A critical review of the response of the Environmental Literacy Skills Programme to learner capabilities, and to the demands of the Working for Water training setting in an emerging Green Economy
- Authors: Fourie, Kathryn
- Date: 2017
- Subjects: Working for Water Programme , Environmental Literacy Skills Programme , Environmental education -- South Africa
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/7879 , vital:21317
- Description: This case study is guided by a social realist research approach. It is an investigation into if and how the Environmental Literacy Skills Programme (ESLP) responds to Working for Water learners' capabilities and the enabling and constraining factors that shape these, and to the demands of the WfW training setting in an emerging Green Economy. The context for the study is that of the Working for Water programme, an Expanded Public Works Programme (EPWP) run under the auspices of the Department of Environmental Affairs in South Africa. The study took place while piloting the newly created ELSP materials with a group of beneficiaries and contractors in Uitenhage, a town in South Africa's Eastern Cape Province. The study provides insights into the application of accredited training in an EPWP training environment, and critically considers the academic and practical suitability of the ELSP in the WfW context. It achieves this by considering how the ELSP seeks to respond to the education levels and experiences of contractors and beneficiaries, and the demands of the WfW training setting. To understand what underpins learner capabilities and experiences, it was necessary to investigate the conversion factors and enabling and constraining factors that influence WfW contractor and beneficiary capabilities and involvement in the ELSP training in the context of an emerging Green Economy. To develop these insights, data was gathered through participant observation, questionnaires, structured and semi-structured interviews, as well as document analysis. The theoretical framework of Amartya Sen's (1999) Capability Approach supports the study, which provides an alternative way of understanding the freedoms that people enjoy, or the lack of freedom they experience, in being able to live the kind of life they have reason to value. The Capability Approach provides the key concept of resource conversion, which is used in the study to discern the social, personal and environmental constraints and enablers that people experience in their lives. These either assist or dis-enable a person in converting a resource such as education, into a functioning such as desired employment. Through a social realist causal analysis model, key structures are identified that underpin the actions of beneficiaries and contractors in relation to their learning and career pathways. The study shows that while the ELSP does support the development of green skills and in part responds to learner capabilities (and enabling and constraining conversion factors), there is a lack of information as to where those skills can be applied in elementary green occupations, in part due to South Africa's focus on high-skills development linked to Green Economy objectives. The study makes recommendations for aligning environmental education with career guidance, as well as a recommendation for further detailed research into identifying elementary green occupations and associated learning pathways.
- Full Text:
- Date Issued: 2017
- Authors: Fourie, Kathryn
- Date: 2017
- Subjects: Working for Water Programme , Environmental Literacy Skills Programme , Environmental education -- South Africa
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/7879 , vital:21317
- Description: This case study is guided by a social realist research approach. It is an investigation into if and how the Environmental Literacy Skills Programme (ESLP) responds to Working for Water learners' capabilities and the enabling and constraining factors that shape these, and to the demands of the WfW training setting in an emerging Green Economy. The context for the study is that of the Working for Water programme, an Expanded Public Works Programme (EPWP) run under the auspices of the Department of Environmental Affairs in South Africa. The study took place while piloting the newly created ELSP materials with a group of beneficiaries and contractors in Uitenhage, a town in South Africa's Eastern Cape Province. The study provides insights into the application of accredited training in an EPWP training environment, and critically considers the academic and practical suitability of the ELSP in the WfW context. It achieves this by considering how the ELSP seeks to respond to the education levels and experiences of contractors and beneficiaries, and the demands of the WfW training setting. To understand what underpins learner capabilities and experiences, it was necessary to investigate the conversion factors and enabling and constraining factors that influence WfW contractor and beneficiary capabilities and involvement in the ELSP training in the context of an emerging Green Economy. To develop these insights, data was gathered through participant observation, questionnaires, structured and semi-structured interviews, as well as document analysis. The theoretical framework of Amartya Sen's (1999) Capability Approach supports the study, which provides an alternative way of understanding the freedoms that people enjoy, or the lack of freedom they experience, in being able to live the kind of life they have reason to value. The Capability Approach provides the key concept of resource conversion, which is used in the study to discern the social, personal and environmental constraints and enablers that people experience in their lives. These either assist or dis-enable a person in converting a resource such as education, into a functioning such as desired employment. Through a social realist causal analysis model, key structures are identified that underpin the actions of beneficiaries and contractors in relation to their learning and career pathways. The study shows that while the ELSP does support the development of green skills and in part responds to learner capabilities (and enabling and constraining conversion factors), there is a lack of information as to where those skills can be applied in elementary green occupations, in part due to South Africa's focus on high-skills development linked to Green Economy objectives. The study makes recommendations for aligning environmental education with career guidance, as well as a recommendation for further detailed research into identifying elementary green occupations and associated learning pathways.
- Full Text:
- Date Issued: 2017
A Cross-cultural analysis of the normative indicators of the Beck Depression Inventory II(BDI-II) and the Beck Anxiety Inventory (BAI) amongst young adults in the Eastern Cape,South Africa
- Authors: Fourie, Claire
- Date: 2017
- Subjects: Stress (Psychology) Depression, Mental -- Psychological aspects
- Language: English
- Type: Thesis , Masters , M Soc Sc
- Identifier: http://hdl.handle.net/10353/10405 , vital:35445
- Description: Mental illness rates are climbing, locally and globally. The World Health Organization (2001) has claimed that one in four people will be affected by a psychiatric disorder during their lifetime. With this in mind, there is an array of psychometric assessment measures that are used as tools to assist in the mental health care field. Two such measures are the Beck Anxiety Inventory (BAI) and the Beck Depression Inventory-II (BDI-II). These measures are used globally to assist with the diagnosis and treatment of depression and anxiety. However, in South Africa, a paucity of normative indicators exists. This research set out to determine if there are significant differences in performance on the BAI and BDI-II when comparing a sample from the Eastern Cape, South Africa, to the international norms. It was found that performances on the BAI between the local sample and the international sample did not differ significantly. The local sample, on average, performed 4.76 points lower on the BDI-II than those assessed in the international norms. A series of theoretical models are explored in elucidating the findings in this study.
