A cyber security strategy to mitigate cloud computing risks within the investment management sector in Cape Town
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for a cybersecurity policy in South African schools
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the integration of 4IR-related topics into IT undergraduate curricula in South Africa
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A leadership model for South Africa’s infrastructure-related State-owned Enterprises
- Authors: Notununu, Fezile
- Date: 2024-04
- Subjects: Government business enterprises -- South Africa , Construction industry , Leadership -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64750 , vital:73885
- Description: The objective of this research was to create a leadership model designed specifically to address the challenges faced by South Africa's infrastructure-related, state-owned enterprises. Both Eskom and Transnet are currently experiencing leadership crises, which might be further exacerbated by the global economic difficulties. Through an initial literature review it became evident that there was a knowledge gap regarding leadership within South Africa's state-owned enterprises. Consequently, it was crucial to conduct an extensive analysis of leadership styles to ensure effective infrastructure management for these state-owned enterprises. The primary aim of this study was to propose a leadership model that would be suitable for South Africa's infrastructure-related, state-owned enterprises. To achieve this objective, the relationship between effective leadership and perceived success in infrastructure development was explored, as well as the relationship between effective planning and perceived success in infrastructure development within these enterprises. Additionally, the connection between leadership training and perceived success in infrastructure development was investigated in the study. Quantitative research methods were employed to address these research objectives. The data for this study were collected through an online survey, with a total of 335 respondents from South Africa. Descriptive statistics and structural equation modelling (SEM) were used for analysis, using SPSS AMOS 29 Software. The findings of the study indicated a significant positive relationship between effective management and perceived success in infrastructure development for state-owned enterprises. However, the results regarding the relationship between effective planning and perceived success were not statistically significant, as the p-value exceeded 0.05. Based on the outcomes of the study, appropriate and meaningful recommendations have been provided regarding the leadership model necessary for effective infrastructure management in South Africa's infrastructure-related, state-owned enterprises. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A model for speech-driven lesson summary generation in a noisy educational environment
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A model to measure the digital competence of South African citizens
- Authors: Du Preez, Creswell Martin
- Date: 2024-04
- Subjects: Communication of technical information , Digital divide , Information technology -- Social aspects , Information society
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64522 , vital:73746
- Description: The rapid proliferation of disruptive technologies is a paradigm shift fundamentally changing how humanity lives, works, communicates, and relates to each other. Many governments are implementing digital transformation strategies to improve service delivery, citizen participation, and information-sharing mechanisms. South Africa has identified digital skills as a key challenge to becoming a professional and globally competitive knowledge society. However, the 2016 Global IT Report of the World Economic Forum highlights the skills problem in South Africa, ranking it 95th out of 139 countries on the skills pillar. This is due to poor quality of education, particularly in math and science. Furthermore, the COVID-19 pandemic significantly underscored the importance of digital competence in South Africa, highlighting both challenges and opportunities. As the pandemic forced a shift to remote work, education, and digital service delivery, the disparities in digital access and skills became more apparent, especially in under-resourced communities. This situation revealed the urgent need to enhance digital competence across the population to bridge the digital divide. On the other hand, the pandemic also acted as a catalyst for digital transformation in the country. There was an accelerated adoption of digital technologies in various sectors, from education using online platforms to businesses embracing e-commerce. This rapid shift showcased the potential of digital technology to foster resilience against such disruptions. It highlighted citizens’ critical need for comprehensive digital competence to navigate this new digital landscape effectively. A gap exists between current online digital skills training programmes and the ability of citizens to participate in the same. While mega-vendors like Microsoft, Google, and Oracle offer virtual training on specific technologies, it is argued that users need digital competence training before participating in these opportunities. In other words, be able to access online training platforms, create a user account, use secure passwords, and navigate online training systems. This critical component is not holistically addressed across the education system in South Africa. Furthermore, digital competence is a new concept in the South African context and has not been holistically assessed until now. This study sets out to develop a digital competence assessment model to measure the digital competence of South African citizens. Research was conducted to understand digital competence, its characteristics and assessment models and frameworks. A suitable framework was then selected and adapted for the South African context. The adapted framework was used to develop a South African Digital Competence Assessment Model. The model consists of a Digital Competence Assessment Grid, which forms the core of the Digital Competence Assessment Model, as well as an example of how the model can be used to develop an assessment questionnaire. The South African Digital Competence Assessment Grid and the Digital Competence Assessment Example were reviewed by experts as part of an expert review process. The recommendations from the experts were used to refine the Digital Competence Assessment Grid. As the concept of digital competence is new to South Africa, implementation strategies and considerations were discussed for the model. As a starting point, implementation resources were developed on how to use the model in the form of a Digital Competence Assessment Model Guide. The study thus makes an important contribution to advancing digital competence assessment in South Africa, which will inform the nature of the development programs needed and from which the competence profiles for various jobs and job families can be generated. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A skills development framework for the built environment
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A strategic approach for handling information security incidents in higher education
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A strategy for the implementation of IT shared services at the Nelson Mandela University
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
An implementation model: photovoltaic application for sustainable energy in South Africa
- Authors: Bukula, Mvuleni
- Date: 2024-04
- Subjects: Energy development -- South Africa , Renewable energy sources -- South Africa , Sustainable engineering -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64511 , vital:73743
