A framework for price tariffs in the costing structures of South African private hospitals
- Authors: Botha, Gideon
- Date: 2020
- Subjects: Medical care, Cost of -- South Africa , Medical economics -- South Africa Medical care -- South Africa -- Cost control Cost accounting
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/50432 , vital:42167
- Description: The increase of South African health care costs can be extrapolated into the global healthcare cost challenge, with various factors contributing to this problem. One of the factors viewed as being central to the rising cost of health care is the inability of health care provider organisations to accurately measure unit costs of resources used to treat a patient for their medical condition and patient outcomes. The measurement of an accurate unit cost and patient outcomes is imperative to improving value, which is seen as an improvement in outcomes for every rand spent. The determination of price tariffs and the price tariff payment model used to onward bill the price tariff for medical services have also been identified as having a central role in improving value in health care. In order for price tariffs to improve value, they should be reflective and be based on an accurate unit cost that reflects the cost of resources used to provide efficient and effective care for a patient’s medical condition. For the price tariff payment model to improve value, it needs to reward providers for delivering superior patient outcomes at a lower cost by making price tariffs contingent on achieving specified outcomes as well as incorporating performance payments or holdbacks based on outcomes achieved. This study provides a framework for price tariffs in the costing structures of South African private hospitals. Secondary research was conducted in the form of a comprehensive literature search in order to do an interpretative analysis of the strengths and weaknesses of the various combinations of unit costing models and price tariff payment models used to determine prices in private hospitals. The literature review was followed by primary research that involved three phases, all of which used a qualitative research approach. In Phase 1, primary data were collected using unobtrusive measures that consisted of a data request first, followed by unstructured interviews with representatives of Hospital A and Hospital B to obtain an analysis of the combinations of unit costing model and price tariff payment model used for a laparoscopic appendectomy. In Phase 2, data were collected by means of an unstructured interview with a surgeon describing a laparoscopic appendectomy procedure in detail and based on this process description, the approximate costs for the various resources that were sourced from different suppliers could be calculated. The data analysis and interpretation were done in three phases, with each phase having different research objectives. The data were first coded and then interpreted. In the first primary research phase, the combinations of unit costing models and price tariff payment models used by private Hospital A and Hospital B were evaluated. In the second phase, the recommended combination of unit costing model and price tariff payment model was applied to a hypothetical example and evaluated. In the final phase, based on the outcome of the first and second research phases, a combination of unit costing model and price tariff payment model for private hospitals was recommended. The results showed that the recommended combination of unit costing and price tariff payment model namely time-driven activity-based costing with the global fee price tariff payment model was the most appropriate to determine price tariffs in private hospitals when compared to the unit costing models and price tariff payment models used by Hospital A and Hospital B for a laparoscopic appendectomy. Furthermore, the recommended combination of unit costing model and price tariff payment model was found to be usable for the determination of price tariffs in the costing structures of private hospitals. The time-driven activity-based costing model and global fee price tariff payment model should be adopted or used as guidelines for determining price tariffs in private hospitals in South Africa. Price tariffs would be more transparent as they would reflect the actual resource cost of treating the patient and the resources used and treatment provided could then be assessed against the delivery value chain that charts the principal activities involved in a patient’s care for a medical condition to ensure that patient best-practice protocols are followed. The proposed framework enables the determination of price tariffs based on an accurate unit cost reflecting the actual resources used to provide efficient and effective care and also improve value for the patient.
- Full Text:
- Date Issued: 2020
- Authors: Botha, Gideon
- Date: 2020
- Subjects: Medical care, Cost of -- South Africa , Medical economics -- South Africa Medical care -- South Africa -- Cost control Cost accounting
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/50432 , vital:42167
- Description: The increase of South African health care costs can be extrapolated into the global healthcare cost challenge, with various factors contributing to this problem. One of the factors viewed as being central to the rising cost of health care is the inability of health care provider organisations to accurately measure unit costs of resources used to treat a patient for their medical condition and patient outcomes. The measurement of an accurate unit cost and patient outcomes is imperative to improving value, which is seen as an improvement in outcomes for every rand spent. The determination of price tariffs and the price tariff payment model used to onward bill the price tariff for medical services have also been identified as having a central role in improving value in health care. In order for price tariffs to improve value, they should be reflective and be based on an accurate unit cost that reflects the cost of resources used to provide efficient and effective care for a patient’s medical condition. For the price tariff payment model to improve value, it needs to reward providers for delivering superior patient outcomes at a lower cost by making price tariffs contingent on achieving specified outcomes as well as incorporating performance payments or holdbacks based on outcomes achieved. This study provides a framework for price tariffs in the costing structures of South African private hospitals. Secondary research was conducted in the form of a comprehensive literature search in order to do an interpretative analysis of the strengths and weaknesses of the various combinations of unit costing models and price tariff payment models used to determine prices in private hospitals. The literature review was followed by primary research that involved three phases, all of which used a qualitative research approach. In Phase 1, primary data were collected using unobtrusive measures that consisted of a data request first, followed by unstructured interviews with representatives of Hospital A and Hospital B to obtain an analysis of the combinations of unit costing model and price tariff payment model used for a laparoscopic appendectomy. In Phase 2, data were collected by means of an unstructured interview with a surgeon describing a laparoscopic appendectomy procedure in detail and based on this process description, the approximate costs for the various resources that were sourced from different suppliers could be calculated. The data analysis and interpretation were done in three phases, with each phase having different research objectives. The data were first coded and then interpreted. In the first primary research phase, the combinations of unit costing models and price tariff payment models used by private Hospital A and Hospital B were evaluated. In the second phase, the recommended combination of unit costing model and price tariff payment model was applied to a hypothetical example and evaluated. In the final phase, based on the outcome of the first and second research phases, a combination of unit costing model and price tariff payment model for private hospitals was recommended. The results showed that the recommended combination of unit costing and price tariff payment model namely time-driven activity-based costing with the global fee price tariff payment model was the most appropriate to determine price tariffs in private hospitals when compared to the unit costing models and price tariff payment models used by Hospital A and Hospital B for a laparoscopic appendectomy. Furthermore, the recommended combination of unit costing model and price tariff payment model was found to be usable for the determination of price tariffs in the costing structures of private hospitals. The time-driven activity-based costing model and global fee price tariff payment model should be adopted or used as guidelines for determining price tariffs in private hospitals in South Africa. Price tariffs would be more transparent as they would reflect the actual resource cost of treating the patient and the resources used and treatment provided could then be assessed against the delivery value chain that charts the principal activities involved in a patient’s care for a medical condition to ensure that patient best-practice protocols are followed. The proposed framework enables the determination of price tariffs based on an accurate unit cost reflecting the actual resources used to provide efficient and effective care and also improve value for the patient.
