A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A framework to implement social entrepreneurship activities in higher education institutions
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
A framework to incorporate sustainability into South African consumer protection policy
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
A framework to support inexperienced postgraduate research supervisors
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
A genetic algorithm to obtain optimum parameters for a halcon vision system
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
A hermeneutic phenominological study of the understanding and treatment of Amafufunyana by traditional healers
- Authors: Gqibitole, Camagwini
- Date: 2017
- Subjects: Traditional medicine Healers Mental illness -- Treatment
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5521 , vital:29313
- Description: Traditional healers have a different understanding of psychological illnesses to the western paradigm as well as a different way of diagnosing and treating psychological illnesses. Aims and Objectives. This study’s aim is to examine how traditional healers understand the causes of mental illness mainly focusing on amafufunyana and how this understanding informs treatments methods. Method. This has been done based on hermeneutic phenomenology by drawing from the lived experience of traditional healers through a focus group interview. Results. Upon analysis of the data it becomes clear that traditional healers understand the aetiology of amafufunyana to be supernatural forces. Amafufunyana present in overt and covert symptoms and the diagnostic process entails connecting with the ancestors for their guidance and confirmation of diagnosis, as well as guidance on which imithi to use. The treatment process is congruent with the diagnostic process as it also entails guidance from the ancestors on which imithi to use. Other valuable aspects of traditional healing were brought forward while conducting this study. The aspect of protection from the ancestors was emphasised. It became evident in the analysis of this study that the rituals that are performed in order to appease the ancestors facilitate the connection to the ancestors and through maintaining this connect one can be protected from an array of illnesses and misfortunes. Recommendations. It is recommended that recommended that more studies are conducted with traditional healers in order to give them an opportunity to elaborate on their lived experience of healing, as it was observed that a majority of literature speak on behalf of traditional healers.
- Full Text:
- Date Issued: 2017
- Authors: Gqibitole, Camagwini
- Date: 2017
- Subjects: Traditional medicine Healers Mental illness -- Treatment
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5521 , vital:29313
- Description: Traditional healers have a different understanding of psychological illnesses to the western paradigm as well as a different way of diagnosing and treating psychological illnesses. Aims and Objectives. This study’s aim is to examine how traditional healers understand the causes of mental illness mainly focusing on amafufunyana and how this understanding informs treatments methods. Method. This has been done based on hermeneutic phenomenology by drawing from the lived experience of traditional healers through a focus group interview. Results. Upon analysis of the data it becomes clear that traditional healers understand the aetiology of amafufunyana to be supernatural forces. Amafufunyana present in overt and covert symptoms and the diagnostic process entails connecting with the ancestors for their guidance and confirmation of diagnosis, as well as guidance on which imithi to use. The treatment process is congruent with the diagnostic process as it also entails guidance from the ancestors on which imithi to use. Other valuable aspects of traditional healing were brought forward while conducting this study. The aspect of protection from the ancestors was emphasised. It became evident in the analysis of this study that the rituals that are performed in order to appease the ancestors facilitate the connection to the ancestors and through maintaining this connect one can be protected from an array of illnesses and misfortunes. Recommendations. It is recommended that recommended that more studies are conducted with traditional healers in order to give them an opportunity to elaborate on their lived experience of healing, as it was observed that a majority of literature speak on behalf of traditional healers.
- Full Text:
- Date Issued: 2017
A historical analysis of the impact of the 1966 Ugandan constitutional crisis on Buganda’s monarchy
- Authors: Musisi, Fred
- Date: 2017
- Subjects: Uganda -- Politics and government -- 1962-1971 Uganda -- History Buganda
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20703 , vital:29377
- Description: 1966 was a particularly tumultuous year in the East African country of Uganda. After an era of relative peace and stability, the country was plagued by a range of tragedies that resulted in a constitutional crisis after the 24 May attack on the palace of the King of Buganda. This was the first time in Uganda's short history that the state had deliberately and systematically turned its guns on its own people. As a point of departure the study advances that existing historical analyses on the crisis lack detail. Consequently, the core of the study was to provide a more focused detailed and multi-faceted historical account of the 1966 crisis on the Buganda’s monarchy. The study yielded insights into the political and socio-economic impacts of the 1966 political turmoil on the people of Buganda. Using the historical method to inform the research design; the study employed an archival history methodology to examine how both the colonial legacy and the internal dynamics of the Ugandan society combined to lead to a serious and dramatic conflict between the kingdom of Buganda and State of Uganda. Furthermore, the study demonstrates that the political turmoil left an indelible scar on the Kingdom of Buganda. The study offers clarity on why and how the crisis occurred and contributes a better understanding of the ‘grey area’ of knowledge and insights into what the abolition of the Kingdom meant to the Baganda.
