A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A genetic algorithm to obtain optimum parameters for a halcon vision system
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A national strategy towards cultivating a cybersecurity culture in South Africa
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
A scenario-based ICT risk assessment approach in local government
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
An evaluation of government housing projects against the breaking new ground principles in Wells estate in the Nelson Mandela Bay Municipality
- Songelwa, Thuthuka Siphumezile
- Authors: Songelwa, Thuthuka Siphumezile
- Date: 2017
- Subjects: Low-income housing -- South Africa -- Nelson Mandela Bay Municipality , Housing development -- South Africa -- Eastern Cape Public housing -- South Africa -- Eastern Cape Housing -- Developing countries Housing policy -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/14378 , vital:27578
- Description: Despite the array of polices adopted to address the housing issue in South Africa in the post ’94’ dispensation, South Africa in 2015 remains riddled with the same housing challenges as at 1994 even despite the significant improvements that have been achieved. Subsidised housing projects completed between 1994 and 2004 are characterised by poor design, poor quality, late delivery, poor location, and spatial marginalisation. To address these shortfalls, the Department of Human Settlements adopted the Breaking New Ground (BNG) principles in 2004 and the housing code of 2009 to mitigate shortfalls in the provision of low cost housing and thereby creating sustainable human settlements. It was in such context that this study sought to assess whether the BNG and housing code of 2009 was implemented in the building of the low-cost houses of the Wells Estate Human Settlement in the Nelson Mandela Bay Municipality (NMBM), constructed post-2004. An exploratory study using both the quantitative and qualitative data collection methods was used to conduct the study. A questionnaire with open and closed questions was used to collect data. To complement the use of the questionnaire, transect walks were also undertaken. The findings of the study were that; firstly: The majority of the beneficiaries belonged to the productive age that is between 18 and 60; Wells Estate depicts a pre ‘94 spatial planning given its peripheral location there by affecting cost to work and job searching; The quality of houses complied with the tenets of the BNG and housing code of 2009; Access to services and facilities like police station, community halls, clinics, and schools remained a challenge because their availability is determined by the population size and utilisation rate, and Access to socio economic opportunities was still a challenge. The beneficiaries of Wells Estate even in the case for businesses owned this; these were for subsistence only such as street vending, shoe repairing, and painting. Given the above findings, the study recommends that: There is need to focus on human capital development through skill development to the productive age group which is unemployed. With skills, the unemployed have an opportunity to look for employment thereby improving their livelihoods; The provision of housing alone cannot alleviate the socio-economic challenges affecting the poor, however there is a need for a multi-pronged approach to address other socioeconomic determinants such as access to employment and education, and There is need to for a collaboration approach between the NMBM and other government departments for instance with the Department of Basic Education for scholar transport.
- Full Text:
- Date Issued: 2017
- Authors: Songelwa, Thuthuka Siphumezile
- Date: 2017
- Subjects: Low-income housing -- South Africa -- Nelson Mandela Bay Municipality , Housing development -- South Africa -- Eastern Cape Public housing -- South Africa -- Eastern Cape Housing -- Developing countries Housing policy -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/14378 , vital:27578
- Description: Despite the array of polices adopted to address the housing issue in South Africa in the post ’94’ dispensation, South Africa in 2015 remains riddled with the same housing challenges as at 1994 even despite the significant improvements that have been achieved. Subsidised housing projects completed between 1994 and 2004 are characterised by poor design, poor quality, late delivery, poor location, and spatial marginalisation. To address these shortfalls, the Department of Human Settlements adopted the Breaking New Ground (BNG) principles in 2004 and the housing code of 2009 to mitigate shortfalls in the provision of low cost housing and thereby creating sustainable human settlements. It was in such context that this study sought to assess whether the BNG and housing code of 2009 was implemented in the building of the low-cost houses of the Wells Estate Human Settlement in the Nelson Mandela Bay Municipality (NMBM), constructed post-2004. An exploratory study using both the quantitative and qualitative data collection methods was used to conduct the study. A questionnaire with open and closed questions was used to collect data. To complement the use of the questionnaire, transect walks were also undertaken. The findings of the study were that; firstly: The majority of the beneficiaries belonged to the productive age that is between 18 and 60; Wells Estate depicts a pre ‘94 spatial planning given its peripheral location there by affecting cost to work and job searching; The quality of houses complied with the tenets of the BNG and housing code of 2009; Access to services and facilities like police station, community halls, clinics, and schools remained a challenge because their availability is determined by the population size and utilisation rate, and Access to socio economic opportunities was still a challenge. The beneficiaries of Wells Estate even in the case for businesses owned this; these were for subsistence only such as street vending, shoe repairing, and painting. Given the above findings, the study recommends that: There is need to focus on human capital development through skill development to the productive age group which is unemployed. With skills, the unemployed have an opportunity to look for employment thereby improving their livelihoods; The provision of housing alone cannot alleviate the socio-economic challenges affecting the poor, however there is a need for a multi-pronged approach to address other socioeconomic determinants such as access to employment and education, and There is need to for a collaboration approach between the NMBM and other government departments for instance with the Department of Basic Education for scholar transport.
