Tomographic imaging of East African equatorial ionosphere and study of equatorial plasma bubbles
- Authors: Giday, Nigussie Mezgebe
- Date: 2018
- Subjects: Ionosphere -- Africa, Central , Tomography -- Africa, Central , Global Positioning System , Neural networks (Computer science) , Space environment , Multi-Instrument Data Analysis System (MIDAS) , Equatorial plasma bubbles
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/63980 , vital:28516
- Description: In spite of the fact that the African ionospheric equatorial region has the largest ground footprint along the geomagnetic equator, it has not been well studied due to the absence of adequate ground-based instruments. This thesis presents research on both tomographic imaging of the African equatorial ionosphere and the study of the ionospheric irregularities/equatorial plasma bubbles (EPBs) under varying geomagnetic conditions. The Multi-Instrument Data Analysis System (MIDAS), an inversion algorithm, was investigated for its validity and ability as a tool to reconstruct multi-scaled ionospheric structures for different geomagnetic conditions. This was done for the narrow East African longitude sector with data from the available ground Global Positioning Sys-tem (GPS) receivers. The MIDAS results were compared to the results of two models, namely the IRI and GIM. MIDAS results compared more favourably with the observation vertical total electron content (VTEC), with a computed maximum correlation coefficient (r) of 0.99 and minimum root-mean-square error (RMSE) of 2.91 TECU, than did the results of the IRI-2012 and GIM models with maximum r of 0.93 and 0.99, and minimum RMSE of 13.03 TECU and 6.52 TECU, respectively, over all the test stations and validation days. The ability of MIDAS to reconstruct storm-time TEC was also compared with the results produced by the use of a Artificial Neural Net-work (ANN) for the African low- and mid-latitude regions. In terms of latitude, on average,MIDAS performed 13.44 % better than ANN in the African mid-latitudes, while MIDAS under performed in low-latitudes. This thesis also reports on the effects of moderate geomagnetic conditions on the evolution of EPBs and/or ionospheric irregularities during their season of occurrence using data from (or measurements by) space- and ground-based instruments for the east African equatorial sector. The study showed that the strength of daytime equatorial electrojet (EEJ), the steepness of the TEC peak-to-trough gradient and/or the meridional/transequatorial thermospheric winds sometimes have collective/interwoven effects, while at other times one mechanism dominates. In summary, this research offered tomographic results that outperform the results of the commonly used (“standard”) global models (i.e. IRI and GIM) for a longitude sector of importance to space weather, which has not been adequately studied due to a lack of sufficient instrumentation.
- Full Text:
- Date Issued: 2018
- Authors: Giday, Nigussie Mezgebe
- Date: 2018
- Subjects: Ionosphere -- Africa, Central , Tomography -- Africa, Central , Global Positioning System , Neural networks (Computer science) , Space environment , Multi-Instrument Data Analysis System (MIDAS) , Equatorial plasma bubbles
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/63980 , vital:28516
- Description: In spite of the fact that the African ionospheric equatorial region has the largest ground footprint along the geomagnetic equator, it has not been well studied due to the absence of adequate ground-based instruments. This thesis presents research on both tomographic imaging of the African equatorial ionosphere and the study of the ionospheric irregularities/equatorial plasma bubbles (EPBs) under varying geomagnetic conditions. The Multi-Instrument Data Analysis System (MIDAS), an inversion algorithm, was investigated for its validity and ability as a tool to reconstruct multi-scaled ionospheric structures for different geomagnetic conditions. This was done for the narrow East African longitude sector with data from the available ground Global Positioning Sys-tem (GPS) receivers. The MIDAS results were compared to the results of two models, namely the IRI and GIM. MIDAS results compared more favourably with the observation vertical total electron content (VTEC), with a computed maximum correlation coefficient (r) of 0.99 and minimum root-mean-square error (RMSE) of 2.91 TECU, than did the results of the IRI-2012 and GIM models with maximum r of 0.93 and 0.99, and minimum RMSE of 13.03 TECU and 6.52 TECU, respectively, over all the test stations and validation days. The ability of MIDAS to reconstruct storm-time TEC was also compared with the results produced by the use of a Artificial Neural Net-work (ANN) for the African low- and mid-latitude regions. In terms of latitude, on average,MIDAS performed 13.44 % better than ANN in the African mid-latitudes, while MIDAS under performed in low-latitudes. This thesis also reports on the effects of moderate geomagnetic conditions on the evolution of EPBs and/or ionospheric irregularities during their season of occurrence using data from (or measurements by) space- and ground-based instruments for the east African equatorial sector. The study showed that the strength of daytime equatorial electrojet (EEJ), the steepness of the TEC peak-to-trough gradient and/or the meridional/transequatorial thermospheric winds sometimes have collective/interwoven effects, while at other times one mechanism dominates. In summary, this research offered tomographic results that outperform the results of the commonly used (“standard”) global models (i.e. IRI and GIM) for a longitude sector of importance to space weather, which has not been adequately studied due to a lack of sufficient instrumentation.
- Full Text:
- Date Issued: 2018
Topic : an appraisal of youth social entrepreneurship for positive youth development in Amathole District Municipality, Eastern Cape
- Authors: Ntlemeza, Aphiwe Ziyanda
- Date: 2018
- Subjects: Social entrepreneurship -- South Africa -- Eastern Cape Youth development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , Rural Development
- Identifier: http://hdl.handle.net/10353/10974 , vital:35971
- Description: This study explores social entrepreneurship projects which are specifically run by the youth in an attempt to mitigate poverty and unemployment in the Amathole District Municipality, Eastern Cape. It also evaluates the extent to which selected social entrepreneurship interventions have contributed to employment creation and income generation. Furthermore, not only does the study investigate social entrepreneurship opportunities available for rural youth in Amathole but goes further to evaluate the sustainability of existing social entrepreneurship projects. The challenges faced by rural youth in pursuing social entrepreneurship are also explored. In so doing, the study is underpinned by the Positivist Youth Development (PYD) theory. The study found that the youth of Amathole District Municipality have a positive attitude towards social entrepreneurship. They engage in a variety of social enterprises. However, the youth face many constraints such as lack of access to finance, lack of business skills, lack of entrepreneurial education and lack of technical support. All these constraints are interrelated and lead to issues of unsustainability and limited income generation and employment creation. Informed by these constraints, the study recommends coordinated awareness campaigns and government (national/provincial) response about social entrepreneurship and community needs within Amathole. To further understand social entrepreneurship, there is need for further studies to investigate the attitudes and constraints of women towards social entrepreneurship as well as youth’s understanding of social entrepreneurship in general.
- Full Text:
- Date Issued: 2018
- Authors: Ntlemeza, Aphiwe Ziyanda
- Date: 2018
- Subjects: Social entrepreneurship -- South Africa -- Eastern Cape Youth development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , Rural Development
- Identifier: http://hdl.handle.net/10353/10974 , vital:35971
- Description: This study explores social entrepreneurship projects which are specifically run by the youth in an attempt to mitigate poverty and unemployment in the Amathole District Municipality, Eastern Cape. It also evaluates the extent to which selected social entrepreneurship interventions have contributed to employment creation and income generation. Furthermore, not only does the study investigate social entrepreneurship opportunities available for rural youth in Amathole but goes further to evaluate the sustainability of existing social entrepreneurship projects. The challenges faced by rural youth in pursuing social entrepreneurship are also explored. In so doing, the study is underpinned by the Positivist Youth Development (PYD) theory. The study found that the youth of Amathole District Municipality have a positive attitude towards social entrepreneurship. They engage in a variety of social enterprises. However, the youth face many constraints such as lack of access to finance, lack of business skills, lack of entrepreneurial education and lack of technical support. All these constraints are interrelated and lead to issues of unsustainability and limited income generation and employment creation. Informed by these constraints, the study recommends coordinated awareness campaigns and government (national/provincial) response about social entrepreneurship and community needs within Amathole. To further understand social entrepreneurship, there is need for further studies to investigate the attitudes and constraints of women towards social entrepreneurship as well as youth’s understanding of social entrepreneurship in general.
- Full Text:
- Date Issued: 2018
Topic map for representing network security competencies
- Authors: Yekela, Odwa
- Date: 2018
- Subjects: Computer networks , Computer networks -- Security measures Computers -- Access control
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/36368 , vital:33931
- Description: Competencies represent the knowledge, skills and attitudes required for job roles. Organisations need to understand and grow competencies within their workforce in order to be more competitive and to maximise new market opportunities. Competency Management is the process of introducing, managing and enforcing competencies in organisations. Through this process, occupational competencies can be assessed to see if candidates match the required job role expectations. The assessment of competencies can be conceptualised from two perspectives. The rst is `competency frameworks', which describe competencies from a high-level overview. As such, they are regarded as theWhat" element of competency. The second perspective is `competencybased learning', which focuses on addressing competencies from a more detailed, task-oriented perspective. Competency-based learning is regarded as the How" element of competency. Currently, there is no available tool that can map the What" with the How" element of competency. Such a mapping would provide a more holistic approach to representing competencies. This dissertation adopts the topic map standard in order to demonstrate a holistic approach to mapping competencies, specially in network security. This is accomplished through the design and evaluation of a Design Science artefact. In this research process a topic map data model was constructed from mapping the `What' and `How' elements together. To demonstrate the applicability of the model, it was implemented in a Computer Security Incident Response Team (CSIRT) recruitment scenario. The aim of this demonstration was to prove that the topic map could be implemented in an organisational context.
- Full Text:
- Date Issued: 2018
- Authors: Yekela, Odwa
- Date: 2018
- Subjects: Computer networks , Computer networks -- Security measures Computers -- Access control
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/36368 , vital:33931
- Description: Competencies represent the knowledge, skills and attitudes required for job roles. Organisations need to understand and grow competencies within their workforce in order to be more competitive and to maximise new market opportunities. Competency Management is the process of introducing, managing and enforcing competencies in organisations. Through this process, occupational competencies can be assessed to see if candidates match the required job role expectations. The assessment of competencies can be conceptualised from two perspectives. The rst is `competency frameworks', which describe competencies from a high-level overview. As such, they are regarded as theWhat" element of competency. The second perspective is `competencybased learning', which focuses on addressing competencies from a more detailed, task-oriented perspective. Competency-based learning is regarded as the How" element of competency. Currently, there is no available tool that can map the What" with the How" element of competency. Such a mapping would provide a more holistic approach to representing competencies. This dissertation adopts the topic map standard in order to demonstrate a holistic approach to mapping competencies, specially in network security. This is accomplished through the design and evaluation of a Design Science artefact. In this research process a topic map data model was constructed from mapping the `What' and `How' elements together. To demonstrate the applicability of the model, it was implemented in a Computer Security Incident Response Team (CSIRT) recruitment scenario. The aim of this demonstration was to prove that the topic map could be implemented in an organisational context.