- Full Text:
- Date Issued: 2020
A framework for the application of network telescope sensors in a global IP network
- Authors: Irwin, Barry Vivian William
- Date: 2011
- Subjects: Sensor networks Computer networks TCP/IP (Computer network protocol) Internet Computer security Computers -- Access control Computer networks -- Security measures Computer viruses Malware (Computer software)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4593 , http://hdl.handle.net/10962/d1004835
- Description: The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
- Full Text:
- Date Issued: 2011
- Authors: Irwin, Barry Vivian William
- Date: 2011
- Subjects: Sensor networks Computer networks TCP/IP (Computer network protocol) Internet Computer security Computers -- Access control Computer networks -- Security measures Computer viruses Malware (Computer software)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4593 , http://hdl.handle.net/10962/d1004835
- Description: The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
- Full Text:
- Date Issued: 2011
A framework for the implementation of e-government as a service delivery mechanism in South Africa: The case of the Eastern Cape Thusong Service Centres
- Authors: Madyibi, Ayanda
- Date: 2020
- Subjects: Electronic government information Technological innovations Information technology
- Language: English
- Type: Thesis , Doctoral , PhD(Information Systems)
- Identifier: http://hdl.handle.net/10353/18908 , vital:42997
- Description: E-government has emerged as an effective means of delivering much-needed online services to the citizens, businesses and other government institutions. This emanates from the advancement of Information and Communication Technology (ICT), the internet and the emerging technologies associated with the Fourth Industrial Revolution (4IR). E-government has essentially transformed the culture, structure and the way of doing business by public institutions in providing government services. In the past, e-government has been popular in developed countries but recently many developing countries are starting to appreciate the need to implement the initiative. However, the implementation of e-government has various challenges that have been identified through research and include technological, organisational and environmental aspects. Therefore, the researcher was motivated to study e-government to improve the delivery of services to citizens in South Africa. The objective of the research was to develop a framework for the implementation of egovernment as a service delivery mechanism in South Africa. The research process led to the identification of challenges that impact the implementation of e-government by applying an underlying Information Systems (IS) theoretical model, namely the Technology-OrganisationEnvironment (TOE) framework. The review of literature allowed the researcher to construct a conceptual theoretical framework which was then applied to the case study in order to understand the factors affecting the implementation of e-government in South Africa. Qualitative research data was collected using Thusong Service Centres in the Eastern Cape as a case study. Thusong Service Centres are government service centres based in rural communities which are used for the provision of online government services to these communities. The empirical data was collected using 22 respondents from five organisational and user perspectives: (1) State Information Technology Agency (SITA) as an agency of government responsible for ICT in South Africa, (2) the Senior ICT Managers from various National, Provincial and Local government entities, (3) Thusong Service Centre Managers, (4) Thusong Service Centre End-Users and (5) Expert Reviews. Documents that included the National e-Government Strategy, e-Government Policy, National Broadband Policy, ICT Policy White Paper were also consulted as secondary data. The conceptual theoretical framework was then revised based on the empirical evidence using the interpretive exploratory approach and triangulated data. The consolidated data from both the literature review and empirical evidence assisted in closing the gap between e-government implementation theory and practice. A detailed e-government implementation framework was then developed with the critical factors that impact the successful implementation of e- ii | P a g e government. E-government subject experts were also given the mandate to review the interview questions and the framework. The use of this framework was then explained in terms of how it can assist government decision-makers in South Africa for the effective and efficient delivery of services to the citizens. The research study has contributed to the e-government body of knowledge through the identified factors utilising the TOE framework at an organisational level for developing countries like South Africa.
- Full Text:
- Date Issued: 2020
- Authors: Madyibi, Ayanda
- Date: 2020
- Subjects: Electronic government information Technological innovations Information technology
- Language: English
- Type: Thesis , Doctoral , PhD(Information Systems)
- Identifier: http://hdl.handle.net/10353/18908 , vital:42997
- Description: E-government has emerged as an effective means of delivering much-needed online services to the citizens, businesses and other government institutions. This emanates from the advancement of Information and Communication Technology (ICT), the internet and the emerging technologies associated with the Fourth Industrial Revolution (4IR). E-government has essentially transformed the culture, structure and the way of doing business by public institutions in providing government services. In the past, e-government has been popular in developed countries but recently many developing countries are starting to appreciate the need to implement the initiative. However, the implementation of e-government has various challenges that have been identified through research and include technological, organisational and environmental aspects. Therefore, the researcher was motivated to study e-government to improve the delivery of services to citizens in South Africa. The objective of the research was to develop a framework for the implementation of egovernment as a service delivery mechanism in South Africa. The research process led to the identification of challenges that impact the implementation of e-government by applying an underlying Information Systems (IS) theoretical model, namely the Technology-OrganisationEnvironment (TOE) framework. The review of literature allowed the researcher to construct a conceptual theoretical framework which was then applied to the case study in order to understand the factors affecting the implementation of e-government in South Africa. Qualitative research data was collected using Thusong Service Centres in the Eastern Cape as a case study. Thusong Service Centres are government service centres based in rural communities which are used for the provision of online government services to these communities. The empirical data was collected using 22 respondents from five organisational and user perspectives: (1) State Information Technology Agency (SITA) as an agency of government responsible for ICT in South Africa, (2) the Senior ICT Managers from various National, Provincial and Local government entities, (3) Thusong Service Centre Managers, (4) Thusong Service Centre End-Users and (5) Expert Reviews. Documents that included the National e-Government Strategy, e-Government Policy, National Broadband Policy, ICT Policy White Paper were also consulted as secondary data. The conceptual theoretical framework was then revised based on the empirical evidence using the interpretive exploratory approach and triangulated data. The consolidated data from both the literature review and empirical evidence assisted in closing the gap between e-government implementation theory and practice. A detailed e-government implementation framework was then developed with the critical factors that impact the successful implementation of e- ii | P a g e government. E-government subject experts were also given the mandate to review the interview questions and the framework. The use of this framework was then explained in terms of how it can assist government decision-makers in South Africa for the effective and efficient delivery of services to the citizens. The research study has contributed to the e-government body of knowledge through the identified factors utilising the TOE framework at an organisational level for developing countries like South Africa.
- Full Text:
- Date Issued: 2020
A framework for the inclusion of students with visual impairments: a case of a Zimbabwe state university
- Authors: Manyumwa, Ennie
- Date: 2016
- Subjects: Inclusive education -- Zimbabwe Students with disabilities -- Education (Higher) -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/29805 , vital:30780
- Description: The aim of this study was to explore the experiences of students with visual impairments in a selected state university in Zimbabwe in order to develop a framework for their inclusion. The study was necessitated by the increased enrolment of students with visual impairments in universities worldwide in response to inclusion in education and the continuous search for the best placement model for students with disabilities. Studies conducted internationally show that students with visual impairments have unique learning needs which must be addressed if their inclusion in universities is to be successful. The study was informed by Bronfenbrenner’s ecological and Bandura’s agentic theories, both of which stress the bi-directional relationship between an individual and the environment. The transformative paradigm which guided this study, lays emphasis on the need to improve the social situation of individuals with disabilities in order to bring about a more equitable society. Since the study intended to gain an understanding of how students with visual impairments interpret their experiences within a selected state university in Zimbabwe which practices inclusion, the qualitative case study design was used. Purposeful sampling was also used in the selection of both the university studied and the participants. Data generation methods employed included the semi-structured interview, photo-voice, document analysis and observation. Data generated were analysed following emergent themes that were used to answer the research questions. Findings revealed that the university started enrolling students with visual impairments in 2004 and has since established a Disability Resource Centre which is equipped with assistive devices and is manned by caring staff. Findings revealed a glaring absence of a university policy on inclusion. The guiding principles used did not clearly articulate issues of inclusion. The students’ positive experiences resulted from single rooms allocated to them and the support received from friends and caring staff. Negative experiences emanated from bureaucratic admission procedures, challenges of adjusting to university life in the absence of orientation and mobility training, financial challenges, hostile social environment and the students’ perceptions of themselves. The students suggested that the university should assist them with fees and expressed their wish to be consulted on matters that concern them. They xviii also suggested close co-operation between the administration and the Disability Resource Centre. The conclusion reached was that although the university was sensitive to issues of inclusion, there were still some deficiencies in the system that were impacting negatively on the inclusion of students with visual impairments. The study recommended a framework which shows the different committees and support systems which can be formed at different levels to facilitate the development of a comprehensive policy on inclusion and expedite its implementation. The involvement of students with visual impairments in the different committees was also recommended. This would afford them the chance to exercise their agentic resources and be involved in matters which concern them, rather than rely on decisions made by sighted individuals who might not possess adequate knowledge of what visual impairment entails.