- Full Text:
- Date Issued: 2017
- Authors: Musisi, Fred
- Date: 2017
- Subjects: Uganda -- Politics and government -- 1962-1971 Uganda -- History Buganda
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20703 , vital:29377
- Description: 1966 was a particularly tumultuous year in the East African country of Uganda. After an era of relative peace and stability, the country was plagued by a range of tragedies that resulted in a constitutional crisis after the 24 May attack on the palace of the King of Buganda. This was the first time in Uganda's short history that the state had deliberately and systematically turned its guns on its own people. As a point of departure the study advances that existing historical analyses on the crisis lack detail. Consequently, the core of the study was to provide a more focused detailed and multi-faceted historical account of the 1966 crisis on the Buganda’s monarchy. The study yielded insights into the political and socio-economic impacts of the 1966 political turmoil on the people of Buganda. Using the historical method to inform the research design; the study employed an archival history methodology to examine how both the colonial legacy and the internal dynamics of the Ugandan society combined to lead to a serious and dramatic conflict between the kingdom of Buganda and State of Uganda. Furthermore, the study demonstrates that the political turmoil left an indelible scar on the Kingdom of Buganda. The study offers clarity on why and how the crisis occurred and contributes a better understanding of the ‘grey area’ of knowledge and insights into what the abolition of the Kingdom meant to the Baganda.
- Full Text:
- Date Issued: 2017
A history of the Grahamstown Teachers’ Training College 1894-1975
- Authors: Kelly, Leonard Eric
- Date: 2017
- Subjects: Grahamstown Teachers' Training College , Teachers -- Training of -- South Africa -- Makhanda -- History , Universities and colleges -- South Africa -- Makhanda -- History
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/7903 , vital:21322
- Description: In the Cape Colony, and then in South Africa generally, the twentieth century was to see the emergence, growth, and final closure of teacher training colleges. South Africa was one of the few Anglophone countries on the African Continent which, in 2003, did not have a separate and dedicated system of Teacher Education Colleges.1 From the 1920s on, there was a spirited debate over whether primary school teacher training was better achieved in the training college or the university. The publication of the National Education Amendment Act (No 73 of 1969) finally placed all teacher training, primary/elementary and secondary, within University Faculties of Education. The present study investigates the history of the Grahamstown Teacher Training College (GTTC) which was officially recognised in 1894 for the training of young white women. The GTTC was an independent college, founded and owned by an Anglican Religious Community for women, the Community of the Resurrection of Our Lord (CR), but it was also an Aided College of the Cape Education Department. As an Aided College, the GTTC was subject to Government Inspection annually, and the students wrote the official examinations set by the Department of Education. The College was run entirely by women and existed for 81 years. The emphasis in the college was on the practical professional training offered. The focus was on the ‘complete’ education of the student, rather than merely on the content of the curriculum. This study shows that the GTTC more than earned its reputation of being one of the finest training colleges in South Africa and that it was indeed a unique educational development. A feature of particular note was that the college was a trail-blazer, a pioneer in the field of education practices. It was the first college to introduce class music and class singing, the first to employ a physical education teacher, to have a full-time librarian and elocutionist, and it was at the GTTC that the assignment method of study was introduced. All these factors are highlighted in the course of this study.
- Full Text:
- Date Issued: 2017
- Authors: Kelly, Leonard Eric
- Date: 2017
- Subjects: Grahamstown Teachers' Training College , Teachers -- Training of -- South Africa -- Makhanda -- History , Universities and colleges -- South Africa -- Makhanda -- History
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/7903 , vital:21322
- Description: In the Cape Colony, and then in South Africa generally, the twentieth century was to see the emergence, growth, and final closure of teacher training colleges. South Africa was one of the few Anglophone countries on the African Continent which, in 2003, did not have a separate and dedicated system of Teacher Education Colleges.1 From the 1920s on, there was a spirited debate over whether primary school teacher training was better achieved in the training college or the university. The publication of the National Education Amendment Act (No 73 of 1969) finally placed all teacher training, primary/elementary and secondary, within University Faculties of Education. The present study investigates the history of the Grahamstown Teacher Training College (GTTC) which was officially recognised in 1894 for the training of young white women. The GTTC was an independent college, founded and owned by an Anglican Religious Community for women, the Community of the Resurrection of Our Lord (CR), but it was also an Aided College of the Cape Education Department. As an Aided College, the GTTC was subject to Government Inspection annually, and the students wrote the official examinations set by the Department of Education. The College was run entirely by women and existed for 81 years. The emphasis in the college was on the practical professional training offered. The focus was on the ‘complete’ education of the student, rather than merely on the content of the curriculum. This study shows that the GTTC more than earned its reputation of being one of the finest training colleges in South Africa and that it was indeed a unique educational development. A feature of particular note was that the college was a trail-blazer, a pioneer in the field of education practices. It was the first college to introduce class music and class singing, the first to employ a physical education teacher, to have a full-time librarian and elocutionist, and it was at the GTTC that the assignment method of study was introduced. All these factors are highlighted in the course of this study.