- Full Text:
- Date Issued: 2018
Toward distributed key management for offline authentication
- Linklater, Gregory, Smith, Christian, Herbert, Alan, Irwin, Barry V W
- Authors: Linklater, Gregory , Smith, Christian , Herbert, Alan , Irwin, Barry V W
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430283 , vital:72680 , https://doi.org/10.1145/3278681.3278683
- Description: Self-sovereign identity promises prospective users greater control, security, privacy, portability and overall greater convenience; however the immaturity of current distributed key management solutions results in general disregard of security advisories in favour of convenience and accessibility. This research proposes the use of intermediate certificates as a distributed key management solution. Intermediate certificates will be shown to allow multiple keys to authenticate to a single self-sovereign identity. Keys may be freely added to an identity without requiring a distributed ledger, any other third-party service or sharing private keys between devices. This research will also show that key rotation is a superior alternative to existing key recovery and escrow systems in helping users recover when their keys are lost or compromised. These features will allow remote credentials to be used to issuer, present and appraise remote attestations, without relying on a constant Internet connection.
- Full Text:
- Date Issued: 2018
- Authors: Linklater, Gregory , Smith, Christian , Herbert, Alan , Irwin, Barry V W
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430283 , vital:72680 , https://doi.org/10.1145/3278681.3278683
- Description: Self-sovereign identity promises prospective users greater control, security, privacy, portability and overall greater convenience; however the immaturity of current distributed key management solutions results in general disregard of security advisories in favour of convenience and accessibility. This research proposes the use of intermediate certificates as a distributed key management solution. Intermediate certificates will be shown to allow multiple keys to authenticate to a single self-sovereign identity. Keys may be freely added to an identity without requiring a distributed ledger, any other third-party service or sharing private keys between devices. This research will also show that key rotation is a superior alternative to existing key recovery and escrow systems in helping users recover when their keys are lost or compromised. These features will allow remote credentials to be used to issuer, present and appraise remote attestations, without relying on a constant Internet connection.
- Full Text:
- Date Issued: 2018
Towards a collection of cost-effective technologies in support of the NIST cybersecurity framework
- Shackleton, Bruce Michael Stuart
- Authors: Shackleton, Bruce Michael Stuart
- Date: 2018
- Subjects: National Institute of Standards and Technology (U.S.) , Computer security , Computer networks Security measures , Small business Information technology Cost effectiveness , Open source software
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62494 , vital:28199
- Description: The NIST Cybersecurity Framework (CSF) is a specific risk and cybersecurity framework. It provides guidance on controls that can be implemented to help improve an organisation’s cybersecurity risk posture. The CSF Functions consist of Identify, Protect, Detect, Respond, and Recover. Like most Information Technology (IT) frameworks, there are elements of people, processes, and technology. The same elements are required to successfully implement the NIST CSF. This research specifically focuses on the technology element. While there are many commercial technologies available for a small to medium sized business, the costs can be prohibitively expensive. Therefore, this research investigates cost-effective technologies and assesses their alignment to the NIST CSF. The assessment was made against the NIST CSF subcategories. Each subcategory was analysed to identify where a technology would likely be required. The framework provides a list of Informative References. These Informative References were used to create high- level technology categories, as well as identify the technical controls against which the technologies were measured. The technologies tested were either open source or proprietary. All open source technologies tested were free to use, or have a free community edition. Proprietary technologies would be free to use, or considered generally available to most organisations, such as components contained within Microsoft platforms. The results from the experimentation demonstrated that there are multiple cost-effective technologies that can support the NIST CSF. Once all technologies were tested, the NIST CSF was extended. Two new columns were added, namely high-level technology category, and tested technology. The columns were populated with output from the research. This extended framework begins an initial collection of cost-effective technologies in support of the NIST CSF.
- Full Text:
- Date Issued: 2018
- Authors: Shackleton, Bruce Michael Stuart
- Date: 2018
- Subjects: National Institute of Standards and Technology (U.S.) , Computer security , Computer networks Security measures , Small business Information technology Cost effectiveness , Open source software
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/62494 , vital:28199
- Description: The NIST Cybersecurity Framework (CSF) is a specific risk and cybersecurity framework. It provides guidance on controls that can be implemented to help improve an organisation’s cybersecurity risk posture. The CSF Functions consist of Identify, Protect, Detect, Respond, and Recover. Like most Information Technology (IT) frameworks, there are elements of people, processes, and technology. The same elements are required to successfully implement the NIST CSF. This research specifically focuses on the technology element. While there are many commercial technologies available for a small to medium sized business, the costs can be prohibitively expensive. Therefore, this research investigates cost-effective technologies and assesses their alignment to the NIST CSF. The assessment was made against the NIST CSF subcategories. Each subcategory was analysed to identify where a technology would likely be required. The framework provides a list of Informative References. These Informative References were used to create high- level technology categories, as well as identify the technical controls against which the technologies were measured. The technologies tested were either open source or proprietary. All open source technologies tested were free to use, or have a free community edition. Proprietary technologies would be free to use, or considered generally available to most organisations, such as components contained within Microsoft platforms. The results from the experimentation demonstrated that there are multiple cost-effective technologies that can support the NIST CSF. Once all technologies were tested, the NIST CSF was extended. Two new columns were added, namely high-level technology category, and tested technology. The columns were populated with output from the research. This extended framework begins an initial collection of cost-effective technologies in support of the NIST CSF.
- Full Text:
- Date Issued: 2018
Towards a community based conservation strategy for wetlands in Uganda
- Authors: Barakagira, Alex
- Date: 2018
- Subjects: Conservation of natural resources , Wetland conservation -- Uganda Wetlands -- Uganda -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/23902 , vital:30640
- Description: Conservation of natural resources in Uganda focuses primarily on protected areas, including savannah national parks, mainly for conserving big game and forests, for controlling the harvest of commercially valuable timber resources, with less concern for wetlands. Later, policies and legislation in Uganda favoured agricultural production rather than the conservation of wetlands, a situation that culminated in their degradation. In a bid to counter the effects of wetlands degradation, Wetland Management Agencies were created. These agencies excluded the input of members of the local communities who reside in the wetlands environs. Local communities were not consulted on matters concerning management and conservation strategies, a situation that may have escalated the problem of wetlands degradation. Local knowledge is needed for the effective management and conservation of the wetlands and it is essential that local communities are included in decision making. This research study is more of an initiative for providing information that may be essential for the formulation of a community based conservation strategy for wetlands in Uganda. The study aimed to identify and characterize activities carried out by members of the local communities in wetlands found in central and western Uganda that are responsible for their progressive degradation; to assess the performance of existing Wetlands Management Institutions towards protection and conservation of wetlands in Uganda; to ascertain whether the acts and policies that have been promulgated for the protection of wetlands in Uganda have been adhered to by members of the local communities and to evaluate three community based conservation case studies with two vastly different outcomes in order to come up with the community-based conservation principles Ugandan communities may need to adopt to achieve sustainable utilisation and conservation of wetland resources. To achieve the objectives stated above, the researcher used a multi-disciplinary methodology that required several areas of expertise and sources of information. Hence, to accomplish the study, primary sources of data that included quantitative and qualitative data were collected from the study participants by means of a questionnaire survey, key informant interviews and direct observations. Secondary sources of data centred on published Ugandan acts and policies; textbooks; case study articles and journal articles. The study revealed a host of activities in which members of the local community are involved that have led to the degradation of the wetlands in Uganda. These include but are not limited to crop cultivation, dairy farming and unsustainable wetland resource harvesting. A number of other reasons for the degradation of the wetlands include unclear ownership of the wetlands, unclear wetland boundaries and a lack of awareness of the indirect benefits wetlands provide for members of the local communities. The study disclosed that wetlands management institutions have not been effective in the protection and conservation of wetlands in Uganda, mainly due to political interference and inadequate funding for the institutions’ conservation activities. The acts and policies that were promulgated for the protection and conservation of wetlands have been selectively implemented in some places and in others completely ignored, culminating in the degradation of the wetlands. The study revealed that effective community based conservation of wetlands in Uganda includes: initiation of the planning, implementation, monitoring and evaluation of all wetlands activities being borne by members of the local community; government introducing alternative income-generating activities aimed to reduce over-reliance on wetland resources and education of the local communities regarding the community-based projects’ objectives in order to garner their support. Recommendations emanating from this study are that the Land Act should be amended to specify a particular land tenure system, preferably freehold, which may promote the conservation of wetlands in Uganda; fertilizers (organic) should be introduced in the study area to fertilize the uplands that have reportedly become infertile in order to reduce the pressure the local community members are exerting on the wetlands for agriculture; wetlands management institutions should be empowered financially and political interference in activities aimed at conservation of wetlands in Uganda must cease. There should be uniform implementation of the rules and regulations stipulated in the acts and policies for all members of the public concerning wetlands protection. Lastly, essential community based conservation principles, as stated above, need to be applied carefully and adhered to if effective implementation of community-based conservation of wetlands is to be achieved in Uganda.
