A critical analysis of performance management within the manufacturing division at Continental Tyre South Africa
- Authors: Dowling, Jurgen
- Date: 2007
- Subjects: Performance -- Management , Continental Tyre South Africa (Firm)
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8556 , http://hdl.handle.net/10948/497 , Performance -- Management , Continental Tyre South Africa (Firm)
- Description: Many companies have performance management systems that incorporate financial and non-financial measurements. All organisations have financial and non-financial measures. However, many use their non-financial measures for local improvements at their front-line and customer-facing operations. Performance management is a shared process between managers and the individuals and teams they manage. It is based on the agreement of objectives, knowledge, skill and competence requirements and work and development plans. The Balanced Scorecard includes financial measures that reflect the results of actions already taken, complementing the financial measures with operational measures on customer satisfaction, internal processes, and the organisations innovative and improvement activities. The Balanced Scorecard combines both quantitative and qualitative measures, acknowledge the expectations of different stakeholders and relate an assessment of performance to choice of strategy. The objective of this study was to assess current performance management that is applied within the manufacturing division at Continental Tyre South Africa. To achieve this objective, a comprehensive literature study was performed on performance management and The Balanced Scorecard. A questionnaire was designed based on the guidelines in the literature study in order to establish the extent to which Continental Tyre South Africa manages performance. The researcher used the random sampling method of selection and distributed the questionnaire to 120 potential respondents via electronic mail and physically. Seventy seven completed questionnaires were returned and these were processed and analysed using Microsoft Office Excel 2003, iii running on the Windows XP suite of computer packages. The opinions of the various respondents were compared with the guidelines provided in the literature survey in order to identify shortcomings of performance management and the achievement of individual and departmental objectives within the manufacturing division at Continental Tyre South Africa. The following main recommendations were made: Continental Tyre South Africa should continue with the sharing of its strategic objectives with management and staff, and must ensure that these objectives are also shared all the way down to the shop floor; It is imperative that management and staff mutually agree on performance objectives for the individuals; Senior management must measure management and staff on how well they performance manage their direct reports and develop people where performance short-comings exist; It is imperative that management and staff undergo performance management training; Management must ensure that there current performance management system incorporates a method to distinguish between top and poor performers; and, It is advisable that senior management consider a mechanism that rewards top performers.
- Full Text:
- Date Issued: 2007
- Authors: Dowling, Jurgen
- Date: 2007
- Subjects: Performance -- Management , Continental Tyre South Africa (Firm)
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8556 , http://hdl.handle.net/10948/497 , Performance -- Management , Continental Tyre South Africa (Firm)
- Description: Many companies have performance management systems that incorporate financial and non-financial measurements. All organisations have financial and non-financial measures. However, many use their non-financial measures for local improvements at their front-line and customer-facing operations. Performance management is a shared process between managers and the individuals and teams they manage. It is based on the agreement of objectives, knowledge, skill and competence requirements and work and development plans. The Balanced Scorecard includes financial measures that reflect the results of actions already taken, complementing the financial measures with operational measures on customer satisfaction, internal processes, and the organisations innovative and improvement activities. The Balanced Scorecard combines both quantitative and qualitative measures, acknowledge the expectations of different stakeholders and relate an assessment of performance to choice of strategy. The objective of this study was to assess current performance management that is applied within the manufacturing division at Continental Tyre South Africa. To achieve this objective, a comprehensive literature study was performed on performance management and The Balanced Scorecard. A questionnaire was designed based on the guidelines in the literature study in order to establish the extent to which Continental Tyre South Africa manages performance. The researcher used the random sampling method of selection and distributed the questionnaire to 120 potential respondents via electronic mail and physically. Seventy seven completed questionnaires were returned and these were processed and analysed using Microsoft Office Excel 2003, iii running on the Windows XP suite of computer packages. The opinions of the various respondents were compared with the guidelines provided in the literature survey in order to identify shortcomings of performance management and the achievement of individual and departmental objectives within the manufacturing division at Continental Tyre South Africa. The following main recommendations were made: Continental Tyre South Africa should continue with the sharing of its strategic objectives with management and staff, and must ensure that these objectives are also shared all the way down to the shop floor; It is imperative that management and staff mutually agree on performance objectives for the individuals; Senior management must measure management and staff on how well they performance manage their direct reports and develop people where performance short-comings exist; It is imperative that management and staff undergo performance management training; Management must ensure that there current performance management system incorporates a method to distinguish between top and poor performers; and, It is advisable that senior management consider a mechanism that rewards top performers.
- Full Text:
- Date Issued: 2007
A critical assessement of socially responsible investing in South Africa
- Authors: Viviers, Suzette
- Date: 2007
- Subjects: Investments -- Moral and ethical aspects
- Language: English
- Type: Thesis , Doctoral , DCom
- Identifier: vital:9293 , http://hdl.handle.net/10948/637 , http://hdl.handle.net/10948/d1011340 , Investments -- Moral and ethical aspects
- Description: This research deals with socially responsible investing (SRI) in its broadest context in South Africa and includes an analysis of the risk-adjusted performance of local SRI funds. SRI refers to an investment strategy whereby investors integrate moral as well as environmental, social and governance (ESG) considerations alongside conventional financial criteria in evaluating investment opportunities. Typical SRI strategies include screening, shareholder activism and cause-based (targeted) investing. The primary objective of this research was to obtain a deeper understanding of SRI in South Africa as it represents a powerful means whereby private sector capital can be channelled into areas of national priority. Data and methodological triangulation strategies were adopted to investigate the research problem, respond to the research questions and test the research hypotheses of this study. The phenomenological component of the research consisted of an extensive literature review as well as in-depth, face-to-face interviews conducted with twelve SRI fund managers and industry experts. The positivistic dimension of this research centred on the construction of the first complete database of SRI funds in South Africa, the sourcing of quantitative primary data and the testing of eight pairs of null and alternative hypotheses. Risk-adjusted performance was evaluated by means of the Sharpe, Sortino and Upside-potential ratios during three sub-periods, namely 1 June 1992 to 31 August 1998, 1 September 1998 to 31 March 2002 and 1 April 2002 to 31 March 2006. Forty-three SRI funds have been launched in South Africa since June 1992 and it is estimated that SRIs constitute approximately 0.7 percent of the total investment capacity in the country. It was found that most local SRI funds combine a cause-based investment strategy with a positive or best-of-sector screening approach. ESG screens were found to focus on the promotion of broad-based Black Economic Empowerment and the development of social infrastructure in South Africa. The FTSE/JSE SRI Index and the Financial Sector Charter were identified as the most prominent drivers of SRI in South Africa, whereas a lack of skills and a shortage of new SRI opportunities, asset classes and funds were seen as impediments to the growth of the local SRI sector. The empirical evidence shows that: - local SRI funds underperformed relative to their respective benchmark indices during the first two sub-periods but significantly outperformed them during sub-period three (the resurgence period of SRI in South Africa); - local SRI fund performance is not significantly different from that of a matched sample of conventional (non-SRI) funds; and - local SRI funds significantly underperformed relative to the general equity market in South Africa during sub-period two (the decline period of SRI in South Africa) but performed on a par with the FTSE/JSE All Share Index during sub-periods one and two. The findings of this research therefore suggest that investors can consider SRI funds as part of a well-diversified investment strategy. It is strongly recommended that a Social Investment Forum be established in South Africa to address the educational needs of stakeholders in the local SRI sector. It is also recommended that local asset managers adopt a focused differentiation strategy to take advantage of the growing SRI sector in South Africa.