- Full Text:
- Date Issued: 2016
- Authors: Manyumwa, Ennie
- Date: 2016
- Subjects: Inclusive education -- Zimbabwe Students with disabilities -- Education (Higher) -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/29805 , vital:30780
- Description: The aim of this study was to explore the experiences of students with visual impairments in a selected state university in Zimbabwe in order to develop a framework for their inclusion. The study was necessitated by the increased enrolment of students with visual impairments in universities worldwide in response to inclusion in education and the continuous search for the best placement model for students with disabilities. Studies conducted internationally show that students with visual impairments have unique learning needs which must be addressed if their inclusion in universities is to be successful. The study was informed by Bronfenbrenner’s ecological and Bandura’s agentic theories, both of which stress the bi-directional relationship between an individual and the environment. The transformative paradigm which guided this study, lays emphasis on the need to improve the social situation of individuals with disabilities in order to bring about a more equitable society. Since the study intended to gain an understanding of how students with visual impairments interpret their experiences within a selected state university in Zimbabwe which practices inclusion, the qualitative case study design was used. Purposeful sampling was also used in the selection of both the university studied and the participants. Data generation methods employed included the semi-structured interview, photo-voice, document analysis and observation. Data generated were analysed following emergent themes that were used to answer the research questions. Findings revealed that the university started enrolling students with visual impairments in 2004 and has since established a Disability Resource Centre which is equipped with assistive devices and is manned by caring staff. Findings revealed a glaring absence of a university policy on inclusion. The guiding principles used did not clearly articulate issues of inclusion. The students’ positive experiences resulted from single rooms allocated to them and the support received from friends and caring staff. Negative experiences emanated from bureaucratic admission procedures, challenges of adjusting to university life in the absence of orientation and mobility training, financial challenges, hostile social environment and the students’ perceptions of themselves. The students suggested that the university should assist them with fees and expressed their wish to be consulted on matters that concern them. They xviii also suggested close co-operation between the administration and the Disability Resource Centre. The conclusion reached was that although the university was sensitive to issues of inclusion, there were still some deficiencies in the system that were impacting negatively on the inclusion of students with visual impairments. The study recommended a framework which shows the different committees and support systems which can be formed at different levels to facilitate the development of a comprehensive policy on inclusion and expedite its implementation. The involvement of students with visual impairments in the different committees was also recommended. This would afford them the chance to exercise their agentic resources and be involved in matters which concern them, rather than rely on decisions made by sighted individuals who might not possess adequate knowledge of what visual impairment entails.
- Full Text:
- Date Issued: 2016
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A framework to elicit user requirements for information systems: a localised participatory approach from Southern Africa
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A framework to evaluate user experience of end user application security features
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
A framework to implement social entrepreneurship activities in higher education institutions
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
A framework to incorporate sustainability into South African consumer protection policy
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
A framework to measure human behaviour whilst reading
- Salehzadeh, Seyed Amirsaleh, Greyling, Jean
- Authors: Salehzadeh, Seyed Amirsaleh , Greyling, Jean
- Date: 2019
- Subjects: Computational intelligence , Machine learning Artificial intelligence Neural networks (Computer science)
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/43578 , vital:36921
- Description: The brain is the most complex object in the known universe that gives a sense of being to humans and characterises human behaviour. Building models of brain functions is perhaps the most fascinating scientific challenge in the 21st century. Reading is a significant cognitive process in the human brain that plays a critical role in the vital process of learning and in performing some daily activities. The study of human behaviour during reading has been an area of interest for researchers in different fields of science. This thesis is based upon providing a novel framework, called ARSAT (Assisting Researchers in the Selection of Appropriate Technologies), that measures the behaviour of humans when reading text. The ARSAT framework aims at assisting researchers in the selection and application of appropriate technologies to measure the behaviour of a person who is reading text. The ARSAT framework will assist to researchers who investigate the reading process and find it difficult to select appropriate theories, metrics, data collection methods and data analytics techniques. The ARSAT framework enhances the ability of its users to select appropriate metrics indicating the effective factors on the characterisation of different aspects of human behaviour during the reading process. As will be shown in this research study, human behaviour is characterised by a complicated interplay of action, cognition and emotion. The ARSAT framework also facilitates selecting appropriate sensory technologies that can be used to monitor and collect data for the metrics. Moreover, this research study will introduce BehaveNet, a novel Deep Learning modelling approach, which can be used for training Deep Learning models of human behaviour from the sensory data collected. In this thesis, a comprehensive literature study is presented that was conducted to acquire adequate knowledge for designing the ARSAT framework. In order to identify the contributing factors that affect the reading process, an overview of some existing theories of the reading process is provided. Furthermore, a number of sensory technologies and techniques that can be applied to monitoring the changes in the metrics indicating the factors are also demonstrated. Only, the technologies that are commercially available on the market are recommended by the ARSAT framework. A variety of Machine Learning techniques were also investigated when designing the BehaveNet. The BehaveNet takes advantage of the complementarity of Convolutional Neural Networks, Long Short-Term Memory networks and Deep Neural Networks. The design of a Human Behaviour Monitoring System (HBMS), by utilising the ARSAT framework for recognising three attention-seeking activities of humans, is also presented in this research study. Reading printed text, as well as speaking out loudly and watching a programme on TV were proposed as activities that a person unintentionally may shift his/her attention from reading into distractions. Between sensory devices recommended by the ARSAT framework, the Muse headband which is an Electroencephalography (EEG) and head motion-sensing wearable device, was selected to track the forehead EEG and a person’s head movements. The EEG and 3-axes accelerometer data were recorded from eight participants when they read printed text, as well as the time they performed two other activities. An imbalanced dataset consisting over 1.2 million rows of noisy data was created and used to build a model of the activities (60% training and 20% validating data) and evaluating the model (20% of the data). The efficiency of the framework is demonstrated by comparing the performance of the models built by utilising the BehaveNet, with the models built by utilising a number of competing Deep Learning models for raw EEG and accelerometer data, that have attained state-of-the-art performance. The classification results are evaluated by some metrics including the classification accuracy, F1 score, confusion matrix, Receiver Operating Characteristic curve, and Area under Curve (AUC) score. By considering the results, the BehaveNet contributed to the body of knowledge as an approach for measuring human behaviour by using sensory devices. In comparison with the performance of the other models, the models built by utilising the BehaveNet, attained better performance when classifying data of two EEG channels (Accuracy = 95%; AUC=0.99; F1 = 0.95), data of a single EEG channel (Accuracy = 85%; AUC=0.96; F1 = 0.83), accelerometer data (Accuracy = 81%; AUC = 0.9; F1 = 0.76) and all of the data in the dataset (Accuracy = 97%; AUC = 0.99; F1 = 0.96). The dataset and the source code of this project are also published on the Internet to help the science community. The Muse headband is also shown to be an economical and standard wearable device that can be successfully used in behavioural research.
