A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A model for privacy-aware presence management in mobile communications
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
Information security service management : a service management approach to information security management
- Authors: Rastogi, Rahul
- Date: 2011
- Subjects: Information technology -- Security measures
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9755 , http://hdl.handle.net/10948/1389 , Information technology -- Security measures
- Description: In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
- Full Text:
- Date Issued: 2011
- Authors: Rastogi, Rahul
- Date: 2011
- Subjects: Information technology -- Security measures
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9755 , http://hdl.handle.net/10948/1389 , Information technology -- Security measures
- Description: In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
- Full Text:
- Date Issued: 2011
Intelligent automotive thermal comfort control
- Authors: Kranz, Jürgen
- Date: 2011
- Subjects: Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9645 , http://hdl.handle.net/10948/1435 , Automobiles -- Heating and ventilation
- Description: Mobility has become a substantial part in our society. Since we spend a lot of our available time on the road, we expect the automotive environment to provide similar comfort levels than residential buildings. Within this context, this research thesis especially focuses on automotive thermal comfort control. The automotive cabin is a very special environment, which is characterized by extreme inhomogeneity and overall transient behavior. Thermal comfort is a very vague and a very subjective term, which depends on physiological and psychological variables. Theories for thermal comfort in transient environments have not been fully established yet and researchers are still busy with its investigation. At present, automotive industry relies on extensive thermal comfort models, manikins and powerful simulation tools to assess and control thermal comfort. This thesis studies the application of artificial intelligence and proposes a blackbox approach which aims for extracting thermal comfort knowledge directly from human's interaction with the HVAC controls. This methodology avoids the use of human physiological and psychological thermal comfort models and does not require any a-priori knowledge. A novel comfort acquisition tool has been developed and has been integrated into a research vehicle in order to gather the required data for system learning. Data has been collected during spring, autumn and summer conditions in Southern Africa. Methods of data mining have been applied and an intelligent implementation using artificial neural networks has been proposed. The achieved results are promising and allow for about 87 perecent correct classification. It is concluded that methods of artificial intelligence perform well and are far superior compared to conventional approaches. These methods can be used as a powerful tool for the development process of vehicle air-conditioning controls and have great potential for time and cost reduction.
- Full Text:
- Date Issued: 2011
- Authors: Kranz, Jürgen
- Date: 2011
- Subjects: Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9645 , http://hdl.handle.net/10948/1435 , Automobiles -- Heating and ventilation
- Description: Mobility has become a substantial part in our society. Since we spend a lot of our available time on the road, we expect the automotive environment to provide similar comfort levels than residential buildings. Within this context, this research thesis especially focuses on automotive thermal comfort control. The automotive cabin is a very special environment, which is characterized by extreme inhomogeneity and overall transient behavior. Thermal comfort is a very vague and a very subjective term, which depends on physiological and psychological variables. Theories for thermal comfort in transient environments have not been fully established yet and researchers are still busy with its investigation. At present, automotive industry relies on extensive thermal comfort models, manikins and powerful simulation tools to assess and control thermal comfort. This thesis studies the application of artificial intelligence and proposes a blackbox approach which aims for extracting thermal comfort knowledge directly from human's interaction with the HVAC controls. This methodology avoids the use of human physiological and psychological thermal comfort models and does not require any a-priori knowledge. A novel comfort acquisition tool has been developed and has been integrated into a research vehicle in order to gather the required data for system learning. Data has been collected during spring, autumn and summer conditions in Southern Africa. Methods of data mining have been applied and an intelligent implementation using artificial neural networks has been proposed. The achieved results are promising and allow for about 87 perecent correct classification. It is concluded that methods of artificial intelligence perform well and are far superior compared to conventional approaches. These methods can be used as a powerful tool for the development process of vehicle air-conditioning controls and have great potential for time and cost reduction.