- Full Text:
- Date Issued: 2007
- Authors: Viviers, Suzette
- Date: 2007
- Subjects: Investments -- Moral and ethical aspects
- Language: English
- Type: Thesis , Doctoral , DCom
- Identifier: vital:9293 , http://hdl.handle.net/10948/637 , http://hdl.handle.net/10948/d1011340 , Investments -- Moral and ethical aspects
- Description: This research deals with socially responsible investing (SRI) in its broadest context in South Africa and includes an analysis of the risk-adjusted performance of local SRI funds. SRI refers to an investment strategy whereby investors integrate moral as well as environmental, social and governance (ESG) considerations alongside conventional financial criteria in evaluating investment opportunities. Typical SRI strategies include screening, shareholder activism and cause-based (targeted) investing. The primary objective of this research was to obtain a deeper understanding of SRI in South Africa as it represents a powerful means whereby private sector capital can be channelled into areas of national priority. Data and methodological triangulation strategies were adopted to investigate the research problem, respond to the research questions and test the research hypotheses of this study. The phenomenological component of the research consisted of an extensive literature review as well as in-depth, face-to-face interviews conducted with twelve SRI fund managers and industry experts. The positivistic dimension of this research centred on the construction of the first complete database of SRI funds in South Africa, the sourcing of quantitative primary data and the testing of eight pairs of null and alternative hypotheses. Risk-adjusted performance was evaluated by means of the Sharpe, Sortino and Upside-potential ratios during three sub-periods, namely 1 June 1992 to 31 August 1998, 1 September 1998 to 31 March 2002 and 1 April 2002 to 31 March 2006. Forty-three SRI funds have been launched in South Africa since June 1992 and it is estimated that SRIs constitute approximately 0.7 percent of the total investment capacity in the country. It was found that most local SRI funds combine a cause-based investment strategy with a positive or best-of-sector screening approach. ESG screens were found to focus on the promotion of broad-based Black Economic Empowerment and the development of social infrastructure in South Africa. The FTSE/JSE SRI Index and the Financial Sector Charter were identified as the most prominent drivers of SRI in South Africa, whereas a lack of skills and a shortage of new SRI opportunities, asset classes and funds were seen as impediments to the growth of the local SRI sector. The empirical evidence shows that: - local SRI funds underperformed relative to their respective benchmark indices during the first two sub-periods but significantly outperformed them during sub-period three (the resurgence period of SRI in South Africa); - local SRI fund performance is not significantly different from that of a matched sample of conventional (non-SRI) funds; and - local SRI funds significantly underperformed relative to the general equity market in South Africa during sub-period two (the decline period of SRI in South Africa) but performed on a par with the FTSE/JSE All Share Index during sub-periods one and two. The findings of this research therefore suggest that investors can consider SRI funds as part of a well-diversified investment strategy. It is strongly recommended that a Social Investment Forum be established in South Africa to address the educational needs of stakeholders in the local SRI sector. It is also recommended that local asset managers adopt a focused differentiation strategy to take advantage of the growing SRI sector in South Africa.
- Full Text:
- Date Issued: 2007
A critical ethnographic study of report writing as a literacy practice by automotive engineers
- Authors: Harran, Marcelle
- Date: 2007
- Subjects: English language -- Written English -- South Africa Written communication -- South Africa Literacy -- Social aspects -- South Africa Engineers -- Language -- South Africa Communication in engineering -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1476 , http://hdl.handle.net/10962/d1003357
- Description: This study describes the social practices involved in the situated activity of report writing in an engineering automotive discourse community in South Africa. In particular, the study focuses on the subjectivity of predominantly English Second Language (ESL) engineers writing reports by determining what literacy means to them and what meanings they give to dominant literacy practices in report writing, especially feedback in text production. In the South African engineering workplace, because of the diversity and complexity of language and identity issues, the appropriation of the required literacy skills tends to be multifaceted. This context is made more complex as English is the business language upon which engineering is based with engineering competence often related to English proficiency. Therefore, the study is located within the understanding that literacy is always situated within specific discoursal practices whose ideologies, beliefs, power relations, values and identities are manifested rhetorically. The basis for this critical theory of literacy is the assertion that literacy is a social practice which involves not only observable units of behaviour but values, attitudes, feelings and social relationships. As the institution’s socio-cultural context in the form of embedded historical and institutional forces impact on writer identity and writing practices or ways of doing report writing, notions of writing as a transparent and autonomous system are also challenged. As critical ethnography is concerned with multiple perspectives, it was selected as the preferred methodology and critical realism to derive definitions of truth and validity. Critical ethnography explores cultural orientations of local practice contexts and incorporates multiple understandings providing a holistic understanding of the complexity of writing practices. As human experience can only be known under particular descriptions, usually in terms of available discourses such as language, writing and rhetoric, the dominant practices emerging in response to the report acceptance event are explored, especially that of supervisor feedback practices as they causally impact on report-writing practices during the practice of report acceptance. Although critical realism does not necessarily demonstrate successful causal explanations, it does look for substantial relations within wider contexts to illuminate part-whole relationships. Therefore, an attempt is made to find representativeness or fit with situated engineering literacy practices and wider and changing literacy contexts, especially the impact of Higher Education and world Englishes as well as the expanding influence of technological and digital systems on report-writing practices.
- Full Text:
- Date Issued: 2007
- Authors: Harran, Marcelle
- Date: 2007
- Subjects: English language -- Written English -- South Africa Written communication -- South Africa Literacy -- Social aspects -- South Africa Engineers -- Language -- South Africa Communication in engineering -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1476 , http://hdl.handle.net/10962/d1003357
- Description: This study describes the social practices involved in the situated activity of report writing in an engineering automotive discourse community in South Africa. In particular, the study focuses on the subjectivity of predominantly English Second Language (ESL) engineers writing reports by determining what literacy means to them and what meanings they give to dominant literacy practices in report writing, especially feedback in text production. In the South African engineering workplace, because of the diversity and complexity of language and identity issues, the appropriation of the required literacy skills tends to be multifaceted. This context is made more complex as English is the business language upon which engineering is based with engineering competence often related to English proficiency. Therefore, the study is located within the understanding that literacy is always situated within specific discoursal practices whose ideologies, beliefs, power relations, values and identities are manifested rhetorically. The basis for this critical theory of literacy is the assertion that literacy is a social practice which involves not only observable units of behaviour but values, attitudes, feelings and social relationships. As the institution’s socio-cultural context in the form of embedded historical and institutional forces impact on writer identity and writing practices or ways of doing report writing, notions of writing as a transparent and autonomous system are also challenged. As critical ethnography is concerned with multiple perspectives, it was selected as the preferred methodology and critical realism to derive definitions of truth and validity. Critical ethnography explores cultural orientations of local practice contexts and incorporates multiple understandings providing a holistic understanding of the complexity of writing practices. As human experience can only be known under particular descriptions, usually in terms of available discourses such as language, writing and rhetoric, the dominant practices emerging in response to the report acceptance event are explored, especially that of supervisor feedback practices as they causally impact on report-writing practices during the practice of report acceptance. Although critical realism does not necessarily demonstrate successful causal explanations, it does look for substantial relations within wider contexts to illuminate part-whole relationships. Therefore, an attempt is made to find representativeness or fit with situated engineering literacy practices and wider and changing literacy contexts, especially the impact of Higher Education and world Englishes as well as the expanding influence of technological and digital systems on report-writing practices.
- Full Text:
- Date Issued: 2007
A critical review of the IFIP TC11 Security Conference Series
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
A Digital Forensic investigative model for business organisations
- Forrester, Jock, Irwin, Barry V W
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430078 , vital:72664 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228783555_A_Digital_Forensic_investigative_model_for_business_organisations/links/53e9c5e80cf28f342f414987/A-Digital-Forensic-investigative-model-for-business-organisations.pdf
- Description: When a digital incident occurs there are generally three courses of ac-tions that are taken, generally dependant on the type of organisation within which the incident occurs, or which is responding the event. In the case of law enforcement the priority is to secure the crime scene, followed by the identification of evidentiary sources which should be dispatched to a specialist laboratory for analysis. In the case of an inci-dent military (or similar critical infrastructures) infrastructure the primary goal becomes one of risk identification and elimination, followed by re-covery and possible offensive measures. Where financial impact is caused by an incident, and revenue earning potential is adversely af-fected, as in the case of most commercial organisations), root cause analysis, and system remediation is of primary concern, with in-depth analysis of the how and why left until systems have been restored.
- Full Text:
- Date Issued: 2007
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430078 , vital:72664 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228783555_A_Digital_Forensic_investigative_model_for_business_organisations/links/53e9c5e80cf28f342f414987/A-Digital-Forensic-investigative-model-for-business-organisations.pdf
- Description: When a digital incident occurs there are generally three courses of ac-tions that are taken, generally dependant on the type of organisation within which the incident occurs, or which is responding the event. In the case of law enforcement the priority is to secure the crime scene, followed by the identification of evidentiary sources which should be dispatched to a specialist laboratory for analysis. In the case of an inci-dent military (or similar critical infrastructures) infrastructure the primary goal becomes one of risk identification and elimination, followed by re-covery and possible offensive measures. Where financial impact is caused by an incident, and revenue earning potential is adversely af-fected, as in the case of most commercial organisations), root cause analysis, and system remediation is of primary concern, with in-depth analysis of the how and why left until systems have been restored.