- Full Text:
- Date Issued: 2017
A holistic investigation of amateur batters performance responses to a century protocol: a focused cognitive perspective
- Authors: Goble, David
- Date: 2017
- Subjects: Cricket -- Batting -- Physiological aspects , Cricket players -- Physiology , Cricket players -- Health and hygiene , Cognition -- Testing , Neurophysiology
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/40725 , vital:25020
- Description: No cognitive study has implemented an exercise modality that requires both physical effort and cognitive control, therefore, the effects of such exercise are unknown. Additionally, no studies have investigated how prolonged batting impacts cognitive functioning nor how physical responses and cognitive functioning are related while batting. At intensities of 6070 percent heart rate maximum, acute and prolonged bouts of physical activity have been shown to improve cognitive functioning. At higher intensities, the beneficial effects are minimal and in some cases performance is impaired. Therefore, the aim of this investigation was to determine how prolonged intermittent batting (a task that requires high muscular and cardiovascular loads but also continuous cognitive control) affects cognitive, physiological, physical and biophysical responses in amateur batters. Further aims included to test the reliability of the method employed in assessing these responses. To answer this question, the investigation was separated into three studies: phase 1 (a large-scale pilot) and phase 2 and 3 (a repeated measures test-retest hypothesis). In each phase, batters completed the 30 over BATEX simulation, which replicated the demands of scoring a one-day international century. To establish physiological, physical and perceptual strain; heart rate, sprint times and perceived exertion data were collected each over. Changes in body mass over time were compared to determine the effects of fluid loss on cognitive performance. Before, during and after the simulation, psychomotor function, visual attention, working memory, visual learning and memory as well as executive functions were assessed (CogState brief test battery). During cognitive assessments, heart rate and heart rate variability parameters were sampled so that autonomic modulation of the heart could be determined. The methodological differences between phase 1 and phase 2 and 3, were (respectively); the frequency of cognitive assessments (five vs. three), the samples used (15 schoolboy vs. 16 academy batters), hydration protocols (250ml of Energade vs. water ad libitum) and a singular change in a physical dependent variable (batting accuracy vs. vertical jump). In schoolboy and academy batters, the prolonged batting simulation placed significant strain on the cardiovascular and muscular subsystems; increasing heart rate (p<0.01), decreasing body mass (p<0.01) and deteriorating sprint performance (p<0.01) over time. In each sample, batters’ perceived exertion increased significantly (p<0.01) and exertion was highest in the final over of the protocol. Interestingly, the changes in cardiovascular and muscular responses were larger in schoolboy batters. While the cognitive performance decrements over time were not significant in academy batters (p>0.05; d<0.2), the magnitude of impairment in psychomotor function (p>0.05; d = 0.37), visual attention (p>0.05; d = 0.56), working memory (p>0.05; d = 0.61) and executive function (p>0.05; d = 0.58) was larger in schoolboy batters. In both samples, the simulation altered the modulation of heart rate significantly. Heart rate variability decreased linearly with time spent batting (p<0.01; d>0.8). During cognitive assessments, heart rate variability increased with time-on-task, where responses were significantly higher (p<0.05) in the last task of the battery compared to the first. Importantly, the results of the retest phase were the same as in the test phase and only two condition effects were observed; (i) heart rate (retest lower: p<0.04;d = 0.39), (ii) body mass (retest lower: p<0.03;d = 0.09). A task-related condition effect in heart rate variability (PNN30) was also observed (retest higher: p<0.03; d = not calculated). Resultantly, the test-retest reliability of phase 2 and 3 was high. The results indicate that prolonged intermittent batting at an intensity of 64-77 %HRmax impaired cognitive functioning in amateur batters. However, the cardiovascular and muscular strain induced by prolonged intermittent batting and its effects on cognitive functioning are mediated by intrinsic and extrinsic factors (age, training status, playing experience and hydration). Therefore, while prolonged batting has similar effects on cognitive functioning as acute bouts of physical activity, they do not share the same relationship. The author hypothesises that the continuous cognitive component inherent in prolonged batting mitigates the beneficial effects of physical activity, as demonstrated previously. Future research is needed to elucidate this relationship. Additionally, player experience affects the way in which batters regulate performance while batting; which also affects the rate of and magnitude of impairment during batting. Finally, the methodological limitations of this study provide direction for future research into batting.