- Full Text:
- Date Issued: 2018
- Authors: Barakagira, Alex
- Date: 2018
- Subjects: Conservation of natural resources , Wetland conservation -- Uganda Wetlands -- Uganda -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/23902 , vital:30640
- Description: Conservation of natural resources in Uganda focuses primarily on protected areas, including savannah national parks, mainly for conserving big game and forests, for controlling the harvest of commercially valuable timber resources, with less concern for wetlands. Later, policies and legislation in Uganda favoured agricultural production rather than the conservation of wetlands, a situation that culminated in their degradation. In a bid to counter the effects of wetlands degradation, Wetland Management Agencies were created. These agencies excluded the input of members of the local communities who reside in the wetlands environs. Local communities were not consulted on matters concerning management and conservation strategies, a situation that may have escalated the problem of wetlands degradation. Local knowledge is needed for the effective management and conservation of the wetlands and it is essential that local communities are included in decision making. This research study is more of an initiative for providing information that may be essential for the formulation of a community based conservation strategy for wetlands in Uganda. The study aimed to identify and characterize activities carried out by members of the local communities in wetlands found in central and western Uganda that are responsible for their progressive degradation; to assess the performance of existing Wetlands Management Institutions towards protection and conservation of wetlands in Uganda; to ascertain whether the acts and policies that have been promulgated for the protection of wetlands in Uganda have been adhered to by members of the local communities and to evaluate three community based conservation case studies with two vastly different outcomes in order to come up with the community-based conservation principles Ugandan communities may need to adopt to achieve sustainable utilisation and conservation of wetland resources. To achieve the objectives stated above, the researcher used a multi-disciplinary methodology that required several areas of expertise and sources of information. Hence, to accomplish the study, primary sources of data that included quantitative and qualitative data were collected from the study participants by means of a questionnaire survey, key informant interviews and direct observations. Secondary sources of data centred on published Ugandan acts and policies; textbooks; case study articles and journal articles. The study revealed a host of activities in which members of the local community are involved that have led to the degradation of the wetlands in Uganda. These include but are not limited to crop cultivation, dairy farming and unsustainable wetland resource harvesting. A number of other reasons for the degradation of the wetlands include unclear ownership of the wetlands, unclear wetland boundaries and a lack of awareness of the indirect benefits wetlands provide for members of the local communities. The study disclosed that wetlands management institutions have not been effective in the protection and conservation of wetlands in Uganda, mainly due to political interference and inadequate funding for the institutions’ conservation activities. The acts and policies that were promulgated for the protection and conservation of wetlands have been selectively implemented in some places and in others completely ignored, culminating in the degradation of the wetlands. The study revealed that effective community based conservation of wetlands in Uganda includes: initiation of the planning, implementation, monitoring and evaluation of all wetlands activities being borne by members of the local community; government introducing alternative income-generating activities aimed to reduce over-reliance on wetland resources and education of the local communities regarding the community-based projects’ objectives in order to garner their support. Recommendations emanating from this study are that the Land Act should be amended to specify a particular land tenure system, preferably freehold, which may promote the conservation of wetlands in Uganda; fertilizers (organic) should be introduced in the study area to fertilize the uplands that have reportedly become infertile in order to reduce the pressure the local community members are exerting on the wetlands for agriculture; wetlands management institutions should be empowered financially and political interference in activities aimed at conservation of wetlands in Uganda must cease. There should be uniform implementation of the rules and regulations stipulated in the acts and policies for all members of the public concerning wetlands protection. Lastly, essential community based conservation principles, as stated above, need to be applied carefully and adhered to if effective implementation of community-based conservation of wetlands is to be achieved in Uganda.
- Full Text:
- Date Issued: 2018
Towards a framework to enhance entry-level national diploma students' learning of computer programming - effects of guided inquiry learning
- Authors: Lukose, Jose
- Date: 2018
- Subjects: Computer programming -- Study and teaching Computer science -- Study and teaching (Higher)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10353/9522 , vital:34362
- Description: Research reports using global data show that the failure rates in introductory programming courses average about 32 percent. This study assessed the effect of elements of Guided Inquiry Learning (GIL) on enhancing academic performance of first year students in Introduction to Computer Programming course. As learners from schools join the university and enrol for different courses, they find the sudden transformation quite challenging. This makes it more challenging for first year university students, especially in difficult courses such as Introduction to Programming. As times change with advances in technology, the traditional ways of presenting information during teaching–learning interface may not address students’ needs. Lecturers and university stakeholders make efforts to address these challenges by proposing innovative teaching ways. One of the common approaches that have been used profitably in other science and engineering programmes is GIL. It is a form of inductive collaborative learning approach where students are presented with a challenge which challenges them to accomplish the desired learning outcomes in the process of responding to the posed challenge. The strategies in GIL include, among others, learning teams who participate in intra- and inter-learner interactions besides lecturer-learner interactions, linking theory and practical information cementing skills and problem solving strategies, scaffolding information, blended learning by integrating both traditional and technology-assisted learning, inquiry activities such as initiating investigations, gathering data, and critiquing evidence to come up with evidence-based solutions. The objective was to apply GIL to this module and observe if there were gains in students’ academic performance. This study was located in the pragmatic paradigm using action research design and a mixed method approach. The sample consisted offirst year students enrolled for Introduction to programming which was a year-long course (two semesters) at a South African university. The population consisted of the only 49 students who were registered for the module under focus. A group of 20 students were considered for the whole year in the GIL experiment. Although it would students were considered for the whole year in the GIL experiment. Although it would students were considered for the whole year in the GIL experiment. Although it would have been ideal to have experimental and control groups with same number of students, that was not possible in this study, because only 20 out of the 49 who were willing to be included in the experimental group. The present researcher employed willing to be included in the experimental group. The present researcher employed three of these GIL strategies in teaching the module Introduction to Programming to the experimental group while another colleague continued with traditional teaching in the control group. Care was taken to limit the insider outsider conflict. Both groups were assessed by the same assessment tools at the same times. Results from these assessments together with focus group interviews provided the core data for this study. Both quantitative and qualitative analyses were carried out on the data, statistical analysis (mainly, chi-Square and t-test) for the former and thematic analysis for the latter. Results indicated gains in the experimental group such as enhanced motivation, interaction, intra-group social cohesion, creativity and provided students the confidence to share knowledge and skills with their peers and keep everyone focused on the course contents. These gains are reflected in higher year marks and pass rates than those in the control group as the analysed data indicate. A study that will pilot the GIL framework in several universities with different teaching modes and large classes are recommended.
- Full Text:
- Date Issued: 2018
- Authors: Lukose, Jose
- Date: 2018
- Subjects: Computer programming -- Study and teaching Computer science -- Study and teaching (Higher)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10353/9522 , vital:34362
- Description: Research reports using global data show that the failure rates in introductory programming courses average about 32 percent. This study assessed the effect of elements of Guided Inquiry Learning (GIL) on enhancing academic performance of first year students in Introduction to Computer Programming course. As learners from schools join the university and enrol for different courses, they find the sudden transformation quite challenging. This makes it more challenging for first year university students, especially in difficult courses such as Introduction to Programming. As times change with advances in technology, the traditional ways of presenting information during teaching–learning interface may not address students’ needs. Lecturers and university stakeholders make efforts to address these challenges by proposing innovative teaching ways. One of the common approaches that have been used profitably in other science and engineering programmes is GIL. It is a form of inductive collaborative learning approach where students are presented with a challenge which challenges them to accomplish the desired learning outcomes in the process of responding to the posed challenge. The strategies in GIL include, among others, learning teams who participate in intra- and inter-learner interactions besides lecturer-learner interactions, linking theory and practical information cementing skills and problem solving strategies, scaffolding information, blended learning by integrating both traditional and technology-assisted learning, inquiry activities such as initiating investigations, gathering data, and critiquing evidence to come up with evidence-based solutions. The objective was to apply GIL to this module and observe if there were gains in students’ academic performance. This study was located in the pragmatic paradigm using action research design and a mixed method approach. The sample consisted offirst year students enrolled for Introduction to programming which was a year-long course (two semesters) at a South African university. The population consisted of the only 49 students who were registered for the module under focus. A group of 20 students were considered for the whole year in the GIL experiment. Although it would students were considered for the whole year in the GIL experiment. Although it would students were considered for the whole year in the GIL experiment. Although it would have been ideal to have experimental and control groups with same number of students, that was not possible in this study, because only 20 out of the 49 who were willing to be included in the experimental group. The present researcher employed willing to be included in the experimental group. The present researcher employed three of these GIL strategies in teaching the module Introduction to Programming to the experimental group while another colleague continued with traditional teaching in the control group. Care was taken to limit the insider outsider conflict. Both groups were assessed by the same assessment tools at the same times. Results from these assessments together with focus group interviews provided the core data for this study. Both quantitative and qualitative analyses were carried out on the data, statistical analysis (mainly, chi-Square and t-test) for the former and thematic analysis for the latter. Results indicated gains in the experimental group such as enhanced motivation, interaction, intra-group social cohesion, creativity and provided students the confidence to share knowledge and skills with their peers and keep everyone focused on the course contents. These gains are reflected in higher year marks and pass rates than those in the control group as the analysed data indicate. A study that will pilot the GIL framework in several universities with different teaching modes and large classes are recommended.
- Full Text:
- Date Issued: 2018
Towards a threat assessment framework for consumer health wearables
- Authors: Mnjama, Javan Joshua
- Date: 2018
- Subjects: Activity trackers (Wearable technology) , Computer networks -- Security measures , Data protection , Information storage and retrieval systems -- Security systems , Computer security -- Software , Consumer Health Wearable Threat Assessment Framework , Design Science Research
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/62649 , vital:28225
- Description: The collection of health data such as physical activity, consumption and physiological data through the use of consumer health wearables via fitness trackers are very beneficial for the promotion of physical wellness. However, consumer health wearables and their associated applications are known to have privacy and security concerns that can potentially make the collected personal health data vulnerable to hackers. These concerns are attributed to security theoretical frameworks not sufficiently addressing the entirety of privacy and security concerns relating to the diverse technological ecosystem of consumer health wearables. The objective of this research was therefore to develop a threat assessment framework that can be used to guide the detection of vulnerabilities which affect consumer health wearables and their associated applications. To meet this objective, the Design Science Research methodology was used to develop the desired artefact (Consumer Health Wearable Threat Assessment Framework). The framework is comprised of fourteen vulnerabilities classified according to Authentication, Authorization, Availability, Confidentiality, Non-Repudiation and Integrity. Through developing the artefact, the threat assessment framework was demonstrated on two fitness trackers and their associated applications. It was discovered, that the framework was able to identify how these vulnerabilities affected, these two test cases based on the classification categories of the framework. The framework was also evaluated by four security experts who assessed the quality, utility and efficacy of the framework. Experts, supported the use of the framework as a relevant and comprehensive framework to guide the detection of vulnerabilities towards consumer health wearables and their associated applications. The implication of this research study is that the framework can be used by developers to better identify the vulnerabilities of consumer health wearables and their associated applications. This will assist in creating a more securer environment for the storage and use of health data by consumer health wearables.
- Full Text:
- Date Issued: 2018
- Authors: Mnjama, Javan Joshua
- Date: 2018
- Subjects: Activity trackers (Wearable technology) , Computer networks -- Security measures , Data protection , Information storage and retrieval systems -- Security systems , Computer security -- Software , Consumer Health Wearable Threat Assessment Framework , Design Science Research
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/62649 , vital:28225
- Description: The collection of health data such as physical activity, consumption and physiological data through the use of consumer health wearables via fitness trackers are very beneficial for the promotion of physical wellness. However, consumer health wearables and their associated applications are known to have privacy and security concerns that can potentially make the collected personal health data vulnerable to hackers. These concerns are attributed to security theoretical frameworks not sufficiently addressing the entirety of privacy and security concerns relating to the diverse technological ecosystem of consumer health wearables. The objective of this research was therefore to develop a threat assessment framework that can be used to guide the detection of vulnerabilities which affect consumer health wearables and their associated applications. To meet this objective, the Design Science Research methodology was used to develop the desired artefact (Consumer Health Wearable Threat Assessment Framework). The framework is comprised of fourteen vulnerabilities classified according to Authentication, Authorization, Availability, Confidentiality, Non-Repudiation and Integrity. Through developing the artefact, the threat assessment framework was demonstrated on two fitness trackers and their associated applications. It was discovered, that the framework was able to identify how these vulnerabilities affected, these two test cases based on the classification categories of the framework. The framework was also evaluated by four security experts who assessed the quality, utility and efficacy of the framework. Experts, supported the use of the framework as a relevant and comprehensive framework to guide the detection of vulnerabilities towards consumer health wearables and their associated applications. The implication of this research study is that the framework can be used by developers to better identify the vulnerabilities of consumer health wearables and their associated applications. This will assist in creating a more securer environment for the storage and use of health data by consumer health wearables.