- Full Text:
- Date Issued: 2007
A drug utilisation review of Isotretinoin in the management of acne
- Authors: Burger, Solé
- Date: 2007
- Subjects: Acne -- Treatment , Isotretinoin
- Language: English
- Type: Thesis , Masters , MPharm
- Identifier: vital:10147 , http://hdl.handle.net/10948/673 , Acne -- Treatment , Isotretinoin
- Description: Acne is a common, chronic disorder that affects many adolescents. The most effective acne medication is systemic isotretinoin. It provides a permanent cure for many patients, but has various side effects. A South African Acne Treatment Guideline was introduced in 2005. Adherence to this guideline could lead to safer, more effective acne management. The primary aim of this study was to investigate the appropriateness of medications prescribed in the treatment of acne in South Africa, and to evaluate the safety and efficacy of systemic isotretinoin utilised by patients in the Nelson Mandela Metropole (NMM). A drug utilisation study (including 18 803 South African acne patients’ chronic prescription data between 2000 and 2005) and a patient questionnaire survey (including information from 57 patients in the NMM who used systemic isotretinoin) were conducted. Basic descriptive and interferential statistics were calculated. The drug utilisation study revealed that systemic antibiotics were the acne treatment prescribed to most (43.3 percent) patients, followed by 42.1 percent of patients on systemic isotretinoin, 33.2 percent on hormonal therapy and 18.9 percent on topical therapy. Topical retinoids were underused. The questionnaire survey indicated a lack of compliance by prescribers with guideline recommendations regarding the prescription (and accompanying counselling and monitoring) of isotretinoin. Incorrect cumulative doses were frequently prescribed, and a lack of proper implementation of pregnancy prevention measures was evident. The majority of isotretinoin patients reported a high efficacy of isotretinoin in clearing their acne.
- Full Text:
- Date Issued: 2007
- Authors: Burger, Solé
- Date: 2007
- Subjects: Acne -- Treatment , Isotretinoin
- Language: English
- Type: Thesis , Masters , MPharm
- Identifier: vital:10147 , http://hdl.handle.net/10948/673 , Acne -- Treatment , Isotretinoin
- Description: Acne is a common, chronic disorder that affects many adolescents. The most effective acne medication is systemic isotretinoin. It provides a permanent cure for many patients, but has various side effects. A South African Acne Treatment Guideline was introduced in 2005. Adherence to this guideline could lead to safer, more effective acne management. The primary aim of this study was to investigate the appropriateness of medications prescribed in the treatment of acne in South Africa, and to evaluate the safety and efficacy of systemic isotretinoin utilised by patients in the Nelson Mandela Metropole (NMM). A drug utilisation study (including 18 803 South African acne patients’ chronic prescription data between 2000 and 2005) and a patient questionnaire survey (including information from 57 patients in the NMM who used systemic isotretinoin) were conducted. Basic descriptive and interferential statistics were calculated. The drug utilisation study revealed that systemic antibiotics were the acne treatment prescribed to most (43.3 percent) patients, followed by 42.1 percent of patients on systemic isotretinoin, 33.2 percent on hormonal therapy and 18.9 percent on topical therapy. Topical retinoids were underused. The questionnaire survey indicated a lack of compliance by prescribers with guideline recommendations regarding the prescription (and accompanying counselling and monitoring) of isotretinoin. Incorrect cumulative doses were frequently prescribed, and a lack of proper implementation of pregnancy prevention measures was evident. The majority of isotretinoin patients reported a high efficacy of isotretinoin in clearing their acne.
- Full Text:
- Date Issued: 2007
A feasibility study for improving Uganda's water to drinkable standards: lessons from Kampala
- Authors: Wasswa, Francis
- Date: 2007
- Subjects: Water quality -- Uganda , Groundwater -- Uganda , Water-supply, Rural -- Uganda
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:9007 , http://hdl.handle.net/10948/802 , http://hdl.handle.net/10948/d1012068 , Water quality -- Uganda , Groundwater -- Uganda , Water-supply, Rural -- Uganda
- Description: An enthusiastic global campaign on intervention in water in the Lower Income Countries (LICs) was launched by the UN at the International Conference on Water and the Environment (ICEW), in Rio de Janerio, in January of 1992. In June of the same year, in Dublin, a plan of action was devised and a commitment to the water related goals highlighted in Rio de Janerio was made. Close to fifteen years on, there is little to show by way of success in the intended countries. Over 1.1 billion people in the LICs lack safe water. The direct impact of this is a higher risk of waterborne diseases. The waterborne diseases claim 42,000 lives every week in the LICs. By any standards this is a serious depletion of the human capital stock. Looked at in light of the fact that these countries still heavily rely on labour in production, amplifies the need to preserve health. The inherent danger posed by the poor quality water‐ as can be drawn from the above statistics‐ seems to suggest that improving the quality of water would go a long way in improving and preserving societal health in the LICs. By implication this would improve the productivity of the workers. Other benefits include cost mitigation, improved investor confidence as well as increased tourists’ confidence‐ all of which are vital for LICs’ growth prospects. It begs the question of why these countries have not improved their water quality. With specific reference made to Uganda, this research is bent on answering this question. In Uganda, there is consensus among scientists that the ground and open water sources are degraded to dangerous levels. Water quality parameters like turbidity, coliform count, and colour are all above the WHO minimum specifications for potable water and are on the rise in the country. This is indicative of water quality deterioration and it heightens the risk of waterborne diseases to the users. The waterborne burden of disease in Uganda is on the rise with a high fatality rate of 440 lives every week. The need to improve water quality in the country has been acknowledged. However, attempts to address the problem have only been undertaken on a small scale, most notable of these being the PuR home water treatment vii program. There is evidence in the country that the water quality would have apparent benefits. Strong correlations have been found between improved health in HIV patients and improved water quality in the country. In the economics of health, improving societal health inherently improves workers’ performance and productivity, leading to higher growth of the economy. There is an economic imperative therefore, as to why countries like Uganda should improve their water quality. In spite of this, even the country’s most urbanized setting‐ Kampala‐ lacks potable water. This study therefore investigates why, in a time when not only the global agenda is more supportive than ever and when the country’s water resources have been found to be risky to use, Uganda has not improved water quality. Kampala is used as the model district for this study. The district accounts for three quarters of users of treated water in the country. The problem is investigated by assessing the efficiency case of such a project (a water quality improving project) in the country; the methodology employed to this end is the Cost Benefit Analysis (CBA). The methodology compares the costs and benefits of a project, in monetary terms, in the same analysis, over its useful life. In the application of CBA one allows for the time value of money by using the discount rate to make the costs and benefits of the project occurring in different years comparable. In principle, the methodology is simple to apply‐ only that issues arise in the quantification of benefits and the determination of the discount rate. Benefits of the Kampala water quality, improving project include non‐market values and for this reason a non‐market valuation technique, the Contingent Valuation Method (CVM), was employed in their quantification. The CVM technique estimates the benefits by measuring the individuals’ willingness to pay for the improved scenario‐ in this case the scenario was one with a water quality‐improving project. The application of the CVM across many disciplines has invited a lot of criticism over the reliability of its estimates as a measure of value. A panel assembled by the North Oceanic and Atmospheric Administration (NOAA) to investigate the reliability of the CVM resolved that as long as the CVM was well conducted, the generated results would reliably predict non‐market values. The Kampala CVM, for the benefits’ quantification, was conducted with the NOAA guidelines in mind. The final value of the project’s benefits was the WTP predicted for the viii median respondent namely Ushs 385.07/= per cubic meter of water. The discount rate was deemed to be the social opportunity cost of capital in the country, viz 12 percent, this being that rate of return foregone by investing in another sector. The project’s costs were arrived at through liaison with water engineers and consulting past data from Uganda’s Water suppliers. From this, the project’s fixed costs were predicted to be Ushs 1451/= per cubic meter of water and the operation and maintenance costs predicted to be Ushs 591.7/= per cubic meter of water. The project’s useful life was deemed to be the average life of a Ugandan, namely 52 years; this choice reflecting the belief that the benefits would last over the users’ whole life. The results of the Kampala water quality‐improving project indicate that the project would not be feasible. It did not matter what discount rate one employed, the project’s operating and maintenance (OM) costs exceed the benefits. The results offer an indication as to why water quality has not been improved in Uganda‐ because the paying population is unwilling to pay for the entire cost of the project. This deduction is not to suggest that the users do not recognize the benefits of the project. The unpleasant truth is that the users’ incomes are typically stretched so thin by other demands that a decision to make more deductions from these incomes is not an inviting one. However, there is a need to improve water quality in LICs like Uganda, as can be deduced from the analysis of the risks of not doing so and benefits of doing so. Accordingly, such projects have to be funded by mechanism that does not require the users to cover the whole cost, but only part of such a cost, with the remainder from other sources like NGOs and foreign aid.