- Full Text:
- Date Issued: 2019
- Authors: Salehzadeh, Seyed Amirsaleh , Greyling, Jean
- Date: 2019
- Subjects: Computational intelligence , Machine learning Artificial intelligence Neural networks (Computer science)
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/43578 , vital:36921
- Description: The brain is the most complex object in the known universe that gives a sense of being to humans and characterises human behaviour. Building models of brain functions is perhaps the most fascinating scientific challenge in the 21st century. Reading is a significant cognitive process in the human brain that plays a critical role in the vital process of learning and in performing some daily activities. The study of human behaviour during reading has been an area of interest for researchers in different fields of science. This thesis is based upon providing a novel framework, called ARSAT (Assisting Researchers in the Selection of Appropriate Technologies), that measures the behaviour of humans when reading text. The ARSAT framework aims at assisting researchers in the selection and application of appropriate technologies to measure the behaviour of a person who is reading text. The ARSAT framework will assist to researchers who investigate the reading process and find it difficult to select appropriate theories, metrics, data collection methods and data analytics techniques. The ARSAT framework enhances the ability of its users to select appropriate metrics indicating the effective factors on the characterisation of different aspects of human behaviour during the reading process. As will be shown in this research study, human behaviour is characterised by a complicated interplay of action, cognition and emotion. The ARSAT framework also facilitates selecting appropriate sensory technologies that can be used to monitor and collect data for the metrics. Moreover, this research study will introduce BehaveNet, a novel Deep Learning modelling approach, which can be used for training Deep Learning models of human behaviour from the sensory data collected. In this thesis, a comprehensive literature study is presented that was conducted to acquire adequate knowledge for designing the ARSAT framework. In order to identify the contributing factors that affect the reading process, an overview of some existing theories of the reading process is provided. Furthermore, a number of sensory technologies and techniques that can be applied to monitoring the changes in the metrics indicating the factors are also demonstrated. Only, the technologies that are commercially available on the market are recommended by the ARSAT framework. A variety of Machine Learning techniques were also investigated when designing the BehaveNet. The BehaveNet takes advantage of the complementarity of Convolutional Neural Networks, Long Short-Term Memory networks and Deep Neural Networks. The design of a Human Behaviour Monitoring System (HBMS), by utilising the ARSAT framework for recognising three attention-seeking activities of humans, is also presented in this research study. Reading printed text, as well as speaking out loudly and watching a programme on TV were proposed as activities that a person unintentionally may shift his/her attention from reading into distractions. Between sensory devices recommended by the ARSAT framework, the Muse headband which is an Electroencephalography (EEG) and head motion-sensing wearable device, was selected to track the forehead EEG and a person’s head movements. The EEG and 3-axes accelerometer data were recorded from eight participants when they read printed text, as well as the time they performed two other activities. An imbalanced dataset consisting over 1.2 million rows of noisy data was created and used to build a model of the activities (60% training and 20% validating data) and evaluating the model (20% of the data). The efficiency of the framework is demonstrated by comparing the performance of the models built by utilising the BehaveNet, with the models built by utilising a number of competing Deep Learning models for raw EEG and accelerometer data, that have attained state-of-the-art performance. The classification results are evaluated by some metrics including the classification accuracy, F1 score, confusion matrix, Receiver Operating Characteristic curve, and Area under Curve (AUC) score. By considering the results, the BehaveNet contributed to the body of knowledge as an approach for measuring human behaviour by using sensory devices. In comparison with the performance of the other models, the models built by utilising the BehaveNet, attained better performance when classifying data of two EEG channels (Accuracy = 95%; AUC=0.99; F1 = 0.95), data of a single EEG channel (Accuracy = 85%; AUC=0.96; F1 = 0.83), accelerometer data (Accuracy = 81%; AUC = 0.9; F1 = 0.76) and all of the data in the dataset (Accuracy = 97%; AUC = 0.99; F1 = 0.96). The dataset and the source code of this project are also published on the Internet to help the science community. The Muse headband is also shown to be an economical and standard wearable device that can be successfully used in behavioural research.
- Full Text:
- Date Issued: 2019
A framework to measure supply chain management efficacy in humanitarian supply environments
- Authors: Linford, Pierre
- Date: 2015
- Subjects: Humanitarian intervention , Business logistics
- Language: English
- Type: Thesis , Doctoral , DBA
- Identifier: http://hdl.handle.net/10948/8155 , vital:25131
- Description: Supply chain management in the for-profit commercial environment is a broad, far-reaching field of study, impacting on a society’s standard of living. Commercial supply chain management is the science of balancing customer service levels with least total costs. In other words, the for-profit supply chain management practitioner is concerned with customer service levels, consumer value, shareholder value, total cost optimisation and ultimately maximising long term sustainable return on investment. Commercial supply chain management differs from military supply chain management in that the latter also focuses on service delivery, but the cost is almost irrelevant. In military operations, successful results (winning the battle) far surpass the total cost parameter or the return on investment. One of the major differentiating factors between commercial supply chain management (CSCM) in the for-profit theatre and humanitarian supply chain management (HSCM) in the not-for-profit supply environments hinges on strategic intent and how to measure success. In CSCM, return on investment (ROI) is key and in HSCM, the ability to create impact becomes paramount. Regarding spend, both CSCM and HSCM are concerned with optimising operational spend, optimal utilisation of capital goods and infrastructure as well as minimising the cost of goods, works and services. Commercial supply chain managers want to spend as little as possible on operational expenses similarly to their humanitarian counterparts but humanitarian supply chain managers are also concerned about underspending of donor funded programming. Humanitarian programming often happens under difficult and dangerous circumstances. This requires a special cadre of professionals who are willing to serve the most vulnerable without exploitation and are able to deliver value often with limited or even broken infrastructure, unreliable supply and under insecure conditions. Humanitarian supply chain management leadership requires a DBA thesis balanced approach between long term strategic views whilst managing the short term outcomes. Also, humanitarian leadership needs to balance decision-making between long term strategic interventions and the ability, maturity and cost structures at functional and executional levels. This conundrum is the fundamental difference between commercial supply chain management and humanitarian supply chain management. Once one understands and respects these nuances, one can measure performance and reward appropriate corrective behaviour. Zig Ziglar once said: “If you aim at nothing, you will hit it every time”. The question that has been asked for so long has been “how to measure supply chain management efficacy in humanitarian supply environments?” This study addresses this question of developing a framework to measure supply chain efficacy in humanitarian supply environments with the view to create an enabling environment within which service levels could enhance the impact of donor funding whilst the needs of intended beneficiaries are better served. During field research, ten key focus areas and sixty-five supply chain management elements were identified. These sixty-five elements were tested via two surveys making use of the Delphi technique. Four of the sixty-five SCM elements were eliminated following the second survey due to high disagreement between the respondents, and a further two were eliminated based on expert opinion feedback from the respondents leaving fifty-nine elements being significantly important for inclusion in the framework. Three additional elements were identified by the respondents but not empirically verified and therefore not included in the proposed frameworks but could be included in future research. Fifty-seven of the sixty-five elements can be directly controlled by the SCM function. However, four of these fifty-seven elements were eliminated during the second survey and a further two were eliminated reviewing the feedback from respondents leaving fifty-one elements under the direct control of the SCM function.
- Full Text:
- Date Issued: 2015
- Authors: Linford, Pierre
- Date: 2015
- Subjects: Humanitarian intervention , Business logistics
- Language: English
- Type: Thesis , Doctoral , DBA
- Identifier: http://hdl.handle.net/10948/8155 , vital:25131
- Description: Supply chain management in the for-profit commercial environment is a broad, far-reaching field of study, impacting on a society’s standard of living. Commercial supply chain management is the science of balancing customer service levels with least total costs. In other words, the for-profit supply chain management practitioner is concerned with customer service levels, consumer value, shareholder value, total cost optimisation and ultimately maximising long term sustainable return on investment. Commercial supply chain management differs from military supply chain management in that the latter also focuses on service delivery, but the cost is almost irrelevant. In military operations, successful results (winning the battle) far surpass the total cost parameter or the return on investment. One of the major differentiating factors between commercial supply chain management (CSCM) in the for-profit theatre and humanitarian supply chain management (HSCM) in the not-for-profit supply environments hinges on strategic intent and how to measure success. In CSCM, return on investment (ROI) is key and in HSCM, the ability to create impact becomes paramount. Regarding spend, both CSCM and HSCM are concerned with optimising operational spend, optimal utilisation of capital goods and infrastructure as well as minimising the cost of goods, works and services. Commercial supply chain managers want to spend as little as possible on operational expenses similarly to their humanitarian counterparts but humanitarian supply chain managers are also concerned about underspending of donor funded programming. Humanitarian programming often happens under difficult and dangerous circumstances. This requires a special cadre of professionals who are willing to serve the most vulnerable without exploitation and are able to deliver value often with limited or even broken infrastructure, unreliable supply and under insecure conditions. Humanitarian supply chain management leadership requires a DBA thesis balanced approach between long term strategic views whilst managing the short term outcomes. Also, humanitarian leadership needs to balance decision-making between long term strategic interventions and the ability, maturity and cost structures at functional and executional levels. This conundrum is the fundamental difference between commercial supply chain management and humanitarian supply chain management. Once one understands and respects these nuances, one can measure performance and reward appropriate corrective behaviour. Zig Ziglar once said: “If you aim at nothing, you will hit it every time”. The question that has been asked for so long has been “how to measure supply chain management efficacy in humanitarian supply environments?” This study addresses this question of developing a framework to measure supply chain efficacy in humanitarian supply environments with the view to create an enabling environment within which service levels could enhance the impact of donor funding whilst the needs of intended beneficiaries are better served. During field research, ten key focus areas and sixty-five supply chain management elements were identified. These sixty-five elements were tested via two surveys making use of the Delphi technique. Four of the sixty-five SCM elements were eliminated following the second survey due to high disagreement between the respondents, and a further two were eliminated based on expert opinion feedback from the respondents leaving fifty-nine elements being significantly important for inclusion in the framework. Three additional elements were identified by the respondents but not empirically verified and therefore not included in the proposed frameworks but could be included in future research. Fifty-seven of the sixty-five elements can be directly controlled by the SCM function. However, four of these fifty-seven elements were eliminated during the second survey and a further two were eliminated reviewing the feedback from respondents leaving fifty-one elements under the direct control of the SCM function.
