Investigating COBIT 5 implementation in the public TVET college sector in South Africa
- Authors: Zulu, Motlalepule Jacobeth
- Date: 2019
- Subjects: Information technology -- Management , Computer security Education, Higher -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/44246 , vital:37142
- Description: The purpose of this study was to investigate whether the COBIT 5 ICT governance framework has been implemented successfully in the public TVET sector. The study clarifies that ICT governance is not only about satisfying audit requirements; the core of ICT governance based on Cobit 5 is alignment between business and ICT. The study proposed a theoretical framework whereby the perceived benefits of implementing COBIT 5 in the public TVET college sector in South Africa was the dependent variable. The proposed independent variables were namely; Training, Adoption, Leadership, Value in IT Investment and Risk Management. The study infers that the board and/or council within an organisation need to lead the process in relation to the governance of ICT. Moreover, the study takes cognisance that ICT is a strategic enabler and thus the board or council ought to play their role of oversight, monitoring and ensuring optimal utilisation of IT resources. The study challenges the perception that IT is a mere operational functional and deduces that top management ought to incorporate IT when formulating and/or reviewing the business strategy. IT ought to be included in any strategic related activity in the organisation. IT should not be left out of the boardroom if management envisage to derive value from ICT investment.
- Full Text:
- Date Issued: 2019
Improving the claims business process in a South African car rental company
- Authors: Nomadolo, Xolile Claude
- Date: 2016
- Subjects: Automobile leasing and renting -- South Africa Claims Business cycles
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/12650 , vital:27103
- Description: The ultimate aim of this study is to identify and eliminate inefficiencies associated with the current claims management processes, thereby ensuring cost reduction, high damages recoveries while ensuring that the company is positioned to be able to apply its resources in the best way possible to respond to satisfying the needs of the customer.
- Full Text: false
- Date Issued: 2016
The experiences of older persons and their adult children on maintaining positive parent-child relationships
- Authors: Boshoff, Marcelle Dianne
- Date: 2016
- Subjects: Parent and adult child , Fammilies -- Psychological aspects , Adult children -- Psychology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/4631 , vital:20624
- Description: The incidence of increased life span as well as a lack of care for older persons, gave rise to the South African Older persons Act (Act No 13 of 2006), which guides society in how our older persons should be treated. This Act also provides a clear indication of the expectations of caring for older persons within communities and families. Many older persons people rely on the relationships they have with their children in their golden years, to be fulfilling and loving. This study therefore aimed to explore the experiences of older persons and their adult children on maintaining positive relationships in order for the relationship to be most beneficial for both older persons and their adult children. The quality of relationships between adult children and older persons according to Newby (2010) can ease participation of adult children in the lives of older persons. This study was conducted from a qualitative research perspective that is exploratory, descriptive and contextual in nature. The exploratory-descriptive design allowed the researcher to understand the topic by using a narrative strategy of inquiry. A non-probability purposive sampling method was applied to identify five older persons as well as the adult children of these older persons who are retirees of an automotive company in South Africa. Individual, semi-structured face to face interviews were conducted with older persons as well as with at least one of their adult children who did not reside with them. Thematic data analysis technique was used to analyse the data collected. The study is viewed as significant in enhancing the understanding of satisfying and caring relationships between older persons and their adult children in order to add to the body of existing knowledge in social gerontology and to improve direct social work practice with older persons.
- Full Text:
- Date Issued: 2016
Shape memory Alloy Actuator for cross-feed in turning operation
- Authors: Otieno, Timothy
- Date: 2012
- Subjects: Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9650 , http://hdl.handle.net/10948/d1012590 , Shape memory alloys -- Mechanical properties , Shape memory alloys , Intermetallic compounds , Materials -- Mechanical properties
- Description: A shape memory alloy (SMA) is an intermetallic compound able to recover, in a continuous and reversible way, a predetermined shape during a thermal cycle while generating mechanical work. In this thesis, its use in developing an actuator for a machining process is investigated. The actuator is to drive the tool cross feed into an aluminium workpiece in a finishing lathe operation. The actuator structure was designed with an output shaft to transfer the movement and force of the SMA wire outside the device. The actuator was fabricated and the experimental setup was assembled which also included a power supply control circuit, displacement sensor, temperature sensor and current sensor for feedback, and data collection and monitoring within software. PID control was implemented within the software that regulated the power supplied to the SMA, thereby providing the position control. This study covers the mechatronics system design and development of the actuator, the experiments carried out to determine performance and the results. Open loop tests were conducted to determine the maximum stroke, the effect of cooling and response to radial forces. These tests revealed the expected non-linearity of the SMA. The actuator achieved the rated maximum stroke of 3-4 percent. The forced cooling test showed a general improvement of approximately 65 percent with fans. The radial force tests showed the value of the maximum stroke remained unaffected by force. The results from the closed loop tests responses with a tuned PID controller produced a stable system for various displacement setpoints. The actuator had a feed rate of 0.25 mm/s and an accuracy of 0.0153mm, which was within the acceptable accuracy for turning operations. The system was deemed accurate for a conventional lathe machine cross feed.