- Full Text:
- Date Issued: 2011
Performance evaluation of buildings in educational institutions: a case of Universities in South-East Nigeria
- Authors: Okolie, Kevin Chuks
- Date: 2011
- Subjects: Buildings -- Nigeria -- Evaluation , College buildings -- Nigeria
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9683 , http://hdl.handle.net/10948/1423 , Buildings -- Nigeria -- Evaluation , College buildings -- Nigeria
- Description: Buildings constitute a substantial percentage of most educational institutions' assets, user needs and operating costs. The performance level of this resource is therefore very critical to educational effectiveness. However, despite the crucial role of this resource in the education and construction sectors of the economy, evaluation of building performance is not a mainstream activity in Africa, particularly Nigeria. Presently, there is limited or no research/data in Nigeria to assess how extensively the use of or lack of building performance evaluation techniques affect teaching, learning spaces and overall organisational performance. The aim of this research was to develop an appropriate model for building performance evaluation in higher education institutions based on performance indicators, for improved awareness, understanding and practice. The research primarily focused on "user needs/requirements" within the organisational context. The methodology employed in the study included a review of the relevant literature and multiple case-studies conducted on four Federal Government universities in South East Nigeria. The target universities constituted the units of analyses and therefore provided opportunity for in-depth examination of the links between users, building facilities and organisational processes as established in the literature review. Epistemologically, the research is objectivist and paradigmically positivist. However, some qualitative aspects of data were relevant to the study and therefore used in a complementary manner. The case approach utilized mixed methods by applying a range of data collection techniques and evidence from multiple sources. The sampling technique was sequential involving both purposive and stratified random sampling. The study reveals apparent lack of a systematic mechanism for evaluating the success or performance of completed and occupied buildings and so the interaction between users and buildings did not add value to learning and working experiences in the target institutions. The bespoke methodology and conceptual process model developed in this research constitute an innovative and pioneering contribution to building performance evaluation as a developing field of knowledge. The study has established a basic level of awareness and understanding among construction practitioners that building performance evaluation can be used as a tool for delivering strategic objectives in the management of educational buildings. The study strongly advocates the inclusion of building performance evaluation as part of the building procurement process. The proposed model in the study provides a useful guide needed by the institutions to navigate to future competitive success in higher education built asset/facilities management.
- Full Text:
- Date Issued: 2011
- Authors: Okolie, Kevin Chuks
- Date: 2011
- Subjects: Buildings -- Nigeria -- Evaluation , College buildings -- Nigeria
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9683 , http://hdl.handle.net/10948/1423 , Buildings -- Nigeria -- Evaluation , College buildings -- Nigeria
- Description: Buildings constitute a substantial percentage of most educational institutions' assets, user needs and operating costs. The performance level of this resource is therefore very critical to educational effectiveness. However, despite the crucial role of this resource in the education and construction sectors of the economy, evaluation of building performance is not a mainstream activity in Africa, particularly Nigeria. Presently, there is limited or no research/data in Nigeria to assess how extensively the use of or lack of building performance evaluation techniques affect teaching, learning spaces and overall organisational performance. The aim of this research was to develop an appropriate model for building performance evaluation in higher education institutions based on performance indicators, for improved awareness, understanding and practice. The research primarily focused on "user needs/requirements" within the organisational context. The methodology employed in the study included a review of the relevant literature and multiple case-studies conducted on four Federal Government universities in South East Nigeria. The target universities constituted the units of analyses and therefore provided opportunity for in-depth examination of the links between users, building facilities and organisational processes as established in the literature review. Epistemologically, the research is objectivist and paradigmically positivist. However, some qualitative aspects of data were relevant to the study and therefore used in a complementary manner. The case approach utilized mixed methods by applying a range of data collection techniques and evidence from multiple sources. The sampling technique was sequential involving both purposive and stratified random sampling. The study reveals apparent lack of a systematic mechanism for evaluating the success or performance of completed and occupied buildings and so the interaction between users and buildings did not add value to learning and working experiences in the target institutions. The bespoke methodology and conceptual process model developed in this research constitute an innovative and pioneering contribution to building performance evaluation as a developing field of knowledge. The study has established a basic level of awareness and understanding among construction practitioners that building performance evaluation can be used as a tool for delivering strategic objectives in the management of educational buildings. The study strongly advocates the inclusion of building performance evaluation as part of the building procurement process. The proposed model in the study provides a useful guide needed by the institutions to navigate to future competitive success in higher education built asset/facilities management.
