The views of amakrwala on the meaning of umqombothi and commercial alcohol use during the initiation ceremonies
- Authors: Mavimbela, Mzoli
- Date: 2021
- Subjects: Youth -- Alcohol use , Alcoholism -- South Africa , Alcoholism -- Psychological aspects , Initiation rites -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , Degree
- Identifier: http://hdl.handle.net/10948/60862 , vital:68801
- Description: Ulwaluko or initiation ceremony is one of the most important ceremonies practiced by the amaXhosa ethnic group to mark male adolescents’ transition from boyhood to manhood. Every young Xhosa male is anticipated to undergo this ceremony in order to be respected and be viewed as a true man by the society. There is a dearth of literature on amakrwala’s views regarding the meaning of traditional beer (umqombothi) and commercial alcohol (brandy or beer) use during the initiation ceremony. Thus, this study addresses this gap, as it adds to the existing spectrum of knowledge on the meaning of alcohol use during the amaXhosa initiation process. The socio-cultural theory was selected as the theoretical framework for the study. This study took a qualitative nature which was exploratory-descriptive and contextual in design employing a non-probability purposive-criterion based technique to sample 16 identified amaXhosa adult males between the ages of 18 to 24 years who recently went through the initiation ceremony. Sixteen individual semi-structured telephonic interviews were conducted. Data collected was analysed using thematic data analysis. Various data verification strategies were employed to ensure trustworthiness. Research ethics applicable to this study were guided by the principles contained in the Belmont report (1979). The findings showed that during the amaXhosa initiation ceremony both commercial alcohol and umqombothi played significant but different roles during each stage of the ceremony. The majority of amakrwala viewed umqombothi as a significant beer for ancestors to divinely bless isiko while brandy and beer were viewed as sweets or beers for fun which accompanied umqombothi. Brandy and beer were viewed as beers required by abafana teaching amakrwala manhood in the lighthouses. Thus, negative behaviours portrayed by abafana during imigidi after drinking alcohol were viewed as a great concern by amakrwala. 7 Alcohol use in ulwaluko was viewed as good by the amakrwala but they emphasized that there should be guidelines that monitor responsible drinking.
- Full Text:
- Date Issued: 2021
- Authors: Mavimbela, Mzoli
- Date: 2021
- Subjects: Youth -- Alcohol use , Alcoholism -- South Africa , Alcoholism -- Psychological aspects , Initiation rites -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , Degree
- Identifier: http://hdl.handle.net/10948/60862 , vital:68801
- Description: Ulwaluko or initiation ceremony is one of the most important ceremonies practiced by the amaXhosa ethnic group to mark male adolescents’ transition from boyhood to manhood. Every young Xhosa male is anticipated to undergo this ceremony in order to be respected and be viewed as a true man by the society. There is a dearth of literature on amakrwala’s views regarding the meaning of traditional beer (umqombothi) and commercial alcohol (brandy or beer) use during the initiation ceremony. Thus, this study addresses this gap, as it adds to the existing spectrum of knowledge on the meaning of alcohol use during the amaXhosa initiation process. The socio-cultural theory was selected as the theoretical framework for the study. This study took a qualitative nature which was exploratory-descriptive and contextual in design employing a non-probability purposive-criterion based technique to sample 16 identified amaXhosa adult males between the ages of 18 to 24 years who recently went through the initiation ceremony. Sixteen individual semi-structured telephonic interviews were conducted. Data collected was analysed using thematic data analysis. Various data verification strategies were employed to ensure trustworthiness. Research ethics applicable to this study were guided by the principles contained in the Belmont report (1979). The findings showed that during the amaXhosa initiation ceremony both commercial alcohol and umqombothi played significant but different roles during each stage of the ceremony. The majority of amakrwala viewed umqombothi as a significant beer for ancestors to divinely bless isiko while brandy and beer were viewed as sweets or beers for fun which accompanied umqombothi. Brandy and beer were viewed as beers required by abafana teaching amakrwala manhood in the lighthouses. Thus, negative behaviours portrayed by abafana during imigidi after drinking alcohol were viewed as a great concern by amakrwala. 7 Alcohol use in ulwaluko was viewed as good by the amakrwala but they emphasized that there should be guidelines that monitor responsible drinking.
- Full Text:
- Date Issued: 2021
'n Ondersoek na genderpolitieke kwessies in die kortverhale van Rachelle Greeff
- Authors: Gelderblom, Zel-Marí Kato
- Date: 2020
- Subjects: Women -- Political activity
- Language: Afrikaans
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/50756 , vital:42666
- Description: Hierdie verhandeling fokus op die genderpolitieke kwessies in die volgende geselekteerde kortverhale van Rachelle Greeff; “Borste en bandiet”, en “Snaaks watter simpel goed mens onthou”, uit die bundel Die rugkant van die bruid (1990), sowel as “Eters anoniem”, uit die bundel Onwaarskynlike Engele (1993). Die hoofdoel van die studie was om die essensies van genderpolitiek soos deur Greeff aangetoon, te bepaal ten einde die geslagsposisie van die hedendaagse vrou te belig. Daar is gekyk na die manier waarop Rachelle Greeff die fokus op die liggaamlikheid en spesifiek die uiterlike van die vrou plaas, sowel as die manier waarop Greeff stereotipes en taboes rondom die vrou afbreek. Judith Butler se genderteorie is gebruik om hierdie genderpolitieke kwessies te ondersoek, te bespreek en te analiseer. Hierdie is volgens my kennis die eerste verhandeling wat oor Rachelle Greeff se werk handel.
- Full Text:
- Date Issued: 2020
- Authors: Gelderblom, Zel-Marí Kato
- Date: 2020
- Subjects: Women -- Political activity
- Language: Afrikaans
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/50756 , vital:42666
- Description: Hierdie verhandeling fokus op die genderpolitieke kwessies in die volgende geselekteerde kortverhale van Rachelle Greeff; “Borste en bandiet”, en “Snaaks watter simpel goed mens onthou”, uit die bundel Die rugkant van die bruid (1990), sowel as “Eters anoniem”, uit die bundel Onwaarskynlike Engele (1993). Die hoofdoel van die studie was om die essensies van genderpolitiek soos deur Greeff aangetoon, te bepaal ten einde die geslagsposisie van die hedendaagse vrou te belig. Daar is gekyk na die manier waarop Rachelle Greeff die fokus op die liggaamlikheid en spesifiek die uiterlike van die vrou plaas, sowel as die manier waarop Greeff stereotipes en taboes rondom die vrou afbreek. Judith Butler se genderteorie is gebruik om hierdie genderpolitieke kwessies te ondersoek, te bespreek en te analiseer. Hierdie is volgens my kennis die eerste verhandeling wat oor Rachelle Greeff se werk handel.