- Full Text:
- Date Issued: 2017
An ICT strategy for sustainable tourism in Zimbabwe
- Authors: Tsokota, Theo
- Date: 2017
- Subjects: Information technology -- Zimbabwe , Technological innovations -- Zimbabwe Tourism -- Zimbabwe -- Computer network resources Tourism -- Zimbabwe -- Data processing Tourism -- Environmental aspects -- Zimbabwe Sustainable tourism -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/21340 , vital:29479
- Description: This research sought to develop an ICT strategy for sustainable tourism in Zimbabwe. The Government of Zimbabwe has identified ICT and tourism both as strategic industries and pillars for economic revival. The tourism sector was identified as an essential source of foreign exchange earnings and as a means to drive the economy to greater heights and reduce poverty through direct employment in down-stream and up-stream industries. Despite being endowed with rich natural resources that include five World Natural Heritage sites, exquisite flora and fauna. Zimbabwe is not performing well in the world tourism sector. The Southern African country continues to be ranked low on World Economic Forum Travel and Tourism Competitiveness Index. Despite the country‘s strengths, in terms of endowments, the low Tourism and Travel Competitiveness Index suggests weaknesses in related areas. There is currently no clear strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. Despite huge investments and advances in ICT, services in the tourism sector in Zimbabwe continue to be delivered manually and in traditional ways. Therefore, this research sought to propose a strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. However, this strategy had to be informed and supported by an empirical study of the shortcomings in the existing situation in the tourism sector. In order to achieve this objective, this research, which is a comprehensive case study on the tourism sector in Zimbabwe, deployed semi-structured interviews, questionnaires, observations and netnography to collect data. The case study was carried out in accordance with the steps for conducting a case as outlined by Yin guided by an interpretive paradigm. The entities and organisations that formed part of the case study were purposefully chosen to provide a representative sample of the tourism role-players in Zimbabwe. The samples were based on sample variation and feasibility (taking into consideration factors such as geographical location, organisational thrust and size). Data collection involved semi-structured interviews with various role-players in the tourism sector. The role-players interviewed included officials from the government, the regulator and from the service providers. The interviews were held in Harare, Bulawayo, Gweru, Chinhoyi, Matopos, Hwange and Victoria Falls. A Zimbabwe annual premier tourism expo, Sanganai/Hlanganani World Travel and Tourism Africa Fair, was also attended in order to interact with various players and to conduct formal and informal interviews. The questionnaires, which were completed by tourists, were administered in Harare, Hwange, Victoria Falls, Matopos, and the Beitbridge and Kazungula border posts. An online version of the questionnaire was also administered. The questionnaire link was e-mailed to tourists, as some of them did not have enough time to complete them during their stay in Zimbabwe and agreed to do so via email. The data was analysed in two phases - structured coding and thematic analysis. . Key factors were identified through structural coding and thematic analysis. Country-specific, sector-specific and organisationalspecific factors were identified for tourists, the government, the regulator and service providers. After a further analysis of the results, those that pointed to the same factors were grouped together and a deduction was made as a diagnosis of the problem was identified. The identified problems were synthesised into seven diagnostics: (i) lack of infrastructure and enabling services; (ii) e-customer relationship management; (iii) lack of collaboration and poor systems integration, (iv) policy and regulation; (v) lack of financial resources; (vi) poor ICT governance and (vii) poor human resource development. A guiding policy was then identified for each of the diagnostics, leading to a set of coherent actions. The research also showed the implementation of this set of actions that consisting of three layers, namely, government, regulator and service providers. This research contributes to the existing body of knowledge by providing a clear strategy formulation model and showing how the implementation will be rolled out. The ICT-related challenges were diagnosed, guiding policies formulated to address the situation and required coherent actions suggested. This research is deemed to be significant for understanding the future of ICT use in developing countries like Zimbabwe.