- Full Text:
- Date Issued: 2017
- Authors: Fourie, Claire
- Date: 2017
- Subjects: Stress (Psychology) Depression, Mental -- Psychological aspects
- Language: English
- Type: Thesis , Masters , M Soc Sc
- Identifier: http://hdl.handle.net/10353/10405 , vital:35445
- Description: Mental illness rates are climbing, locally and globally. The World Health Organization (2001) has claimed that one in four people will be affected by a psychiatric disorder during their lifetime. With this in mind, there is an array of psychometric assessment measures that are used as tools to assist in the mental health care field. Two such measures are the Beck Anxiety Inventory (BAI) and the Beck Depression Inventory-II (BDI-II). These measures are used globally to assist with the diagnosis and treatment of depression and anxiety. However, in South Africa, a paucity of normative indicators exists. This research set out to determine if there are significant differences in performance on the BAI and BDI-II when comparing a sample from the Eastern Cape, South Africa, to the international norms. It was found that performances on the BAI between the local sample and the international sample did not differ significantly. The local sample, on average, performed 4.76 points lower on the BDI-II than those assessed in the international norms. A series of theoretical models are explored in elucidating the findings in this study.
- Full Text:
- Date Issued: 2017
A customer retention framework for the port of Ngqura container commodity
- Authors: Myoli, Chuma
- Date: 2017
- Subjects: Customer loyalty -- South Africa -- Port Elizabeth , Customer relations -- South Africa -- Port Elizabeth Harbors -- Economic aspects -- South Africa -- Port Elizabeth Shipping -- South Africa -- Port Elizabeth -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/14179 , vital:27440
- Description: The maritime sector plays an important role in economies across the globe. Ports in particular are the backbone of the economy of countries endowed with shorelines as they facilitate foreign trade through the importation and exportation of goods to and from their domestic markets. South Africa’s latest addition to its complimentary ports system, the Port of Ngqura, is positioned as a container transshipment hub and a gateway port to Africa with its world-class infrastructure and deep-water container berths at 18 metres, the deepest on the African continent. Ports, whose main mandate is the container commodity, struggle to retain customers as the container industry is a fickle one. As a result, the retention of transshipment container cargo customers remain a challenge for ports. In recent years, ports have to compete more aggressively for their participation in major logistics networks and these days, the ports of the same region are increasingly competing with each other. There are clusters of ports with the same type of supply located within a region competing with other clusters of ports in other regions. The main objective of this study was to propose a customer retention framework for the Port of Ngqura to be used as part of the marketing strategy to possibly retain customers, grow market share and to increase profits. The study focused on the effect of components such as value proposition, customer service quality, customer satisfaction, customer relationship management and customer loyalty on customer retention. After the exercise of testing statistical reliability, the researcher established that the measuring instrument for the component of value proposition was deemed unreliable and therefore, does not necessarily lead to customer retention for the Port of Ngqura. Nunnally (1978) recommends that instruments used in basic research have reliability of 0.70 or higher. The Cronbach Alpha score for the value proposition measuring scale was 0.41, which is below the recommended 0.70. The measuring instruments of the remaining four components of customer service quality, customer satisfaction, customer relationship management and customer loyalty as influencers of customer retention proved to be reliable due to the Cronbach Alpha score being above the recommended 0.70 for all four measuring instruments. In conclusion, this study showed the importance of customer retention and more importantly, how the mentioned reliable four components affect customer retention at the Port of Ngqura. Recommendations were presented by the author on how to integrate the components of customer retention into a retention framework that can contribute to the profitability of the port. The findings of this study led to the recommendation of the need for the Port of Ngqura to firstly, incorporate customer retention into overall marketing strategy and to thus be aggressive as customer relationship building is crucial in retaining customers and growing market share in today’s competitive port environment. Secondly, the port needs to segment its target customers, it is recommended that the target market be well defined, understood and segmented based on industry (shipping line, clearing and forwarding agency, fruit, automotive or wool) and amount of volumes and revenue brought to the Port of Ngqura. Thirdly, leadership involvement as at the strategic level of Transnet Group and Transnet National Ports Authority, executive leaders need to be involved in the implementation of customer retention for marketing of the port as they are the ones that have a high delegation of authority when it comes to decision making. It is also recommended that the measurement of success be clearly defined and linked to the objectives for the implementation of customer retention. The marketers and the Port of Ngqura, using customer relationship strategies, should devise ways of measuring loyalty to the port and the brand, the reputation of the port, service quality and customer satisfaction. Employee training is the most critical recommendation as they must be well trained and equipped to execute their duties, they must be knowledgeable about the maritime industry as well as the business of their customers, fully understand their customers’ needs and have customer empathy. Ports can also improve service quality by focusing on port and terminal efficiency by conducting benchmark studies with high ranked ports like the Port of Singapore as they are known for high levels of efficiency in the market. By improving service quality, the port will improve customer satisfaction and achieve customer loyalty and ultimately, retention.
- Full Text:
- Date Issued: 2017
- Authors: Myoli, Chuma
- Date: 2017
- Subjects: Customer loyalty -- South Africa -- Port Elizabeth , Customer relations -- South Africa -- Port Elizabeth Harbors -- Economic aspects -- South Africa -- Port Elizabeth Shipping -- South Africa -- Port Elizabeth -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/14179 , vital:27440
- Description: The maritime sector plays an important role in economies across the globe. Ports in particular are the backbone of the economy of countries endowed with shorelines as they facilitate foreign trade through the importation and exportation of goods to and from their domestic markets. South Africa’s latest addition to its complimentary ports system, the Port of Ngqura, is positioned as a container transshipment hub and a gateway port to Africa with its world-class infrastructure and deep-water container berths at 18 metres, the deepest on the African continent. Ports, whose main mandate is the container commodity, struggle to retain customers as the container industry is a fickle one. As a result, the retention of transshipment container cargo customers remain a challenge for ports. In recent years, ports have to compete more aggressively for their participation in major logistics networks and these days, the ports of the same region are increasingly competing with each other. There are clusters of ports with the same type of supply located within a region competing with other clusters of ports in other regions. The main objective of this study was to propose a customer retention framework for the Port of Ngqura to be used as part of the marketing strategy to possibly retain customers, grow market share and to increase profits. The study focused on the effect of components such as value proposition, customer service quality, customer satisfaction, customer relationship management and customer loyalty on customer retention. After the exercise of testing statistical reliability, the researcher established that the measuring instrument for the component of value proposition was deemed unreliable and therefore, does not necessarily lead to customer retention for the Port of Ngqura. Nunnally (1978) recommends that instruments used in basic research have reliability of 0.70 or higher. The Cronbach Alpha score for the value proposition measuring scale was 0.41, which is below the recommended 0.70. The measuring instruments of the remaining four components of customer service quality, customer satisfaction, customer relationship management and customer loyalty as influencers of customer retention proved to be reliable due to the Cronbach Alpha score being above the recommended 0.70 for all four measuring instruments. In conclusion, this study showed the importance of customer retention and more importantly, how the mentioned reliable four components affect customer retention at the Port of Ngqura. Recommendations were presented by the author on how to integrate the components of customer retention into a retention framework that can contribute to the profitability of the port. The findings of this study led to the recommendation of the need for the Port of Ngqura to firstly, incorporate customer retention into overall marketing strategy and to thus be aggressive as customer relationship building is crucial in retaining customers and growing market share in today’s competitive port environment. Secondly, the port needs to segment its target customers, it is recommended that the target market be well defined, understood and segmented based on industry (shipping line, clearing and forwarding agency, fruit, automotive or wool) and amount of volumes and revenue brought to the Port of Ngqura. Thirdly, leadership involvement as at the strategic level of Transnet Group and Transnet National Ports Authority, executive leaders need to be involved in the implementation of customer retention for marketing of the port as they are the ones that have a high delegation of authority when it comes to decision making. It is also recommended that the measurement of success be clearly defined and linked to the objectives for the implementation of customer retention. The marketers and the Port of Ngqura, using customer relationship strategies, should devise ways of measuring loyalty to the port and the brand, the reputation of the port, service quality and customer satisfaction. Employee training is the most critical recommendation as they must be well trained and equipped to execute their duties, they must be knowledgeable about the maritime industry as well as the business of their customers, fully understand their customers’ needs and have customer empathy. Ports can also improve service quality by focusing on port and terminal efficiency by conducting benchmark studies with high ranked ports like the Port of Singapore as they are known for high levels of efficiency in the market. By improving service quality, the port will improve customer satisfaction and achieve customer loyalty and ultimately, retention.