- Full Text:
- Date Issued: 2011
Performance improvement in South African construction
- Authors: Emuze, Fidelis Abumere
- Date: 2011
- Subjects: Construction industry -- South Africa -- Management , Project management -- South Africa , Construction projects -- Management , Business logistics -- South Africa -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9678 , http://hdl.handle.net/10948/1642 , Construction industry -- South Africa -- Management , Project management -- South Africa , Construction projects -- Management , Business logistics -- South Africa -- Management
- Description: In general, dreams are conceived, ideas are conceptualised, and initiatives are embarked upon in order to alter the state of realities. Dreams change realities; when mechanisms are put in place to realise them, dreams succeed. However, anecdotal evidence as well as empirical findings has continued to reiterate the difficulties associated with realising dreams related to construction projects. Extending the „dream‟ analogy to the South African construction industry context therefore paints an uninspiring picture. Dreams associated with construction do not have a 100% chance of becoming realities as evident in reported poor project performance in the industry. Shattered dreams in the form of poor performing projects, poorly implemented construction processes, or worst, projects delivered at the expense of unexpected cost to the client as a direct result of poor H&S or time overruns, negate the intent of dreams. This thesis is primarily concerned with project performance related bottlenecks in South African construction. After an extensive review of related literature that entails the analysis of publications related to non-value adding activities (NVAAs), supply chain management (SCM), and system dynamics (SD) in the construction project management realm, an exhaustive mixed-mode quantitative survey was conducted among key participants in the South African infrastructure sector. Public sector clients, consulting engineers and contractors that were involved in civil engineering projects were surveyed repeatedly with approximately five survey instruments at convenient intervals. Results arising from the study, inter-alia, indicate that: an appreciable amount of NVAAs occur in South African construction; these NVAAs become further compounded when propagated into other value adding activities (VAAs) in the construction process; the identified NVAAs equally perpetrate the menace associated with poor performance to the detriment of the achievement of cost, H&S, quality, and time project targets, and the root cause of these NVAAs that often contribute to poor performance is not far from the much reported „shortage of skills‟ in South Africa. Notable contributions to the body of knowledge include SD models are extendable regardless of the source of their empirical data as evident in the qualitative models proposed in this study; within the SD domain, it is advisable to consider the „competence‟ of individuals assigned to tasks especially in a developing country as this study revealed that human resources issues predominate among the sources of NVAAs that eventuate in a range of poor project performance; the NVAAs that occur, and their causes on projects are perceived to be due to lapses and / or inadequacies that involved the entire construction supply chain; there is no single construction process / task that is immune from being affected by NVAAs; and within the South African, and by implication construction context generally iii in developing countries, the adequacy of required knowledge among project stakeholders is the most crucial determinant of project performance. As opposed to what is obtainable in developed countries, the construction industry in developing countries, particularly in South Africa, should take advantage of knowledge management (KM) techniques such as brainstorming, communities of practices, and face-to-face interactions. These techniques can be driven through appropriate mentorship programmes, industry focused built environment education, and other human resources driven avenues that do not necessarily require substantial investment in technologies, so that to a large extent organisations in the industry can prioritise KM, and thereafter, continually engage in it for future performance improvement. Using inferential statistical methods for hypotheses testing, and SD concepts for creating qualitative models led to a range of recommendations which, inter-alia, propose that halting the tide of NVAAs and poor performance requires the management of both tacit and explicit knowledge gained in construction; and most importantly, it requires the assurance that „competence‟ is the overriding criteria for selecting project partners, and also, for assigning either design or construction related activities to responsible parties involved in project realisation in South Africa. In effect, in order to engender a culture of continuous improvement in South African construction, other considerations should be subservient to „competence‟ in the construction supply chain. Competence must be located among everyone involved in project realisation, that is, enhancing the competence of all involved in project realisation is as good as ensuring performance improvement, which in turn, equates to the acceleration of project delivery in South Africa.