- Full Text:
- Date Issued: 2017
- Authors: Tsokota, Theo
- Date: 2017
- Subjects: Information technology -- Zimbabwe , Technological innovations -- Zimbabwe Tourism -- Zimbabwe -- Computer network resources Tourism -- Zimbabwe -- Data processing Tourism -- Environmental aspects -- Zimbabwe Sustainable tourism -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/21340 , vital:29479
- Description: This research sought to develop an ICT strategy for sustainable tourism in Zimbabwe. The Government of Zimbabwe has identified ICT and tourism both as strategic industries and pillars for economic revival. The tourism sector was identified as an essential source of foreign exchange earnings and as a means to drive the economy to greater heights and reduce poverty through direct employment in down-stream and up-stream industries. Despite being endowed with rich natural resources that include five World Natural Heritage sites, exquisite flora and fauna. Zimbabwe is not performing well in the world tourism sector. The Southern African country continues to be ranked low on World Economic Forum Travel and Tourism Competitiveness Index. Despite the country‘s strengths, in terms of endowments, the low Tourism and Travel Competitiveness Index suggests weaknesses in related areas. There is currently no clear strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. Despite huge investments and advances in ICT, services in the tourism sector in Zimbabwe continue to be delivered manually and in traditional ways. Therefore, this research sought to propose a strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. However, this strategy had to be informed and supported by an empirical study of the shortcomings in the existing situation in the tourism sector. In order to achieve this objective, this research, which is a comprehensive case study on the tourism sector in Zimbabwe, deployed semi-structured interviews, questionnaires, observations and netnography to collect data. The case study was carried out in accordance with the steps for conducting a case as outlined by Yin guided by an interpretive paradigm. The entities and organisations that formed part of the case study were purposefully chosen to provide a representative sample of the tourism role-players in Zimbabwe. The samples were based on sample variation and feasibility (taking into consideration factors such as geographical location, organisational thrust and size). Data collection involved semi-structured interviews with various role-players in the tourism sector. The role-players interviewed included officials from the government, the regulator and from the service providers. The interviews were held in Harare, Bulawayo, Gweru, Chinhoyi, Matopos, Hwange and Victoria Falls. A Zimbabwe annual premier tourism expo, Sanganai/Hlanganani World Travel and Tourism Africa Fair, was also attended in order to interact with various players and to conduct formal and informal interviews. The questionnaires, which were completed by tourists, were administered in Harare, Hwange, Victoria Falls, Matopos, and the Beitbridge and Kazungula border posts. An online version of the questionnaire was also administered. The questionnaire link was e-mailed to tourists, as some of them did not have enough time to complete them during their stay in Zimbabwe and agreed to do so via email. The data was analysed in two phases - structured coding and thematic analysis. . Key factors were identified through structural coding and thematic analysis. Country-specific, sector-specific and organisationalspecific factors were identified for tourists, the government, the regulator and service providers. After a further analysis of the results, those that pointed to the same factors were grouped together and a deduction was made as a diagnosis of the problem was identified. The identified problems were synthesised into seven diagnostics: (i) lack of infrastructure and enabling services; (ii) e-customer relationship management; (iii) lack of collaboration and poor systems integration, (iv) policy and regulation; (v) lack of financial resources; (vi) poor ICT governance and (vii) poor human resource development. A guiding policy was then identified for each of the diagnostics, leading to a set of coherent actions. The research also showed the implementation of this set of actions that consisting of three layers, namely, government, regulator and service providers. This research contributes to the existing body of knowledge by providing a clear strategy formulation model and showing how the implementation will be rolled out. The ICT-related challenges were diagnosed, guiding policies formulated to address the situation and required coherent actions suggested. This research is deemed to be significant for understanding the future of ICT use in developing countries like Zimbabwe.