- Full Text:
- Date Issued: 2017
A discourse analysis of the construction of gendered relationships in grade 10-12 Life Orientation textbooks in the Eastern Cape
- Authors: Adams, Luvo
- Date: 2017
- Subjects: Sex instruction -- South Africa -- Eastern Cape Life skills -- Study and teaching (Secondary)
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5532 , vital:29315
- Description: School-based sexuality education has been the subject of research in the social sciences and pedagogical spheres globally. In South Africa, growing interest among social scientists in the topic, were ignited by the introduction of sexuality education as a compulsory part of Life Orientation (LO) by the late 1990s. However, the implementation of LO has been problematic. Reviewed literature in the current study, reveals how the dominance of the heterosex discourse is foregrounded in LO content on gender and sexuality. The current study was aimed at examining the construction of gendered relationships in LO textbooks. The study sampled LO textbooks for Grades 10-12, learners in these grades are between the mean ages 16-18 years. This group is the target group, because they are legally afforded the right to consent to sexual activity with peers, within the same age bracket. Conducted from a social constructionist perspective, the current study employed qualitative methods of inquiry (textual analysis). Against the backdrop of heterosexuality as norm, it was the aim of the current study to understand the subject positions made available for female learners to construct themselves, within the discursive spaces in LO content. Findings suggest that two discourses namely: the heterosex discourse and the discourse of danger and disease, dominate in LO content on gender and sexuality. This leads to the construction of gendered relationships a s inherently heterosexual, leading to the marginalisation of relationships that fall outside of the norm. The female learner is positioned as a passive-victim, incapable of exercising sexual agency, while young men are positioned as inherently more powerful members of the intimate relationships or dangerous sexual predators. In the discourse of danger and disease, she is also positioned as a potential victim but the focus is on equipping her with skills, in a way which positioned her as an active-resistor in refusing sexual activity; and being in control of decision-making on issues of safety in relationships. The implications of these contradictions, is that they focus on the individual and disallow her taking up of sexual agency, and disregard the context in which she has to do so.
- Full Text:
- Date Issued: 2017
- Authors: Adams, Luvo
- Date: 2017
- Subjects: Sex instruction -- South Africa -- Eastern Cape Life skills -- Study and teaching (Secondary)
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5532 , vital:29315
- Description: School-based sexuality education has been the subject of research in the social sciences and pedagogical spheres globally. In South Africa, growing interest among social scientists in the topic, were ignited by the introduction of sexuality education as a compulsory part of Life Orientation (LO) by the late 1990s. However, the implementation of LO has been problematic. Reviewed literature in the current study, reveals how the dominance of the heterosex discourse is foregrounded in LO content on gender and sexuality. The current study was aimed at examining the construction of gendered relationships in LO textbooks. The study sampled LO textbooks for Grades 10-12, learners in these grades are between the mean ages 16-18 years. This group is the target group, because they are legally afforded the right to consent to sexual activity with peers, within the same age bracket. Conducted from a social constructionist perspective, the current study employed qualitative methods of inquiry (textual analysis). Against the backdrop of heterosexuality as norm, it was the aim of the current study to understand the subject positions made available for female learners to construct themselves, within the discursive spaces in LO content. Findings suggest that two discourses namely: the heterosex discourse and the discourse of danger and disease, dominate in LO content on gender and sexuality. This leads to the construction of gendered relationships a s inherently heterosexual, leading to the marginalisation of relationships that fall outside of the norm. The female learner is positioned as a passive-victim, incapable of exercising sexual agency, while young men are positioned as inherently more powerful members of the intimate relationships or dangerous sexual predators. In the discourse of danger and disease, she is also positioned as a potential victim but the focus is on equipping her with skills, in a way which positioned her as an active-resistor in refusing sexual activity; and being in control of decision-making on issues of safety in relationships. The implications of these contradictions, is that they focus on the individual and disallow her taking up of sexual agency, and disregard the context in which she has to do so.
- Full Text:
- Date Issued: 2017
A discursive analysis of what sexual violence perpetrators say to their victims
- Authors: Coopoo, Perishka
- Date: 2017
- Subjects: Project Unbreakable , Rapists -- Language , Rape -- Social aspects , Language and sex , Sexual harassment of women , Women -- Crimes against , Discoure analysis
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/13869 , vital:21863
- Description: This research study aimed to examine the way in which sexual violence perpetrators talk to their victims by critically investigating the discursive strategies drawn on by perpetrators, the discursive constructions of their actions and their victims, and the consistencies with the talk of sexual violence perpetrators and rape myths and discursive and social practices promoting sexual violence. Over two-hundred photographs were collected from a photographic art project called Project Unbreakable. The photographs were of sexual violence survivors, from all over the world, holding a poster with a quote from their attacker. The words that survivors chose to represent for Project Unbreakable served as the data for this research study. The data were analyzed using the six stages of Foucauldian discourse analysis outlined by Carla Willig. The analysis revealed that by drawing on discourses of pleasure, desire, romance, marriage and consent, perpetrators discursively constructed their actions as sex. Furthermore, perpetrators discursively constructed their victims as sexually passive and dependant on men, as gate keepers of men’s sexuality, as sexual instruments for male satisfaction, and as consenting persons. On the other hand, perpetrators were also found to discursively construct their actions as a legitimized form of punishment, humiliation and intimidation. In addition, their victims were discursively constructed as deviant, deserving of their victimization, worthless, damaged and powerless. These discursive constructions of their actions and their victims enabled perpetrators to normalize their behaviour, blame their victims, minimize the incident, assert their innocence, justify their actions, silence their victims and reinforce their position at the top of the gender hierarchy. Consistencies were also found between the talk of perpetrators and rape myths, stereotypes and discursive and social practices promoting sexual violence. Another interesting finding in the data was that of quotes from a third party, not the perpetrator, which further illustrated the existence of rape culture. This research draws on the idea that a rape supportive culture does not only capture the hostile nature of the social environment that many survivors experience in the aftermath of sexual violence, but it also provides a social pattern for coercive sexuality to occur.