- Full Text:
- Date Issued: 2015
A framework to support inexperienced postgraduate research supervisors
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
A gatherer’s paradise? early humans and plant foraging on the Cape south coast, South Africa
- Authors: Botha, Maria Susan
- Date: 2019
- Subjects: Plant remains (Archaeology) -- South Africa , Plant physiology Plant ecology Botany -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/37139 , vital:34124
- Description: Humans were driven to refugia during the cold and dry glacial Marine Isotope Stage 6 (MIS6) (~195–125 ka); only a few places, including the Cape south coast, show archaeological evidence of continuous human occupation. It has been hypothesised that the Cape south coast provided the requisite shelter to ensure human’s earliest survival because it provided all the right ingredients. The shores offer abundant shellfish, the land a diverse array of plants, and the climate was ameliorated due to the proximity of the then exposed Palaeo-Agulhas Plain to the warm Agulhas current. The aim of this study is to determine whether the indigenous flora of this region could have provided a sufficient edible resource for early humans. Residents of the Cape south coast have genetic ancestry linking them to the Khoe-San, the original inhabitants of the area, and still have an extensive knowledge of the local edible plants. With their help, I set out to determine a) whether humans have been utilising the same plant species over time, b) what the foraging potential of the edible plants in the region is and c) how resilient these plants are to human foraging. If we know whether the plant species known and used today were the same as those that were utilised by past humans, we can then use the contemporary knowledge to make predictions about past utilisation. To answer this question, I collated two databases: archaeological (all plant species found in archaeological sites [dating 0 to 80,000 BP]) and contemporary (all plant species in the modern-day ethnographic literature [last 400 years]) that occur within the Greater Cape Floristic Region(GCFR). I found a significant number of plant species shared between the two databases, which suggests that at least some plant species have been used by humans over a long period of time. To determine the indigenous plant foraging potential of the region, I foraged for food in the Cape south coast (451 bouts) monthly over a two-year period with the help of local inhabitants. The findings show that edible plant resources are distributed patchily and focusing on specific vegetation types would greatly enhance chances of harvesting 2,000 kcal per day, which is considered the daily calorific requirements for a typical hunter-gatherer. I then sought to understand how resilient these plants [(with an emphasis on plants with an underground storage organ (USO)] would be to human foraging. To do this, I set out plots and harvested all edible foods for three consecutive years with the help of foragers. Results indicate that there was a significant reduction in edible weight only in the third year of consecutive harvesting. In conclusion, using various approaches, this study investigates the plant food potential of the Cape south coast from the perspective of early human consumers. The findings suggest that knowledge regarding useful plants dates back to at least 80,000 BP. Food resources are patchily distributed across the main vegetation types found within the Cape south coast and occur in hotspots, i.e. concentrated areas hosting high densities of edible plant foods, surrounded by areas with very low plant food densities. Foragers could have harvested their daily calorific quota more easily if they focused their harvesting efforts in specific vegetation types found in the Cape south coast. Furthermore, many USOs circumvent climatic fluctuations, herbivory or both by staggering their emergence over multiple years, which implies they have some resilience to human foraging.
- Full Text:
- Date Issued: 2019
- Authors: Botha, Maria Susan
- Date: 2019
- Subjects: Plant remains (Archaeology) -- South Africa , Plant physiology Plant ecology Botany -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/37139 , vital:34124
- Description: Humans were driven to refugia during the cold and dry glacial Marine Isotope Stage 6 (MIS6) (~195–125 ka); only a few places, including the Cape south coast, show archaeological evidence of continuous human occupation. It has been hypothesised that the Cape south coast provided the requisite shelter to ensure human’s earliest survival because it provided all the right ingredients. The shores offer abundant shellfish, the land a diverse array of plants, and the climate was ameliorated due to the proximity of the then exposed Palaeo-Agulhas Plain to the warm Agulhas current. The aim of this study is to determine whether the indigenous flora of this region could have provided a sufficient edible resource for early humans. Residents of the Cape south coast have genetic ancestry linking them to the Khoe-San, the original inhabitants of the area, and still have an extensive knowledge of the local edible plants. With their help, I set out to determine a) whether humans have been utilising the same plant species over time, b) what the foraging potential of the edible plants in the region is and c) how resilient these plants are to human foraging. If we know whether the plant species known and used today were the same as those that were utilised by past humans, we can then use the contemporary knowledge to make predictions about past utilisation. To answer this question, I collated two databases: archaeological (all plant species found in archaeological sites [dating 0 to 80,000 BP]) and contemporary (all plant species in the modern-day ethnographic literature [last 400 years]) that occur within the Greater Cape Floristic Region(GCFR). I found a significant number of plant species shared between the two databases, which suggests that at least some plant species have been used by humans over a long period of time. To determine the indigenous plant foraging potential of the region, I foraged for food in the Cape south coast (451 bouts) monthly over a two-year period with the help of local inhabitants. The findings show that edible plant resources are distributed patchily and focusing on specific vegetation types would greatly enhance chances of harvesting 2,000 kcal per day, which is considered the daily calorific requirements for a typical hunter-gatherer. I then sought to understand how resilient these plants [(with an emphasis on plants with an underground storage organ (USO)] would be to human foraging. To do this, I set out plots and harvested all edible foods for three consecutive years with the help of foragers. Results indicate that there was a significant reduction in edible weight only in the third year of consecutive harvesting. In conclusion, using various approaches, this study investigates the plant food potential of the Cape south coast from the perspective of early human consumers. The findings suggest that knowledge regarding useful plants dates back to at least 80,000 BP. Food resources are patchily distributed across the main vegetation types found within the Cape south coast and occur in hotspots, i.e. concentrated areas hosting high densities of edible plant foods, surrounded by areas with very low plant food densities. Foragers could have harvested their daily calorific quota more easily if they focused their harvesting efforts in specific vegetation types found in the Cape south coast. Furthermore, many USOs circumvent climatic fluctuations, herbivory or both by staggering their emergence over multiple years, which implies they have some resilience to human foraging.