- Full Text:
- Date Issued: 2017
An ICT strategy to support a patient-centred approach to diabetes care
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
Analysis of factors affecting performance of a low-temperature Organic Rankine Cycle heat engine
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
Analysis of the reliability for the 132/66/22 KV distribution network within ESKOM’s Eastern Cape operating unit
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
- Authors: Pantshwa, Athini
- Date: 2017
- Subjects: Electric power distribution Electricity -- Supply -- Engineering , Smart power grids
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19750 , vital:28953
- Description: A stable and reliable electrical power supply system is an inevitable pre-requisite for the technological and economic growth of any nation. Due to this, utilities must strive and ensure that the customer’s reliability requirements are met and that the regulators requirements are satisfied at the lowest possible cost. It is known fact around the world that 90% of the customer service interruptions are caused due to failure in distribution system. Therefore, it is worth considering reliability assessments as it provides an opportunity to incorporate the cost or losses incurred by the utilities customer as a result of power failure. This must be considered in the planning and operating practices. The system modelling and simulation study is carried out on one of the district’s distribution system which consists of 132 kV, 66 kV and 22 kV network in Aliwal North Sector ECOU. The reliability assessment is done on the 22, 66 and 132 kV system to assess the performance of the present system and also predictive reliability analysis for the future system considering load growth and system expansion. The alternative which gives low SAIDI, SAIFI and minimum breakeven costs is being assessed and considered. The reliability of 132 kV system could be further improved by constructing a new 132 kV line from a different source of supply and connecting with line coming from another district (reserve) at reasonable break even cost. The decision base could be further improved by having Aliwal North Sector context interruption cost. However, the historical data which may be used in Aliwal North Sector to acquire interruption costs from the customers are being proposed. The focus should be on improving the power quality on constrained networks first, then the reliability. Therefore for the Aliwal North power system network it is imperative that Eskom invest on the reliability of this network. This dissertation also analysed load reflected economic benefit versus performance expectations that should be optimized through achieving a balance between network performance (SAIDI) improvement, and total life cycle cost (to Eskom as well as the economy). Reliability analysis conducted in this dissertation used Aliwal North power system network as a case study; the results proved that the system is vulnerable to faults, planned and unplanned outages. Reliability evaluation studies were conducted on the system using DigSilent software in conjunction with FME. These two models gave accurate results with acceptable variance in most indices except for the ENS where the variance was quite significant. It can be concluded that DigSilent results are the most accurate results in all three reliability evaluation scenarios for the Aliwal North Power System, best interpretation being that of DigSilent.
- Full Text:
- Date Issued: 2017
Application of the theory of critical distance technique to predict fracture toughness in friction stir welded Ti-6Al-4V sheet
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
Concrete work decision analysis in Bloemfontein
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
Developing end-user requirements for the design of an eProcurement portal
- Authors: Du Preez, Pedro Gordon
- Date: 2017
- Subjects: End-user computing , Government purchasing -- South Africa Business information services Management information systems Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/33272 , vital:32628
- Description: During the 2015 South African budget speech, the country was made aware of the proposed changes to be introduced to the tendering process. These changes were to be implemented from 1 April 2015 and were to span over two years. The changes were to facilitate the transition of the tendering process from a paper- based system to a completely digital process, where the majority of the processes will take place on an eProcurement portal (www.etenders.gov.za). This means that businesses will be obligated to use the portal, in order to access tender opportunities and ultimately, to submit tenders on this portal, with the phasing out of all paper-based tender processes. If the portal is to succeed it has to be well adopted by its users. If the portal is not adopted or is used incorrectly, businesses might struggle to access tender opportunities for their business. This research searches to address this problem by helping the users of this portal to gain efficient and effective access to tendering opportunities, through finding and developing user requirements for successful adoption from a user experience perspective. The primary objective of this research is to develop end-user requirements for the design of an eProcurement portal. To achieve this, a general understanding of the legal policies in place for tendering is necessary, as well as a first-hand experience of the users. Case study research methodology and a mixed method approach are used to gather both qualitative and quantitative data. The case study is conducted in the Eastern Cape and directed at business within the construction sector that do tender, as this research is only focusing on the end user and their roles within the tendering process and not on the government internal tendering processes. The outcome of this research is to offer a list of user requirements that can be used within the design of the eProcurement portal that will function as valuable material towards the adoption and effectiveness of the eProcurement portal.