- Full Text:
- Date Issued: 2017
- Authors: Coopoo, Perishka
- Date: 2017
- Subjects: Project Unbreakable , Rapists -- Language , Rape -- Social aspects , Language and sex , Sexual harassment of women , Women -- Crimes against , Discoure analysis
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/13869 , vital:21863
- Description: This research study aimed to examine the way in which sexual violence perpetrators talk to their victims by critically investigating the discursive strategies drawn on by perpetrators, the discursive constructions of their actions and their victims, and the consistencies with the talk of sexual violence perpetrators and rape myths and discursive and social practices promoting sexual violence. Over two-hundred photographs were collected from a photographic art project called Project Unbreakable. The photographs were of sexual violence survivors, from all over the world, holding a poster with a quote from their attacker. The words that survivors chose to represent for Project Unbreakable served as the data for this research study. The data were analyzed using the six stages of Foucauldian discourse analysis outlined by Carla Willig. The analysis revealed that by drawing on discourses of pleasure, desire, romance, marriage and consent, perpetrators discursively constructed their actions as sex. Furthermore, perpetrators discursively constructed their victims as sexually passive and dependant on men, as gate keepers of men’s sexuality, as sexual instruments for male satisfaction, and as consenting persons. On the other hand, perpetrators were also found to discursively construct their actions as a legitimized form of punishment, humiliation and intimidation. In addition, their victims were discursively constructed as deviant, deserving of their victimization, worthless, damaged and powerless. These discursive constructions of their actions and their victims enabled perpetrators to normalize their behaviour, blame their victims, minimize the incident, assert their innocence, justify their actions, silence their victims and reinforce their position at the top of the gender hierarchy. Consistencies were also found between the talk of perpetrators and rape myths, stereotypes and discursive and social practices promoting sexual violence. Another interesting finding in the data was that of quotes from a third party, not the perpetrator, which further illustrated the existence of rape culture. This research draws on the idea that a rape supportive culture does not only capture the hostile nature of the social environment that many survivors experience in the aftermath of sexual violence, but it also provides a social pattern for coercive sexuality to occur.
- Full Text:
- Date Issued: 2017
A fibre utilisation comparison of two harvesting systems in eucalyptus grandis in the Kwa-Zulu natal forestry region of South Africa
- Nxumalo, Sikhumbuzo Khethukuthula, McEwan, Andrew
- Authors: Nxumalo, Sikhumbuzo Khethukuthula , McEwan, Andrew
- Date: 2017
- Subjects: Eucalyptus grandis -- South Africa -- KwaZulu-Natal Harvesting -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , Degree
- Identifier: http://hdl.handle.net/10948/20592 , vital:29331
- Description: Global timber demand is increasing as the level of technology continues to improve in many parts of the world. There needs to be more focus on renewable energy resources which will have a reduced negative impact on the environment. There is limited land area for timber plantations and this necessitates effective use of land from both an environmental and a commercial point of view. This research aimed at quantifying and comparing the fibre utilisation of two harvesting systems operating in Eucalyptus grandis pulpwood plantations. This was done using a general linear model, whereby the fibre loss areas were identified and used as the dependent variables, whilst diameter at breast height (DBH), site and harvesting systems were used as the independent variables. The research also aimed at determining the amount of fibre each system could recover, where fibre is lost or gained in each harvesting system and also whether one of the harvesting systems is able to recover more fibre than the other. The research investigated two harvesting systems in Eucalyptus grandis pulpwood plantations. These systems consisted of the full tree chain flail delimber debarker and chipper (FT CFDD&C) system and the cut-to-length (CTL) motor-manual system. These systems operated close to one another to ensure that the research was carried out on comparable paired plots. Two sites were identified to carry out research after a pilot study was done to test the feasibility. Using the FT CFDD&C system, trees were felled by means of a feller buncher. A grapple skidder was used for extraction to the landing, a chain flail delimber debarker (CFDD) for debarking and debranching and a roadside chipper for converting the boles into chips. The second CTL motor-manual system was modified into a tree length system to suit the conditions of the study due to infield chipping requiring longer lengths. Therefore, trees were felled with a chainsaw and debranched and topped infield before tree lengths were extracted to the landing site with the grapple skidder. The CFDD was used for debarking and the chipper converted boles into chips.
- Full Text:
- Date Issued: 2017
- Authors: Nxumalo, Sikhumbuzo Khethukuthula , McEwan, Andrew
- Date: 2017
- Subjects: Eucalyptus grandis -- South Africa -- KwaZulu-Natal Harvesting -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , Degree
- Identifier: http://hdl.handle.net/10948/20592 , vital:29331
- Description: Global timber demand is increasing as the level of technology continues to improve in many parts of the world. There needs to be more focus on renewable energy resources which will have a reduced negative impact on the environment. There is limited land area for timber plantations and this necessitates effective use of land from both an environmental and a commercial point of view. This research aimed at quantifying and comparing the fibre utilisation of two harvesting systems operating in Eucalyptus grandis pulpwood plantations. This was done using a general linear model, whereby the fibre loss areas were identified and used as the dependent variables, whilst diameter at breast height (DBH), site and harvesting systems were used as the independent variables. The research also aimed at determining the amount of fibre each system could recover, where fibre is lost or gained in each harvesting system and also whether one of the harvesting systems is able to recover more fibre than the other. The research investigated two harvesting systems in Eucalyptus grandis pulpwood plantations. These systems consisted of the full tree chain flail delimber debarker and chipper (FT CFDD&C) system and the cut-to-length (CTL) motor-manual system. These systems operated close to one another to ensure that the research was carried out on comparable paired plots. Two sites were identified to carry out research after a pilot study was done to test the feasibility. Using the FT CFDD&C system, trees were felled by means of a feller buncher. A grapple skidder was used for extraction to the landing, a chain flail delimber debarker (CFDD) for debarking and debranching and a roadside chipper for converting the boles into chips. The second CTL motor-manual system was modified into a tree length system to suit the conditions of the study due to infield chipping requiring longer lengths. Therefore, trees were felled with a chainsaw and debranched and topped infield before tree lengths were extracted to the landing site with the grapple skidder. The CFDD was used for debarking and the chipper converted boles into chips.