- Full Text:
- Date Issued: 2017
- Authors: Goble, David
- Date: 2017
- Subjects: Cricket -- Batting -- Physiological aspects , Cricket players -- Physiology , Cricket players -- Health and hygiene , Cognition -- Testing , Neurophysiology
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/40725 , vital:25020
- Description: No cognitive study has implemented an exercise modality that requires both physical effort and cognitive control, therefore, the effects of such exercise are unknown. Additionally, no studies have investigated how prolonged batting impacts cognitive functioning nor how physical responses and cognitive functioning are related while batting. At intensities of 6070 percent heart rate maximum, acute and prolonged bouts of physical activity have been shown to improve cognitive functioning. At higher intensities, the beneficial effects are minimal and in some cases performance is impaired. Therefore, the aim of this investigation was to determine how prolonged intermittent batting (a task that requires high muscular and cardiovascular loads but also continuous cognitive control) affects cognitive, physiological, physical and biophysical responses in amateur batters. Further aims included to test the reliability of the method employed in assessing these responses. To answer this question, the investigation was separated into three studies: phase 1 (a large-scale pilot) and phase 2 and 3 (a repeated measures test-retest hypothesis). In each phase, batters completed the 30 over BATEX simulation, which replicated the demands of scoring a one-day international century. To establish physiological, physical and perceptual strain; heart rate, sprint times and perceived exertion data were collected each over. Changes in body mass over time were compared to determine the effects of fluid loss on cognitive performance. Before, during and after the simulation, psychomotor function, visual attention, working memory, visual learning and memory as well as executive functions were assessed (CogState brief test battery). During cognitive assessments, heart rate and heart rate variability parameters were sampled so that autonomic modulation of the heart could be determined. The methodological differences between phase 1 and phase 2 and 3, were (respectively); the frequency of cognitive assessments (five vs. three), the samples used (15 schoolboy vs. 16 academy batters), hydration protocols (250ml of Energade vs. water ad libitum) and a singular change in a physical dependent variable (batting accuracy vs. vertical jump). In schoolboy and academy batters, the prolonged batting simulation placed significant strain on the cardiovascular and muscular subsystems; increasing heart rate (p<0.01), decreasing body mass (p<0.01) and deteriorating sprint performance (p<0.01) over time. In each sample, batters’ perceived exertion increased significantly (p<0.01) and exertion was highest in the final over of the protocol. Interestingly, the changes in cardiovascular and muscular responses were larger in schoolboy batters. While the cognitive performance decrements over time were not significant in academy batters (p>0.05; d<0.2), the magnitude of impairment in psychomotor function (p>0.05; d = 0.37), visual attention (p>0.05; d = 0.56), working memory (p>0.05; d = 0.61) and executive function (p>0.05; d = 0.58) was larger in schoolboy batters. In both samples, the simulation altered the modulation of heart rate significantly. Heart rate variability decreased linearly with time spent batting (p<0.01; d>0.8). During cognitive assessments, heart rate variability increased with time-on-task, where responses were significantly higher (p<0.05) in the last task of the battery compared to the first. Importantly, the results of the retest phase were the same as in the test phase and only two condition effects were observed; (i) heart rate (retest lower: p<0.04;d = 0.39), (ii) body mass (retest lower: p<0.03;d = 0.09). A task-related condition effect in heart rate variability (PNN30) was also observed (retest higher: p<0.03; d = not calculated). Resultantly, the test-retest reliability of phase 2 and 3 was high. The results indicate that prolonged intermittent batting at an intensity of 64-77 %HRmax impaired cognitive functioning in amateur batters. However, the cardiovascular and muscular strain induced by prolonged intermittent batting and its effects on cognitive functioning are mediated by intrinsic and extrinsic factors (age, training status, playing experience and hydration). Therefore, while prolonged batting has similar effects on cognitive functioning as acute bouts of physical activity, they do not share the same relationship. The author hypothesises that the continuous cognitive component inherent in prolonged batting mitigates the beneficial effects of physical activity, as demonstrated previously. Future research is needed to elucidate this relationship. Additionally, player experience affects the way in which batters regulate performance while batting; which also affects the rate of and magnitude of impairment during batting. Finally, the methodological limitations of this study provide direction for future research into batting.
- Full Text:
- Date Issued: 2017
A leadership transfer framework to improve the retention rate in the private hotel industry
- Authors: Gregersen, Peter Carl
- Date: 2017
- Subjects: Corporate culture -- South Africa , Employee retention -- South Africa , Hospitality industry -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/7160 , vital:21284
- Description: The transference of knowledge and the creation of a knowledge vault within operations of the Hospitality sector is the cornerstone to the success of this dynamic contributor to the economy, not only as a skills developer, but also as a collective group of experts that unknowingly build a community of expertise that transfer knowledge amongst themselves within an organisation. Leadership that share knowledge, whether tacit or implied, leads to the development and knowledge growth from members to those who are exposed to the intricacies of decision making and business practices. This leads then to the skills development and retention of the participants who feel nurtured and fulfilled in the employment within the organisation and view themselves as valued members. The finding of this research reveals a correlation between knowledge sharing and the desire for job security that leads to the feeling of being nurtured and finding the employment positive and enjoyable. The transference of knowledge allows the receiver of the knowledge to develop to where the point of the receiver becoming an expert in their chosen field is attained and the collective of the mangers are developed to the level of a community of experts in their various fields. However the academic qualifications of leadership is low, the significance of this highlights the level of networking amongst themselves as paramount to the success of this multi million rand industry.
- Full Text:
- Date Issued: 2017
- Authors: Gregersen, Peter Carl
- Date: 2017
- Subjects: Corporate culture -- South Africa , Employee retention -- South Africa , Hospitality industry -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/7160 , vital:21284
- Description: The transference of knowledge and the creation of a knowledge vault within operations of the Hospitality sector is the cornerstone to the success of this dynamic contributor to the economy, not only as a skills developer, but also as a collective group of experts that unknowingly build a community of expertise that transfer knowledge amongst themselves within an organisation. Leadership that share knowledge, whether tacit or implied, leads to the development and knowledge growth from members to those who are exposed to the intricacies of decision making and business practices. This leads then to the skills development and retention of the participants who feel nurtured and fulfilled in the employment within the organisation and view themselves as valued members. The finding of this research reveals a correlation between knowledge sharing and the desire for job security that leads to the feeling of being nurtured and finding the employment positive and enjoyable. The transference of knowledge allows the receiver of the knowledge to develop to where the point of the receiver becoming an expert in their chosen field is attained and the collective of the mangers are developed to the level of a community of experts in their various fields. However the academic qualifications of leadership is low, the significance of this highlights the level of networking amongst themselves as paramount to the success of this multi million rand industry.