- Full Text:
- Date Issued: 2020
A comparative analysis of the effects of different Levels of Education on growth in African Economies
- Authors: Mkhosana, Nomathamsanqa
- Date: 2020
- Subjects: Economic development -- Effect of education on , Education -- Economic Aspects
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/50393 , vital:42161
- Description: The economic growth and development of a country depend on the educational opportunities available to its citizens. Education is deemed to influence economic growth via improved labour productivity particularly through knowledge and skills accumulation by promoting technological improvement and innovation. The aim of the study was to highlight the importance of each level of education on economic growth of African countries. The objective of the study was to find which level of education (primary, secondary and tertiary) has the most significant effect on economic growth. To obtain this objective, the study using two panel cointegration methods, the fully modified ordinary least squares (FMOLS) and dynamic ordinary least squares (DOLS) method applied to data covering the period of 2000 to 2017, the study aimed at sampling 10 educated economies and 10 advanced economies in Africa, since South Africa and Kenya belong in both categories, the study a total of 18 African economies. The results of the study show discrepancies, that is, primary and secondary education being most beneficial towards more advanced economies whilst only tertiary education is beneficiary towards more educated African countries. Policy implications are provided.
- Full Text:
- Date Issued: 2020
- Authors: Mkhosana, Nomathamsanqa
- Date: 2020
- Subjects: Economic development -- Effect of education on , Education -- Economic Aspects
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/50393 , vital:42161
- Description: The economic growth and development of a country depend on the educational opportunities available to its citizens. Education is deemed to influence economic growth via improved labour productivity particularly through knowledge and skills accumulation by promoting technological improvement and innovation. The aim of the study was to highlight the importance of each level of education on economic growth of African countries. The objective of the study was to find which level of education (primary, secondary and tertiary) has the most significant effect on economic growth. To obtain this objective, the study using two panel cointegration methods, the fully modified ordinary least squares (FMOLS) and dynamic ordinary least squares (DOLS) method applied to data covering the period of 2000 to 2017, the study aimed at sampling 10 educated economies and 10 advanced economies in Africa, since South Africa and Kenya belong in both categories, the study a total of 18 African economies. The results of the study show discrepancies, that is, primary and secondary education being most beneficial towards more advanced economies whilst only tertiary education is beneficiary towards more educated African countries. Policy implications are provided.
- Full Text:
- Date Issued: 2020
A Comparative Study of Bootstrapping Techniques for Inventory Control
- Authors: Frederick, Lauren
- Date: 2020
- Subjects: Computer bootstrapping -- Inventory control
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48335 , vital:40849
- Description: Setting correct inventory levels is an important business consideration in order to minimise inventory investment while at the same time ensuring sufficient inventory levels to meet customer demand. Inventory management has a significant impact on both financial and customer service aspects of a business. Selecting appropriate inventory levels requires that products’ lead time demand be accurately estimated in order to calculate the reorder point. The purpose of this study was to empirically determine whether bootstrapping methods used to estimate the lead time demand distribution and reorder point calculation could match or even outperform a standard parametric approach. The two bootstrapping methods compared in this research included variations of those presented by Bookbinder and Lordahl [1989] and do Rego and de Mesquita [2015]. These were compared to the standard parametric approach common in practice which makes use of the Normal distribution for modelling lead time demand. The three reorder point calculation methods were each incorporated into the inventory policy simulations using data supplied by a South African automotive spare parts business. The simulations covered a period of twelve months and were repeated for multiple service levels ranging from 70 to 99 percent. Results of the simulations were compared at a high level as well as for groups of items identified using segmentation techniques which considered different item demand and lead time characteristics. Key findings were that the Normal approximation method was far superior in terms of the service level metric, while the variation of the Bookbinder and Lordahl [1989] method adopted in this study presented possible cost benefits at lower service levels.
- Full Text:
- Date Issued: 2020
- Authors: Frederick, Lauren
- Date: 2020
- Subjects: Computer bootstrapping -- Inventory control
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48335 , vital:40849
- Description: Setting correct inventory levels is an important business consideration in order to minimise inventory investment while at the same time ensuring sufficient inventory levels to meet customer demand. Inventory management has a significant impact on both financial and customer service aspects of a business. Selecting appropriate inventory levels requires that products’ lead time demand be accurately estimated in order to calculate the reorder point. The purpose of this study was to empirically determine whether bootstrapping methods used to estimate the lead time demand distribution and reorder point calculation could match or even outperform a standard parametric approach. The two bootstrapping methods compared in this research included variations of those presented by Bookbinder and Lordahl [1989] and do Rego and de Mesquita [2015]. These were compared to the standard parametric approach common in practice which makes use of the Normal distribution for modelling lead time demand. The three reorder point calculation methods were each incorporated into the inventory policy simulations using data supplied by a South African automotive spare parts business. The simulations covered a period of twelve months and were repeated for multiple service levels ranging from 70 to 99 percent. Results of the simulations were compared at a high level as well as for groups of items identified using segmentation techniques which considered different item demand and lead time characteristics. Key findings were that the Normal approximation method was far superior in terms of the service level metric, while the variation of the Bookbinder and Lordahl [1989] method adopted in this study presented possible cost benefits at lower service levels.
- Full Text:
- Date Issued: 2020
A framework for digital signature implementations for e-government services
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
A framework for enhancing compliance with Employee Performance Management and Development Systems(EPMDS) among public sector doctors in BCMM health facilities
- Bayeni, Luvuyo Lonwabo Precious
- Authors: Bayeni, Luvuyo Lonwabo Precious
- Date: 2020
- Subjects: Performance -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47520 , vital:40116
- Description: This research explored an employee performance management and development system in the context of the public health centres in the Eastern Cape Province of South Africa. The study reviewed the literature on EPMDS in the public health sector of South Africa, noting the shortfalls, challenges, and ways in which it could be improved. The major findings from the study include the need to review the entire policy, revise the pay-scales, and co-create a new EPMDS policy creating space for the representation of the views of the employees. Without completing the development and performance evaluation, grade progression cannot be implemented despite years of service; hence the problem doctors face with their salary levels. The current EPMDS was found to be ineffective due to the wide discrepancy that exists between doctors and other health professionals in public health institutions. Among the commitment motivators highlighted by the respondents, was the need to develop an organisational culture that permits employees to recognise that they are appreciated. Future research must consider using mixed research methods, in the context of other South African Provinces and include a larger sample of research participants.