- Full Text:
- Date Issued: 2007
- Authors: Wasswa, Francis
- Date: 2007
- Subjects: Water quality -- Uganda , Groundwater -- Uganda , Water-supply, Rural -- Uganda
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:9007 , http://hdl.handle.net/10948/802 , http://hdl.handle.net/10948/d1012068 , Water quality -- Uganda , Groundwater -- Uganda , Water-supply, Rural -- Uganda
- Description: An enthusiastic global campaign on intervention in water in the Lower Income Countries (LICs) was launched by the UN at the International Conference on Water and the Environment (ICEW), in Rio de Janerio, in January of 1992. In June of the same year, in Dublin, a plan of action was devised and a commitment to the water related goals highlighted in Rio de Janerio was made. Close to fifteen years on, there is little to show by way of success in the intended countries. Over 1.1 billion people in the LICs lack safe water. The direct impact of this is a higher risk of waterborne diseases. The waterborne diseases claim 42,000 lives every week in the LICs. By any standards this is a serious depletion of the human capital stock. Looked at in light of the fact that these countries still heavily rely on labour in production, amplifies the need to preserve health. The inherent danger posed by the poor quality water‐ as can be drawn from the above statistics‐ seems to suggest that improving the quality of water would go a long way in improving and preserving societal health in the LICs. By implication this would improve the productivity of the workers. Other benefits include cost mitigation, improved investor confidence as well as increased tourists’ confidence‐ all of which are vital for LICs’ growth prospects. It begs the question of why these countries have not improved their water quality. With specific reference made to Uganda, this research is bent on answering this question. In Uganda, there is consensus among scientists that the ground and open water sources are degraded to dangerous levels. Water quality parameters like turbidity, coliform count, and colour are all above the WHO minimum specifications for potable water and are on the rise in the country. This is indicative of water quality deterioration and it heightens the risk of waterborne diseases to the users. The waterborne burden of disease in Uganda is on the rise with a high fatality rate of 440 lives every week. The need to improve water quality in the country has been acknowledged. However, attempts to address the problem have only been undertaken on a small scale, most notable of these being the PuR home water treatment vii program. There is evidence in the country that the water quality would have apparent benefits. Strong correlations have been found between improved health in HIV patients and improved water quality in the country. In the economics of health, improving societal health inherently improves workers’ performance and productivity, leading to higher growth of the economy. There is an economic imperative therefore, as to why countries like Uganda should improve their water quality. In spite of this, even the country’s most urbanized setting‐ Kampala‐ lacks potable water. This study therefore investigates why, in a time when not only the global agenda is more supportive than ever and when the country’s water resources have been found to be risky to use, Uganda has not improved water quality. Kampala is used as the model district for this study. The district accounts for three quarters of users of treated water in the country. The problem is investigated by assessing the efficiency case of such a project (a water quality improving project) in the country; the methodology employed to this end is the Cost Benefit Analysis (CBA). The methodology compares the costs and benefits of a project, in monetary terms, in the same analysis, over its useful life. In the application of CBA one allows for the time value of money by using the discount rate to make the costs and benefits of the project occurring in different years comparable. In principle, the methodology is simple to apply‐ only that issues arise in the quantification of benefits and the determination of the discount rate. Benefits of the Kampala water quality, improving project include non‐market values and for this reason a non‐market valuation technique, the Contingent Valuation Method (CVM), was employed in their quantification. The CVM technique estimates the benefits by measuring the individuals’ willingness to pay for the improved scenario‐ in this case the scenario was one with a water quality‐improving project. The application of the CVM across many disciplines has invited a lot of criticism over the reliability of its estimates as a measure of value. A panel assembled by the North Oceanic and Atmospheric Administration (NOAA) to investigate the reliability of the CVM resolved that as long as the CVM was well conducted, the generated results would reliably predict non‐market values. The Kampala CVM, for the benefits’ quantification, was conducted with the NOAA guidelines in mind. The final value of the project’s benefits was the WTP predicted for the viii median respondent namely Ushs 385.07/= per cubic meter of water. The discount rate was deemed to be the social opportunity cost of capital in the country, viz 12 percent, this being that rate of return foregone by investing in another sector. The project’s costs were arrived at through liaison with water engineers and consulting past data from Uganda’s Water suppliers. From this, the project’s fixed costs were predicted to be Ushs 1451/= per cubic meter of water and the operation and maintenance costs predicted to be Ushs 591.7/= per cubic meter of water. The project’s useful life was deemed to be the average life of a Ugandan, namely 52 years; this choice reflecting the belief that the benefits would last over the users’ whole life. The results of the Kampala water quality‐improving project indicate that the project would not be feasible. It did not matter what discount rate one employed, the project’s operating and maintenance (OM) costs exceed the benefits. The results offer an indication as to why water quality has not been improved in Uganda‐ because the paying population is unwilling to pay for the entire cost of the project. This deduction is not to suggest that the users do not recognize the benefits of the project. The unpleasant truth is that the users’ incomes are typically stretched so thin by other demands that a decision to make more deductions from these incomes is not an inviting one. However, there is a need to improve water quality in LICs like Uganda, as can be deduced from the analysis of the risks of not doing so and benefits of doing so. Accordingly, such projects have to be funded by mechanism that does not require the users to cover the whole cost, but only part of such a cost, with the remainder from other sources like NGOs and foreign aid.
- Full Text:
- Date Issued: 2007
A few points on Pointfree pseudocompactness
- Authors: Dube, T , Matutu, Phethiwe P
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6783 , http://hdl.handle.net/10962/d1006926
- Description: We present several characterizations of completely regular pseudocompact frames. The first is an extension to frames of characterizations of completely regular pseudocompact spaces given by Väänänen. We follow with an embedding-type characterization stating that a completely regular frame is pseudocompact if and only if it is a P-quotient of its Stone-Čech compactification. We then give a characterization in terms of ideals in the cozero parts of the frames concerned. This characterization seems to be new and its spatial counterpart does not seem to have been observed before. We also define relatively pseudocompact quotients, and show that a necessary and sufficient condition for a completely regular frame to be pseudocompact is that it be relatively pseudocompact in its Hewitt realcompactification. Consequently a proof of a result of Banaschewski and Gilmour that a completely regular frame is pseudocompact if and only if its Hewitt realcompactification is compact, is presented without the invocation of the Boolean Ultrafilter Theorem.
- Full Text:
- Date Issued: 2007
- Authors: Dube, T , Matutu, Phethiwe P
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6783 , http://hdl.handle.net/10962/d1006926
- Description: We present several characterizations of completely regular pseudocompact frames. The first is an extension to frames of characterizations of completely regular pseudocompact spaces given by Väänänen. We follow with an embedding-type characterization stating that a completely regular frame is pseudocompact if and only if it is a P-quotient of its Stone-Čech compactification. We then give a characterization in terms of ideals in the cozero parts of the frames concerned. This characterization seems to be new and its spatial counterpart does not seem to have been observed before. We also define relatively pseudocompact quotients, and show that a necessary and sufficient condition for a completely regular frame to be pseudocompact is that it be relatively pseudocompact in its Hewitt realcompactification. Consequently a proof of a result of Banaschewski and Gilmour that a completely regular frame is pseudocompact if and only if its Hewitt realcompactification is compact, is presented without the invocation of the Boolean Ultrafilter Theorem.