- Full Text:
- Date Issued: 2017
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A genetic algorithm to obtain optimum parameters for a halcon vision system
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
A hermeneutic phenominological study of the understanding and treatment of Amafufunyana by traditional healers
- Authors: Gqibitole, Camagwini
- Date: 2017
- Subjects: Traditional medicine Healers Mental illness -- Treatment
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5521 , vital:29313
- Description: Traditional healers have a different understanding of psychological illnesses to the western paradigm as well as a different way of diagnosing and treating psychological illnesses. Aims and Objectives. This study’s aim is to examine how traditional healers understand the causes of mental illness mainly focusing on amafufunyana and how this understanding informs treatments methods. Method. This has been done based on hermeneutic phenomenology by drawing from the lived experience of traditional healers through a focus group interview. Results. Upon analysis of the data it becomes clear that traditional healers understand the aetiology of amafufunyana to be supernatural forces. Amafufunyana present in overt and covert symptoms and the diagnostic process entails connecting with the ancestors for their guidance and confirmation of diagnosis, as well as guidance on which imithi to use. The treatment process is congruent with the diagnostic process as it also entails guidance from the ancestors on which imithi to use. Other valuable aspects of traditional healing were brought forward while conducting this study. The aspect of protection from the ancestors was emphasised. It became evident in the analysis of this study that the rituals that are performed in order to appease the ancestors facilitate the connection to the ancestors and through maintaining this connect one can be protected from an array of illnesses and misfortunes. Recommendations. It is recommended that recommended that more studies are conducted with traditional healers in order to give them an opportunity to elaborate on their lived experience of healing, as it was observed that a majority of literature speak on behalf of traditional healers.
- Full Text:
- Date Issued: 2017
- Authors: Gqibitole, Camagwini
- Date: 2017
- Subjects: Traditional medicine Healers Mental illness -- Treatment
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5521 , vital:29313
- Description: Traditional healers have a different understanding of psychological illnesses to the western paradigm as well as a different way of diagnosing and treating psychological illnesses. Aims and Objectives. This study’s aim is to examine how traditional healers understand the causes of mental illness mainly focusing on amafufunyana and how this understanding informs treatments methods. Method. This has been done based on hermeneutic phenomenology by drawing from the lived experience of traditional healers through a focus group interview. Results. Upon analysis of the data it becomes clear that traditional healers understand the aetiology of amafufunyana to be supernatural forces. Amafufunyana present in overt and covert symptoms and the diagnostic process entails connecting with the ancestors for their guidance and confirmation of diagnosis, as well as guidance on which imithi to use. The treatment process is congruent with the diagnostic process as it also entails guidance from the ancestors on which imithi to use. Other valuable aspects of traditional healing were brought forward while conducting this study. The aspect of protection from the ancestors was emphasised. It became evident in the analysis of this study that the rituals that are performed in order to appease the ancestors facilitate the connection to the ancestors and through maintaining this connect one can be protected from an array of illnesses and misfortunes. Recommendations. It is recommended that recommended that more studies are conducted with traditional healers in order to give them an opportunity to elaborate on their lived experience of healing, as it was observed that a majority of literature speak on behalf of traditional healers.
- Full Text:
- Date Issued: 2017
A leadership transfer framework to improve the retention rate in the private hotel industry
- Authors: Gregersen, Peter Carl
- Date: 2017
- Subjects: Corporate culture -- South Africa , Employee retention -- South Africa , Hospitality industry -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/7160 , vital:21284
- Description: The transference of knowledge and the creation of a knowledge vault within operations of the Hospitality sector is the cornerstone to the success of this dynamic contributor to the economy, not only as a skills developer, but also as a collective group of experts that unknowingly build a community of expertise that transfer knowledge amongst themselves within an organisation. Leadership that share knowledge, whether tacit or implied, leads to the development and knowledge growth from members to those who are exposed to the intricacies of decision making and business practices. This leads then to the skills development and retention of the participants who feel nurtured and fulfilled in the employment within the organisation and view themselves as valued members. The finding of this research reveals a correlation between knowledge sharing and the desire for job security that leads to the feeling of being nurtured and finding the employment positive and enjoyable. The transference of knowledge allows the receiver of the knowledge to develop to where the point of the receiver becoming an expert in their chosen field is attained and the collective of the mangers are developed to the level of a community of experts in their various fields. However the academic qualifications of leadership is low, the significance of this highlights the level of networking amongst themselves as paramount to the success of this multi million rand industry.
- Full Text:
- Date Issued: 2017
- Authors: Gregersen, Peter Carl
- Date: 2017
- Subjects: Corporate culture -- South Africa , Employee retention -- South Africa , Hospitality industry -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/7160 , vital:21284
- Description: The transference of knowledge and the creation of a knowledge vault within operations of the Hospitality sector is the cornerstone to the success of this dynamic contributor to the economy, not only as a skills developer, but also as a collective group of experts that unknowingly build a community of expertise that transfer knowledge amongst themselves within an organisation. Leadership that share knowledge, whether tacit or implied, leads to the development and knowledge growth from members to those who are exposed to the intricacies of decision making and business practices. This leads then to the skills development and retention of the participants who feel nurtured and fulfilled in the employment within the organisation and view themselves as valued members. The finding of this research reveals a correlation between knowledge sharing and the desire for job security that leads to the feeling of being nurtured and finding the employment positive and enjoyable. The transference of knowledge allows the receiver of the knowledge to develop to where the point of the receiver becoming an expert in their chosen field is attained and the collective of the mangers are developed to the level of a community of experts in their various fields. However the academic qualifications of leadership is low, the significance of this highlights the level of networking amongst themselves as paramount to the success of this multi million rand industry.