- Full Text:
- Date Issued: 2020
- Authors: Bayeni, Luvuyo Lonwabo Precious
- Date: 2020
- Subjects: Performance -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47520 , vital:40116
- Description: This research explored an employee performance management and development system in the context of the public health centres in the Eastern Cape Province of South Africa. The study reviewed the literature on EPMDS in the public health sector of South Africa, noting the shortfalls, challenges, and ways in which it could be improved. The major findings from the study include the need to review the entire policy, revise the pay-scales, and co-create a new EPMDS policy creating space for the representation of the views of the employees. Without completing the development and performance evaluation, grade progression cannot be implemented despite years of service; hence the problem doctors face with their salary levels. The current EPMDS was found to be ineffective due to the wide discrepancy that exists between doctors and other health professionals in public health institutions. Among the commitment motivators highlighted by the respondents, was the need to develop an organisational culture that permits employees to recognise that they are appreciated. Future research must consider using mixed research methods, in the context of other South African Provinces and include a larger sample of research participants.
- Full Text:
- Date Issued: 2020
A framework for teaching secure coding practices through a blended learning approach
- Mdunyelwa, Vuyolwethu Sizoli
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
A framework to integrate secure programming principles into undergraduate computing curricula
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Information technology -- Management , Business enterprises -- Computer networks
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/48841 , vital:41145
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. v The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature available on business strategic alignment with ICT goals.
- Full Text:
- Date Issued: 2020
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Information technology -- Management , Business enterprises -- Computer networks
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/48841 , vital:41145
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. v The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature available on business strategic alignment with ICT goals.
- Full Text:
- Date Issued: 2020
A Geochemical Comparison of Southern African Stromatolites and Stromatolite Pools
- Authors: Dodd, Carla
- Date: 2020
- Subjects: Stromatolites
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48235 , vital:40527
- Description: Microbialite accretion takes place via either mineral precipitation, the trapping and binding of mineral and sediment grains, or a combination of the two. Recently, the geochemistry of carbonate deposits, including microbialites, has been used to reconstruct palaeoenvironments and infer biogenicity. Numerous modern stromatolite (layered microbialites) systems are located on the southern African coastline and are formed predominantly by mineral precipitation with minor detrital input. In order to better understand the environmental and biological processes influencing the formation of microbialites, the geochemistry of southern African coastalstromatolites is examined. This is done by a spatial comparison of the hydrochemistry as well as the major and trace element geochemistry of various coastal stromatolite systems. The influence of the underlying geology on the composition of the stromatolites forms a particular focus of the study. In addition, the effect of metazoans on the micro-fabrics and sediment incorporation into the stromatolite matrix is assessed. Finally, the trace element geochemistry of active, inactive, and ancient stromatolites is compared with a speleothem sample in order to test the validity of using trace elements as a means to determine biogenicity of deposition. Results show that the bulk geochemistry of the South African stromatolites is not a simple function of the associated bedrock lithologies, although certain parallels do exist. It was found that metazoans indirectly influence sediment incorporation by increasing porosity and thereby accommodation space for detrital input. Furthermore, trace element signatures could not be directly attributed to microbial influence in the deposition of the carbonates. Ultimately, this study provides valuable insights into the formation processes of the active South African stromatolites and the use of trace elements as a geochemical tool to investigate the evolution of life and determine past environmental conditions.
- Full Text:
- Date Issued: 2020
- Authors: Dodd, Carla
- Date: 2020
- Subjects: Stromatolites
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48235 , vital:40527
- Description: Microbialite accretion takes place via either mineral precipitation, the trapping and binding of mineral and sediment grains, or a combination of the two. Recently, the geochemistry of carbonate deposits, including microbialites, has been used to reconstruct palaeoenvironments and infer biogenicity. Numerous modern stromatolite (layered microbialites) systems are located on the southern African coastline and are formed predominantly by mineral precipitation with minor detrital input. In order to better understand the environmental and biological processes influencing the formation of microbialites, the geochemistry of southern African coastalstromatolites is examined. This is done by a spatial comparison of the hydrochemistry as well as the major and trace element geochemistry of various coastal stromatolite systems. The influence of the underlying geology on the composition of the stromatolites forms a particular focus of the study. In addition, the effect of metazoans on the micro-fabrics and sediment incorporation into the stromatolite matrix is assessed. Finally, the trace element geochemistry of active, inactive, and ancient stromatolites is compared with a speleothem sample in order to test the validity of using trace elements as a means to determine biogenicity of deposition. Results show that the bulk geochemistry of the South African stromatolites is not a simple function of the associated bedrock lithologies, although certain parallels do exist. It was found that metazoans indirectly influence sediment incorporation by increasing porosity and thereby accommodation space for detrital input. Furthermore, trace element signatures could not be directly attributed to microbial influence in the deposition of the carbonates. Ultimately, this study provides valuable insights into the formation processes of the active South African stromatolites and the use of trace elements as a geochemical tool to investigate the evolution of life and determine past environmental conditions.
- Full Text:
- Date Issued: 2020
A model for the detection of breast cancer using machine learning and thermal images in a mobile environment
- Authors: Lennox, Nicholas
- Date: 2020
- Subjects: Breast -- Cancer -- Imaging , Breast -- Imaging Mobile communication systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46097 , vital:39492
- Description: Breast cancer is the most common cancer amongst women and one of the deadliest. Various modalities exist which image the breasts, all with a focus on early detection; thermography is one such method. It is a non-invasive test, which is safe and can be used for a wide variety of breast densities. It functions by analysing thermal patterns captured via an infrared camera of the surface of the breast. Advances in infrared and mobile technology enable this modality to be mobile based; allowing a high degree of portability at a lower cost. Furthermore, as technology has improved, machine learning has played a larger role in medical practices by offering unbiased, consistent, and timely second opinions. Machine learning algorithms are able to classify medical images automatically if offered in the correct format. This study aims to provide a model, which integrates breast cancer detection, thermal imaging, machine learning, and mobile technology. The conceptual model is theorised from three literature studies regarding: identifiable aspects of breast cancer through thermal imaging, the mobile ecosystem, and classification using machine learning algorithms. The model is implemented and evaluated using an experiment designed to classify automatically thermal breast images of the same quality that mobile attachable thermal cameras are able to capture. The experiment contrasts various combinations of segmentation methods, extracted features, and classification algorithms. Promising results were shown in the experiment with a high degree of accuracy obtained. The successful results obtained from the experimentation process validates the feasibility of the model.