- Full Text:
- Date Issued: 2017
A meteorological analysis of extreme flood events in the southern parts of the Eastern Cape, South Africa
- Authors: Jacobs, Tennielle Lindsay
- Date: 2017
- Subjects: Floods -- South Africa -- Eastern Cape , Floods -- South Africa -- Eastern Cape -- Cast studies , Lows (Meteorology) -- South Africa -- Eastern Cape , Rain and rainfall -- South Africa -- Eastern Cape , Rainfall anomalies -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/50525 , vital:25996
- Description: Extreme flood events have been found to occur in the Eastern Cape Province of South Africa. The southern and south-eastern coastal regions are particularly susceptible to floods with daily rainfall records of up to 490 mm having been recorded here. In order to gain a better understanding of these floods, historical floods in the southern parts of the Eastern Cape have been analysed in this study. This study aimed to investigate the most extreme flood events in the history of the area and to analyse the surface observational data during the heavy rainfall events found, to contribute to the understanding of these heavy rainfall events. Seven case studies were investigated using NCEP/NCAR Reanalysis 1 data and surface observational data, to analysis the synoptic circulation and surface data tendencies during heavy rainfall events. All of the case studies that had synoptic data available showed to have a COL system present with the upper air low lying westward of the flood area. The surface synoptic situation presented an intense high pressure system lying south west or south of the country in the Atlantic Ocean between 35-45°S. Another key factor was a surface trough over the interior of the country, due to the COL, extending southwards to protrude off of the south or south eastern coastline east of the flood areas. The combination of these three systems colloquially referred to as a “Black South-Easter”, produced dangerous rainfall intensities when the winds were perpendicular to the coast. The results of the surface observations revealed temperatures increasing at night (against diurnal cycles) with increasing relative humidity preceding the heavy rainfall events. The pressure showed both increasing and decreasing trends during heavy rainfall events however in five of six cases a tight pressure gradient was present producing an influx of moist air into the flood area. Onshore winds were found to be of high importance in heavy rainfall events to bring moist air into the area. Wind speeds greater than 5m/s occurred during times of high rainfall intensities.
- Full Text:
- Date Issued: 2017
- Authors: Jacobs, Tennielle Lindsay
- Date: 2017
- Subjects: Floods -- South Africa -- Eastern Cape , Floods -- South Africa -- Eastern Cape -- Cast studies , Lows (Meteorology) -- South Africa -- Eastern Cape , Rain and rainfall -- South Africa -- Eastern Cape , Rainfall anomalies -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/50525 , vital:25996
- Description: Extreme flood events have been found to occur in the Eastern Cape Province of South Africa. The southern and south-eastern coastal regions are particularly susceptible to floods with daily rainfall records of up to 490 mm having been recorded here. In order to gain a better understanding of these floods, historical floods in the southern parts of the Eastern Cape have been analysed in this study. This study aimed to investigate the most extreme flood events in the history of the area and to analyse the surface observational data during the heavy rainfall events found, to contribute to the understanding of these heavy rainfall events. Seven case studies were investigated using NCEP/NCAR Reanalysis 1 data and surface observational data, to analysis the synoptic circulation and surface data tendencies during heavy rainfall events. All of the case studies that had synoptic data available showed to have a COL system present with the upper air low lying westward of the flood area. The surface synoptic situation presented an intense high pressure system lying south west or south of the country in the Atlantic Ocean between 35-45°S. Another key factor was a surface trough over the interior of the country, due to the COL, extending southwards to protrude off of the south or south eastern coastline east of the flood areas. The combination of these three systems colloquially referred to as a “Black South-Easter”, produced dangerous rainfall intensities when the winds were perpendicular to the coast. The results of the surface observations revealed temperatures increasing at night (against diurnal cycles) with increasing relative humidity preceding the heavy rainfall events. The pressure showed both increasing and decreasing trends during heavy rainfall events however in five of six cases a tight pressure gradient was present producing an influx of moist air into the flood area. Onshore winds were found to be of high importance in heavy rainfall events to bring moist air into the area. Wind speeds greater than 5m/s occurred during times of high rainfall intensities.