- Full Text:
- Date Issued: 2017
A meteorological analysis of extreme flood events in the southern parts of the Eastern Cape, South Africa
- Authors: Jacobs, Tennielle Lindsay
- Date: 2017
- Subjects: Floods -- South Africa -- Eastern Cape , Floods -- South Africa -- Eastern Cape -- Cast studies , Lows (Meteorology) -- South Africa -- Eastern Cape , Rain and rainfall -- South Africa -- Eastern Cape , Rainfall anomalies -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/50525 , vital:25996
- Description: Extreme flood events have been found to occur in the Eastern Cape Province of South Africa. The southern and south-eastern coastal regions are particularly susceptible to floods with daily rainfall records of up to 490 mm having been recorded here. In order to gain a better understanding of these floods, historical floods in the southern parts of the Eastern Cape have been analysed in this study. This study aimed to investigate the most extreme flood events in the history of the area and to analyse the surface observational data during the heavy rainfall events found, to contribute to the understanding of these heavy rainfall events. Seven case studies were investigated using NCEP/NCAR Reanalysis 1 data and surface observational data, to analysis the synoptic circulation and surface data tendencies during heavy rainfall events. All of the case studies that had synoptic data available showed to have a COL system present with the upper air low lying westward of the flood area. The surface synoptic situation presented an intense high pressure system lying south west or south of the country in the Atlantic Ocean between 35-45°S. Another key factor was a surface trough over the interior of the country, due to the COL, extending southwards to protrude off of the south or south eastern coastline east of the flood areas. The combination of these three systems colloquially referred to as a “Black South-Easter”, produced dangerous rainfall intensities when the winds were perpendicular to the coast. The results of the surface observations revealed temperatures increasing at night (against diurnal cycles) with increasing relative humidity preceding the heavy rainfall events. The pressure showed both increasing and decreasing trends during heavy rainfall events however in five of six cases a tight pressure gradient was present producing an influx of moist air into the flood area. Onshore winds were found to be of high importance in heavy rainfall events to bring moist air into the area. Wind speeds greater than 5m/s occurred during times of high rainfall intensities.
- Full Text:
- Date Issued: 2017
- Authors: Jacobs, Tennielle Lindsay
- Date: 2017
- Subjects: Floods -- South Africa -- Eastern Cape , Floods -- South Africa -- Eastern Cape -- Cast studies , Lows (Meteorology) -- South Africa -- Eastern Cape , Rain and rainfall -- South Africa -- Eastern Cape , Rainfall anomalies -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/50525 , vital:25996
- Description: Extreme flood events have been found to occur in the Eastern Cape Province of South Africa. The southern and south-eastern coastal regions are particularly susceptible to floods with daily rainfall records of up to 490 mm having been recorded here. In order to gain a better understanding of these floods, historical floods in the southern parts of the Eastern Cape have been analysed in this study. This study aimed to investigate the most extreme flood events in the history of the area and to analyse the surface observational data during the heavy rainfall events found, to contribute to the understanding of these heavy rainfall events. Seven case studies were investigated using NCEP/NCAR Reanalysis 1 data and surface observational data, to analysis the synoptic circulation and surface data tendencies during heavy rainfall events. All of the case studies that had synoptic data available showed to have a COL system present with the upper air low lying westward of the flood area. The surface synoptic situation presented an intense high pressure system lying south west or south of the country in the Atlantic Ocean between 35-45°S. Another key factor was a surface trough over the interior of the country, due to the COL, extending southwards to protrude off of the south or south eastern coastline east of the flood areas. The combination of these three systems colloquially referred to as a “Black South-Easter”, produced dangerous rainfall intensities when the winds were perpendicular to the coast. The results of the surface observations revealed temperatures increasing at night (against diurnal cycles) with increasing relative humidity preceding the heavy rainfall events. The pressure showed both increasing and decreasing trends during heavy rainfall events however in five of six cases a tight pressure gradient was present producing an influx of moist air into the flood area. Onshore winds were found to be of high importance in heavy rainfall events to bring moist air into the area. Wind speeds greater than 5m/s occurred during times of high rainfall intensities.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A normative study of the Raven's Coloured Progressive Matrices for South African children with cognitive barriers to learning
- Authors: August, Justin Oswin
- Date: 2017
- Subjects: Children -- Intelligence testing -- South Africa , Inclusive education -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/19419 , vital:28869
- Description: With the changing landscape in South Africa to a full democracy, increased research has been undertaken in the psychometric field on local and national normative studies regarding various assessment measures. The Raven’s Coloured Progressive Matrices (CPM) is one of the measures that have already been extensively normed throughout the world for various population groups. In South Africa, local norms for normal populations of children have been developed by groups of researchers in the Grahamstown (Eastern Cape) as well as the Bloemfontein (Free State) areas. With a South African school educational system that focuses on Inclusive Education, there is a growing need for mainstream schools to identify learners who are at risk for learning disabilities in order to develop appropriate supportive intervention plans. The research aimed to establish psychometric normative screening data based on the Raven’s CPM, and to compare these with the established and published international and local Raven’s CPM norms. In addition, the researcher developed pilot classification scores for the early screening and detection of at risk learners in order to encourage the potential role and use of the Raven’s CPM in the identification of cognitive learning barriers. The sample consisted of 388 primary school learners identified as having cognitive barriers to learning. Archival data was used that was gathered from a Psychological clinic that provided screening services to schools in the Nelson Mandela Metropolitan area. The results of the study indicated that there was a proportional relationship between age and test performance. Gender differences were found where the males in this study outperformed the females. There was a significant difference in the Raven’s CPM test performance with respect to the grade levels of the learners. The study developed a special set of norms with cognitive classification scores that will aid in the early identification of learning disabilities.
- Full Text:
- Date Issued: 2017
- Authors: August, Justin Oswin
- Date: 2017
- Subjects: Children -- Intelligence testing -- South Africa , Inclusive education -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/19419 , vital:28869
- Description: With the changing landscape in South Africa to a full democracy, increased research has been undertaken in the psychometric field on local and national normative studies regarding various assessment measures. The Raven’s Coloured Progressive Matrices (CPM) is one of the measures that have already been extensively normed throughout the world for various population groups. In South Africa, local norms for normal populations of children have been developed by groups of researchers in the Grahamstown (Eastern Cape) as well as the Bloemfontein (Free State) areas. With a South African school educational system that focuses on Inclusive Education, there is a growing need for mainstream schools to identify learners who are at risk for learning disabilities in order to develop appropriate supportive intervention plans. The research aimed to establish psychometric normative screening data based on the Raven’s CPM, and to compare these with the established and published international and local Raven’s CPM norms. In addition, the researcher developed pilot classification scores for the early screening and detection of at risk learners in order to encourage the potential role and use of the Raven’s CPM in the identification of cognitive learning barriers. The sample consisted of 388 primary school learners identified as having cognitive barriers to learning. Archival data was used that was gathered from a Psychological clinic that provided screening services to schools in the Nelson Mandela Metropolitan area. The results of the study indicated that there was a proportional relationship between age and test performance. Gender differences were found where the males in this study outperformed the females. There was a significant difference in the Raven’s CPM test performance with respect to the grade levels of the learners. The study developed a special set of norms with cognitive classification scores that will aid in the early identification of learning disabilities.