- Full Text:
- Date Issued: 2019
A gendered analysis of conditional cash based transfers: a case study of Puntland Technical Vocational Skills Training Programme, Somalia
- Authors: Chitombi, Rumbidzai
- Date: 2020
- Subjects: Puntland Technical Vocational Skills Training Programme , Transfer payments -- Somalia -- Case studies , Economic assistance, Domestic -- Somalia , Economic development -- Social aspects -- Somalia , Women -- Somalia -- Social conditions
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/167335 , vital:41469
- Description: As part of the worldwide development system, conditional cash transfer (CCT) programmes have become an increasingly popular policy and development approach in seeking to address poverty, especially in developing countries. Under the CCT programmes, beneficiaries are given assistance in the form of either cash or cash vouchers after fulfilling certain obligations of the development programme, such as attending training, enacting proper health care, or ensuring regular school attendance of children. The programmes have been described as a ‘double-edged sword’ since they aim to address poverty and, at the same time, reduce reliance on government largesse. In this regard, they are seen as potentially effective, and more empowering, alternatives to more traditional social assistance programmes whereby poor people receive welfare assistance in the form of ‘in kind’ and ‘unconditional’ assistance, receiving this as either food or shelter commodities, and without having to meet any conditions in doing so. This ‘traditional’ way of assisting poor people has largely been criticised for creating a dependency syndrome amongst the beneficiaries. In certain cases, CCT programmes focus specifically on women, either in receiving the cash transfer or in meeting the conditions attached to the programme, or both. In this context, considerable debate exists in the scholarly literature about the effects of such CCT programmes on the situation and status of women, specifically in terms of possibly empowering women. While some scholars claim that these programmes enhance the human and financial assets of women, others argue that focusing specifically on women, and as care-givers within households, tends to reproduce gender-based inequalities and subordination. Since gender equality and female empowerment are now key issues in global development spheres, and at national levels, this thesis aims to contribute to literature on the effects of CCTs on gender and women’s empowerment. This is pursued by way of a gendered perspective on CCTs as a development methodology for empowering women with reference to Somalia, using the Puntland Technical Vocational Skills Training programme as a case study. This programme focused, in the main, on internally-displaced people in Somalia, with a particular emphasis on women in meeting the programme conditions (i.e. participating in a training programme) and in being the cash recipients. The study used both quantitative and qualitative approaches for data collection and analysis, focusing on sixty selected beneficiaries who participated in the Puntland Technical Vocational skills training programme in Somalia from 2013. The thesis examines the prevailing structures (including cultural dynamics and socio-economic factors) in Somalia which lead to women’s subordination, notably in the light of significant internal displacement because of war and conflict and the emergence of internally-displaced camps. On this basis, from a gendered perspective, there is a critical appraisal of the manner in which the Puntland CCT programme affected women’s subordinate status, including how it may have led to the restructuring of gendered relations at both household and community levels. In offering this appraisal with reference to the Puntland programme, the thesis argues that women’s subordination and, by extension, women’s empowerment, is multi-faceted, and that continuity and change along the dimensions of subordination is often uneven and contradictory. Further, as also demonstrated in the Puntland case study, women’s subordination (as a social totality) is not a totalising system, such that women regularly make use of gaps in the system as opportunities to enhance their well-being without confronting the totality of the system.
- Full Text:
- Date Issued: 2020
- Authors: Chitombi, Rumbidzai
- Date: 2020
- Subjects: Puntland Technical Vocational Skills Training Programme , Transfer payments -- Somalia -- Case studies , Economic assistance, Domestic -- Somalia , Economic development -- Social aspects -- Somalia , Women -- Somalia -- Social conditions
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/167335 , vital:41469
- Description: As part of the worldwide development system, conditional cash transfer (CCT) programmes have become an increasingly popular policy and development approach in seeking to address poverty, especially in developing countries. Under the CCT programmes, beneficiaries are given assistance in the form of either cash or cash vouchers after fulfilling certain obligations of the development programme, such as attending training, enacting proper health care, or ensuring regular school attendance of children. The programmes have been described as a ‘double-edged sword’ since they aim to address poverty and, at the same time, reduce reliance on government largesse. In this regard, they are seen as potentially effective, and more empowering, alternatives to more traditional social assistance programmes whereby poor people receive welfare assistance in the form of ‘in kind’ and ‘unconditional’ assistance, receiving this as either food or shelter commodities, and without having to meet any conditions in doing so. This ‘traditional’ way of assisting poor people has largely been criticised for creating a dependency syndrome amongst the beneficiaries. In certain cases, CCT programmes focus specifically on women, either in receiving the cash transfer or in meeting the conditions attached to the programme, or both. In this context, considerable debate exists in the scholarly literature about the effects of such CCT programmes on the situation and status of women, specifically in terms of possibly empowering women. While some scholars claim that these programmes enhance the human and financial assets of women, others argue that focusing specifically on women, and as care-givers within households, tends to reproduce gender-based inequalities and subordination. Since gender equality and female empowerment are now key issues in global development spheres, and at national levels, this thesis aims to contribute to literature on the effects of CCTs on gender and women’s empowerment. This is pursued by way of a gendered perspective on CCTs as a development methodology for empowering women with reference to Somalia, using the Puntland Technical Vocational Skills Training programme as a case study. This programme focused, in the main, on internally-displaced people in Somalia, with a particular emphasis on women in meeting the programme conditions (i.e. participating in a training programme) and in being the cash recipients. The study used both quantitative and qualitative approaches for data collection and analysis, focusing on sixty selected beneficiaries who participated in the Puntland Technical Vocational skills training programme in Somalia from 2013. The thesis examines the prevailing structures (including cultural dynamics and socio-economic factors) in Somalia which lead to women’s subordination, notably in the light of significant internal displacement because of war and conflict and the emergence of internally-displaced camps. On this basis, from a gendered perspective, there is a critical appraisal of the manner in which the Puntland CCT programme affected women’s subordinate status, including how it may have led to the restructuring of gendered relations at both household and community levels. In offering this appraisal with reference to the Puntland programme, the thesis argues that women’s subordination and, by extension, women’s empowerment, is multi-faceted, and that continuity and change along the dimensions of subordination is often uneven and contradictory. Further, as also demonstrated in the Puntland case study, women’s subordination (as a social totality) is not a totalising system, such that women regularly make use of gaps in the system as opportunities to enhance their well-being without confronting the totality of the system.
- Full Text:
- Date Issued: 2020
A genetic and ecophysiological comparison of co-occuring indigenous (Perna perna) and invasive (Mytilus galloprovincialis) intertidal mussels
- Authors: Zardi, G I
- Date: 2006
- Subjects: Perna -- South Africa Mytilus galloprovincialis -- South Africa Mussels -- South Africa Mytilidae -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5613 , http://hdl.handle.net/10962/d1003066
- Description: The Mediterranean mussel Mytilus galloprovincialis is the most successful marine invasive species in South Africa. Its presence has had significant ecological consequences on the intertidal communities of the west coast. On the south coast, M galloprovincialis co-exists and competes with the indigenous intertidal mussel Perna perna in the lower balanoid zone, where they show partial habitat segregation. The upper and the lower mussel zones are dominated by M. galloprovincialis and P. perna respectively while they co-occur in the mid zone. In this thesis M. galloprovincialis and P. perna are compared in terms of their population genetics and their ecophysiology. The success of an invader depends on its ability to react to new environmental factors, especially when compared to indigenous species. The distribution and diversity of intertidal species throughout the world are strongly influenced by periodic sand inundation and hydrodynamic stress. Occupying the lower intertidal zone, P. perna is more strongly influenced by sand (burial and sand in suspension) than M. galioprovincialis. Despite this, P. perna is more vulnerable to the effects of sand, showing higher mortality rates under experimental conditions in both the laboratory and the field. M. galioprovincialis has longer labial palps than P. perna, indicating a better ability to sort particles. This, and a higher tolerance to anoxia, explains its lower mortality rates when exposed to burial or suspended sand. Habitat segregation is often explained by physiological tolerances, but in this case, such explanations fail. The ability of a mussel to withstand wave-generated hydrodynamic stress depends mainly on its byssal attachment strength. The higher attachment strength of P. perna compared to M. galioprovincialis and of solitary mussels compared to mussels living within a bed (bed mussels) can be explained by more and thicker byssal threads. M galloprovincialis also has a wider shell, is subjected to higher hydrodynamic loads than P. perna and shows a higher theoretical probability of dislodgement, this is borne out under field conditions. The attachment strength of both species increased from higher to lower shore, in parallel to a gradient of a stronger wave action. Monthly measurements showed that P. perna is always more strongly attached than M. galloprovincialis and revealed seasonal fluctuations of attachment strength for both species in response to wave height. The gonad index of both species was negatively cross-correlated with attachment strength. The results are discussed in the context of the evolutionary strategy of the alien mussel, which directs most of its energy to fast growth and high reproductive output, apparently at the cost of reduced attachment strength. This raises the prediction that its invasive impact will be more pronounced at sites subjected to low or moderate wave action at heavily exposed sites. The potential of a species for invasion is also determined by the ability of the invader to disperse. Population genetics provide indirect information about dispersal through a direct measurement of gene flow. The low genetic divergence (measured as mtDNA) of M. galloprovincialis confirms its recent arrival in South Africa. In contrast, the population genetics structure of P. perna revealed strong divergence on the south-east coast, resulting in a western lineage (straddling the distributional gap of the Benguela System), and an eastern lineage, with an overlap region of the two on the south coast between Kenton-on-Sea and Haga Haga. This genetic disjunction may be caused by Agulhas Current acting as an oceanographic barrier to larval dispersal, or by different environmental selective forces acting on regional populations. Over the last ten years, M. galloprovincialis has shown a decrease or cessation of its spread to the east in exactly the region of the genetic disjunction in P. perna, again suggesting either an oceanographic barrier to larval dispersal, or increasing selection driven by sharp gradients in environmental conditions.