- Full Text:
- Date Issued: 2017
A mobile based user centred integrated remote patient monitoring framework for low resource settings
- Authors: Ndlovu, Nkanyiso
- Date: 2017
- Subjects: Health services accessibility Medical telematics Patient monitoring -- Remote sensing
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10353/8563 , vital:33128
- Description: There is a gap in healthcare service delivery within low resource settings of South Africa. These areas are under-serviced because of poor health infrastructure and few available medical experts. This contributes immensely to poor health care delivery especially to chronically ill diabetic patients and increases mortality rates. However, innovative remote patient monitoring (RPM) systems have been developed to curb the above challenge in recent years. Unfortunately, most of these systems are standalone and are incompatible with one another. Most of them relay on Internet for connectivity which is imminent in low resource settings. This makes continuity of care of chronic ill patients a great challenge. Additional, the efficacy and feasibility of RPM using mobile phones in low resource settings of South Africa are still unknown. It was also noted that none of these systems have been developed for a clinical trial. The goal of this study was to provide a standard framework that allows optimal design of mobile RPM systems which are interoperable. The objectives were to investigate the RPM system efficacy and reliability in low resource settings and determine its effects on clinical management, self-care and health outcomes. The framework was validated with a clinical trial to remotely monitor diabetic adults in Limpopo province of South Africa. A prototype system was developed based on sound user centric design process and enterprise architectural principles to remotely monitor diabetic elderly patients using cellular technologies and existing hospital infrastructure. It was evaluated using a controlled, randomized clinical trial for 6 months. There were 120 patients who took part in the study and were categorized into two groups, the intervention Group X and the control Group Y. Each group comprised of 60 participants. Evidence from this study justified the feasibility and possibility of long term implementation of RPM system to cater for chronic ill patients in low resource settings worldwide. Results showed that the self-care and normal blood glucose levels improved for both groups whereas quality of life improved only for Group X. It was shown that extensive self-care knowledge with the help of RPM system improved self-care and helped normalize their glucose levels. The hospital admissions and mortality between the two groups did not differ much. However, the intervention group had more hospital visits than the control group because the participants were requested to visit the hospitals in case of emergency. The users perceived the RPM system as feasible and effective way of clinical management and self-care. Due to wide acceptance, some patients were even willing to continue using the system after the trial. Home measurements proved to be reliable and helped improve self-care. In future, a standardized and unified framework based on rule set would provide comprehensive remote healthcare allowing continuous patient monitoring at a reduced overall cost thereby decreasing mortality rates.
- Full Text:
- Date Issued: 2017
A mobile based user centred integrated remote patient monitoring framework for low resource settings
- Authors: Ndlovu, Nkanyiso
- Date: 2017
- Subjects: Health services accessibility Medical telematics Patient monitoring -- Remote sensing
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10353/8563 , vital:33128
- Description: There is a gap in healthcare service delivery within low resource settings of South Africa. These areas are under-serviced because of poor health infrastructure and few available medical experts. This contributes immensely to poor health care delivery especially to chronically ill diabetic patients and increases mortality rates. However, innovative remote patient monitoring (RPM) systems have been developed to curb the above challenge in recent years. Unfortunately, most of these systems are standalone and are incompatible with one another. Most of them relay on Internet for connectivity which is imminent in low resource settings. This makes continuity of care of chronic ill patients a great challenge. Additional, the efficacy and feasibility of RPM using mobile phones in low resource settings of South Africa are still unknown. It was also noted that none of these systems have been developed for a clinical trial. The goal of this study was to provide a standard framework that allows optimal design of mobile RPM systems which are interoperable. The objectives were to investigate the RPM system efficacy and reliability in low resource settings and determine its effects on clinical management, self-care and health outcomes. The framework was validated with a clinical trial to remotely monitor diabetic adults in Limpopo province of South Africa. A prototype system was developed based on sound user centric design process and enterprise architectural principles to remotely monitor diabetic elderly patients using cellular technologies and existing hospital infrastructure. It was evaluated using a controlled, randomized clinical trial for 6 months. There were 120 patients who took part in the study and were categorized into two groups, the intervention Group X and the control Group Y. Each group comprised of 60 participants. Evidence from this study justified the feasibility and possibility of long term implementation of RPM system to cater for chronic ill patients in low resource settings worldwide. Results showed that the self-care and normal blood glucose levels improved for both groups whereas quality of life improved only for Group X. It was shown that extensive self-care knowledge with the help of RPM system improved self-care and helped normalize their glucose levels. The hospital admissions and mortality between the two groups did not differ much. However, the intervention group had more hospital visits than the control group because the participants were requested to visit the hospitals in case of emergency. The users perceived the RPM system as feasible and effective way of clinical management and self-care. Due to wide acceptance, some patients were even willing to continue using the system after the trial. Home measurements proved to be reliable and helped improve self-care. In future, a standardized and unified framework based on rule set would provide comprehensive remote healthcare allowing continuous patient monitoring at a reduced overall cost thereby decreasing mortality rates.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A narrative, child-participatory study of domestic mobility within grandmother-headed households in the Eastern Cape, South Africa
- Authors: Lotter, Jaclyn Oehley
- Date: 2017
- Subjects: Women heads of households South Africa Eastern Cape , Poor women South Africa Eastern Cape , Migration, Internal South Africa , Poverty South Africa , HIV infections Social aspects South Africa , HIV infections Economic aspects South Africa , AIDS (Disease) Social aspects South Africa , AIDS (Disease) Economic aspects South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/7678 , vital:21285