- Full Text:
- Date Issued: 2018
Towards Enhanced Threat Intelligence Through NetFlow Distillation
- Herbert, Alan, Irwin, Barry V W
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427699 , vital:72456 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327624198_Towards_Enhanced_Threat_Intelligence_Through_NetFlow_Distillation/links/5b9a501fa6fdcc59bf8ee8ea/Towards-Enhanced-Threat-Intelligence-Through-NetFlow-Distillation.pdf
- Description: Bolvedere is a hardware-accelerated NetFlow analysis platform intended to discern and distribute NetFlow records in a requested format by a user. This functionality removes the need for a user to deal with the NetFlow protocol directly, and also reduces the requirement of CPU resources as data would be passed on to a host in the known requested format.
- Full Text:
- Date Issued: 2018
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427699 , vital:72456 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327624198_Towards_Enhanced_Threat_Intelligence_Through_NetFlow_Distillation/links/5b9a501fa6fdcc59bf8ee8ea/Towards-Enhanced-Threat-Intelligence-Through-NetFlow-Distillation.pdf
- Description: Bolvedere is a hardware-accelerated NetFlow analysis platform intended to discern and distribute NetFlow records in a requested format by a user. This functionality removes the need for a user to deal with the NetFlow protocol directly, and also reduces the requirement of CPU resources as data would be passed on to a host in the known requested format.
- Full Text:
- Date Issued: 2018
Towards intercultural communication congruence in Sino-African organisational contexts
- Authors: Chigwendere, Fungai Beaula
- Date: 2018
- Subjects: Intercultural communication -- Africa , China -- Foreign economic relations -- Africa , Communication in organizations -- Cross-cultural studies , Corporate culture -- Cross-cultural studies , Africa -- Relations -- China , China -- Relations -- Africa
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/62395 , vital:28172
- Description: Despite the prevalence of theories and research that could serve as guidelines for addressing intercultural communication challenges such as misunderstanding, ineffectiveness and inappropriateness in communication in Sino-African organisational contexts, the continued existence of these challenges suggests the inadequacy of such theories. Accordingly, in consideration of African and Chinese cultural perspectives, the aim of this study was to develop a hybrid intercultural communication congruence (HICC) framework in order to enhance intercultural communication and achieve intercultural communication congruence in Sino-African organisational contexts. In this study, intercultural communication congruence means effectiveness and appropriateness in intercultural communication. To achieve the study aim, an interpretive pragmatism paradigm was adopted, comprising a two-pronged approach of a synthesis of extant literature and theory as well as an empirical qualitative study, both underpinned by cross-cultural management theory. Based on the synthesis of literature and theory, a generic theoretical intercultural communication congruence framework underpinned by intercultural communication awareness - a state where communicants understand communication orientation and manner of communication in their own and their counterparts’ culture - was developed. A further contribution was a theoretical contextualisation of the generic theoretical intercultural communication congruence framework, resulting in a theoretical framework for intercultural communication awareness in Western, African and Chinese cultures and a theoretical intercultural communication congruence framework specific to Sino-African organisational contexts. Thereafter, with the aim of validating the intercultural communication awareness dimension of the theoretical intercultural communication congruence framework specific to Sino-African organisational contexts, an empirical study was conducted with a sample of seven African and eight Chinese experts using indepth interviews with open-ended and semi-structured questions. Based on qualitative content analysis, six intercultural communication awareness enablers or conditions that enable people to understand communication in different cultures and contexts for the purposes of attaining intercultural communication awareness emerged. These were cultural orientation, manner of communication, orientation to rules and protocol, individual dispositions, intercultural communication influences and intercultural communication variations. An integration of the intercultural communication awareness enablers into the generic theoretical intercultural communication congruence framework results in an updated generic theoretical intercultural communication congruence framework. Then, informed by the updated generic theoretical intercultural communication congruence framework, a further contribution of this study was an empirical verification of the intercultural communication awareness dimension of the theoretical intercultural communication congruence framework specific to Sino-African organisational contexts to result in a final hybrid intercultural communication congruence framework for Sino-African organisational contexts supported by the perspectives of those involved in interaction, rather than predetermined standards of other cultures. Empirical findings suggest that both African and Chinese colleagues maintain a sense of collectivism in the Sino- African organisational context, although this is demonstrated differently. In addition, African colleagues display a blended manner of communication characterised by a mix of Western and African ways while the Chinese manner is contextual and governed by roles and relationships. In African culture, rules and protocol are negotiated, aimed at social maintenance, while strong cultural patriotism ensures strict adherence in Chinese culture. In respect of individual dispositions, African people are seen as open and accommodating while the Chinese disposition could be described as closed and ambiguous. Also evident in the findings is the existence of within-culture differences and influence of noncultural factors on intercultural communication that should be addressed in order to achieve intercultural communication congruence. Finally, the frameworks developed and the methodological processes followed will stimulate academic debate and raise numerous questions for future research. Immediate future research could be geared towards refining the concepts of intercultural communication awareness, intercultural communication congruence and the hybrid intercultural communication congruence framework for Sino-African organisational contexts. At a management practice level, intercultural communication awareness insights provide a reference point for intercultural communication enhancement strategies and interventions in Sino-African organisational contexts.
- Full Text:
- Date Issued: 2018
- Authors: Chigwendere, Fungai Beaula
- Date: 2018
- Subjects: Intercultural communication -- Africa , China -- Foreign economic relations -- Africa , Communication in organizations -- Cross-cultural studies , Corporate culture -- Cross-cultural studies , Africa -- Relations -- China , China -- Relations -- Africa
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/62395 , vital:28172
- Description: Despite the prevalence of theories and research that could serve as guidelines for addressing intercultural communication challenges such as misunderstanding, ineffectiveness and inappropriateness in communication in Sino-African organisational contexts, the continued existence of these challenges suggests the inadequacy of such theories. Accordingly, in consideration of African and Chinese cultural perspectives, the aim of this study was to develop a hybrid intercultural communication congruence (HICC) framework in order to enhance intercultural communication and achieve intercultural communication congruence in Sino-African organisational contexts. In this study, intercultural communication congruence means effectiveness and appropriateness in intercultural communication. To achieve the study aim, an interpretive pragmatism paradigm was adopted, comprising a two-pronged approach of a synthesis of extant literature and theory as well as an empirical qualitative study, both underpinned by cross-cultural management theory. Based on the synthesis of literature and theory, a generic theoretical intercultural communication congruence framework underpinned by intercultural communication awareness - a state where communicants understand communication orientation and manner of communication in their own and their counterparts’ culture - was developed. A further contribution was a theoretical contextualisation of the generic theoretical intercultural communication congruence framework, resulting in a theoretical framework for intercultural communication awareness in Western, African and Chinese cultures and a theoretical intercultural communication congruence framework specific to Sino-African organisational contexts. Thereafter, with the aim of validating the intercultural communication awareness dimension of the theoretical intercultural communication congruence framework specific to Sino-African organisational contexts, an empirical study was conducted with a sample of seven African and eight Chinese experts using indepth interviews with open-ended and semi-structured questions. Based on qualitative content analysis, six intercultural communication awareness enablers or conditions that enable people to understand communication in different cultures and contexts for the purposes of attaining intercultural communication awareness emerged. These were cultural orientation, manner of communication, orientation to rules and protocol, individual dispositions, intercultural communication influences and intercultural communication variations. An integration of the intercultural communication awareness enablers into the generic theoretical intercultural communication congruence framework results in an updated generic theoretical intercultural communication congruence framework. Then, informed by the updated generic theoretical intercultural communication congruence framework, a further contribution of this study was an empirical verification of the intercultural communication awareness dimension of the theoretical intercultural communication congruence framework specific to Sino-African organisational contexts to result in a final hybrid intercultural communication congruence framework for Sino-African organisational contexts supported by the perspectives of those involved in interaction, rather than predetermined standards of other cultures. Empirical findings suggest that both African and Chinese colleagues maintain a sense of collectivism in the Sino- African organisational context, although this is demonstrated differently. In addition, African colleagues display a blended manner of communication characterised by a mix of Western and African ways while the Chinese manner is contextual and governed by roles and relationships. In African culture, rules and protocol are negotiated, aimed at social maintenance, while strong cultural patriotism ensures strict adherence in Chinese culture. In respect of individual dispositions, African people are seen as open and accommodating while the Chinese disposition could be described as closed and ambiguous. Also evident in the findings is the existence of within-culture differences and influence of noncultural factors on intercultural communication that should be addressed in order to achieve intercultural communication congruence. Finally, the frameworks developed and the methodological processes followed will stimulate academic debate and raise numerous questions for future research. Immediate future research could be geared towards refining the concepts of intercultural communication awareness, intercultural communication congruence and the hybrid intercultural communication congruence framework for Sino-African organisational contexts. At a management practice level, intercultural communication awareness insights provide a reference point for intercultural communication enhancement strategies and interventions in Sino-African organisational contexts.
- Full Text:
- Date Issued: 2018
Towards place-based research to support social–ecological stewardship
- Cundill, Georgina, Cockburn, Jessica J, Shackleton, Sheona E
- Authors: Cundill, Georgina , Cockburn, Jessica J , Shackleton, Sheona E
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/125053 , vital:35724 , https://doi.org/10.3390/su10051434
- Description: Concerns about ecological degradation and social inequalities have prompted increasing calls for stewardship in the social–ecological systems and sustainability science literature. However, how can the ideals of stewardship be realised in practice? The links between the theory and practice of stewardship are under-developed, and research to support place-based stewardship practice is limited. We therefore bring together complementary perspectives to guide research on place-based stewardship practice in the context of multifunctional landscapes. We unpack and synthesise literature on stewardship, landscapes, and collaboration for natural resource management, and highlight the ways in which the pathways approach can deepen research on collaboration and stewardship practice. We propose landscapes as a suitable level of analysis and action for stewardship. Since all landscapes are multifunctional, we argue that collaboration among multiple stakeholders is a necessary focus of such research. Our analysis reveals that existing theory on collaboration could be deepened by further research into the agency of individual human actors, the complex social–relational dynamics among actors, and the situatedness of actors within the social–ecological context. These factors mediate collaborative processes, and a better understanding of them is needed to support place-based stewardship practice. To this end, the pathways approach offers a waymark to advance research on collaboration, particularly in the complex, contested social–ecological systems that tend to characterize multifunctional landscapes.