- Full Text:
- Date Issued: 2006
- Authors: Zardi, G I
- Date: 2006
- Subjects: Perna -- South Africa Mytilus galloprovincialis -- South Africa Mussels -- South Africa Mytilidae -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5613 , http://hdl.handle.net/10962/d1003066
- Description: The Mediterranean mussel Mytilus galloprovincialis is the most successful marine invasive species in South Africa. Its presence has had significant ecological consequences on the intertidal communities of the west coast. On the south coast, M galloprovincialis co-exists and competes with the indigenous intertidal mussel Perna perna in the lower balanoid zone, where they show partial habitat segregation. The upper and the lower mussel zones are dominated by M. galloprovincialis and P. perna respectively while they co-occur in the mid zone. In this thesis M. galloprovincialis and P. perna are compared in terms of their population genetics and their ecophysiology. The success of an invader depends on its ability to react to new environmental factors, especially when compared to indigenous species. The distribution and diversity of intertidal species throughout the world are strongly influenced by periodic sand inundation and hydrodynamic stress. Occupying the lower intertidal zone, P. perna is more strongly influenced by sand (burial and sand in suspension) than M. galioprovincialis. Despite this, P. perna is more vulnerable to the effects of sand, showing higher mortality rates under experimental conditions in both the laboratory and the field. M. galioprovincialis has longer labial palps than P. perna, indicating a better ability to sort particles. This, and a higher tolerance to anoxia, explains its lower mortality rates when exposed to burial or suspended sand. Habitat segregation is often explained by physiological tolerances, but in this case, such explanations fail. The ability of a mussel to withstand wave-generated hydrodynamic stress depends mainly on its byssal attachment strength. The higher attachment strength of P. perna compared to M. galioprovincialis and of solitary mussels compared to mussels living within a bed (bed mussels) can be explained by more and thicker byssal threads. M galloprovincialis also has a wider shell, is subjected to higher hydrodynamic loads than P. perna and shows a higher theoretical probability of dislodgement, this is borne out under field conditions. The attachment strength of both species increased from higher to lower shore, in parallel to a gradient of a stronger wave action. Monthly measurements showed that P. perna is always more strongly attached than M. galloprovincialis and revealed seasonal fluctuations of attachment strength for both species in response to wave height. The gonad index of both species was negatively cross-correlated with attachment strength. The results are discussed in the context of the evolutionary strategy of the alien mussel, which directs most of its energy to fast growth and high reproductive output, apparently at the cost of reduced attachment strength. This raises the prediction that its invasive impact will be more pronounced at sites subjected to low or moderate wave action at heavily exposed sites. The potential of a species for invasion is also determined by the ability of the invader to disperse. Population genetics provide indirect information about dispersal through a direct measurement of gene flow. The low genetic divergence (measured as mtDNA) of M. galloprovincialis confirms its recent arrival in South Africa. In contrast, the population genetics structure of P. perna revealed strong divergence on the south-east coast, resulting in a western lineage (straddling the distributional gap of the Benguela System), and an eastern lineage, with an overlap region of the two on the south coast between Kenton-on-Sea and Haga Haga. This genetic disjunction may be caused by Agulhas Current acting as an oceanographic barrier to larval dispersal, or by different environmental selective forces acting on regional populations. Over the last ten years, M. galloprovincialis has shown a decrease or cessation of its spread to the east in exactly the region of the genetic disjunction in P. perna, again suggesting either an oceanographic barrier to larval dispersal, or increasing selection driven by sharp gradients in environmental conditions.
- Full Text:
- Date Issued: 2006
A geographical analysis of nutrition in the Eastern Cape and Ciskei
- Authors: Fincham, Robert John
- Date: 1985
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4812 , http://hdl.handle.net/10962/d1004905
- Description: From preface: The primary aim of the thesis is to make an anthropometric assessment of levels of nutrition of black pre-school children in selected communities of the Eastern Cape and Ciskei. The communities are those of black labourers and their families on white-owned commercial farms in the Dias Divisional Council area of the Eastern Cape; a rural community of an area of Ciskei known as the Amatola Basin; and Tsweletsl'lele, a 'closer settlement' or resettlement area in Ciskei. A pilot survey of school entrants in the Albany magisterial district also sheds light on the nutrition of children in the small towns, such as Grahamstown, of the Eastern Cape. Through an analysis of nutritional conditions in these disparate communities, it should be possible to begin to establish the geographical variation of nutrition in the region. Black communities in the metropolitan area of Port Elizabeth are not considered in the thesis, but on-going surveillance in the city, by the author, will elucidate nutritional conditions there. In achieving the primary aim of the thesis, attention will be focussed on inter-community rather than intra-community variation in nutrition. Nutrition may vary within communities (intra-community variation), for example, within different parts of the Dias Divisional Council area. While such variation is 1 ikely to be minimal, as will be discussed in the presentation of results in chapter 6, section A(l), it is in itself important, and present research endeavours within the surveillance programme are being geared to explore this dimension of nutritional variation more fully. Inter-community variation in nutrition provides, however, a more than sufficient focus for the thesis. A secondary aim of the thesis is to explore the relationship between nutritional status and socio-economic conditions prevailing in the surveyed communities. The secondary aim makes it possible to obtain a better understanding of the processes whi ch infl uence the geographical pattern of nutrition. A consideration of socio-economic conditions, both within the communities and within the Eastern Cape and Ciskei as a whole, also provides a context in which the nutrition results can be assessed. The third aim of the thesis is to assess possible applications of the survey results to policy formulation, thereby providing an applied dimension to the work.
- Full Text:
- Date Issued: 1985
- Authors: Fincham, Robert John
- Date: 1985
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4812 , http://hdl.handle.net/10962/d1004905
- Description: From preface: The primary aim of the thesis is to make an anthropometric assessment of levels of nutrition of black pre-school children in selected communities of the Eastern Cape and Ciskei. The communities are those of black labourers and their families on white-owned commercial farms in the Dias Divisional Council area of the Eastern Cape; a rural community of an area of Ciskei known as the Amatola Basin; and Tsweletsl'lele, a 'closer settlement' or resettlement area in Ciskei. A pilot survey of school entrants in the Albany magisterial district also sheds light on the nutrition of children in the small towns, such as Grahamstown, of the Eastern Cape. Through an analysis of nutritional conditions in these disparate communities, it should be possible to begin to establish the geographical variation of nutrition in the region. Black communities in the metropolitan area of Port Elizabeth are not considered in the thesis, but on-going surveillance in the city, by the author, will elucidate nutritional conditions there. In achieving the primary aim of the thesis, attention will be focussed on inter-community rather than intra-community variation in nutrition. Nutrition may vary within communities (intra-community variation), for example, within different parts of the Dias Divisional Council area. While such variation is 1 ikely to be minimal, as will be discussed in the presentation of results in chapter 6, section A(l), it is in itself important, and present research endeavours within the surveillance programme are being geared to explore this dimension of nutritional variation more fully. Inter-community variation in nutrition provides, however, a more than sufficient focus for the thesis. A secondary aim of the thesis is to explore the relationship between nutritional status and socio-economic conditions prevailing in the surveyed communities. The secondary aim makes it possible to obtain a better understanding of the processes whi ch infl uence the geographical pattern of nutrition. A consideration of socio-economic conditions, both within the communities and within the Eastern Cape and Ciskei as a whole, also provides a context in which the nutrition results can be assessed. The third aim of the thesis is to assess possible applications of the survey results to policy formulation, thereby providing an applied dimension to the work.