- Full Text:
- Date Issued: 2007
A framework for secure mobile computing in healthcare
- Thomas, Godwin Dogara Ayenajeh
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
A general genetic algorithm for one and two dimensional cutting and packing problems
- Authors: Mancapa, Vusisizwe
- Date: 2007
- Subjects: Packaging -- Data processing , Genetic algorithms , Cutting stock problem , Packing for shipment , Manufacturing processes -- Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9602 , http://hdl.handle.net/10948/555 , http://hdl.handle.net/10948/d1011727 , Packaging -- Data processing , Genetic algorithms , Cutting stock problem , Packing for shipment , Manufacturing processes -- Planning
- Description: Cutting and packing problems are combinatorial optimisation problems. The major interest in these problems is their practical significance, in manufacturing and other business sectors. In most manufacturing situations a raw material usually in some standard size has to be divided or be cut into smaller items to complete the production of some product. Since the cost of this raw material usually forms a significant portion of the input costs, it is therefore desirable that this resource be used efficiently. A hybrid general genetic algorithm is presented in this work to solve one and two dimensional problems of this nature. The novelties with this algorithm are: A novel placement heuristic hybridised with a Genetic Algorithm is introduced and a general solution encoding scheme which is used to encode one dimensional and two dimensional problems is also introduced.
- Full Text:
- Date Issued: 2007
- Authors: Mancapa, Vusisizwe
- Date: 2007
- Subjects: Packaging -- Data processing , Genetic algorithms , Cutting stock problem , Packing for shipment , Manufacturing processes -- Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9602 , http://hdl.handle.net/10948/555 , http://hdl.handle.net/10948/d1011727 , Packaging -- Data processing , Genetic algorithms , Cutting stock problem , Packing for shipment , Manufacturing processes -- Planning
- Description: Cutting and packing problems are combinatorial optimisation problems. The major interest in these problems is their practical significance, in manufacturing and other business sectors. In most manufacturing situations a raw material usually in some standard size has to be divided or be cut into smaller items to complete the production of some product. Since the cost of this raw material usually forms a significant portion of the input costs, it is therefore desirable that this resource be used efficiently. A hybrid general genetic algorithm is presented in this work to solve one and two dimensional problems of this nature. The novelties with this algorithm are: A novel placement heuristic hybridised with a Genetic Algorithm is introduced and a general solution encoding scheme which is used to encode one dimensional and two dimensional problems is also introduced.
- Full Text:
- Date Issued: 2007
A geopolitical analysis of long term internet network telescope traffic
- Irwin, Barry V W, Pilkington, Nik, Barnett, Richard J, Friedman, Blake
- Authors: Irwin, Barry V W , Pilkington, Nik , Barnett, Richard J , Friedman, Blake
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428142 , vital:72489 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228848896_A_geopolitical_analysis_of_long_term_internet_network_telescope_traffic/links/53e9c5190cf2fb1b9b672aee/A-geopolitical-analysis-of-long-term-internet-network-telescope-traffic.pdf
- Description: This paper presents results form the analysis of twelve months of net-work telescope traffic spanning 2005 and 2006, and details some of the tools developed. The most significant results of the analysis are high-lighted. In particular the bulk of traffic analysed had its source in the China from a volume perspective, but Eastern United States, and North Western Europe were shown to be primary sources when the number of unique hosts were considered. Traffic from African states (South Af-rica in particular) was also found to be surprisingly high. This unex-pected result may be due to the network locality preference of many automated agents. Both statistical and graphical analysis are present-ed. It is found that a country with a high penetration of broadband con-nectivity is likley to feature highly in Network telescope traffic, as are networks logically close to the telescope network.
- Full Text:
- Date Issued: 2007
- Authors: Irwin, Barry V W , Pilkington, Nik , Barnett, Richard J , Friedman, Blake
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428142 , vital:72489 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228848896_A_geopolitical_analysis_of_long_term_internet_network_telescope_traffic/links/53e9c5190cf2fb1b9b672aee/A-geopolitical-analysis-of-long-term-internet-network-telescope-traffic.pdf
- Description: This paper presents results form the analysis of twelve months of net-work telescope traffic spanning 2005 and 2006, and details some of the tools developed. The most significant results of the analysis are high-lighted. In particular the bulk of traffic analysed had its source in the China from a volume perspective, but Eastern United States, and North Western Europe were shown to be primary sources when the number of unique hosts were considered. Traffic from African states (South Af-rica in particular) was also found to be surprisingly high. This unex-pected result may be due to the network locality preference of many automated agents. Both statistical and graphical analysis are present-ed. It is found that a country with a high penetration of broadband con-nectivity is likley to feature highly in Network telescope traffic, as are networks logically close to the telescope network.
- Full Text:
- Date Issued: 2007
A literature review of the factors impacting on objectivity in news journalism
- Authors: Yat, Gai Thurbil
- Date: 2007
- Subjects: Journalism -- Objectivity
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8376 , http://hdl.handle.net/10948/872 , Journalism -- Objectivity
- Description: Objectivity has been the most debatable issue in the history of journalism and there are, therefore, many different ways of looking at it. Media academics such as Gans (1979) and Tuchman (2000) refer to objectivity as an examination of contents of collected news materials. Glasser (1992) points out that objectivity is a balance of beliefs restructured by a journalist and presented against independent thinking. It is difficult to test the objectivity of journalists because it is the credibility of facts gathered by a journalist that lies at the heart of objectivity. In Glasser’s opinion, the “notion” of objectivity is flawed against the newsman’s mandate of reporting responsibly. Objectivity is therefore professional principle through which journalists write news responsibly and present it to their audience as a final product (Glasser, 1992). This study will discuss objectivity also in reference to the problems that journalists face when they cover news stories. It may be that journalists may have problems searching for stories not because they do not embrace journalistic principles of fairness, clarity and objectivity, but because of the way in which facts are presented to them by news sources (Fred and Wellman, 2003). There have been some cases whereby media audiences have wrongly been made to think that journalists are biased in their coverage. 2 For example, the 2003 Iraq invasion by US-led forces, where correspondents were made to practice embedded journalism is a good example of how circumstances could force a journalist to succumb to soldiers’ demands of keeping their war causalities away from their cameras. It is worth noting, however, that being biased for a journalist in such a war situation could be circumstantial in the sense that an American journalist covering a story in Iraqi’s capital, Baghdad, would be regarded as a spy by Iraqi’s troops. Likewise, an Iraqi journalist chasing stories in the coalition force’s camps in Iraqi’s capital would be treated as a traitor by the Iraqi people (Fred and Wellman, 2003:21). There is no doubt that in the situations described above objectivity in journalism can be affected. It is against such background that this study will investigate the factors that affect objectivity in the print media. It is vitally important to bear in mind that bias should not be confused with editorial columns that express the opinion of publishers, or editors for that matter. The question of objectivity goes back to the gatekeepers, whereby the editors as gatekeepers decide what to publish and what news stories reporters should gather. So the question of objectivity in the news can be dealt with by the editors who decide which story should be run by their respective newspapers. According to Fred and Wellman (2003:32), editors and media owners are the decision makers in the field of journalism.
- Full Text:
- Date Issued: 2007
- Authors: Yat, Gai Thurbil
- Date: 2007
- Subjects: Journalism -- Objectivity
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8376 , http://hdl.handle.net/10948/872 , Journalism -- Objectivity
- Description: Objectivity has been the most debatable issue in the history of journalism and there are, therefore, many different ways of looking at it. Media academics such as Gans (1979) and Tuchman (2000) refer to objectivity as an examination of contents of collected news materials. Glasser (1992) points out that objectivity is a balance of beliefs restructured by a journalist and presented against independent thinking. It is difficult to test the objectivity of journalists because it is the credibility of facts gathered by a journalist that lies at the heart of objectivity. In Glasser’s opinion, the “notion” of objectivity is flawed against the newsman’s mandate of reporting responsibly. Objectivity is therefore professional principle through which journalists write news responsibly and present it to their audience as a final product (Glasser, 1992). This study will discuss objectivity also in reference to the problems that journalists face when they cover news stories. It may be that journalists may have problems searching for stories not because they do not embrace journalistic principles of fairness, clarity and objectivity, but because of the way in which facts are presented to them by news sources (Fred and Wellman, 2003). There have been some cases whereby media audiences have wrongly been made to think that journalists are biased in their coverage. 2 For example, the 2003 Iraq invasion by US-led forces, where correspondents were made to practice embedded journalism is a good example of how circumstances could force a journalist to succumb to soldiers’ demands of keeping their war causalities away from their cameras. It is worth noting, however, that being biased for a journalist in such a war situation could be circumstantial in the sense that an American journalist covering a story in Iraqi’s capital, Baghdad, would be regarded as a spy by Iraqi’s troops. Likewise, an Iraqi journalist chasing stories in the coalition force’s camps in Iraqi’s capital would be treated as a traitor by the Iraqi people (Fred and Wellman, 2003:21). There is no doubt that in the situations described above objectivity in journalism can be affected. It is against such background that this study will investigate the factors that affect objectivity in the print media. It is vitally important to bear in mind that bias should not be confused with editorial columns that express the opinion of publishers, or editors for that matter. The question of objectivity goes back to the gatekeepers, whereby the editors as gatekeepers decide what to publish and what news stories reporters should gather. So the question of objectivity in the news can be dealt with by the editors who decide which story should be run by their respective newspapers. According to Fred and Wellman (2003:32), editors and media owners are the decision makers in the field of journalism.