- Full Text:
- Date Issued: 2018
- Authors: Cundill, Georgina , Cockburn, Jessica J , Shackleton, Sheona E
- Date: 2018
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/125053 , vital:35724 , https://doi.org/10.3390/su10051434
- Description: Concerns about ecological degradation and social inequalities have prompted increasing calls for stewardship in the social–ecological systems and sustainability science literature. However, how can the ideals of stewardship be realised in practice? The links between the theory and practice of stewardship are under-developed, and research to support place-based stewardship practice is limited. We therefore bring together complementary perspectives to guide research on place-based stewardship practice in the context of multifunctional landscapes. We unpack and synthesise literature on stewardship, landscapes, and collaboration for natural resource management, and highlight the ways in which the pathways approach can deepen research on collaboration and stewardship practice. We propose landscapes as a suitable level of analysis and action for stewardship. Since all landscapes are multifunctional, we argue that collaboration among multiple stakeholders is a necessary focus of such research. Our analysis reveals that existing theory on collaboration could be deepened by further research into the agency of individual human actors, the complex social–relational dynamics among actors, and the situatedness of actors within the social–ecological context. These factors mediate collaborative processes, and a better understanding of them is needed to support place-based stewardship practice. To this end, the pathways approach offers a waymark to advance research on collaboration, particularly in the complex, contested social–ecological systems that tend to characterize multifunctional landscapes.
- Full Text:
- Date Issued: 2018
Towards the development of a conceptual framework for hospital performance assessment of a South African public hospital in the Eastern Cape province
- Authors: Wagner, Rolene Margaret
- Date: 2018
- Subjects: Public hospitals Hospital care Hospitals -- Administration
- Language: English
- Type: Thesis , Masters , MPH
- Identifier: http://hdl.handle.net/10353/12249 , vital:39223
- Description: An integrated conceptual framework for measuring and comparing the performance of a South African teaching hospital in the Eastern Cape Province with other hospitals, is not available. The aim of this study was therefore to contribute to the development of a conceptual framework for assessing the performance of a SA public hospital in the Eastern Cape Province. The systematic literature review included all black and grey literature that relate to one of the two main themes- the purpose of measuring hospital performance and the methodology of assessing hospital performance. Relevant studies were identified through a Google search using the following descriptors: “Hospital Performance”, and “Hospital Performance Assessment”. There were 369 scholarly articles with the exact descriptors anywhere in the article with 59 articles released during the period 2012 to 2016. Ultimately, 7 articles met all the inclusionary criteria and described enterprise wide assessments of hospital performance. Other relevant articles, inclusive of grey literature, are included. Two of the studies in Morocco and Costa Rica were systematic reviews of hospital performance and covered the period 2000-2011. The Botswana case study assessed the use of the WHO PATH tool to measure the performance of its public hospitals. The Iranian, United States and Malaysian studies reflected on single aspect measures of hospital performance such as efficiency; the effect of weighting hospital performance indicators for patient harm on hospital profiles and payment; and Bed Occupancy rates, respectively. The review of the challenges associated with developing a hospital performance assessment framework was not found to be as useful as the other articles. The WHO PATH tool provides a high level integrated conceptual framework for measuring and comparing the performance of a South African teaching hospital in the Eastern Cape Province with other hospitals. This, however, needs to be adapted to the South African context with specific indicators being selected by local stakeholders that will promote best possible patient outcomes and a positive experience of patient-centred care at effective and efficient public health facilities. Lessons can be drawn from other countries’ experiences that have implemented hospital performance assessments and tested specific performance indicators.
- Full Text:
- Date Issued: 2018
- Authors: Wagner, Rolene Margaret
- Date: 2018
- Subjects: Public hospitals Hospital care Hospitals -- Administration
- Language: English
- Type: Thesis , Masters , MPH
- Identifier: http://hdl.handle.net/10353/12249 , vital:39223
- Description: An integrated conceptual framework for measuring and comparing the performance of a South African teaching hospital in the Eastern Cape Province with other hospitals, is not available. The aim of this study was therefore to contribute to the development of a conceptual framework for assessing the performance of a SA public hospital in the Eastern Cape Province. The systematic literature review included all black and grey literature that relate to one of the two main themes- the purpose of measuring hospital performance and the methodology of assessing hospital performance. Relevant studies were identified through a Google search using the following descriptors: “Hospital Performance”, and “Hospital Performance Assessment”. There were 369 scholarly articles with the exact descriptors anywhere in the article with 59 articles released during the period 2012 to 2016. Ultimately, 7 articles met all the inclusionary criteria and described enterprise wide assessments of hospital performance. Other relevant articles, inclusive of grey literature, are included. Two of the studies in Morocco and Costa Rica were systematic reviews of hospital performance and covered the period 2000-2011. The Botswana case study assessed the use of the WHO PATH tool to measure the performance of its public hospitals. The Iranian, United States and Malaysian studies reflected on single aspect measures of hospital performance such as efficiency; the effect of weighting hospital performance indicators for patient harm on hospital profiles and payment; and Bed Occupancy rates, respectively. The review of the challenges associated with developing a hospital performance assessment framework was not found to be as useful as the other articles. The WHO PATH tool provides a high level integrated conceptual framework for measuring and comparing the performance of a South African teaching hospital in the Eastern Cape Province with other hospitals. This, however, needs to be adapted to the South African context with specific indicators being selected by local stakeholders that will promote best possible patient outcomes and a positive experience of patient-centred care at effective and efficient public health facilities. Lessons can be drawn from other countries’ experiences that have implemented hospital performance assessments and tested specific performance indicators.
- Full Text:
- Date Issued: 2018
Towards transformative social learning on the path to 1.5 degrees
- Macintyre, Thomas, Lotz-Sisitka, Heila, Wals, Arjen E, Vogel, Coleen, Tassone, Valenina
- Authors: Macintyre, Thomas , Lotz-Sisitka, Heila , Wals, Arjen E , Vogel, Coleen , Tassone, Valenina
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/182461 , vital:43832 , xlink:href="https://doi.org/10.1016/j.cosust.2017.12.003"
- Description: This paper provides insights into learning orientations and approaches that encourage change and transformation on the path to achieving the 1.5 degree C target. This literature review of the climate change and education/learning interface positions relevant literature in a heuristic tool, and reveals different learning approaches to addressing climate change. We highlight that although traditional lines of departure for achieving climate targets are usually technocratic in nature, especially if a zero emissions pathway is aimed for, there is an increasing realisation that climate issues are complex, deeply intertwined with unsustainable development and cultural change, and require collective engagement. Through considering the 1.5 degree C target as a metaphor for the fundamental changes needed in society, we argue that a wide range of learning orientations, including more inclusive and transformative social learning approaches, are needed to address the colossal challenges facing society.
- Full Text:
- Date Issued: 2018
- Authors: Macintyre, Thomas , Lotz-Sisitka, Heila , Wals, Arjen E , Vogel, Coleen , Tassone, Valenina
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/182461 , vital:43832 , xlink:href="https://doi.org/10.1016/j.cosust.2017.12.003"
- Description: This paper provides insights into learning orientations and approaches that encourage change and transformation on the path to achieving the 1.5 degree C target. This literature review of the climate change and education/learning interface positions relevant literature in a heuristic tool, and reveals different learning approaches to addressing climate change. We highlight that although traditional lines of departure for achieving climate targets are usually technocratic in nature, especially if a zero emissions pathway is aimed for, there is an increasing realisation that climate issues are complex, deeply intertwined with unsustainable development and cultural change, and require collective engagement. Through considering the 1.5 degree C target as a metaphor for the fundamental changes needed in society, we argue that a wide range of learning orientations, including more inclusive and transformative social learning approaches, are needed to address the colossal challenges facing society.
- Full Text:
- Date Issued: 2018
Towards understanding the effect of size variation on the aggressive and feeding behaviours of juvenile dusky kob Argyrosomus japonicus (Pisces: Sciaenidae)
- Authors: Babane, Siviwe Elvis
- Date: 2018
- Subjects: Argyrosomus -- Feeding and feeds , Aquaculture , Fishes -- Cannibalism , Fishes -- Feeding and feeds
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59592 , vital:27629
- Description: Many studies have been conducted on the effect of size-grading in other fish species. However, there is a paucity of scientific information on the effects of size variation on cannibalism of juvenile dusky kob. Thus, a study focusing on the effect of size variation on juvenile dusky kob aggressive and feeding (browsing) behaviours was conducted. Three separate groups of hatchery-reared juvenile dusky kob of were obtained from Oceanwise (Pty) Ltd for use in a series of three experimental trials. In all trials, juvenile fish of the same age were size-graded and the COV-value was used to determine the size variation. The focal fish (largest fish) was exposed to groups of fish with different size variation for 30-min. behavioural observations before and after feeding in randomised trials. The first experimental trial (Chapter 2) quantified the effect of increasing size variation and observation time on the aggressive and browsing behaviours of juvenile dusky kob. On average, juvenile dusky kob weighed 3.60 ± 0.68 g fish-1 and measured 5.8 ± 0.41 mm. Each focal fish was observed (a) before feeding in the morning, (b) 2 h after feeding, (c) 6 h after feeding and (d) 12 h after feeding. Fish increased browsing behaviours (averaging 6.60 ± 0.56) and decreased intimidating aggressive behaviours (18.60 ± 1.39) 12 h after feeding. Other aggressive behaviours occurred but did not differ between observation times. Aggressive and browsing behaviours positively correlated with size variation variables, predominantly, 12 h after feeding. An average frequency of 19 chases were observed positively correlated with size variation, followed by average frequencies of 17 body bites and browses, and 11 tail bites per 30 min. Some behaviours including average frequencies of 0.2 chases, 4 tail bites, 2.4 intimidating and 0.3 browsing behaviours negatively correlated with the size variation, generally closer to the last meal. These preliminary observations thus showed that fish have become hungry approximately 6-12 h after feeding and substituted certain behaviours for others as time after feeding passed and as size variation increased. The second experimental trial (Chapter 3) consisted of the observations further testing the relationship between aggressive behaviours and size variation of juveniles of dusky kob averaging 0.43 ± 0.27 g fish-1. The focal fish was exposed to groups of fish of four size variation (COV) treatments for observations before and 12 h after feeding. Aggressive behaviours positively correlated with size variation both before and 12 h after feeding. An average frequency of 437 body bites positively correlated more often with COV, followed by average frequencies of 365 intimidating behaviours and 199 tail bites per 30 min., respectively, before and 12 h after feeding. The least often exhibited aggressive behaviours averaged 26 chases while positively correlating with size variation on the times specified. An average frequency of 311 intimidating behaviours before and after feeding including average of 28 tail bites after feeding negatively correlated with size variation. This may relate to shift of behaviours depending on the needs and capacity of the fish. Apparently, aggressive fish can change its behaviour as a function of COV-values rather than the mean size of the other fish. The third trial (Chapter 4) investigated the effect of the aggressor’s (focal fish) size in relation its aggressive and browsing behaviours to other fish (non-focal fish). Juvenile fish used for this trial, on average, weighed 30 ± 7.63 g fish-1. Aggressive and browsing behaviours were observed in four treatments of a) high COV and mean weight below, b) low COV and mean weight less, c) high COV and mean weight equivalent to and d) low COV and mean weight higher than that of the focal fish. Increased frequencies of aggressive and browsing behaviours per 30 min. occurred in treatment A, sharing similar frequencies in treatment C, compared to the other treatments (B and D) which shared certain frequencies. The intimidating behaviours predominated, followed by browsing, body bites, chases and tail bites, respectively. The results of the overall study suggest that the time passed after feeding and increasing size variation and differences facilitated aggressive and browsing behaviours in juvenile dusky kob. Dusky kob showed increasing aggressive behaviours as early as in the first two weeks after hatching, averaging 0.43 ± 0.27 g fish-1 with the frequency correlating with size differences. Consistent size-grading technique in the same-age fish should be used to manage size variation associated with aggressive behaviours. The period of about 4-6 h after feeding may explain the noticeable increased aggressive and browsing behaviours. Thus, fish should be fed immediately before or after evacuation of their guts to maintain less-aggressive behaviours of juvenile dusky kob. Fish generally increased aggressive and browsing acts before and long time after feeding than closer to after feeding. The study has provided the fundamental scientific groundwork for fish farmers and future researchers can further explore size variation, time after feeding and gut evacuation rate as critical components of aggressive behaviours. The scientific knowledge of aggressive and cannibalistic behaviours has essential application in farming management to achieve improved survival and growth rates in juvenile fish.