- Full Text:
- Date Issued: 1985
A global ionospheric F2 region peak electron density model using neural networks and extended geophysically relevant inputs
- Authors: Oyeyemi, Elijah Oyedola
- Date: 2006
- Subjects: Neural networks (Computer science) Ionospheric electron density Ionosphere Ionosphere -- Mathematical models
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5470 , http://hdl.handle.net/10962/d1005255
- Description: This thesis presents my research on the development of a neural network (NN) based global empirical model of the ionospheric F2 region peak electron density using extended geophysically relevant inputs. The main principle behind this approach has been to utilize parameters other than simple geographic co-ordinates, on which the F2 peak electron density is known to depend, and to exploit the technique of NNs, thereby establishing and modeling the non-linear dynamic processes (both in space and time)associated with the F2 region electron density on a global scale. Four different models have been developed in this work. These are the foF2 NN model, M(3000)F2 NN model, short-term forecasting foF2 NN, and a near-real time foF2 NN model. Data used in the training of the NNs were obtained from the worldwide ionosonde stations spanning the period 1964 to 1986 based on availability, which included all periods of calm and disturbed magnetic activity. Common input parameters used in the training of all 4 models are day number (day of the year, DN), Universal Time (UT), a 2 month running mean of the sunspot number (R2), a 2 day running mean of the 3-hour planetary magnetic index ap (A16), solar zenith angle (CHI), geographic latitude (q), magnetic dip angle (I), angle of magnetic declination (D), angle of meridian relative to subsolar point (M). For the short-term and near-real time foF2 models, additional input parameters related to recent past observations of foF2 itself were included in the training of the NNs. The results of the foF2 NN model and M(3000)F2 NN model presented in this work, which compare favourably with the IRI (International Reference Ionosphere) model successfully demonstrate the potential of NNs for spatial and temporal modeling of the ionospheric parameters foF2 and M(3000)F2 globally. The results obtained from the short-term foF2 NN model and nearreal time foF2 NN model reveal that, in addition to the temporal and spatial input variables, short-term forecasting of foF2 is much improved by including past observations of foF2 itself. Results obtained from the near-real time foF2 NN model also reveal that there exists a correlation between measured foF2 values at different locations across the globe. Again, comparisons of the foF2 NN model and M(3000)F2 NN model predictions with that of the IRI model predictions and observed values at some selected high latitude stations, suggest that the NN technique can successfully be employed to model the complex irregularities associated with the high latitude regions. Based on the results obtained in this research and the comparison made with the IRI model (URSI and CCIR coefficients), these results justify consideration of the NN technique for the prediction of global ionospheric parameters. I believe that, after consideration by the IRI community, these models will prove to be valuable to both the high frequency (HF) communication and worldwide ionospheric communities.
- Full Text:
- Date Issued: 2006
- Authors: Oyeyemi, Elijah Oyedola
- Date: 2006
- Subjects: Neural networks (Computer science) Ionospheric electron density Ionosphere Ionosphere -- Mathematical models
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5470 , http://hdl.handle.net/10962/d1005255
- Description: This thesis presents my research on the development of a neural network (NN) based global empirical model of the ionospheric F2 region peak electron density using extended geophysically relevant inputs. The main principle behind this approach has been to utilize parameters other than simple geographic co-ordinates, on which the F2 peak electron density is known to depend, and to exploit the technique of NNs, thereby establishing and modeling the non-linear dynamic processes (both in space and time)associated with the F2 region electron density on a global scale. Four different models have been developed in this work. These are the foF2 NN model, M(3000)F2 NN model, short-term forecasting foF2 NN, and a near-real time foF2 NN model. Data used in the training of the NNs were obtained from the worldwide ionosonde stations spanning the period 1964 to 1986 based on availability, which included all periods of calm and disturbed magnetic activity. Common input parameters used in the training of all 4 models are day number (day of the year, DN), Universal Time (UT), a 2 month running mean of the sunspot number (R2), a 2 day running mean of the 3-hour planetary magnetic index ap (A16), solar zenith angle (CHI), geographic latitude (q), magnetic dip angle (I), angle of magnetic declination (D), angle of meridian relative to subsolar point (M). For the short-term and near-real time foF2 models, additional input parameters related to recent past observations of foF2 itself were included in the training of the NNs. The results of the foF2 NN model and M(3000)F2 NN model presented in this work, which compare favourably with the IRI (International Reference Ionosphere) model successfully demonstrate the potential of NNs for spatial and temporal modeling of the ionospheric parameters foF2 and M(3000)F2 globally. The results obtained from the short-term foF2 NN model and nearreal time foF2 NN model reveal that, in addition to the temporal and spatial input variables, short-term forecasting of foF2 is much improved by including past observations of foF2 itself. Results obtained from the near-real time foF2 NN model also reveal that there exists a correlation between measured foF2 values at different locations across the globe. Again, comparisons of the foF2 NN model and M(3000)F2 NN model predictions with that of the IRI model predictions and observed values at some selected high latitude stations, suggest that the NN technique can successfully be employed to model the complex irregularities associated with the high latitude regions. Based on the results obtained in this research and the comparison made with the IRI model (URSI and CCIR coefficients), these results justify consideration of the NN technique for the prediction of global ionospheric parameters. I believe that, after consideration by the IRI community, these models will prove to be valuable to both the high frequency (HF) communication and worldwide ionospheric communities.
- Full Text:
- Date Issued: 2006
A high school guidance programme aimed at the primary prevention of sexual abuse of children as part of a national strategy for the prevention of child sexual abuse in South Africa
- Authors: McGregor, Dale
- Date: 1994
- Subjects: Child abuse -- South Africa -- Prevention Educational counseling -- Keiskammahoek Educational counseling -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1553 , http://hdl.handle.net/10962/d1003435
- Description: The sexual abuse of children has become recognised as a major problem affecting children in most, if not all, countries of the world. The prevention of such abuse has, in the last decade, become an issue of international significance. In South Africa, prevention efforts are mainly informal ad hoc strategies initiated by individuals or organisations. As such they suffer from being short-lived and often isolated. Prevention efforts fall into the general categories of primary, secondary and tertiary prevention. Primary prevention focuses on preventing abuse from occurring at all. There are two main aspects to this type of prevention. The first aims at teaching children to protect themselves. The second aims at preventing the development of a disposition to abuse. This study set out to suggest and justify the adoption of a national strategy appropriate to the South African situation, including an overview of what can be done through the schooling system. This strategy will provide a framework and context for individual efforts, and hopefully stimulate new programmes. In addition, a detailed prevention programme for implementation in the secondary school, through the medium of the subject Guidance, was developed. This programme addressed itself mainly to that primary aspect of prevention concerned with preventing people from developing a disposition to abuse. The programme consists of lesson plans, teacher's notes and worksheet materials for pupils.
- Full Text:
- Date Issued: 1994
- Authors: McGregor, Dale
- Date: 1994
- Subjects: Child abuse -- South Africa -- Prevention Educational counseling -- Keiskammahoek Educational counseling -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1553 , http://hdl.handle.net/10962/d1003435
- Description: The sexual abuse of children has become recognised as a major problem affecting children in most, if not all, countries of the world. The prevention of such abuse has, in the last decade, become an issue of international significance. In South Africa, prevention efforts are mainly informal ad hoc strategies initiated by individuals or organisations. As such they suffer from being short-lived and often isolated. Prevention efforts fall into the general categories of primary, secondary and tertiary prevention. Primary prevention focuses on preventing abuse from occurring at all. There are two main aspects to this type of prevention. The first aims at teaching children to protect themselves. The second aims at preventing the development of a disposition to abuse. This study set out to suggest and justify the adoption of a national strategy appropriate to the South African situation, including an overview of what can be done through the schooling system. This strategy will provide a framework and context for individual efforts, and hopefully stimulate new programmes. In addition, a detailed prevention programme for implementation in the secondary school, through the medium of the subject Guidance, was developed. This programme addressed itself mainly to that primary aspect of prevention concerned with preventing people from developing a disposition to abuse. The programme consists of lesson plans, teacher's notes and worksheet materials for pupils.
- Full Text:
- Date Issued: 1994