- Full Text:
- Date Issued: 2011
- Authors: Emuze, Fidelis Abumere
- Date: 2011
- Subjects: Construction industry -- South Africa -- Management , Project management -- South Africa , Construction projects -- Management , Business logistics -- South Africa -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9678 , http://hdl.handle.net/10948/1642 , Construction industry -- South Africa -- Management , Project management -- South Africa , Construction projects -- Management , Business logistics -- South Africa -- Management
- Description: In general, dreams are conceived, ideas are conceptualised, and initiatives are embarked upon in order to alter the state of realities. Dreams change realities; when mechanisms are put in place to realise them, dreams succeed. However, anecdotal evidence as well as empirical findings has continued to reiterate the difficulties associated with realising dreams related to construction projects. Extending the „dream‟ analogy to the South African construction industry context therefore paints an uninspiring picture. Dreams associated with construction do not have a 100% chance of becoming realities as evident in reported poor project performance in the industry. Shattered dreams in the form of poor performing projects, poorly implemented construction processes, or worst, projects delivered at the expense of unexpected cost to the client as a direct result of poor H&S or time overruns, negate the intent of dreams. This thesis is primarily concerned with project performance related bottlenecks in South African construction. After an extensive review of related literature that entails the analysis of publications related to non-value adding activities (NVAAs), supply chain management (SCM), and system dynamics (SD) in the construction project management realm, an exhaustive mixed-mode quantitative survey was conducted among key participants in the South African infrastructure sector. Public sector clients, consulting engineers and contractors that were involved in civil engineering projects were surveyed repeatedly with approximately five survey instruments at convenient intervals. Results arising from the study, inter-alia, indicate that: an appreciable amount of NVAAs occur in South African construction; these NVAAs become further compounded when propagated into other value adding activities (VAAs) in the construction process; the identified NVAAs equally perpetrate the menace associated with poor performance to the detriment of the achievement of cost, H&S, quality, and time project targets, and the root cause of these NVAAs that often contribute to poor performance is not far from the much reported „shortage of skills‟ in South Africa. Notable contributions to the body of knowledge include SD models are extendable regardless of the source of their empirical data as evident in the qualitative models proposed in this study; within the SD domain, it is advisable to consider the „competence‟ of individuals assigned to tasks especially in a developing country as this study revealed that human resources issues predominate among the sources of NVAAs that eventuate in a range of poor project performance; the NVAAs that occur, and their causes on projects are perceived to be due to lapses and / or inadequacies that involved the entire construction supply chain; there is no single construction process / task that is immune from being affected by NVAAs; and within the South African, and by implication construction context generally iii in developing countries, the adequacy of required knowledge among project stakeholders is the most crucial determinant of project performance. As opposed to what is obtainable in developed countries, the construction industry in developing countries, particularly in South Africa, should take advantage of knowledge management (KM) techniques such as brainstorming, communities of practices, and face-to-face interactions. These techniques can be driven through appropriate mentorship programmes, industry focused built environment education, and other human resources driven avenues that do not necessarily require substantial investment in technologies, so that to a large extent organisations in the industry can prioritise KM, and thereafter, continually engage in it for future performance improvement. Using inferential statistical methods for hypotheses testing, and SD concepts for creating qualitative models led to a range of recommendations which, inter-alia, propose that halting the tide of NVAAs and poor performance requires the management of both tacit and explicit knowledge gained in construction; and most importantly, it requires the assurance that „competence‟ is the overriding criteria for selecting project partners, and also, for assigning either design or construction related activities to responsible parties involved in project realisation in South Africa. In effect, in order to engender a culture of continuous improvement in South African construction, other considerations should be subservient to „competence‟ in the construction supply chain. Competence must be located among everyone involved in project realisation, that is, enhancing the competence of all involved in project realisation is as good as ensuring performance improvement, which in turn, equates to the acceleration of project delivery in South Africa.
- Full Text:
- Date Issued: 2011
- «
- ‹
- 1
- ›
- »