- Full Text:
- Date Issued: 2020
- Authors: Lennox, Nicholas
- Date: 2020
- Subjects: Breast -- Cancer -- Imaging , Breast -- Imaging Mobile communication systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46097 , vital:39492
- Description: Breast cancer is the most common cancer amongst women and one of the deadliest. Various modalities exist which image the breasts, all with a focus on early detection; thermography is one such method. It is a non-invasive test, which is safe and can be used for a wide variety of breast densities. It functions by analysing thermal patterns captured via an infrared camera of the surface of the breast. Advances in infrared and mobile technology enable this modality to be mobile based; allowing a high degree of portability at a lower cost. Furthermore, as technology has improved, machine learning has played a larger role in medical practices by offering unbiased, consistent, and timely second opinions. Machine learning algorithms are able to classify medical images automatically if offered in the correct format. This study aims to provide a model, which integrates breast cancer detection, thermal imaging, machine learning, and mobile technology. The conceptual model is theorised from three literature studies regarding: identifiable aspects of breast cancer through thermal imaging, the mobile ecosystem, and classification using machine learning algorithms. The model is implemented and evaluated using an experiment designed to classify automatically thermal breast images of the same quality that mobile attachable thermal cameras are able to capture. The experiment contrasts various combinations of segmentation methods, extracted features, and classification algorithms. Promising results were shown in the experiment with a high degree of accuracy obtained. The successful results obtained from the experimentation process validates the feasibility of the model.
- Full Text:
- Date Issued: 2020
A psychobiographical study of Maya Angelo
- Authors: De Waal, Leandra
- Date: 2020
- Subjects: Angelou, Maya
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/46341 , vital:39569
- Description: Psychobiographies aim to gain a deeper understanding into the lives of notable or notorious individuals through the lens of a psychological theory. Thisstudy aimedto gain insight into the personality development of Maya Angelou through the useof Erikson’s Theory of PsychosocialDevelopment. The study exploresand describesher life experiences in terms of this theory, and understandsher life within her socio-historical context. Angelou is a renowned literary figure. Herjourney to becoming a writer was an arduous one, marked by great hardships from an early age. Despite early parental abandonment, childhood rape, exposure to racism, and difficulties in romantic relationships, she developed into a healthy adult who achieved much literary success and inspired individuals worldwide.Nonprobability purposive sampling was used to selectAngelou as the subjectand was madeon the basis of the researcher’s interest in Angelou’s life history.Datawas collected by triangulating multiple sources of informationand analysed using the approach developed by Miles and Huberman, which involves threesteps: data reduction, data display, and conclusion drawing and verification.The main findings suggest that Angelou progressed through Erikson’s eight stages successfully, despite some delays in negotiations of crises.
- Full Text:
- Date Issued: 2020
- Authors: De Waal, Leandra
- Date: 2020
- Subjects: Angelou, Maya
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/46341 , vital:39569
- Description: Psychobiographies aim to gain a deeper understanding into the lives of notable or notorious individuals through the lens of a psychological theory. Thisstudy aimedto gain insight into the personality development of Maya Angelou through the useof Erikson’s Theory of PsychosocialDevelopment. The study exploresand describesher life experiences in terms of this theory, and understandsher life within her socio-historical context. Angelou is a renowned literary figure. Herjourney to becoming a writer was an arduous one, marked by great hardships from an early age. Despite early parental abandonment, childhood rape, exposure to racism, and difficulties in romantic relationships, she developed into a healthy adult who achieved much literary success and inspired individuals worldwide.Nonprobability purposive sampling was used to selectAngelou as the subjectand was madeon the basis of the researcher’s interest in Angelou’s life history.Datawas collected by triangulating multiple sources of informationand analysed using the approach developed by Miles and Huberman, which involves threesteps: data reduction, data display, and conclusion drawing and verification.The main findings suggest that Angelou progressed through Erikson’s eight stages successfully, despite some delays in negotiations of crises.
- Full Text:
- Date Issued: 2020
A smart home environment simulation tool to support the recognition of activities of daily living
- Authors: Ho, Brandon
- Date: 2020
- Subjects: Artificial intelligence , Internet of things Home automation
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/49334 , vital:41622
- Description: The prevalence of internet of things technologies and internet-connected devices enables the potential of introducing intelligence to a wide range of applications and fields. Smart homes are popular application of internet of things. Smart homes refer to domestic environments that can monitor their own state and the state of their inhabitants. Smart homes are identified as a promising solution for assisting inhabitants in completing daily activities and improving quality of life for inhabitants. This dissertation discusses the design and implementation of smart home simulation tool prototype, called smart environment stimulation (SESim). SESim is designed to conduct smart home simulation and generate synthetic sensor datasets which describe activity performances. This dissertation also discusses the evaluation of SESim, which focused on validating the utility of conducting smart home simulations and generating sensor datasets.
- Full Text: false
- Date Issued: 2020
- Authors: Ho, Brandon
- Date: 2020
- Subjects: Artificial intelligence , Internet of things Home automation
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/49334 , vital:41622
- Description: The prevalence of internet of things technologies and internet-connected devices enables the potential of introducing intelligence to a wide range of applications and fields. Smart homes are popular application of internet of things. Smart homes refer to domestic environments that can monitor their own state and the state of their inhabitants. Smart homes are identified as a promising solution for assisting inhabitants in completing daily activities and improving quality of life for inhabitants. This dissertation discusses the design and implementation of smart home simulation tool prototype, called smart environment stimulation (SESim). SESim is designed to conduct smart home simulation and generate synthetic sensor datasets which describe activity performances. This dissertation also discusses the evaluation of SESim, which focused on validating the utility of conducting smart home simulations and generating sensor datasets.