- Full Text:
- Date Issued: 2017
- Authors: Du Preez, Pedro Gordon
- Date: 2017
- Subjects: End-user computing , Government purchasing -- South Africa Business information services Management information systems Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/33272 , vital:32628
- Description: During the 2015 South African budget speech, the country was made aware of the proposed changes to be introduced to the tendering process. These changes were to be implemented from 1 April 2015 and were to span over two years. The changes were to facilitate the transition of the tendering process from a paper- based system to a completely digital process, where the majority of the processes will take place on an eProcurement portal (www.etenders.gov.za). This means that businesses will be obligated to use the portal, in order to access tender opportunities and ultimately, to submit tenders on this portal, with the phasing out of all paper-based tender processes. If the portal is to succeed it has to be well adopted by its users. If the portal is not adopted or is used incorrectly, businesses might struggle to access tender opportunities for their business. This research searches to address this problem by helping the users of this portal to gain efficient and effective access to tendering opportunities, through finding and developing user requirements for successful adoption from a user experience perspective. The primary objective of this research is to develop end-user requirements for the design of an eProcurement portal. To achieve this, a general understanding of the legal policies in place for tendering is necessary, as well as a first-hand experience of the users. Case study research methodology and a mixed method approach are used to gather both qualitative and quantitative data. The case study is conducted in the Eastern Cape and directed at business within the construction sector that do tender, as this research is only focusing on the end user and their roles within the tendering process and not on the government internal tendering processes. The outcome of this research is to offer a list of user requirements that can be used within the design of the eProcurement portal that will function as valuable material towards the adoption and effectiveness of the eProcurement portal.
- Full Text:
- Date Issued: 2017
Diamond turning of contact lens polymers
- Authors: Liman, Muhammad Mukhtar
- Date: 2017
- Subjects: Diamond turning Contact lenses , Electrostatic lenses Lenses -- Design and construction Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19223 , vital:28789
- Description: Contact lens production requires high accuracy and good surface integrity. Surface roughness is generally used to measure the index quality of a turning process. It has been an important response because it has direct influence toward the part performance and the production cost. Hence, choosing optimal cutting parameters will not only improve the quality measure but also the productivity. In this study, an ONSI-56 (Onsifocon A) contact lens buttons were used to investigate the triboelectric phenomena and the effects of turning parameters on surface finish of the lens materials. ONSI-56 specimens are machined by Precitech Nanoform Ultra-grind 250 precision machine and the roughness values of the diamond turned surfaces are measured by Taylor Hopson PGI Profilometer. Electrostatics values were measured using electrostatic voltmeter. An artificial neural network (ANN) and response surface (RS) model were developed to predict surface roughness and electrostatic discharge (ESD) on the turned ONSI-56. In the development of predictive models, turning parameters of cutting speed, feed rate and depth of cut were considered as model variables. The required data for predictive models were obtained by conducting a series of turning test and measuring the surface roughness and ESD data. Good agreement is observed between the predictive models results and the experimental measurements. The ANN and RSM models for ONSI-56 are compared with each other using mean absolute percentage error (MAPE) for accuracy and computational cost.