- Full Text:
- Date Issued: 2007
A methodology for measuring and monitoring IT risk
- Authors: Tansley, Natalie Vanessa
- Date: 2007
- Subjects: Electronic data processing departments -- Security measures , Business -- Data processing -- Security measures , Information resources management , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9781 , http://hdl.handle.net/10948/772 , Electronic data processing departments -- Security measures , Business -- Data processing -- Security measures , Information resources management , Information technology -- Security measures
- Description: The primary objective of the research is to develop a methodology for monitoring and measuring IT risks, strictly focusing on internal controls. The research delivers a methodology whereby an organization can measure its system of internal controls, providing assurance that the risks are at an acceptable level. To achieve the primary objective a number of secondary objectives were addressed: What are the drivers forcing organizations to better corporate governance in managing risk? What is IT risk management, specifically focusing on operational risk. What is internal control and specifically focusing on COSO’s internal control process. Investigation of measurement methods, such as, Balance Scorecards, Critical Success Factors, Maturity Models, Key Performance Indicators and Key Goal Indicators. Investigation of various frameworks such as CobiT, COSO and ISO 17799, ITIL and BS 7799 as to how they manage IT risk relating to internal control.
- Full Text:
- Date Issued: 2007
- Authors: Tansley, Natalie Vanessa
- Date: 2007
- Subjects: Electronic data processing departments -- Security measures , Business -- Data processing -- Security measures , Information resources management , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9781 , http://hdl.handle.net/10948/772 , Electronic data processing departments -- Security measures , Business -- Data processing -- Security measures , Information resources management , Information technology -- Security measures
- Description: The primary objective of the research is to develop a methodology for monitoring and measuring IT risks, strictly focusing on internal controls. The research delivers a methodology whereby an organization can measure its system of internal controls, providing assurance that the risks are at an acceptable level. To achieve the primary objective a number of secondary objectives were addressed: What are the drivers forcing organizations to better corporate governance in managing risk? What is IT risk management, specifically focusing on operational risk. What is internal control and specifically focusing on COSO’s internal control process. Investigation of measurement methods, such as, Balance Scorecards, Critical Success Factors, Maturity Models, Key Performance Indicators and Key Goal Indicators. Investigation of various frameworks such as CobiT, COSO and ISO 17799, ITIL and BS 7799 as to how they manage IT risk relating to internal control.
- Full Text:
- Date Issued: 2007
A model for a context aware machine-based personal memory manager and its implementation using a visual programming environment
- Authors: Tsegaye, Melekam Asrat
- Date: 2007
- Subjects: Visual programming (Computer science) Memory management (Computer science) Memory -- Data processing
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4640 , http://hdl.handle.net/10962/d1006563
- Description: Memory is a part of cognition. It is essential for an individual to function normally in society. It encompasses an individual's lifetime experience, thus defining his identity. This thesis develops the concept of a machine-based personal memory manager which captures and manages an individual's day-to-day external memories. Rather than accumulating large amounts of data which has to be mined for useful memories, the machine-based memory manager automatically organizes memories as they are captured to enable their quick retrieval and use. The main functions of the machine-based memory manager envisioned in this thesis are the support and the augmentation of an individual's biological memory system. In the thesis, a model for a machine-based memory manager is developed. A visual programming environment, which can be used to build context aware applications as well as a proof-of-concept machine-based memory manager, is conceptualized and implemented. An experimental machine-based memory manager is implemented and evaluated. The model describes a machine-based memory manager which manages an individual's external memories by context. It addresses the management of external memories which accumulate over long periods of time by proposing a context aware file system which automatically organizes external memories by context. It describes how personal memory management can be facilitated by machine using six entities (life streams, memory producers, memory consumers, a memory manager, memory fragments and context descriptors) and the processes in which these entities participate (memory capture, memory encoding and decoding, memory decoding and retrieval). The visual programming environment represents a development tool which contains facilities that support context aware application programming. For example, it provides facilities which enable the definition and use of virtual sensors. It enables rapid programming with a focus on component re-use and dynamic composition of applications through a visual interface. The experimental machine-based memory manager serves as an example implementation of the machine-based memory manager which is described by the model developed in this thesis. The hardware used in its implementation consists of widely available components such as a camera, microphone and sub-notebook computer which are assembled in the form of a wearable computer. The software is constructed using the visual programming environment developed in this thesis. It contains multiple sensor drivers, context interpreters, a context aware file system as well as memory retrieval and presentation interfaces. The evaluation of the machine-based memory manager shows that it is possible to create a machine which monitors the states of an individual and his environment, and manages his external memories, thus supporting and augmenting his biological memory.
- Full Text:
- Date Issued: 2007
- Authors: Tsegaye, Melekam Asrat
- Date: 2007
- Subjects: Visual programming (Computer science) Memory management (Computer science) Memory -- Data processing
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4640 , http://hdl.handle.net/10962/d1006563
- Description: Memory is a part of cognition. It is essential for an individual to function normally in society. It encompasses an individual's lifetime experience, thus defining his identity. This thesis develops the concept of a machine-based personal memory manager which captures and manages an individual's day-to-day external memories. Rather than accumulating large amounts of data which has to be mined for useful memories, the machine-based memory manager automatically organizes memories as they are captured to enable their quick retrieval and use. The main functions of the machine-based memory manager envisioned in this thesis are the support and the augmentation of an individual's biological memory system. In the thesis, a model for a machine-based memory manager is developed. A visual programming environment, which can be used to build context aware applications as well as a proof-of-concept machine-based memory manager, is conceptualized and implemented. An experimental machine-based memory manager is implemented and evaluated. The model describes a machine-based memory manager which manages an individual's external memories by context. It addresses the management of external memories which accumulate over long periods of time by proposing a context aware file system which automatically organizes external memories by context. It describes how personal memory management can be facilitated by machine using six entities (life streams, memory producers, memory consumers, a memory manager, memory fragments and context descriptors) and the processes in which these entities participate (memory capture, memory encoding and decoding, memory decoding and retrieval). The visual programming environment represents a development tool which contains facilities that support context aware application programming. For example, it provides facilities which enable the definition and use of virtual sensors. It enables rapid programming with a focus on component re-use and dynamic composition of applications through a visual interface. The experimental machine-based memory manager serves as an example implementation of the machine-based memory manager which is described by the model developed in this thesis. The hardware used in its implementation consists of widely available components such as a camera, microphone and sub-notebook computer which are assembled in the form of a wearable computer. The software is constructed using the visual programming environment developed in this thesis. It contains multiple sensor drivers, context interpreters, a context aware file system as well as memory retrieval and presentation interfaces. The evaluation of the machine-based memory manager shows that it is possible to create a machine which monitors the states of an individual and his environment, and manages his external memories, thus supporting and augmenting his biological memory.