- Full Text: false
- Date Issued: 2020
A Social Media Method for Eliciting Millennials’ Worldviews on the Coastal and Marine Environment
- Authors: Okuah, Obrukevwe Anehwe
- Date: 2020
- Subjects: Millennialism -- Environmental aspects
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48588 , vital:40893
- Description: A lack of involvement by participants with traditional data collection methods for research has led to insufficient data regarding millennials’ worldviews on the coastal and marine environment. Understanding millennial worldviews could provide insights for policy interventions for sustainable use of the marine and coastal environment. The aim of this research is to design, develop and evaluate an appropriate social media method to elicit millennials’ worldviews on the coastal and marine environment. The methodology used for the research was Design Science Research (DSR), which is a legitimate approach to conducting research in the field of Information Systems. The methods used were a literature review, interviews with social media experts and Social Media Influencers (SMIs), and a focus group discussion with researchers from the field of social sciences. The proposed artefact (the method) can be used to provide guidance to researchers for engaging and eliciting opinions and worldviews of millennials on social media. The method includes a Social Media Influencer Model that illustrates the relationship between SMIs’ characteristics and techniques for engaging the public, and a Social Media Analytics (SMA) Process model that can guide researchers through the steps of eliciting worldviews from the public. Although there are several SMA techniques that can be used, the proposed method uses sentiment analysis as an SMA technique for deriving sentiments from social media data. The method was evaluated by researchers who require a social media method for eliciting millennials worldviews. The findings confirmed some of the techniques identified in literature as well as some additional techniques and processes. It was also evident that using this method could assist researchers for data collection and specifically to obtain worldviews on the marine and coastal environment. The contribution of this study is an artefact that fulfils the need for a social media method for data collection that is more convenient for researchers and millennials and can guide researchers through the steps of eliciting worldviews from the public.
- Full Text:
- Date Issued: 2020
- Authors: Okuah, Obrukevwe Anehwe
- Date: 2020
- Subjects: Millennialism -- Environmental aspects
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48588 , vital:40893
- Description: A lack of involvement by participants with traditional data collection methods for research has led to insufficient data regarding millennials’ worldviews on the coastal and marine environment. Understanding millennial worldviews could provide insights for policy interventions for sustainable use of the marine and coastal environment. The aim of this research is to design, develop and evaluate an appropriate social media method to elicit millennials’ worldviews on the coastal and marine environment. The methodology used for the research was Design Science Research (DSR), which is a legitimate approach to conducting research in the field of Information Systems. The methods used were a literature review, interviews with social media experts and Social Media Influencers (SMIs), and a focus group discussion with researchers from the field of social sciences. The proposed artefact (the method) can be used to provide guidance to researchers for engaging and eliciting opinions and worldviews of millennials on social media. The method includes a Social Media Influencer Model that illustrates the relationship between SMIs’ characteristics and techniques for engaging the public, and a Social Media Analytics (SMA) Process model that can guide researchers through the steps of eliciting worldviews from the public. Although there are several SMA techniques that can be used, the proposed method uses sentiment analysis as an SMA technique for deriving sentiments from social media data. The method was evaluated by researchers who require a social media method for eliciting millennials worldviews. The findings confirmed some of the techniques identified in literature as well as some additional techniques and processes. It was also evident that using this method could assist researchers for data collection and specifically to obtain worldviews on the marine and coastal environment. The contribution of this study is an artefact that fulfils the need for a social media method for data collection that is more convenient for researchers and millennials and can guide researchers through the steps of eliciting worldviews from the public.
- Full Text:
- Date Issued: 2020
A strategy to motivate continued instructor usage of learning management systems (LMSS) in higher learning institutions of Zimbabwe
- Authors: Siwela, Ndukuyenkosi
- Date: 2020
- Subjects: Web-based instruction , Computer systems Organizational learning -- Zimbabwe Internet in education
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47259 , vital:39837
- Description: The purpose of this study was to develop a strategy to motivate continued usage of Learning Management Systems in higher learning institutions of Zimbabwe. A related goal was to identify unique challenges experienced by instructors in their use of LMSs. The use of LMSs is now global and has been fairly successful in developed countries even though past research shows that instructors tend to discontinue usage over a period of time. Whereas most LMSs research is carried in the context of the developed world, the candidate demonstrates that Vantankesh's IS Success Model and Davis' Technology Acceptance Model can be successfully replicated into the developing world on condition that local environment is taken into context. The results showed that LMSs in Zimbabwe higher learning institutions hold a promise of success even though challenges exist. The findings have wider implications on the need to invest in neccessary infrustructure and future predictions on learner interests. The study demonstrates that shared success can be achieved if the local conditions are taken into context when developing a strategy to motivate instructor continued LMS usage. The study holds the practical implication that institutions can motivate instructors to continue with usage of LMSs to deliver quality output in their daily duties.
- Full Text:
- Date Issued: 2020
- Authors: Siwela, Ndukuyenkosi
- Date: 2020
- Subjects: Web-based instruction , Computer systems Organizational learning -- Zimbabwe Internet in education
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47259 , vital:39837
- Description: The purpose of this study was to develop a strategy to motivate continued usage of Learning Management Systems in higher learning institutions of Zimbabwe. A related goal was to identify unique challenges experienced by instructors in their use of LMSs. The use of LMSs is now global and has been fairly successful in developed countries even though past research shows that instructors tend to discontinue usage over a period of time. Whereas most LMSs research is carried in the context of the developed world, the candidate demonstrates that Vantankesh's IS Success Model and Davis' Technology Acceptance Model can be successfully replicated into the developing world on condition that local environment is taken into context. The results showed that LMSs in Zimbabwe higher learning institutions hold a promise of success even though challenges exist. The findings have wider implications on the need to invest in neccessary infrustructure and future predictions on learner interests. The study demonstrates that shared success can be achieved if the local conditions are taken into context when developing a strategy to motivate instructor continued LMS usage. The study holds the practical implication that institutions can motivate instructors to continue with usage of LMSs to deliver quality output in their daily duties.