- Full Text:
- Date Issued: 2017
A participant-focused sociological analysis of Beedz, a Grahamstown skills training project for women
- Authors: Bobo, Azola Benita Dorothea
- Date: 2017
- Subjects: Beedz (Makhanda, South Africa) , Feminist theory -- Developing countries , Training -- South Africa -- Makhanda , Occupational training -- South Africa -- Makhanda , Women -- South Africa -- Makhanda -- Social conditions
- Language: English
- Type: Thesis , Masters , MSocSc
- Identifier: http://hdl.handle.net/10962/5686 , vital:20964
- Description: This research looked at a participant-focused sociological analysis of Beedz, a Grahamstown skills training project for women. Beedz is run by the River of Life Church and aims to equip women with the necessary skills to participate in the economy, either as entrepreneurs or as employees. Using third world feminist theory, this research explored the experiences of women who have participated in the Beedz programme, what they went through, and whether the programme benefited them or not. In particular, this research explored how the participants experienced Beedz as a programme for women without an exclusive focus on traditional feminist issues. This research was qualitative in nature; with in-depth, semi-structured interviews being used as a means of data collection. Data was analysed using key themes emerging from the interviews. The key findings of this research were that it is important to include women in training projects, as by including them you create spaces and enabling environments for women to empower themselves. Secondly, although Beedz does not deliberately work from the third world feminist theory, it could be argued that it fits in this framework as this programme facilitates skills training through looking at women as a whole, taking into account not only their gender, but also their class and race. Recommendations were made on how the Beedz programme may be improved, based on the information gathered from the participants from the interviews conducted during the research, with the key recommendation being that the organisers of the programme need to create a space for the participants’ voice to be heard, so that the programme can be relevant and beneficial to them.
- Full Text:
- Date Issued: 2017
- Authors: Bobo, Azola Benita Dorothea
- Date: 2017
- Subjects: Beedz (Makhanda, South Africa) , Feminist theory -- Developing countries , Training -- South Africa -- Makhanda , Occupational training -- South Africa -- Makhanda , Women -- South Africa -- Makhanda -- Social conditions
- Language: English
- Type: Thesis , Masters , MSocSc
- Identifier: http://hdl.handle.net/10962/5686 , vital:20964
- Description: This research looked at a participant-focused sociological analysis of Beedz, a Grahamstown skills training project for women. Beedz is run by the River of Life Church and aims to equip women with the necessary skills to participate in the economy, either as entrepreneurs or as employees. Using third world feminist theory, this research explored the experiences of women who have participated in the Beedz programme, what they went through, and whether the programme benefited them or not. In particular, this research explored how the participants experienced Beedz as a programme for women without an exclusive focus on traditional feminist issues. This research was qualitative in nature; with in-depth, semi-structured interviews being used as a means of data collection. Data was analysed using key themes emerging from the interviews. The key findings of this research were that it is important to include women in training projects, as by including them you create spaces and enabling environments for women to empower themselves. Secondly, although Beedz does not deliberately work from the third world feminist theory, it could be argued that it fits in this framework as this programme facilitates skills training through looking at women as a whole, taking into account not only their gender, but also their class and race. Recommendations were made on how the Beedz programme may be improved, based on the information gathered from the participants from the interviews conducted during the research, with the key recommendation being that the organisers of the programme need to create a space for the participants’ voice to be heard, so that the programme can be relevant and beneficial to them.
- Full Text:
- Date Issued: 2017
A perfect end: a study of syllable codas in South African Sign Language
- Köhlo, Mikhaela Demitria Katebe
- Authors: Köhlo, Mikhaela Demitria Katebe
- Date: 2017
- Subjects: South African Sign Language , South African Sign Language Phonology , Linguistics , Grammar, Comparative and general Syllable
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/36127 , vital:24492
- Description: Coda constraints are common in spoken languages. German, for example, can only have voiceless obstruents in the coda position (Lombardi 1999). Most sign language research has been on other sign languages, most notably American Sign Language (ASL). This research serves to contribute to syllable theory and has a methodology that allows for cross-linguistic research, strengthening the understanding of sign languages in general, and enhancing the description of SASL in particular. It is well known that syllables in spoken languages require a vowel nucleus to be well-formed. Sandler and Lillo-Martin (2006) provide evidence of sign languages requiring movement to be considered well-formed: even seemingly stationary signs such as WHO, which occurs at the chin, will have finger wiggling as some form of movement. It is thus natural to assume that movement is akin to vowels in syllable theory (Brentari 1998). Thus, locations are similar to consonants. However, the visual nature of sign allows for simultaneity - holds do not occur by themselves. Next to location, handshapes are phonetically complex features that may impact the constraints at coda position. To my knowledge, there is no formal research on the coda constraints of sign language syllables. The data examined here comes from a video dictionary of approximately 175 words. From this dictionary, a database of coded locations and handshapes are recorded for both the onset and the coda. From this, a consonant inventory is made and patterns are identified. Each source of data is analysed individually based on Brentari’s (1998) Prosodic Model. Patterns that are noticed are then looked at using Brentari’s (1998) framework to account for what phonological rules are dictating constraints. However, as a hearing researcher cannot claim native knowledge of a sign language, the conclusions drawn from the data will be tested using native SASL signers for negative judgement. The preliminary findings of the research suggest that there are constraints on the coda location and handshape of a sign and that this may be a result of the natural classes of handshape and location prohibiting certain onset-coda combinations. The onset and coda on monosyllabic signs mirror each other’s location, while the handshape cannot change in repeated and many monosyllabic signs. These constraints provide more understanding into the rich phonological nature of sign languages.