- Full Text:
- Date Issued: 2007
A model for adaptive multimodal mobile notification
- Authors: Brander, William
- Date: 2007
- Subjects: Mobile computing , Context-aware computing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10473 , http://hdl.handle.net/10948/699 , Mobile computing , Context-aware computing
- Description: Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
- Full Text:
- Date Issued: 2007
- Authors: Brander, William
- Date: 2007
- Subjects: Mobile computing , Context-aware computing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10473 , http://hdl.handle.net/10948/699 , Mobile computing , Context-aware computing
- Description: Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
- Full Text:
- Date Issued: 2007
A model for integrating information security into the software development life cycle
- Authors: Futcher, Lynn Ann
- Date: 2007
- Subjects: Computer security , Software maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9737 , http://hdl.handle.net/10948/506 , Computer security , Software maintenance
- Description: It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Therefore, information security has become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. However, a common weakness that is inherent in the traditional software development methodologies is the lack of attention given to the security aspects of software development. Most of these methodologies do not explicitly include a standardised method for incorporating information security into their life cycles. Meaningful security can be achieved when information security issues are considered as part of a routine development process, and security safeguards are integrated into the software application throughout its life cycle. This, in turn, will lead to users being more confident to use software applications, and to entrust today's computer systems with their personal information. To build better or more secure software, an improved software development process is required. Security of a software application must be based on the risk associated with the application. In order to understand this risk, the relevant information assets need to be identified together with their threats and vulnerabilities. Therefore, security considerations provide input into every phase of the Software Development Life Cycle (SDLC), from requirements gathering to design, implementation, testing and deployment. This research project presents a Secure Software Development Model (SecSDM) for incorporating information security into all phases of the SDLC, from requirements gathering to systems maintenance. The SecSDM is based on many of the recommendations provided by relevant international standards and best practices, for example, the ISO 7498-2 (1989) standard which addresses the underlying security services and mechanisms that form an integral part of the model.
- Full Text:
- Date Issued: 2007
- Authors: Futcher, Lynn Ann
- Date: 2007
- Subjects: Computer security , Software maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9737 , http://hdl.handle.net/10948/506 , Computer security , Software maintenance
- Description: It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Therefore, information security has become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. However, a common weakness that is inherent in the traditional software development methodologies is the lack of attention given to the security aspects of software development. Most of these methodologies do not explicitly include a standardised method for incorporating information security into their life cycles. Meaningful security can be achieved when information security issues are considered as part of a routine development process, and security safeguards are integrated into the software application throughout its life cycle. This, in turn, will lead to users being more confident to use software applications, and to entrust today's computer systems with their personal information. To build better or more secure software, an improved software development process is required. Security of a software application must be based on the risk associated with the application. In order to understand this risk, the relevant information assets need to be identified together with their threats and vulnerabilities. Therefore, security considerations provide input into every phase of the Software Development Life Cycle (SDLC), from requirements gathering to design, implementation, testing and deployment. This research project presents a Secure Software Development Model (SecSDM) for incorporating information security into all phases of the SDLC, from requirements gathering to systems maintenance. The SecSDM is based on many of the recommendations provided by relevant international standards and best practices, for example, the ISO 7498-2 (1989) standard which addresses the underlying security services and mechanisms that form an integral part of the model.
- Full Text:
- Date Issued: 2007
A multiple case study of parent involvement with grade 8 learners of mathematics
- Authors: Govender, Vasuthavan Gopaul
- Date: 2007
- Subjects: Education, Secondary -- Parent participation , Parent-teacher relationships , Mathematics -- Study and teaching (Secondary)
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: vital:9556 , http://hdl.handle.net/10948/511 , http://hdl.handle.net/10948/d1011913 , Education, Secondary -- Parent participation , Parent-teacher relationships , Mathematics -- Study and teaching (Secondary)
- Description: The learning of mathematics is a worldwide concern. International studies over the last decade place South African learners amongst the lowest achievers. Although various initiatives have been tried there does not seem to be any improvement. In the USA and UK initiatives include the involvement of parents and these have been implemented with great success. One of the parent involvement programmes from the USA, the Family Maths Programme has been in South Africa since 1996. This programme has been successful in South Africa but is confined to parents of grades 4-7 children. However, there is no programme for parents of high school learners. As grade 8 is usually the first high school year in South Africa, this study focuses on parents of grade 8 children and their involvement in their children’s mathematics learning. It consists of an initial survey of grade 8 parents’ (from an urban school) mathematical backgrounds and experiences and their involvement in their children’s education. Using key points from the survey and elements from the literature review and other sources, the researcher designed a parent assistance programme for mathematics which was conducted with three groups of parents of grade 8 children from the same high school. Each group of parents was exclusive and the same set of procedures was applied to each group, making this study a qualitative multiple case study, within the interpretive research paradigm. The parent-assistance programme consists of a parents’ workshop and completion of journals over a 7-week period. Parents documented their interactions with their children in structured journals, a process known as participant journaling. After this journaling period, parents and children were surveyed on this interaction by means of follow-up questionnaires. This was followed later in interviews with the parents and mathematics teachers, separately. After the completion of all three case studies parents and children participated in focus group discussions to discuss and share experiences of the programme. The interrogation of the data, on two levels, suggests parents’ and children’s perceptions of mathematics were likely to be positively influenced. The data also suggest that children were likely to become more confident and to improve in mathematics.
- Full Text:
- Date Issued: 2007
- Authors: Govender, Vasuthavan Gopaul
- Date: 2007
- Subjects: Education, Secondary -- Parent participation , Parent-teacher relationships , Mathematics -- Study and teaching (Secondary)
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: vital:9556 , http://hdl.handle.net/10948/511 , http://hdl.handle.net/10948/d1011913 , Education, Secondary -- Parent participation , Parent-teacher relationships , Mathematics -- Study and teaching (Secondary)
- Description: The learning of mathematics is a worldwide concern. International studies over the last decade place South African learners amongst the lowest achievers. Although various initiatives have been tried there does not seem to be any improvement. In the USA and UK initiatives include the involvement of parents and these have been implemented with great success. One of the parent involvement programmes from the USA, the Family Maths Programme has been in South Africa since 1996. This programme has been successful in South Africa but is confined to parents of grades 4-7 children. However, there is no programme for parents of high school learners. As grade 8 is usually the first high school year in South Africa, this study focuses on parents of grade 8 children and their involvement in their children’s mathematics learning. It consists of an initial survey of grade 8 parents’ (from an urban school) mathematical backgrounds and experiences and their involvement in their children’s education. Using key points from the survey and elements from the literature review and other sources, the researcher designed a parent assistance programme for mathematics which was conducted with three groups of parents of grade 8 children from the same high school. Each group of parents was exclusive and the same set of procedures was applied to each group, making this study a qualitative multiple case study, within the interpretive research paradigm. The parent-assistance programme consists of a parents’ workshop and completion of journals over a 7-week period. Parents documented their interactions with their children in structured journals, a process known as participant journaling. After this journaling period, parents and children were surveyed on this interaction by means of follow-up questionnaires. This was followed later in interviews with the parents and mathematics teachers, separately. After the completion of all three case studies parents and children participated in focus group discussions to discuss and share experiences of the programme. The interrogation of the data, on two levels, suggests parents’ and children’s perceptions of mathematics were likely to be positively influenced. The data also suggest that children were likely to become more confident and to improve in mathematics.
- Full Text:
- Date Issued: 2007
A naive salience-based method for speaker identification in fiction books
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432627 , vital:72888 , https://pubmed.ncbi.nlm.nih.gov/10350927/
- Description: This paper presents a salience-based technique for the annotation of directly quoted speech from fiction text. In particular, this paper determines to what extent a naïve (without the use of complex machine learning or knowledge-based techniques) scoring technique can be used for the identification of the speaker of speech quotes. The presented technique makes use of a scoring technique, similar to that commonly found in knowledge-poor anaphora resolution research, as well as a set of hand-coded rules for the final identification of the speaker of each quote in the text. Speaker identification is shown to be achieved using three tasks: the identification of a speech-verb associated with a quote with a recall of 94.41%; the identification of the actor associated with a quote with a recall of 88.22%; and the selection of a speaker with an accuracy of 79.40%.
- Full Text:
- Date Issued: 2007
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432627 , vital:72888 , https://pubmed.ncbi.nlm.nih.gov/10350927/
- Description: This paper presents a salience-based technique for the annotation of directly quoted speech from fiction text. In particular, this paper determines to what extent a naïve (without the use of complex machine learning or knowledge-based techniques) scoring technique can be used for the identification of the speaker of speech quotes. The presented technique makes use of a scoring technique, similar to that commonly found in knowledge-poor anaphora resolution research, as well as a set of hand-coded rules for the final identification of the speaker of each quote in the text. Speaker identification is shown to be achieved using three tasks: the identification of a speech-verb associated with a quote with a recall of 94.41%; the identification of the actor associated with a quote with a recall of 88.22%; and the selection of a speaker with an accuracy of 79.40%.