- Full Text:
- Date Issued: 2020
A study of contaminants in fish in South Africa : linking science, management and society
- Authors: Ramparsad, Kerina
- Date: 2020
- Subjects: Estuarine fishes -- Contamination -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48609 , vital:40895
- Description: Contaminants in fish is a concern globally and locally. Fish have the propensity to accumulate contaminants to levels that may pose a threat to human health and disrupt ecosystem function. The purpose for investigating contaminants in this study for fish provides the public with information on the potential human health risks from the contaminated fish we consume. This study also investigated contaminants in estuarine fish and sediment, and is important to monitor as these components of ecosystems can indicate contamination in estuaries. Effective methods to determine contaminants in fish and sediment included the Direct Mercury Analyser 80 for mercury, Gas Chromatography for fatty acids and polychlorinated biphenyls and Inductively Coupled Plasma for aluminium, arsenic, cadmium, chromium, cobalt, copper, iron, lead, manganese, mercury, nickel, vanadium and zinc. Basic statistical tools, geochemical techniques, a bioaccumulation model and human health risk assessment tools provided by the United States Environmental Protection Agency were used to interpret the data. Ultimately consumption advice was developed from the risk assessment results and showed predatory fish such as swordfish and bluenose species are recommended to be avoided while yellow tail, red roman, mackerel, fish fingers and canned tuna are some of the fish that can be eaten 10-14 times per month that would not cause potential health risks. It was found that estuarine ambassid fish investigated in this study were not suitable for contaminant monitoring. There were no clear spatial and seasonal trends observed in the estuaries suggesting that ambassid fish efficiently assimilate contaminants. There was little evidence that contaminants were transferred from sediment to ambassid fish in the eThekwini estuaries. Therefore, their use is limited as a cost-effective estuarine contaminant monitoring tool. Each estuary investigated is unique and requires its own management plan.
- Full Text:
- Date Issued: 2020
- Authors: Ramparsad, Kerina
- Date: 2020
- Subjects: Estuarine fishes -- Contamination -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48609 , vital:40895
- Description: Contaminants in fish is a concern globally and locally. Fish have the propensity to accumulate contaminants to levels that may pose a threat to human health and disrupt ecosystem function. The purpose for investigating contaminants in this study for fish provides the public with information on the potential human health risks from the contaminated fish we consume. This study also investigated contaminants in estuarine fish and sediment, and is important to monitor as these components of ecosystems can indicate contamination in estuaries. Effective methods to determine contaminants in fish and sediment included the Direct Mercury Analyser 80 for mercury, Gas Chromatography for fatty acids and polychlorinated biphenyls and Inductively Coupled Plasma for aluminium, arsenic, cadmium, chromium, cobalt, copper, iron, lead, manganese, mercury, nickel, vanadium and zinc. Basic statistical tools, geochemical techniques, a bioaccumulation model and human health risk assessment tools provided by the United States Environmental Protection Agency were used to interpret the data. Ultimately consumption advice was developed from the risk assessment results and showed predatory fish such as swordfish and bluenose species are recommended to be avoided while yellow tail, red roman, mackerel, fish fingers and canned tuna are some of the fish that can be eaten 10-14 times per month that would not cause potential health risks. It was found that estuarine ambassid fish investigated in this study were not suitable for contaminant monitoring. There were no clear spatial and seasonal trends observed in the estuaries suggesting that ambassid fish efficiently assimilate contaminants. There was little evidence that contaminants were transferred from sediment to ambassid fish in the eThekwini estuaries. Therefore, their use is limited as a cost-effective estuarine contaminant monitoring tool. Each estuary investigated is unique and requires its own management plan.
- Full Text:
- Date Issued: 2020
A study on certain factors that may affect the economic viability of backgrounding beef weaner calves on pastures in the Southern Cape area of South Africa
- Authors: Terblanche, Ian
- Date: 2020
- Subjects: Calves -- Weaning -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/47623 , vital:40259
- Description: The backgrounding of beef weaner calves from pastures has the potential to be developed as an intensive beef enterprise that can increase the income of smaller farms, given that these farms have the ability to produce good quality pastures. This study was conducted to verify the inputs that impact on the viability of pasture backgrounding systems in an attempt to provide beef producers with better information for decision making. The scientific research was conducted with the registered Kromme Rhee Bonsmara herd at the Kromme Rhee research farm of the Western Cape Department of Agriculture. The farm is situated at 18º50’E and 33º51’S in the Stellenbosch area and has an altitude of 177 m above sea level. The area is situated in the winter rainfall region of the Western Cape with an annual rainfall of 670 mm. The average summer temperature ranges between 15-35 ºC and winter temperature between 10-17 ºC. The aim of this study was to develop growth curves representing the growth of Bonsmara animals for use by beef producers in predicting future live weight of animals in a pasture backgrounding system. Dry matter (DM) intake was measured at various live weight stages in order to determine whether a prediction model could be established to represent the DM intake of growing Bonsmara cattle on pastures. Results were used as inputs to determine whether backgrounding on pastures was economically viable. Animals were weighed at monthly intervals. Weighings commenced from birth and continued for a period of 797 days, repeated with two production year groups. One group consisted of 18 heifers and 12 bulls that were weighed from birth till an average age of 759 days. The other group consisted of four heifers and seven bulls and was weighed from birth untill an average age of 892 days. Roughage supplementation was done with lucerne hay in periods of pasture shortfalls, while a protein and energy lick were supplied continuously. A feeding trial with 10 weaned heifers and 10 bull calves of the same year group was conducted to determine the average feed intake per individual animal over a thirteen-month period that commenced after weaning. Two groups of five Bonsmara bull calves and two groups of five Bonsmara heifers were grouped according to age and gender. The feed intake of the growing calves was recorded for different live weight categories. The animals received lucerne (Medicago sativa) hay on an ad lib basis, while a concentrate supplement was supplied at 2 kg per animal per day up until live weights of 350 kg for heifers and 380 kg for bulls was achieved. The lucerne based diet was formulated to simulate a diet for growing animals on pasture with additional supplementation. Group feed intake values of the four groups of animals were measured at about 20-day intervals over the trial period of 369 days. The feed waste was dried and weighed back to calculate a waste percentage to be used as a correction factor. The Gompertz growth function was used to develop growth curves for male and female Bonsmara animals. Results indicated a significant difference between the mature weight of males and females (P <0.05). In both year groups the nonlinear Gompertz growth model predicted heavier mature weight for males compared to females. Mature weights of bulls were respectively 44.4% and 68.5% higher than that of heifers over the two year period. Days at maximum growth occurred later for males than for females (P <0.05) and the maturing rate of males and females did not differ significantly. Individual average feed intakes were calculated from the group fed animals over the duration of the rearing period. The data revealed that feed intake for bulls can be predicted by the linear model, DMI= 0.16531 + 0.0235306 x live weight (P ≤0.001; R 2 = 78.25). The feed intake of heifers can be predicted by the linear model, DMI= -1.41991 + 0.0283891 x live weight (P ≤0.001; R 2= 76.25). Analysis of variance detected no difference between the percentage feed intake of heifers (2.46%) and bulls (2.40%), over the experimental period. Prices of different live weight groupings were analysed over seven years to establish whether cyclical price trends can be observed across years and seasonal price trends within years. Within years prices were found to differ between months. For all calf weight groups, the lowest prices occurred in the months of March, April, May, June and July which showed price indices significantly different (P <0.05) from indices of the months of October, November and December when highest prices occurred, confirming seasonality in weaner calf prices. Price indices were developed for use as an input in the economic viability assessment. A brief literature review on the production and quality of four common pastures in the Southern Cape was done to gather information for compiling pasture budgets for use in determining the economic viability of pasture backgrounding. The economic viability of backgrounding on pastures was evaluated on a gross margin level and illustrated for three pasture systems namely irrigated oats as a winter pasture, irrigated lucerne as a spring pasture and dryland P. clandestinum /E. plana /mixed grass also as a low-cost spring pasture. All three pasture systems showed a positive economic viability for the decision parameters used in the illustration. The gross margin of backgrounding on the oats pasture system was more sensitive to a small decrease in the predicted price or the predicted live weight and therefore a riskier option than backgrounding on the other two systems. Outputs from the gross margin analyses were used in partial budgeting to illustrate a robust decision support framework that beef farmers can use for making decisions whether to sell weaners straight after weaning as opposed to selling after a period of backgrounding on pastures. Overall results indicate that backgrounding of calves on pastures has the potential to be a viable beef enterprise on smaller farms in the region. Keywords: beef production; Gompertz growth curves, feed intake; pasture backgrounding; gross margin; partial budgets.