- Full Text:
- Date Issued: 2017
- Authors: Liman, Muhammad Mukhtar
- Date: 2017
- Subjects: Diamond turning Contact lenses , Electrostatic lenses Lenses -- Design and construction Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/19223 , vital:28789
- Description: Contact lens production requires high accuracy and good surface integrity. Surface roughness is generally used to measure the index quality of a turning process. It has been an important response because it has direct influence toward the part performance and the production cost. Hence, choosing optimal cutting parameters will not only improve the quality measure but also the productivity. In this study, an ONSI-56 (Onsifocon A) contact lens buttons were used to investigate the triboelectric phenomena and the effects of turning parameters on surface finish of the lens materials. ONSI-56 specimens are machined by Precitech Nanoform Ultra-grind 250 precision machine and the roughness values of the diamond turned surfaces are measured by Taylor Hopson PGI Profilometer. Electrostatics values were measured using electrostatic voltmeter. An artificial neural network (ANN) and response surface (RS) model were developed to predict surface roughness and electrostatic discharge (ESD) on the turned ONSI-56. In the development of predictive models, turning parameters of cutting speed, feed rate and depth of cut were considered as model variables. The required data for predictive models were obtained by conducting a series of turning test and measuring the surface roughness and ESD data. Good agreement is observed between the predictive models results and the experimental measurements. The ANN and RSM models for ONSI-56 are compared with each other using mean absolute percentage error (MAPE) for accuracy and computational cost.
- Full Text:
- Date Issued: 2017
Effective communication planning for high-performance civil engineering project teams
- Authors: Rossouw, Jeanne Jacques
- Date: 2017
- Subjects: Communication in engineering -- South Africa Communication of technical information , Communication in management Project management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19993 , vital:29020
- Description: In the area of project management, it is well understood that effective communication processes impact positively on project performance. Despite this, project teams still struggle to develop effective communication plans that address their project communication needs. The evidence of this is that many project problems are attributed to poor communication. The literature addresses the needs and shortcomings of group communication and communication planning in general; but there is however, a scarcity of literature describing how to plan for the internal communication needs of high-performance civil engineering teams. With the limited literature available on the topic, this study seeks to validate how effective the current communication planning methods are at Aurecon in meeting the communication needs of its project teams. This qualitative research project is a case study of communication planning within the project teams at Aurecon in Port Elizabeth. A semi-structured interview process was followed, addressing specific questions, without limiting the direction of the interviews. Project team members, working on high performance projects, were asked for their thoughts, feelings and suggestions about existing communication practices and project communication planning. Overall, it was found that the existing communication-planning practices at Aurecon did not have any beneficial effect on how team members communicate. It was concluded that project teams would benefit from improved communication-planning processes that are more inclusive of their specific communication needs. Organisations working on high-performance projects will benefit directly from the research, which challenges these organisations to think more broadly about how they plan for communication at a project level. The research provides practical suggestions for improving the way that teams plan their communication processes; and it does so by focusing on the communication needs of the team members. Recommendations are made to professional bodies, tertiary institutions, project organisations – and most importantly – to project team members themselves. The recommendations to project team members include taking ownership of communication practices, asserting their views, as well as making their needs known.
- Full Text:
- Date Issued: 2017
- Authors: Rossouw, Jeanne Jacques
- Date: 2017
- Subjects: Communication in engineering -- South Africa Communication of technical information , Communication in management Project management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/19993 , vital:29020
- Description: In the area of project management, it is well understood that effective communication processes impact positively on project performance. Despite this, project teams still struggle to develop effective communication plans that address their project communication needs. The evidence of this is that many project problems are attributed to poor communication. The literature addresses the needs and shortcomings of group communication and communication planning in general; but there is however, a scarcity of literature describing how to plan for the internal communication needs of high-performance civil engineering teams. With the limited literature available on the topic, this study seeks to validate how effective the current communication planning methods are at Aurecon in meeting the communication needs of its project teams. This qualitative research project is a case study of communication planning within the project teams at Aurecon in Port Elizabeth. A semi-structured interview process was followed, addressing specific questions, without limiting the direction of the interviews. Project team members, working on high performance projects, were asked for their thoughts, feelings and suggestions about existing communication practices and project communication planning. Overall, it was found that the existing communication-planning practices at Aurecon did not have any beneficial effect on how team members communicate. It was concluded that project teams would benefit from improved communication-planning processes that are more inclusive of their specific communication needs. Organisations working on high-performance projects will benefit directly from the research, which challenges these organisations to think more broadly about how they plan for communication at a project level. The research provides practical suggestions for improving the way that teams plan their communication processes; and it does so by focusing on the communication needs of the team members. Recommendations are made to professional bodies, tertiary institutions, project organisations – and most importantly – to project team members themselves. The recommendations to project team members include taking ownership of communication practices, asserting their views, as well as making their needs known.
- Full Text:
- Date Issued: 2017