- Full Text:
- Date Issued: 2007
A novel biosensor for the detection and monitoring of -d-galactosidase of faecal origin in water
- Wutor, V C, Togo, C A, Limson, Janice L, Pletschke, Brett I
- Authors: Wutor, V C , Togo, C A , Limson, Janice L , Pletschke, Brett I
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6468 , http://hdl.handle.net/10962/d1005797 , http://dx.doi.org/10.1016/j.enzmictec.2006.10.039
- Description: A voltammetric sensor prepared by the immobilization of metallophthalocyanine complexes onto a glassy carbon electrode has been developed for the detection of β-d-galactosidase (B-GAL) of faecal origin in water. Electrooxidation of chlorophenol red, a breakdown product of the chromogenic substrate chlorophenol red β-d-galactopyranoside, was used as a measure of β-d-galactosidase activity. At metallophthalocyanine modified electrodes, in particular copper(II) phthalocyanine, a decrease in electrode fouling was observed. The sensor was sensitive to fluctuations in pH, not significantly affected by temperature variations and could detect one colony forming unit/100 mL in 15 min. Loss of 40% sensitivity was observed over a period of 30 days. A strong correlation between sensor sensitivity and colony forming units was observed. The sensor is capable of detecting viable but nonculturable bacteria, overcoming this drawback of the use of culture media for detection of coliforms.
- Full Text:
- Date Issued: 2007
- Authors: Wutor, V C , Togo, C A , Limson, Janice L , Pletschke, Brett I
- Date: 2007
- Language: English
- Type: Article
- Identifier: vital:6468 , http://hdl.handle.net/10962/d1005797 , http://dx.doi.org/10.1016/j.enzmictec.2006.10.039
- Description: A voltammetric sensor prepared by the immobilization of metallophthalocyanine complexes onto a glassy carbon electrode has been developed for the detection of β-d-galactosidase (B-GAL) of faecal origin in water. Electrooxidation of chlorophenol red, a breakdown product of the chromogenic substrate chlorophenol red β-d-galactopyranoside, was used as a measure of β-d-galactosidase activity. At metallophthalocyanine modified electrodes, in particular copper(II) phthalocyanine, a decrease in electrode fouling was observed. The sensor was sensitive to fluctuations in pH, not significantly affected by temperature variations and could detect one colony forming unit/100 mL in 15 min. Loss of 40% sensitivity was observed over a period of 30 days. A strong correlation between sensor sensitivity and colony forming units was observed. The sensor is capable of detecting viable but nonculturable bacteria, overcoming this drawback of the use of culture media for detection of coliforms.
- Full Text:
- Date Issued: 2007
A preliminary examination of selected biological links between four Eastern Cape estuaries and the inshore marine environment
- Authors: Vorwerk, Paul D
- Date: 2007
- Subjects: Estuaries -- South Africa -- Eastern Cape Marine fishes -- South Africa -- Eastern Cape Marine ecology -- South Africa -- Eastern Cape Estuarine ecology -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5747 , http://hdl.handle.net/10962/d1005434
- Description: The coastal transition zone (CTZ), which links the terrestrial and marine environments, has been identified as a region of high biological diversity and elevated production. Results of studies conducted in the northern hemisphere indicate that the links between estuaries and the adjacent marine environment is critical to ecological functioning within the CTZ. This study assessed the influence of selected estuaries with different hydrodynamic characteristics on the adjacent marine environment along the south-eastern coastline of southern Africa. Four estuaries were examined, including two permanently open systems, the fresh water deprived Kariega and fresh water dominated Great Fish, and two temporarily open/closed estuaries (TOCE), the Kasouga and East Kleinemonde. Results of the study indicated that outflow of estuarine water from the Great Fish Estuary contributed to a plume of less saline water being evident within the adjacent marine environment. The plume of water was associated with increased zooplankton biomass and particulate organic matter (POM) and chlorophyll-a concentrations. Adjacent to the Kariega Estuary, no evidence of fresh water outflow into the marine environment was observed. However, in the sea directly opposite the mouth of the estuary an increase in zooplankton abundance and biomass was evident. Results of numerical analyses indicated that the increase in zooplankton abundance observed adjacent to the mouth of both permanently open estuaries could not be attributed to the export of zooplankton from the estuary, but rather the accumulation of marine species within the region. The mechanisms responsible for this accumulation were not determined, but it was thought to be associated with increased food availability in the estuarine frontal zone. A similar, but less dramatic biological response was also observed in the marine environment adjacent to the two TOCEs. It is suggested that the increase in biological activity within these regions could be ascribed to seepage of estuarine or ground water through the sand bar that separates these estuaries from the sea. Results of stable carbon isotope analyses indicated that both the Great Fish and Kariega estuaries exported carbon to the nearshore marine environment. The area influenced by estuarine derived carbon was dependent on the volume of estuarine outflow to the marine environment. Adjacent to the fresh water dominated Great Fish Estuary, estuarine derived carbon was recorded up to 12km from the mouth, while adjacent to the fresh water deprived Kariega, estuarine derived carbon was only evident directly opposite the mouth. The recruitment of macrozooplankton (> 2cm) into the fresh water deprived Kariega Estuary was in the range recorded for other permanently open southern African estuaries with higher fresh water flow rates. This indicates that the mechanisms which allow estuarine dependent larvae to locate and enter estuaries are not related to fresh water inflow. In conclusion, this study has demonstrated that despite their small size relative to European and North American systems, South African permanently open and temporarily open/closed estuaries also influence biological activity within the adjacent nearshore marine environment.
- Full Text:
- Date Issued: 2007
- Authors: Vorwerk, Paul D
- Date: 2007
- Subjects: Estuaries -- South Africa -- Eastern Cape Marine fishes -- South Africa -- Eastern Cape Marine ecology -- South Africa -- Eastern Cape Estuarine ecology -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:5747 , http://hdl.handle.net/10962/d1005434
- Description: The coastal transition zone (CTZ), which links the terrestrial and marine environments, has been identified as a region of high biological diversity and elevated production. Results of studies conducted in the northern hemisphere indicate that the links between estuaries and the adjacent marine environment is critical to ecological functioning within the CTZ. This study assessed the influence of selected estuaries with different hydrodynamic characteristics on the adjacent marine environment along the south-eastern coastline of southern Africa. Four estuaries were examined, including two permanently open systems, the fresh water deprived Kariega and fresh water dominated Great Fish, and two temporarily open/closed estuaries (TOCE), the Kasouga and East Kleinemonde. Results of the study indicated that outflow of estuarine water from the Great Fish Estuary contributed to a plume of less saline water being evident within the adjacent marine environment. The plume of water was associated with increased zooplankton biomass and particulate organic matter (POM) and chlorophyll-a concentrations. Adjacent to the Kariega Estuary, no evidence of fresh water outflow into the marine environment was observed. However, in the sea directly opposite the mouth of the estuary an increase in zooplankton abundance and biomass was evident. Results of numerical analyses indicated that the increase in zooplankton abundance observed adjacent to the mouth of both permanently open estuaries could not be attributed to the export of zooplankton from the estuary, but rather the accumulation of marine species within the region. The mechanisms responsible for this accumulation were not determined, but it was thought to be associated with increased food availability in the estuarine frontal zone. A similar, but less dramatic biological response was also observed in the marine environment adjacent to the two TOCEs. It is suggested that the increase in biological activity within these regions could be ascribed to seepage of estuarine or ground water through the sand bar that separates these estuaries from the sea. Results of stable carbon isotope analyses indicated that both the Great Fish and Kariega estuaries exported carbon to the nearshore marine environment. The area influenced by estuarine derived carbon was dependent on the volume of estuarine outflow to the marine environment. Adjacent to the fresh water dominated Great Fish Estuary, estuarine derived carbon was recorded up to 12km from the mouth, while adjacent to the fresh water deprived Kariega, estuarine derived carbon was only evident directly opposite the mouth. The recruitment of macrozooplankton (> 2cm) into the fresh water deprived Kariega Estuary was in the range recorded for other permanently open southern African estuaries with higher fresh water flow rates. This indicates that the mechanisms which allow estuarine dependent larvae to locate and enter estuaries are not related to fresh water inflow. In conclusion, this study has demonstrated that despite their small size relative to European and North American systems, South African permanently open and temporarily open/closed estuaries also influence biological activity within the adjacent nearshore marine environment.
- Full Text:
- Date Issued: 2007