- Description: The movement of adults and children between households in South Africa is a tradition entrenched by apartheid state policies and fuelled by poverty and HIV/AIDS. Children affected by domestic mobility include not only orphans, but those whose families are struggling financially or are deprived of income through illness or death. One example of domestic mobility is the redistribution of children through grandmother-headed households. While domestic mobility has been researched from a number of different academic perspectives, there is scanty psychological literature on the subject, and a gap around children’s experiences of their own mobility. Children’s roles and agency in their mobility, and how these are shaped by their environments, social relations and resilience, are not considered. This research aimed to explore the meanings that domestic mobility had in the lives, identity constructions and personal narratives of South African children currently residing in grandmother-headed households in the Eastern Cape. This was achieved through a narrative approach, interested in big life-stories, as well as small stories of everyday interaction. Over the course of two years, five child participants aged between eight and 12 years constructed narrative material through participatory action research methodologies, including the mapping of time-lines and their lived environments, and photovoice. Child participants and their families were selected from the client-base of a non-governmental organisation, Isibindi (Alice). Narratives were analysed as case studies to tell detailed stories of children’s lives, and to comment on issues associated with domestic mobility, socio-economic status, gender, education, HIV/AIDS and social protection. The study found that blanket definitions of poverty and domestic mobility conceal important variations in levels of poverty and individual experiences of mobility. While children are excluded from processes of decision-making about their mobility, they perform their agency by contributing to household survival and ensuring the continuation of mutually beneficial attachment relationships. This research argues that interventions which act on various systemic levels (macro, meso and exo) add support and protection for vulnerable children. This research also argues for psychological “scaffolding” of potentially traumatic or precarious processes, such as domestic mobility and deaths in families, through caregivers preparing and consulting with children before events happen.
- Full Text:
- Date Issued: 2017
- Authors: Lotter, Jaclyn Oehley
- Date: 2017
- Subjects: Women heads of households South Africa Eastern Cape , Poor women South Africa Eastern Cape , Migration, Internal South Africa , Poverty South Africa , HIV infections Social aspects South Africa , HIV infections Economic aspects South Africa , AIDS (Disease) Social aspects South Africa , AIDS (Disease) Economic aspects South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/7678 , vital:21285
- Description: The movement of adults and children between households in South Africa is a tradition entrenched by apartheid state policies and fuelled by poverty and HIV/AIDS. Children affected by domestic mobility include not only orphans, but those whose families are struggling financially or are deprived of income through illness or death. One example of domestic mobility is the redistribution of children through grandmother-headed households. While domestic mobility has been researched from a number of different academic perspectives, there is scanty psychological literature on the subject, and a gap around children’s experiences of their own mobility. Children’s roles and agency in their mobility, and how these are shaped by their environments, social relations and resilience, are not considered. This research aimed to explore the meanings that domestic mobility had in the lives, identity constructions and personal narratives of South African children currently residing in grandmother-headed households in the Eastern Cape. This was achieved through a narrative approach, interested in big life-stories, as well as small stories of everyday interaction. Over the course of two years, five child participants aged between eight and 12 years constructed narrative material through participatory action research methodologies, including the mapping of time-lines and their lived environments, and photovoice. Child participants and their families were selected from the client-base of a non-governmental organisation, Isibindi (Alice). Narratives were analysed as case studies to tell detailed stories of children’s lives, and to comment on issues associated with domestic mobility, socio-economic status, gender, education, HIV/AIDS and social protection. The study found that blanket definitions of poverty and domestic mobility conceal important variations in levels of poverty and individual experiences of mobility. While children are excluded from processes of decision-making about their mobility, they perform their agency by contributing to household survival and ensuring the continuation of mutually beneficial attachment relationships. This research argues that interventions which act on various systemic levels (macro, meso and exo) add support and protection for vulnerable children. This research also argues for psychological “scaffolding” of potentially traumatic or precarious processes, such as domestic mobility and deaths in families, through caregivers preparing and consulting with children before events happen.
- Full Text:
- Date Issued: 2017
A national strategy towards cultivating a cybersecurity culture in South Africa
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
A new synthetic approach for preparation of Efavirenz
- Authors: Chada, Sravanthi
- Date: 2017
- Subjects: Antiretroviral agents , Asymmetric synthesis , Enzyme inhibitors , HIV (Viruses) -- Enzymes
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15512 , vital:28265
- Description: Efavirenz, a drug that is still inaccessible to millions of people worldwide, is potent non nucleoside reverse transcriptase inhibitor (NNRTI), is one of the preferred agents used in combination therapy for first-line treatment of the human immunodeficiency virus (HIV). NNRTIs attach to and block an HIV enzyme called reverse transcriptase, by blocking reverse transcriptase; NNRTIs prevent HIV from multiplying and can reduce the amount of HIV in the body. Efavirenz can't cure HIV/AIDS, but taken in combination with other HIV medicines (called an HIV regimen) every day helps people with HIV live longer healthier lives. Efavirenz also reduces the risk of HIV transmission and can be used by children who are suffering from HIV/AIDS. All the above therapeutic uses of efavirenz prompted us to identify the novel and hopefully cost efficient synthetic methodology for the preparation of efavirenz. In this thesis a new synthetic method for asymmetric synthesis of efavirenz is described. This route started from commercially available starting materials and it is first established in traditional batch chemistry and further the parameters transferred to a semi continuous flow protocol for optimization.