- Full Text:
- Date Issued: 2018
- Authors: Babane, Siviwe Elvis
- Date: 2018
- Subjects: Argyrosomus -- Feeding and feeds , Aquaculture , Fishes -- Cannibalism , Fishes -- Feeding and feeds
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/59592 , vital:27629
- Description: Many studies have been conducted on the effect of size-grading in other fish species. However, there is a paucity of scientific information on the effects of size variation on cannibalism of juvenile dusky kob. Thus, a study focusing on the effect of size variation on juvenile dusky kob aggressive and feeding (browsing) behaviours was conducted. Three separate groups of hatchery-reared juvenile dusky kob of were obtained from Oceanwise (Pty) Ltd for use in a series of three experimental trials. In all trials, juvenile fish of the same age were size-graded and the COV-value was used to determine the size variation. The focal fish (largest fish) was exposed to groups of fish with different size variation for 30-min. behavioural observations before and after feeding in randomised trials. The first experimental trial (Chapter 2) quantified the effect of increasing size variation and observation time on the aggressive and browsing behaviours of juvenile dusky kob. On average, juvenile dusky kob weighed 3.60 ± 0.68 g fish-1 and measured 5.8 ± 0.41 mm. Each focal fish was observed (a) before feeding in the morning, (b) 2 h after feeding, (c) 6 h after feeding and (d) 12 h after feeding. Fish increased browsing behaviours (averaging 6.60 ± 0.56) and decreased intimidating aggressive behaviours (18.60 ± 1.39) 12 h after feeding. Other aggressive behaviours occurred but did not differ between observation times. Aggressive and browsing behaviours positively correlated with size variation variables, predominantly, 12 h after feeding. An average frequency of 19 chases were observed positively correlated with size variation, followed by average frequencies of 17 body bites and browses, and 11 tail bites per 30 min. Some behaviours including average frequencies of 0.2 chases, 4 tail bites, 2.4 intimidating and 0.3 browsing behaviours negatively correlated with the size variation, generally closer to the last meal. These preliminary observations thus showed that fish have become hungry approximately 6-12 h after feeding and substituted certain behaviours for others as time after feeding passed and as size variation increased. The second experimental trial (Chapter 3) consisted of the observations further testing the relationship between aggressive behaviours and size variation of juveniles of dusky kob averaging 0.43 ± 0.27 g fish-1. The focal fish was exposed to groups of fish of four size variation (COV) treatments for observations before and 12 h after feeding. Aggressive behaviours positively correlated with size variation both before and 12 h after feeding. An average frequency of 437 body bites positively correlated more often with COV, followed by average frequencies of 365 intimidating behaviours and 199 tail bites per 30 min., respectively, before and 12 h after feeding. The least often exhibited aggressive behaviours averaged 26 chases while positively correlating with size variation on the times specified. An average frequency of 311 intimidating behaviours before and after feeding including average of 28 tail bites after feeding negatively correlated with size variation. This may relate to shift of behaviours depending on the needs and capacity of the fish. Apparently, aggressive fish can change its behaviour as a function of COV-values rather than the mean size of the other fish. The third trial (Chapter 4) investigated the effect of the aggressor’s (focal fish) size in relation its aggressive and browsing behaviours to other fish (non-focal fish). Juvenile fish used for this trial, on average, weighed 30 ± 7.63 g fish-1. Aggressive and browsing behaviours were observed in four treatments of a) high COV and mean weight below, b) low COV and mean weight less, c) high COV and mean weight equivalent to and d) low COV and mean weight higher than that of the focal fish. Increased frequencies of aggressive and browsing behaviours per 30 min. occurred in treatment A, sharing similar frequencies in treatment C, compared to the other treatments (B and D) which shared certain frequencies. The intimidating behaviours predominated, followed by browsing, body bites, chases and tail bites, respectively. The results of the overall study suggest that the time passed after feeding and increasing size variation and differences facilitated aggressive and browsing behaviours in juvenile dusky kob. Dusky kob showed increasing aggressive behaviours as early as in the first two weeks after hatching, averaging 0.43 ± 0.27 g fish-1 with the frequency correlating with size differences. Consistent size-grading technique in the same-age fish should be used to manage size variation associated with aggressive behaviours. The period of about 4-6 h after feeding may explain the noticeable increased aggressive and browsing behaviours. Thus, fish should be fed immediately before or after evacuation of their guts to maintain less-aggressive behaviours of juvenile dusky kob. Fish generally increased aggressive and browsing acts before and long time after feeding than closer to after feeding. The study has provided the fundamental scientific groundwork for fish farmers and future researchers can further explore size variation, time after feeding and gut evacuation rate as critical components of aggressive behaviours. The scientific knowledge of aggressive and cannibalistic behaviours has essential application in farming management to achieve improved survival and growth rates in juvenile fish.
- Full Text:
- Date Issued: 2018
Towards unmasking the true employee in South Africa’s contemporary work environment: the perennial problem of labour law
- Authors: Maloka, Tumo Charles
- Date: 2018
- Subjects: Labor laws and legislation
- Language: English
- Type: Thesis , Doctoral , LLD
- Identifier: http://hdl.handle.net/10353/16874 , vital:40781
- Description: The enormously intricate task of unmasking the true employee in contemporary work environment reveals the dilemmas and complexities embedded in the beguilingly simple but intractable question: who is an employee? The hallmarks of a true employee are shaded in modern work environment given that the actual differences between the categories of “employee” and “independent contractor” are diminishing. The conception of self-employment that links being self-employed inextricably with entrepreneurship, ownership, and autonomy has more to do with ideology than reality. In addressing the opacities of form engendered by “Work on demand via app” and the “Uberisation of work”, the study also attends to the significant and neglected component of labour law’s traditional dilemma. Put simply, how the law identifies an “employer” as a counterparty with an “employee”. Certain features of modern business organisation such as vertical disintegration of production, and their link to the rise of precarious employment underscore the extent to which the concept of employer plays a central role in defining the contours of labour protection. The problems of precarity are deep-seated, long-term and even escalating, especially in compelled and dependent self-employment. Re-appraisal South Africa’s black box of precarious self-employment through the lens of Canadian dependent contractor jurisprudence points to key limitations that should be addressed for a more robust and effective vision of labour regulation. If the definition of “employee” in section 213 of the Labour Relations Act 66 of 1995 is amended to redefine an “employee” to include a “dependent contractor”, this will represent a leap forward in tackling the interlinked problems of disguised employment and precarious self-employment. This statutory redefinition of the employee serves two purposes. First, the dependent contractor category solves the broader challenge for labour regulation of how to extend protection to persons who have some of the trappings of the independent contractor, but, in reality, are in a position of i ii economic dependence, resembling that of an employee. In essence, the intermediate category recognises that, as a matter of fairness persons in economic positions that are closely analogous should be given the same legislative treatment. The second purpose, and one no less important, is to fill in the missing piece of the puzzle in the judicially endorsed three-tiered SITA test for identifying employment relationship. If the dependent contractor category is adopted, the lacuna in the threefold SITA test that has so far escaped scholarly, judicial and legislative will be resolved. In this regard, the study contributes to a line of legal scholarship that has tracked the regulatory trajectory for reforming South Africa’s labour laws. It is hoped that this thesis will provoke a sustained, and more curious engagement with the complexities and capacities of labour regulation
- Full Text:
- Date Issued: 2018
- Authors: Maloka, Tumo Charles
- Date: 2018
- Subjects: Labor laws and legislation
- Language: English
- Type: Thesis , Doctoral , LLD
- Identifier: http://hdl.handle.net/10353/16874 , vital:40781
- Description: The enormously intricate task of unmasking the true employee in contemporary work environment reveals the dilemmas and complexities embedded in the beguilingly simple but intractable question: who is an employee? The hallmarks of a true employee are shaded in modern work environment given that the actual differences between the categories of “employee” and “independent contractor” are diminishing. The conception of self-employment that links being self-employed inextricably with entrepreneurship, ownership, and autonomy has more to do with ideology than reality. In addressing the opacities of form engendered by “Work on demand via app” and the “Uberisation of work”, the study also attends to the significant and neglected component of labour law’s traditional dilemma. Put simply, how the law identifies an “employer” as a counterparty with an “employee”. Certain features of modern business organisation such as vertical disintegration of production, and their link to the rise of precarious employment underscore the extent to which the concept of employer plays a central role in defining the contours of labour protection. The problems of precarity are deep-seated, long-term and even escalating, especially in compelled and dependent self-employment. Re-appraisal South Africa’s black box of precarious self-employment through the lens of Canadian dependent contractor jurisprudence points to key limitations that should be addressed for a more robust and effective vision of labour regulation. If the definition of “employee” in section 213 of the Labour Relations Act 66 of 1995 is amended to redefine an “employee” to include a “dependent contractor”, this will represent a leap forward in tackling the interlinked problems of disguised employment and precarious self-employment. This statutory redefinition of the employee serves two purposes. First, the dependent contractor category solves the broader challenge for labour regulation of how to extend protection to persons who have some of the trappings of the independent contractor, but, in reality, are in a position of i ii economic dependence, resembling that of an employee. In essence, the intermediate category recognises that, as a matter of fairness persons in economic positions that are closely analogous should be given the same legislative treatment. The second purpose, and one no less important, is to fill in the missing piece of the puzzle in the judicially endorsed three-tiered SITA test for identifying employment relationship. If the dependent contractor category is adopted, the lacuna in the threefold SITA test that has so far escaped scholarly, judicial and legislative will be resolved. In this regard, the study contributes to a line of legal scholarship that has tracked the regulatory trajectory for reforming South Africa’s labour laws. It is hoped that this thesis will provoke a sustained, and more curious engagement with the complexities and capacities of labour regulation
- Full Text:
- Date Issued: 2018
Trading with selected SADC countries and economic growth in South Africa
- Authors: Malimba, Nwabisa
- Date: 2018
- Subjects: Southern African Development Community , Economic development -- South Africa South Africa -- Economic conditions -- 1991 Economic development -- Africa, Southern