- Full Text:
- Date Issued: 2020
- Authors: Terblanche, Ian
- Date: 2020
- Subjects: Calves -- Weaning -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/47623 , vital:40259
- Description: The backgrounding of beef weaner calves from pastures has the potential to be developed as an intensive beef enterprise that can increase the income of smaller farms, given that these farms have the ability to produce good quality pastures. This study was conducted to verify the inputs that impact on the viability of pasture backgrounding systems in an attempt to provide beef producers with better information for decision making. The scientific research was conducted with the registered Kromme Rhee Bonsmara herd at the Kromme Rhee research farm of the Western Cape Department of Agriculture. The farm is situated at 18º50’E and 33º51’S in the Stellenbosch area and has an altitude of 177 m above sea level. The area is situated in the winter rainfall region of the Western Cape with an annual rainfall of 670 mm. The average summer temperature ranges between 15-35 ºC and winter temperature between 10-17 ºC. The aim of this study was to develop growth curves representing the growth of Bonsmara animals for use by beef producers in predicting future live weight of animals in a pasture backgrounding system. Dry matter (DM) intake was measured at various live weight stages in order to determine whether a prediction model could be established to represent the DM intake of growing Bonsmara cattle on pastures. Results were used as inputs to determine whether backgrounding on pastures was economically viable. Animals were weighed at monthly intervals. Weighings commenced from birth and continued for a period of 797 days, repeated with two production year groups. One group consisted of 18 heifers and 12 bulls that were weighed from birth till an average age of 759 days. The other group consisted of four heifers and seven bulls and was weighed from birth untill an average age of 892 days. Roughage supplementation was done with lucerne hay in periods of pasture shortfalls, while a protein and energy lick were supplied continuously. A feeding trial with 10 weaned heifers and 10 bull calves of the same year group was conducted to determine the average feed intake per individual animal over a thirteen-month period that commenced after weaning. Two groups of five Bonsmara bull calves and two groups of five Bonsmara heifers were grouped according to age and gender. The feed intake of the growing calves was recorded for different live weight categories. The animals received lucerne (Medicago sativa) hay on an ad lib basis, while a concentrate supplement was supplied at 2 kg per animal per day up until live weights of 350 kg for heifers and 380 kg for bulls was achieved. The lucerne based diet was formulated to simulate a diet for growing animals on pasture with additional supplementation. Group feed intake values of the four groups of animals were measured at about 20-day intervals over the trial period of 369 days. The feed waste was dried and weighed back to calculate a waste percentage to be used as a correction factor. The Gompertz growth function was used to develop growth curves for male and female Bonsmara animals. Results indicated a significant difference between the mature weight of males and females (P <0.05). In both year groups the nonlinear Gompertz growth model predicted heavier mature weight for males compared to females. Mature weights of bulls were respectively 44.4% and 68.5% higher than that of heifers over the two year period. Days at maximum growth occurred later for males than for females (P <0.05) and the maturing rate of males and females did not differ significantly. Individual average feed intakes were calculated from the group fed animals over the duration of the rearing period. The data revealed that feed intake for bulls can be predicted by the linear model, DMI= 0.16531 + 0.0235306 x live weight (P ≤0.001; R 2 = 78.25). The feed intake of heifers can be predicted by the linear model, DMI= -1.41991 + 0.0283891 x live weight (P ≤0.001; R 2= 76.25). Analysis of variance detected no difference between the percentage feed intake of heifers (2.46%) and bulls (2.40%), over the experimental period. Prices of different live weight groupings were analysed over seven years to establish whether cyclical price trends can be observed across years and seasonal price trends within years. Within years prices were found to differ between months. For all calf weight groups, the lowest prices occurred in the months of March, April, May, June and July which showed price indices significantly different (P <0.05) from indices of the months of October, November and December when highest prices occurred, confirming seasonality in weaner calf prices. Price indices were developed for use as an input in the economic viability assessment. A brief literature review on the production and quality of four common pastures in the Southern Cape was done to gather information for compiling pasture budgets for use in determining the economic viability of pasture backgrounding. The economic viability of backgrounding on pastures was evaluated on a gross margin level and illustrated for three pasture systems namely irrigated oats as a winter pasture, irrigated lucerne as a spring pasture and dryland P. clandestinum /E. plana /mixed grass also as a low-cost spring pasture. All three pasture systems showed a positive economic viability for the decision parameters used in the illustration. The gross margin of backgrounding on the oats pasture system was more sensitive to a small decrease in the predicted price or the predicted live weight and therefore a riskier option than backgrounding on the other two systems. Outputs from the gross margin analyses were used in partial budgeting to illustrate a robust decision support framework that beef farmers can use for making decisions whether to sell weaners straight after weaning as opposed to selling after a period of backgrounding on pastures. Overall results indicate that backgrounding of calves on pastures has the potential to be a viable beef enterprise on smaller farms in the region. Keywords: beef production; Gompertz growth curves, feed intake; pasture backgrounding; gross margin; partial budgets.