- Full Text:
- Date Issued: 2017
- Authors: Köhlo, Mikhaela Demitria Katebe
- Date: 2017
- Subjects: South African Sign Language , South African Sign Language Phonology , Linguistics , Grammar, Comparative and general Syllable
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/36127 , vital:24492
- Description: Coda constraints are common in spoken languages. German, for example, can only have voiceless obstruents in the coda position (Lombardi 1999). Most sign language research has been on other sign languages, most notably American Sign Language (ASL). This research serves to contribute to syllable theory and has a methodology that allows for cross-linguistic research, strengthening the understanding of sign languages in general, and enhancing the description of SASL in particular. It is well known that syllables in spoken languages require a vowel nucleus to be well-formed. Sandler and Lillo-Martin (2006) provide evidence of sign languages requiring movement to be considered well-formed: even seemingly stationary signs such as WHO, which occurs at the chin, will have finger wiggling as some form of movement. It is thus natural to assume that movement is akin to vowels in syllable theory (Brentari 1998). Thus, locations are similar to consonants. However, the visual nature of sign allows for simultaneity - holds do not occur by themselves. Next to location, handshapes are phonetically complex features that may impact the constraints at coda position. To my knowledge, there is no formal research on the coda constraints of sign language syllables. The data examined here comes from a video dictionary of approximately 175 words. From this dictionary, a database of coded locations and handshapes are recorded for both the onset and the coda. From this, a consonant inventory is made and patterns are identified. Each source of data is analysed individually based on Brentari’s (1998) Prosodic Model. Patterns that are noticed are then looked at using Brentari’s (1998) framework to account for what phonological rules are dictating constraints. However, as a hearing researcher cannot claim native knowledge of a sign language, the conclusions drawn from the data will be tested using native SASL signers for negative judgement. The preliminary findings of the research suggest that there are constraints on the coda location and handshape of a sign and that this may be a result of the natural classes of handshape and location prohibiting certain onset-coda combinations. The onset and coda on monosyllabic signs mirror each other’s location, while the handshape cannot change in repeated and many monosyllabic signs. These constraints provide more understanding into the rich phonological nature of sign languages.
- Full Text:
- Date Issued: 2017
A phenomenological study of problematic internet use with massively multiplayer online games
- Authors: Bopp, Stacey-Lee
- Date: 2017
- Subjects: Computer games -- Psychological aspects , Internet games -- Psychological aspects Internet addiction
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13757 , vital:27305
- Description: Massively multiplayer online games (MMOG’s) are a specific form of online computer games that allow for millions of people to simultaneously play online at any time. This form of online gaming has become a huge phenomenon worldwide both as a popular past time and a business endeavour for many individuals. There are more than 16 million people worldwide who subscribe to fantasy role-playing online games. Although such games can provide entertainment for many people, they can also lead to problematic Internet use (PIU). PIU has also been referred to as Internet addiction, and can cause significant problems in an individual’s functioning. The study aimed to enhance a greater understanding of the phenomenon of male adults’ experiences PIU with MMOG’s. More specifically the study aims to identify if PIU with MMOG’s can be considered a form of Internet addiction within South Africa. Furthermore, assisting in the further development of online addiction diagnosis and treatment strategies. The study utilised an interpretive phenomenological approach (IPA) and participants were purposively sampled. The data was collected using semi-structured individual interviews. Furthermore, Braun and Clarks thematic analysis was used during data analysis while incorporating the four major processes in phenomenological research, namely 1) epoche, 2) phenomenological reduction, 3) imaginative variation and, 4) synthesis. Themes that emerged from the analysis of the participants’ experiences included, initial description of use, motives for continued use of MMOG’s, consequences of PIU with MMOG’s, perceptions of PIU with MMOG’s, and treatment considerations. This study provided a thick description of South African and international literature and combines the literature with the themes that emerged from the participants experiences in order to produce discussions based on the findings of this qualitative study. Conclusions, recommendations, and limitations of this study informed future research on cyber citizenship by providing a detailed understanding of the context of South African male adults’ experiences of PIU with MMOG’s.
- Full Text:
- Date Issued: 2017
- Authors: Bopp, Stacey-Lee
- Date: 2017
- Subjects: Computer games -- Psychological aspects , Internet games -- Psychological aspects Internet addiction
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13757 , vital:27305
- Description: Massively multiplayer online games (MMOG’s) are a specific form of online computer games that allow for millions of people to simultaneously play online at any time. This form of online gaming has become a huge phenomenon worldwide both as a popular past time and a business endeavour for many individuals. There are more than 16 million people worldwide who subscribe to fantasy role-playing online games. Although such games can provide entertainment for many people, they can also lead to problematic Internet use (PIU). PIU has also been referred to as Internet addiction, and can cause significant problems in an individual’s functioning. The study aimed to enhance a greater understanding of the phenomenon of male adults’ experiences PIU with MMOG’s. More specifically the study aims to identify if PIU with MMOG’s can be considered a form of Internet addiction within South Africa. Furthermore, assisting in the further development of online addiction diagnosis and treatment strategies. The study utilised an interpretive phenomenological approach (IPA) and participants were purposively sampled. The data was collected using semi-structured individual interviews. Furthermore, Braun and Clarks thematic analysis was used during data analysis while incorporating the four major processes in phenomenological research, namely 1) epoche, 2) phenomenological reduction, 3) imaginative variation and, 4) synthesis. Themes that emerged from the analysis of the participants’ experiences included, initial description of use, motives for continued use of MMOG’s, consequences of PIU with MMOG’s, perceptions of PIU with MMOG’s, and treatment considerations. This study provided a thick description of South African and international literature and combines the literature with the themes that emerged from the participants experiences in order to produce discussions based on the findings of this qualitative study. Conclusions, recommendations, and limitations of this study informed future research on cyber citizenship by providing a detailed understanding of the context of South African male adults’ experiences of PIU with MMOG’s.
- Full Text:
- Date Issued: 2017
A poverty alleviation strategy of Vukuzenzele gardening project in Motherwell township
- Authors: Zitho, Andiswa
- Date: 2017
- Subjects: Economic development projects -- South Africa -- Port Elizabeth , Economic development -- South Africa -- Port Elizabeth Community development -- South Africa -- Port Elizabeth Poor -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13724 , vital:27302
- Description: Poverty is one of the issues that affects the development in our country. the strategies that are used differ from one to person to another. development is said to be measured through a lot of things but mostly through economic growth which influenced by poverty. the purpose of this study was to investigate the effectiveness of the strategies being used to alleviate poverty in the Motherwell township, in Port Elizabeth. The study focused mainly on Vukuzenzele gardening project, where a sample of 15 participants were purposovely selected to be part of the study. Furthermore, the aim of the study was to contribute towards community development by investigating the social issues that directly influence poverty eradication.
- Full Text:
- Date Issued: 2017
- Authors: Zitho, Andiswa
- Date: 2017
- Subjects: Economic development projects -- South Africa -- Port Elizabeth , Economic development -- South Africa -- Port Elizabeth Community development -- South Africa -- Port Elizabeth Poor -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13724 , vital:27302
- Description: Poverty is one of the issues that affects the development in our country. the strategies that are used differ from one to person to another. development is said to be measured through a lot of things but mostly through economic growth which influenced by poverty. the purpose of this study was to investigate the effectiveness of the strategies being used to alleviate poverty in the Motherwell township, in Port Elizabeth. The study focused mainly on Vukuzenzele gardening project, where a sample of 15 participants were purposovely selected to be part of the study. Furthermore, the aim of the study was to contribute towards community development by investigating the social issues that directly influence poverty eradication.
- Full Text:
- Date Issued: 2017