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/31962 , vital:31867
- Description: This study empirically evaluates the impact of trading with SADC countries on the economic growth of South Africa (2010 -2016). The study used Fixed Effects Model to determine the relationship between economic growth of South Africa and the selected explanatory variables. The study made use of annual panel data from World Bank, Focus Economics and Trading economics. The relationship between South Africa’s economic growth and its determinants was examined using the procedure suggested in the literature by William (2017). Various tests were conducted to ensure that the relevant model is used and to produce reliable results. The results of a fixed effects model revealed that exports, imports and trade openness are statistically significant for South African economic growth. However, the p-values indicated that trade openness is the most statistically significant variable in explaining the variation in South African economic growth better than other explanatory variables confirm. Other variables that explained the fitness of the model for the data indicated that the model was a good fit. The implication of the results obtained from Fixed Effects model is that there was little trade between South Africa and selected SADC countries during the period under review. Trading with SADC countries has a negative effect on South African economy mainly because there was a decrease in exports to SADC over the past six years and that SADC countries still need to be more open to trade. Less intensive trading between SADC countries could be attributed to shortage of capital, infrastructure and skilled labour among SADC countries. The main trading partners of South Africa are countries that are characterised by being capital intensive and have highly skilled labour. In the light of the challenges that negatively affects trade in the SADC region, the study suggests that SADC should spell out the criteria that countries need to meet before they can become members of the union. These should be non-negotiable and ensure that member states harmonise their policies with those of SADC. The study also suggests that SADC countries should be more open to trade as it has been empirically proven that trade openness has a positive relationship with economic growth. Empirical evidence presents that countries with open, large and more developed neighbouring economies grow faster than those with closed, smaller, and less developed neighbouring economies. Trade should be intensified because there are potential gains to trading with SADC. It is further suggested that more focus should be given on work related training to improve the skills of our labour force. These suggestions are based on the belief that African countries have the ability to rescue themselves out of the vicious cycle of poverty.
- Full Text:
- Date Issued: 2018
- Authors: Malimba, Nwabisa
- Date: 2018
- Subjects: Southern African Development Community , Economic development -- South Africa South Africa -- Economic conditions -- 1991 Economic development -- Africa, Southern
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/31962 , vital:31867
- Description: This study empirically evaluates the impact of trading with SADC countries on the economic growth of South Africa (2010 -2016). The study used Fixed Effects Model to determine the relationship between economic growth of South Africa and the selected explanatory variables. The study made use of annual panel data from World Bank, Focus Economics and Trading economics. The relationship between South Africa’s economic growth and its determinants was examined using the procedure suggested in the literature by William (2017). Various tests were conducted to ensure that the relevant model is used and to produce reliable results. The results of a fixed effects model revealed that exports, imports and trade openness are statistically significant for South African economic growth. However, the p-values indicated that trade openness is the most statistically significant variable in explaining the variation in South African economic growth better than other explanatory variables confirm. Other variables that explained the fitness of the model for the data indicated that the model was a good fit. The implication of the results obtained from Fixed Effects model is that there was little trade between South Africa and selected SADC countries during the period under review. Trading with SADC countries has a negative effect on South African economy mainly because there was a decrease in exports to SADC over the past six years and that SADC countries still need to be more open to trade. Less intensive trading between SADC countries could be attributed to shortage of capital, infrastructure and skilled labour among SADC countries. The main trading partners of South Africa are countries that are characterised by being capital intensive and have highly skilled labour. In the light of the challenges that negatively affects trade in the SADC region, the study suggests that SADC should spell out the criteria that countries need to meet before they can become members of the union. These should be non-negotiable and ensure that member states harmonise their policies with those of SADC. The study also suggests that SADC countries should be more open to trade as it has been empirically proven that trade openness has a positive relationship with economic growth. Empirical evidence presents that countries with open, large and more developed neighbouring economies grow faster than those with closed, smaller, and less developed neighbouring economies. Trade should be intensified because there are potential gains to trading with SADC. It is further suggested that more focus should be given on work related training to improve the skills of our labour force. These suggestions are based on the belief that African countries have the ability to rescue themselves out of the vicious cycle of poverty.
- Full Text:
- Date Issued: 2018
Traditional, indigenous, or leafy?: A definition, typology, and way forward for African vegetables
- Towns, Alexander M, Shackleton, Charlie M
- Authors: Towns, Alexander M , Shackleton, Charlie M
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/179791 , vital:43189 , xlink:href="https://doi.org/10.1007/s12231-019-09448-1"
- Description: Around 1000 different species of indigenous and naturalized vegetables contribute to the dietary diversity, food security, and livelihoods of populations across sub-Saharan Africa. These foods are also a part of alimentary traditions and cultural identity, but have suffered as neglected and underutilized species. Slowly, African vegetables are beginning to gain the attention of universities, research centers, and development organizations; however, the terminology used to describe the plants is characterized by widespread disagreement and redundancy. Key terms and concepts used such as indigenous, traditional, and leafy have different interpretations and are used interchangeably, creating a challenge for coordinated research and extension efforts. Through analyzing a broad set of peer-reviewed journal articles on African vegetables, we (1) provide an overview with respect to definitions and terms used in the literature, (2) propose a definition of the term traditional African vegetable (TAV), (3) create a typology to classify the main groups of African vegetables, and (4) identify trends and gaps for further research and extension on African vegetables. We propose not only a unified way to categorize these vegetables but also a way for a more holistic and interdisciplinary systems approach to further the research agenda and practical management of African vegetables.
- Full Text:
- Date Issued: 2018
- Authors: Towns, Alexander M , Shackleton, Charlie M
- Date: 2018
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/179791 , vital:43189 , xlink:href="https://doi.org/10.1007/s12231-019-09448-1"
- Description: Around 1000 different species of indigenous and naturalized vegetables contribute to the dietary diversity, food security, and livelihoods of populations across sub-Saharan Africa. These foods are also a part of alimentary traditions and cultural identity, but have suffered as neglected and underutilized species. Slowly, African vegetables are beginning to gain the attention of universities, research centers, and development organizations; however, the terminology used to describe the plants is characterized by widespread disagreement and redundancy. Key terms and concepts used such as indigenous, traditional, and leafy have different interpretations and are used interchangeably, creating a challenge for coordinated research and extension efforts. Through analyzing a broad set of peer-reviewed journal articles on African vegetables, we (1) provide an overview with respect to definitions and terms used in the literature, (2) propose a definition of the term traditional African vegetable (TAV), (3) create a typology to classify the main groups of African vegetables, and (4) identify trends and gaps for further research and extension on African vegetables. We propose not only a unified way to categorize these vegetables but also a way for a more holistic and interdisciplinary systems approach to further the research agenda and practical management of African vegetables.
- Full Text:
- Date Issued: 2018
Transformation at Rhodes University: investigating the extent of support for the participation of students with disabilities in the transformation processes of the Institution
- Authors: Israel, Veronica
- Date: 2018
- Subjects: Rhodes University , Educational change -- South Africa -- Makhanda , Educational equalization -- South Africa -- Makhanda , College students with disabilities -- South Africa -- Makhanda , Students with disabilities -- Services for , Corporate culture -- South Africa -- Makhanda , Critical Disability Studies Approach (CDSA)
- Language: English
- Type: text , Thesis , Masters , MSocSc
- Identifier: http://hdl.handle.net/10962/62006 , vital:28095
- Description: This study is motivated by the vigorous discourse around transformation at Rhodes University and investigates the extent of support for and engagement with students with disabilities in the transformation processes of the institution. It analyses the extent to which integration is holistic at institutions of Higher Learning. Particular interest is given to the institutional culture of Rhodes University, namely whether it values and embraces diversity and is committed to inclusivity, centering the presence and voice of students with disabilities. It explores institutional responses to students with disabilities and their capacity to flourish beyond notions of access, therefore, delivering on the demand for institutional transformation. The thesis draws on the Critical Disability Studies Approach (CDSA), the social justice reform agenda with reference to the feminist analysis of disability, and the concept of inclusive education. The study uses a qualitative research methodology. The sample size used in the study was sufficient to highlight the challenges students with disabilities at Rhodes University face and their coping mechanisms while investigating the extent of support and active participation in the transformation discourse. The study found that the majority of the participants’ academic capabilities were influenced by their disability and impacted on their academic success. The study further revealed that there is a disjuncture between policy and practice in terms of awareness, and as such, effectiveness. While there is a supportive institutional framework, as indicated by more than 50% of the participants in the study, the recommendations ensuing from this research indicate that there are areas in which the university can improve its support mechanisms. Improving support structures is possible through establishing platforms which can be used for students to share their lived experiences and making disability a visible part of the institutional discourse on transformation. The study concludes by arguing for the application of principles of Ubuntu which demonstrate the commitment of Rhodes University in inculcating an inclusive institutional culture and understanding that disability is intersectional with social registers such as race and gender. It emphasises the recognition of the institution as a transforming one if the body that matters is the body whose presence, voice and lived experience is acknowledged and recognised.