- Full Text:
- Date Issued: 2012
Journalists' appropriation of ICTs in news-gathering and processing: a case study of Grocott's Mail
- Authors: Dugo, Habtamu Tesfaye
- Date: 2008
- Subjects: Grocott's Mail (Grahamstown, South Africa) Journalism -- South Africa -- Grahamstown Journalists -- South Africa -- Grahamstown Electronic news gathering -- South Africa -- Grahamstown Journalism -- Data processing -- South Africa -- Grahamstown Information technology -- South Africa -- Grahamstown Reporters and reporting -- South Africa -- Grahamstown Communication and technology -- South Africa -- Grahamstown
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3427 , http://hdl.handle.net/10962/d1002881
- Description: This study set out to investigate Grocott’s Mail journalists’ appropriation of information and communication technologies in news-gathering and processing using the social shaping of technology as a theoretical lens. It mainly focuses on digital ICTs that journalists use in news-gathering and processing including the Internet, electronic mail, and mobile telephony. Grocott’s Mail is a small-scale newspaper based in Grahamstown, South Africa. Using qualitative research method and the case study as its sub-method, the research reveals that Grocott’s Mail journalists’ appropriation of ICTs involves various opportunities and challenges in news-gathering and processing. In terms of the state of the existing technological infrastructure, the study reveals that since it embraced the digital ICTs in 2003, Grocott’s Mail boasts an adequate ICT infrastructure for a small-scale African newspaper with 30 PCs and one laptop, and professional software for 28 permanent employees. On the other hand, the research reveals serious constraints with the existing ICTs: a huge need for staff training and capacity building to fully utilise the ICTs, and the need to look for ways of raising funds to either upgrade or replace the existing ICTs. Grocott’s Mail journalists use the Internet to do background research on news stories, to verify the accuracy of information, and to check competition across other media. These are the merits of the Internet in news-gathering and processing. On the other hand, there are specific unintended consequences of the Internet such as wasting the company’s working time, and its use leading to lazy/press release journalism. Informants unanimously indicate that the main problems of the Internet are heavy dependence on other online news-sources and wasting time on online entertainment. In terms of using email in news-gathering, the research finds email technology as having advantages such as being a tool of flexibility and speed, a tool for email interviews, and as a technology that promotes participatory journalism. On the other hand, challenges related to email include its limitations because of what interviewees view as its supplementary and small-scale use because of its low contextual richness as opposed to face to face interviews. In terms of cellular telephony, the study finds that regardless of the ubiquity of cell phones and cell phone networks, they have not yet been deployed in news-gathering and processing due to various constraints. These are cell phones not being a big factor in reporting, lack of a proper funding and refunding scheme, prevalence of negative attitudes towards cell phones, and lack of a business model. Thus, cellular phones seem to have little or no relevance in news-gathering and processing at Grocott’s Mail presently.
- Full Text:
- Date Issued: 2008
A holistic approach to network security in OGSA-based grid systems
- Authors: Loutsios, Demetrios
- Date: 2006
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9736 , http://hdl.handle.net/10948/550 , Computer networks -- Security measures
- Description: Grid computing technologies facilitate complex scientific collaborations between globally dispersed parties, which make use of heterogeneous technologies and computing systems. However, in recent years the commercial sector has developed a growing interest in Grid technologies. Prominent Grid researchers have predicted Grids will grow into the commercial mainstream, even though its origins were in scientific research. This is much the same way as the Internet started as a vehicle for research collaboration between universities and government institutions, and grew into a technology with large commercial applications. Grids facilitate complex trust relationships between globally dispersed business partners, research groups, and non-profit organizations. Almost any dispersed “virtual organization” willing to share computing resources can make use of Grid technologies. Grid computing facilitates the networking of shared services; the inter-connection of a potentially unlimited number of computing resources within a “Grid” is possible. Grid technologies leverage a range of open standards and technologies to provide interoperability between heterogeneous computing systems. Newer Grids build on key capabilities of Web-Service technologies to provide easy and dynamic publishing and discovery of Grid resources. Due to the inter-organisational nature of Grid systems, there is a need to provide adequate security to Grid users and to Grid resources. This research proposes a framework, using a specific brokered pattern, which addresses several common Grid security challenges, which include: Providing secure and consistent cross-site Authentication and Authorization; Single-sign on capabilities to Grid users; Abstract iii; Underlying platform and runtime security, and; Grid network communications and messaging security. These Grid security challenges can be viewed as comprising two (proposed) logical layers of a Grid. These layers are: a Common Grid Layer (higher level Grid interactions), and a Local Resource Layer (Lower level technology security concerns). This research is concerned with providing a generic and holistic security framework to secure both layers. This research makes extensive use of STRIDE - an acronym for Microsoft approach to addressing security threats - as part of a holistic Grid security framework. STRIDE and key Grid related standards, such as Open Grid Service Architecture (OGSA), Web-Service Resource Framework (WS-RF), and the Globus Toolkit are used to formulate the proposed framework.
- Full Text:
- Date Issued: 2006