- Full Text:
- Date Issued: 2017
- Authors: Chada, Sravanthi
- Date: 2017
- Subjects: Antiretroviral agents , Asymmetric synthesis , Enzyme inhibitors , HIV (Viruses) -- Enzymes
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15512 , vital:28265
- Description: Efavirenz, a drug that is still inaccessible to millions of people worldwide, is potent non nucleoside reverse transcriptase inhibitor (NNRTI), is one of the preferred agents used in combination therapy for first-line treatment of the human immunodeficiency virus (HIV). NNRTIs attach to and block an HIV enzyme called reverse transcriptase, by blocking reverse transcriptase; NNRTIs prevent HIV from multiplying and can reduce the amount of HIV in the body. Efavirenz can't cure HIV/AIDS, but taken in combination with other HIV medicines (called an HIV regimen) every day helps people with HIV live longer healthier lives. Efavirenz also reduces the risk of HIV transmission and can be used by children who are suffering from HIV/AIDS. All the above therapeutic uses of efavirenz prompted us to identify the novel and hopefully cost efficient synthetic methodology for the preparation of efavirenz. In this thesis a new synthetic method for asymmetric synthesis of efavirenz is described. This route started from commercially available starting materials and it is first established in traditional batch chemistry and further the parameters transferred to a semi continuous flow protocol for optimization.
- Full Text:
- Date Issued: 2017
A normative study of the Raven's Coloured Progressive Matrices for South African children with cognitive barriers to learning
- Authors: August, Justin Oswin
- Date: 2017
- Subjects: Children -- Intelligence testing -- South Africa , Inclusive education -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/19419 , vital:28869
- Description: With the changing landscape in South Africa to a full democracy, increased research has been undertaken in the psychometric field on local and national normative studies regarding various assessment measures. The Raven’s Coloured Progressive Matrices (CPM) is one of the measures that have already been extensively normed throughout the world for various population groups. In South Africa, local norms for normal populations of children have been developed by groups of researchers in the Grahamstown (Eastern Cape) as well as the Bloemfontein (Free State) areas. With a South African school educational system that focuses on Inclusive Education, there is a growing need for mainstream schools to identify learners who are at risk for learning disabilities in order to develop appropriate supportive intervention plans. The research aimed to establish psychometric normative screening data based on the Raven’s CPM, and to compare these with the established and published international and local Raven’s CPM norms. In addition, the researcher developed pilot classification scores for the early screening and detection of at risk learners in order to encourage the potential role and use of the Raven’s CPM in the identification of cognitive learning barriers. The sample consisted of 388 primary school learners identified as having cognitive barriers to learning. Archival data was used that was gathered from a Psychological clinic that provided screening services to schools in the Nelson Mandela Metropolitan area. The results of the study indicated that there was a proportional relationship between age and test performance. Gender differences were found where the males in this study outperformed the females. There was a significant difference in the Raven’s CPM test performance with respect to the grade levels of the learners. The study developed a special set of norms with cognitive classification scores that will aid in the early identification of learning disabilities.
- Full Text:
- Date Issued: 2017
- Authors: August, Justin Oswin
- Date: 2017
- Subjects: Children -- Intelligence testing -- South Africa , Inclusive education -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/19419 , vital:28869
- Description: With the changing landscape in South Africa to a full democracy, increased research has been undertaken in the psychometric field on local and national normative studies regarding various assessment measures. The Raven’s Coloured Progressive Matrices (CPM) is one of the measures that have already been extensively normed throughout the world for various population groups. In South Africa, local norms for normal populations of children have been developed by groups of researchers in the Grahamstown (Eastern Cape) as well as the Bloemfontein (Free State) areas. With a South African school educational system that focuses on Inclusive Education, there is a growing need for mainstream schools to identify learners who are at risk for learning disabilities in order to develop appropriate supportive intervention plans. The research aimed to establish psychometric normative screening data based on the Raven’s CPM, and to compare these with the established and published international and local Raven’s CPM norms. In addition, the researcher developed pilot classification scores for the early screening and detection of at risk learners in order to encourage the potential role and use of the Raven’s CPM in the identification of cognitive learning barriers. The sample consisted of 388 primary school learners identified as having cognitive barriers to learning. Archival data was used that was gathered from a Psychological clinic that provided screening services to schools in the Nelson Mandela Metropolitan area. The results of the study indicated that there was a proportional relationship between age and test performance. Gender differences were found where the males in this study outperformed the females. There was a significant difference in the Raven’s CPM test performance with respect to the grade levels of the learners. The study developed a special set of norms with cognitive classification scores that will aid in the early identification of learning disabilities.
- Full Text:
- Date Issued: 2017