- Full Text:
- Date Issued: 2018
- Authors: Israel, Veronica
- Date: 2018
- Subjects: Rhodes University , Educational change -- South Africa -- Makhanda , Educational equalization -- South Africa -- Makhanda , College students with disabilities -- South Africa -- Makhanda , Students with disabilities -- Services for , Corporate culture -- South Africa -- Makhanda , Critical Disability Studies Approach (CDSA)
- Language: English
- Type: text , Thesis , Masters , MSocSc
- Identifier: http://hdl.handle.net/10962/62006 , vital:28095
- Description: This study is motivated by the vigorous discourse around transformation at Rhodes University and investigates the extent of support for and engagement with students with disabilities in the transformation processes of the institution. It analyses the extent to which integration is holistic at institutions of Higher Learning. Particular interest is given to the institutional culture of Rhodes University, namely whether it values and embraces diversity and is committed to inclusivity, centering the presence and voice of students with disabilities. It explores institutional responses to students with disabilities and their capacity to flourish beyond notions of access, therefore, delivering on the demand for institutional transformation. The thesis draws on the Critical Disability Studies Approach (CDSA), the social justice reform agenda with reference to the feminist analysis of disability, and the concept of inclusive education. The study uses a qualitative research methodology. The sample size used in the study was sufficient to highlight the challenges students with disabilities at Rhodes University face and their coping mechanisms while investigating the extent of support and active participation in the transformation discourse. The study found that the majority of the participants’ academic capabilities were influenced by their disability and impacted on their academic success. The study further revealed that there is a disjuncture between policy and practice in terms of awareness, and as such, effectiveness. While there is a supportive institutional framework, as indicated by more than 50% of the participants in the study, the recommendations ensuing from this research indicate that there are areas in which the university can improve its support mechanisms. Improving support structures is possible through establishing platforms which can be used for students to share their lived experiences and making disability a visible part of the institutional discourse on transformation. The study concludes by arguing for the application of principles of Ubuntu which demonstrate the commitment of Rhodes University in inculcating an inclusive institutional culture and understanding that disability is intersectional with social registers such as race and gender. It emphasises the recognition of the institution as a transforming one if the body that matters is the body whose presence, voice and lived experience is acknowledged and recognised.
- Full Text:
- Date Issued: 2018
Transformation through engagement: developing Grade 9 leadership opportunities through activity system using change laboratory intervention in a secondary school in Omusati region of Namibia
- Authors: Vaino, Loide Mwasheka
- Date: 2018
- Subjects: School management and organization Namibia Omusati , Student participation in administration Namibia Omusati , Educational leadership Namibia Omusati , Student government Namibia Omusati
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/61569 , vital:28038
- Description: The evolution of traditional educational leadership theory to contemporary leadership theory came as a response to an increased demand for better services in schools by creating platforms for learner leadership such as distributed leadership where learner leadership is located. This study of learner leadership is conducted in a secondary school in Omusati region of Namibia. Drawing on distributed leadership theory, the study sought to promote the distribution of leadership opportunities amongst all educational stakeholders, including learners, as provided for by policy and projected by educational leadership theory. The motivation of this study was the need to understand the problems associated with learner leadership as identified by past research. In addition, this study hoped to address the gap in the literature by exploring learner leadership development opportunities developing agency in learners through a Change Laboratory (CL) intervention. This study was as a transformative case study, how the grade 9s in the case study school were involved in leadership, the constraining factors that hindered the involvement of grade 9 learners in leadership, the enhancement of learner leadership at school, the positive contributions of CL workshops to participants and the leadership growth brought about by an intervention. This study generated data through observation, questionnaires, semi-structured interviews, focus group interviews, and Change Laboratory Workshops. The findings revealed that the grade 9 learners were marginally involved in leadership at the school. The most substantial challenge relates to traditional and outdated views of leadership on the part of teachers and educational managers. Additionally, the findings from the Change Laboratory workshops revealed that despite grade 9 learners being the youngest at school, they have the potential to be learner leaders. Hence in addition to several practical recommendations, the study recommends a change of mindset towards learner leadership so that opportunities are provided to contribute to the growth and development of learners. Finally, these research study findings will help my professional colleagues and policy makers in education to better understand the significance role of learner leadership involvements in schools.
- Full Text:
- Date Issued: 2018
- Authors: Vaino, Loide Mwasheka
- Date: 2018
- Subjects: School management and organization Namibia Omusati , Student participation in administration Namibia Omusati , Educational leadership Namibia Omusati , Student government Namibia Omusati
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/61569 , vital:28038
- Description: The evolution of traditional educational leadership theory to contemporary leadership theory came as a response to an increased demand for better services in schools by creating platforms for learner leadership such as distributed leadership where learner leadership is located. This study of learner leadership is conducted in a secondary school in Omusati region of Namibia. Drawing on distributed leadership theory, the study sought to promote the distribution of leadership opportunities amongst all educational stakeholders, including learners, as provided for by policy and projected by educational leadership theory. The motivation of this study was the need to understand the problems associated with learner leadership as identified by past research. In addition, this study hoped to address the gap in the literature by exploring learner leadership development opportunities developing agency in learners through a Change Laboratory (CL) intervention. This study was as a transformative case study, how the grade 9s in the case study school were involved in leadership, the constraining factors that hindered the involvement of grade 9 learners in leadership, the enhancement of learner leadership at school, the positive contributions of CL workshops to participants and the leadership growth brought about by an intervention. This study generated data through observation, questionnaires, semi-structured interviews, focus group interviews, and Change Laboratory Workshops. The findings revealed that the grade 9 learners were marginally involved in leadership at the school. The most substantial challenge relates to traditional and outdated views of leadership on the part of teachers and educational managers. Additionally, the findings from the Change Laboratory workshops revealed that despite grade 9 learners being the youngest at school, they have the potential to be learner leaders. Hence in addition to several practical recommendations, the study recommends a change of mindset towards learner leadership so that opportunities are provided to contribute to the growth and development of learners. Finally, these research study findings will help my professional colleagues and policy makers in education to better understand the significance role of learner leadership involvements in schools.
- Full Text:
- Date Issued: 2018
Transformations in Hlengwe ethnicity in Chiredzi, Zimbabwe, 1890 to 2014
- Authors: Chisi, Taderera Hebert
- Date: 2018
- Subjects: Hlengwe (African people) -- Zimbabwe -- Chiredzi Rural District , Ethnicity -- Zimbabwe -- Chiredzi Rural District , Social constructionism , Black people -- Race identity -- Zimbabwe -- Chiredzi Rural District , Zimbabwe -- History , Imperialism -- History
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/62296 , vital:28152
- Description: Studies of ethnicity have shifted from primordialism to diverse variants of social constructivism, which include instrumentalism, invention of tribalism by the colonial elite and missionaries and demotic constructivism or creation of ethnicity from below. The studies have generally generated two broad schools of thought. One school avers that African ethnicity was invented by the colonial elite and missionaries in the colonial period whilst the other and more recent asserts that ethnicity had a precolonial currency and the generality of Africans also played a key role in identity formation. Also most notable is that most studies have tended to focus on larger and more visible ethnic groups, ignoring the stories of small communities mostly found in remote border areas of modern ‘nation’ states. Using archival material, colonial records, autobiographies, oral and secondary sources, this thesis, which is largely guided by the demotic constructivist theoretical perspective examines the evolution of the ethnic identity of an ‘obscure’ Hlengwe ethnic community of the south-east lowveld of Zimbabwe from the pre-colonial period to 2014. History of the Hlengwe history has been blurred by the use of the term “Shangaan” to denote the Hlengwe, yet they were not ethnically so. A chronological approach and demotic constuctivism have been used to enable a deeper analysis of the critical historical phases, key players and processes in Hlengwe identity formation as time wore on. While we acknowledge that identity formation involves diverse players, we also focus on the role of the generally neglected commoners in the making of African ethnicity. This study differs from other works on ethnicity which focus on events of short historical phases and the role of selected elitist agents in the making of African ethnicity, by analysing the making of Hlengwe ethnicity from the precolonial to the postcolonial period. We prove that Hlengwe ethnicity was created in the pre-colonial period but did not remain static as it was perpetually reshaped by unpredictable historical events right up to 2014. The Hlengwe community was subjected to processes of social transformation over a long period of time to an extent that the one time docile, ‘uncivilised”, inward looking community bearing an identity of shame had evolved by the close of the 20th century and early 21st century to an assertive community, proud of its identity and actively seeking political, economic and cultural recognition and rights for its ‘underdog’ Hlengwe constituency in a country where diverse Shona groups andNdebele form the dominant ethnic communities.
- Full Text:
- Date Issued: 2018
- Authors: Chisi, Taderera Hebert
- Date: 2018
- Subjects: Hlengwe (African people) -- Zimbabwe -- Chiredzi Rural District , Ethnicity -- Zimbabwe -- Chiredzi Rural District , Social constructionism , Black people -- Race identity -- Zimbabwe -- Chiredzi Rural District , Zimbabwe -- History , Imperialism -- History
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/62296 , vital:28152
- Description: Studies of ethnicity have shifted from primordialism to diverse variants of social constructivism, which include instrumentalism, invention of tribalism by the colonial elite and missionaries and demotic constructivism or creation of ethnicity from below. The studies have generally generated two broad schools of thought. One school avers that African ethnicity was invented by the colonial elite and missionaries in the colonial period whilst the other and more recent asserts that ethnicity had a precolonial currency and the generality of Africans also played a key role in identity formation. Also most notable is that most studies have tended to focus on larger and more visible ethnic groups, ignoring the stories of small communities mostly found in remote border areas of modern ‘nation’ states. Using archival material, colonial records, autobiographies, oral and secondary sources, this thesis, which is largely guided by the demotic constructivist theoretical perspective examines the evolution of the ethnic identity of an ‘obscure’ Hlengwe ethnic community of the south-east lowveld of Zimbabwe from the pre-colonial period to 2014. History of the Hlengwe history has been blurred by the use of the term “Shangaan” to denote the Hlengwe, yet they were not ethnically so. A chronological approach and demotic constuctivism have been used to enable a deeper analysis of the critical historical phases, key players and processes in Hlengwe identity formation as time wore on. While we acknowledge that identity formation involves diverse players, we also focus on the role of the generally neglected commoners in the making of African ethnicity. This study differs from other works on ethnicity which focus on events of short historical phases and the role of selected elitist agents in the making of African ethnicity, by analysing the making of Hlengwe ethnicity from the precolonial to the postcolonial period. We prove that Hlengwe ethnicity was created in the pre-colonial period but did not remain static as it was perpetually reshaped by unpredictable historical events right up to 2014. The Hlengwe community was subjected to processes of social transformation over a long period of time to an extent that the one time docile, ‘uncivilised”, inward looking community bearing an identity of shame had evolved by the close of the 20th century and early 21st century to an assertive community, proud of its identity and actively seeking political, economic and cultural recognition and rights for its ‘underdog’ Hlengwe constituency in a country where diverse Shona groups andNdebele form the dominant ethnic communities.
- Full Text:
- Date Issued: 2018