- Full Text:
- Date Issued: 2020
A stunting profile of children under the age of five visiting Bhisho hospital clinic, part of the umbrella project: a profile of stunting in children under the age of five in food insecure villages in Mqanduli, Ngqushwa and Bhisho hospital, Eastern Cape, South Africa
- Authors: Beyleveld, Janine
- Date: 2020
- Subjects: Children -- growth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/50201 , vital:42066
- Description: Introduction and Background: Stunting is the most prevalent form of childhood malnutrition where about 149 million children under the age of five can be classified as stunted globally. South Africa has one of the highest stunting rates in the world at 27%, causing devastating effects on economic productivity as well as on an individual’s nutritional status. The presence of stunted growth in children is a strong indicator of chronic undernutrition and highlights injustices experienced within communities. Aims and Objectives: The aim of this study is to develop a stunning profile of children under the age of five, visiting BhishoHospital’s gateway clinic in the Eastern Cape, South Africa. The objectives were to determine the prevalence of stunting of the children visiting Bhisho Hospital’s clinic and to identify the drivers of stunting in the area. Methodology: A quantitative study with a descriptive, cross-sectional design was used. The study population included all children under the age of five visiting Bhisho Hospital’s clinic. Data was collected by means of an interview-administered questionnaire. Results: The prevalence of stunting in the area was 47.5%. A significant association was found between the participants' main form of sanitation and stunting category in the group of infants younger than six months (p = 0.007) and the group older than six months(p = 0.040). Discussion: The prevalence of stunting in the area was far higher than the national average of 27%, although the majority of the sample had a normal weight. The use of non-flush toilets was found to be a risk factor for childhood stunting. Recommendation: Financial and political investment in child health needs to be placed as a top priority in South Africa to reduce stunting rates.
- Full Text:
- Date Issued: 2020
- Authors: Beyleveld, Janine
- Date: 2020
- Subjects: Children -- growth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/50201 , vital:42066
- Description: Introduction and Background: Stunting is the most prevalent form of childhood malnutrition where about 149 million children under the age of five can be classified as stunted globally. South Africa has one of the highest stunting rates in the world at 27%, causing devastating effects on economic productivity as well as on an individual’s nutritional status. The presence of stunted growth in children is a strong indicator of chronic undernutrition and highlights injustices experienced within communities. Aims and Objectives: The aim of this study is to develop a stunning profile of children under the age of five, visiting BhishoHospital’s gateway clinic in the Eastern Cape, South Africa. The objectives were to determine the prevalence of stunting of the children visiting Bhisho Hospital’s clinic and to identify the drivers of stunting in the area. Methodology: A quantitative study with a descriptive, cross-sectional design was used. The study population included all children under the age of five visiting Bhisho Hospital’s clinic. Data was collected by means of an interview-administered questionnaire. Results: The prevalence of stunting in the area was 47.5%. A significant association was found between the participants' main form of sanitation and stunting category in the group of infants younger than six months (p = 0.007) and the group older than six months(p = 0.040). Discussion: The prevalence of stunting in the area was far higher than the national average of 27%, although the majority of the sample had a normal weight. The use of non-flush toilets was found to be a risk factor for childhood stunting. Recommendation: Financial and political investment in child health needs to be placed as a top priority in South Africa to reduce stunting rates.
- Full Text:
- Date Issued: 2020
A trade union’s right to strike to acquire organisational rights
- Authors: Bebula, Vitamin Luxolo
- Date: 2020
- Subjects: Labor unions -- Law and legislation -- South Africa , Industrial relations -- South Africa South Africa -- Labour Relations Act -- 1995
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: http://hdl.handle.net/10948/48949 , vital:41565
- Description: Chapter II of the Labour Relations Act (LRA) entrenches the right to freedom of association. Section 1(c) of the LRA outlines the purpose of this Act as to provide a collective bargaining framework to determine wages, terms and conditions of employment, and matters of mutual interest by the employees and their unions and employers and employer’s organisation. Under this chapter, section (1)3 of the LRA confers the right to an employee to join a trade union, form or participate in forming a trade union or federation of trade unions. The member of a trade union has a right to participate in the lawful activities of his or her union. Regarding freedom of association, the new government took a commitment to uphold international labour standards and promised to submit to International Labour Organisation (ILO) Conventions on freedom of association and collective bargaining to parliament for ratification. In 1992 some provision of the previous Labour Relations Act was declared by ILO’s FFCC as incompatible with the freedom of association. The convention affords the workers and employers the right to establish and join organisations and federations of their own choice. The ILO also protects the right to collective bargaining. The convention also confers the right to provision of facilities to worker’s representatives for prompt and effective conduction of their activities.
- Full Text:
- Date Issued: 2020
- Authors: Bebula, Vitamin Luxolo
- Date: 2020
- Subjects: Labor unions -- Law and legislation -- South Africa , Industrial relations -- South Africa South Africa -- Labour Relations Act -- 1995
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: http://hdl.handle.net/10948/48949 , vital:41565
- Description: Chapter II of the Labour Relations Act (LRA) entrenches the right to freedom of association. Section 1(c) of the LRA outlines the purpose of this Act as to provide a collective bargaining framework to determine wages, terms and conditions of employment, and matters of mutual interest by the employees and their unions and employers and employer’s organisation. Under this chapter, section (1)3 of the LRA confers the right to an employee to join a trade union, form or participate in forming a trade union or federation of trade unions. The member of a trade union has a right to participate in the lawful activities of his or her union. Regarding freedom of association, the new government took a commitment to uphold international labour standards and promised to submit to International Labour Organisation (ILO) Conventions on freedom of association and collective bargaining to parliament for ratification. In 1992 some provision of the previous Labour Relations Act was declared by ILO’s FFCC as incompatible with the freedom of association. The convention affords the workers and employers the right to establish and join organisations and federations of their own choice. The ILO also protects the right to collective bargaining. The convention also confers the right to provision of facilities to worker’s representatives for prompt and effective conduction of their activities.
- Full Text:
- Date Issued: 2020