- Description: South African electrical grid faces significant risks that the state produced electricity supply from electricity network to premises for consumption will not meet the electricity demand. Certain sectors of the economy and essential social services such as the hospitals, the telecommunications networks, and water companies are heavily impacted on by load management, through load shedding by rotating power outages or reducing power consumption from primary sources until demand decreases. Eskom, as the major electricity supplier in South Africa's aging infrastructure, with declining reliability, substandard quality coal and large gaps between generating capacity and demand, leaves the country vulnerable to electricity blackouts. The consequences of such power outages are devastating, but no single technology solution can meet the demand. Localised backup solutions such as solar power and battery backup limit the risk of power outages and provide power security during the periods of load shedding. Quantitative research method is pursued as a systematic survey to collect quantitative data by means of sampling and submitting online survey questionnaires. After receiving the data, statistical techniques were performed through structural equation modeling to analyse the structural relationship between the measured variables and the underlying variables. This research focuses on photovoltaic applications as a means of harnessing solar energy to convert solar energy into electricity. Solar panels consist of photovoltaic cells made of semiconductors or materials that respond to the action of photons of light. Energy availability to all can promote economic development and human well-being. Without the improvements in energy efficiency and development costs of new energy technologies such as photovoltaics, the global energy system will come under even more pressure. Therefore, changes in the global trend towards a decentralised low-carbon energy system are inevitable to ensure affordable, reliable and sustainable energy access for all. This research seeks to contribute to the present challenges that are facing South Africa’s electricity supply industry by increasing the energy mix of renewable energy as compared to the fossil fuel-based electricity supply. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Barriers faced by women in public sector leadership roles
- Authors: Khoza, Zelda
- Date: 2024-04
- Subjects: Women construction workers -- South Africa -- Management , Construction industry -- South Africa -- Management , Leadership -- South Africa , Equality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64599 , vital:73770
- Description: This research aims to analyse barriers that hinder women from occupying senior leadership posi-tions and to identify strategies that can be utilised to enable women to be appointed in these posi-tions at Transnet. The study identifies implementable strategies to assist women who aspire to be part of senior leadership and face barriers that hinder them from progressing to leadership posi-tions. The research adopts a pragmatic research paradigm, including quantitative and qualitative meth-ods, to explain the barriers associated with women advancing to leadership positions within the company. The data was collected through survey questionnaires and in-depth interviews. The analysis indicates that women are still under-represented in Transnet, even though efforts are being made to close this gap. Ineffective implementation of policies, due to lack of facilitating roles by HRM and line managers as expected, and lack of required support from the organisation play a significant role in creating barriers hindering senior leadership positions. The research findings can inform Human Resource Management (HRM) about the need for effec-tive implementation of policies and intensified monitoring to address the identified barriers that hin-der women from occupying senior leadership positions. Transnet should foster an organisational culture to build solid connections and engage diverse stakeholders to increase their impact and access to resources and drive positive organisational change. Transnet can leverage these find-ings to develop programmes and initiatives that support women’s career advancement and skills development. With these findings, Transnet should consider implementing strategies that provide flexible working conditions. Lastly, these findings aid Transnet in providing mentorship to women as a valuable leadership opportunity in the organisation. This study contributes to the existing literature on barriers that hinder women from occupying sen-ior leadership positions within organisations. The study also provides vital insights into the rolling out of women’s development programmes and the encouragement they bring. It offers implications for future research, policy changes, professional practices, and strategies to assist women in lead-ership positions. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Computer vision as a tool for tracking gastropod chemical trails
- Authors: Viviers, Andre
- Date: 2024-04
- Subjects: Computers , Electronic data processing , Machine learning
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64863 , vital:73934
- Description: The difficulties encountered in previous gastropod research with human intervention (Raw, Miranda, & Perissinotto, 2013) inspired this dissertation. More specifically the tedious task of human intervention in the tracking of gastropod chemical trails, which is a time-consuming and error-prone exercise. In this study, computer vision is proposed as an alternative to human intervention. A machine learning literature review was conducted to identify relevant methodologies and techniques for the research. Furthermore, it investigates data preprocessing techniques on a variety of different data types. This sets the stage for a deeper investigation of techniques used for pre-processing image and video data. Following that, another literature review delved deeper into the computer vision pipeline. The review is divided into two parts: data pre-processing and model training. First, it provides a deeper investigation into relevant data pre-processing techniques for use in constructing a dataset comprised of gastropod images. Following that, it delves into the complexities of training a computer vision model. The study then investigates convolutional neural networks, revealing the neural networks’ suitability in image/video processing. A convolutional neural network is selected as the foundation for the best-effort model. This serves as the foundation for the subsequent experimental research. The first part of the experimental work involves creating a labelled dataset from the video dataset provided by Raw et al. (2013). By employing data preprocessing techniques in a strategic manner, an unlabeled dataset is generated. Then a labelled dataset is generated using a simple K-Means clustering algorithm and manual labelling. Thereafter, a best-effort model is trained to detect gastropods within images using this dataset. After making the labelled dataset, the next step in the exploration is to build a prototype that can find gastropods and draw trace lines based on their movement. Five evaluation runs serve to gauge the prototype’s effectiveness. Videos with varying properties from the original dataset are purposefully chosen for each run. The prototype’s trace lines are compared to the original dataset’s human-drawn pathways. The versatility of the prototype is demonstrated in the final evaluation by generating fine-grained trace lines post-processing. This enables the plot to be adjusted to different parameters based on the characteristics that the resulting plot should have. Through the versatility and accuracy demonstrated by the evaluation runs, this research found that a gastropod tracking solution based on computer vision can alleviate human intervention. The dissertation concludes with a discourse on the lessons learned from the research study. These are presented as guidelines to aid future work in developing a gastropod tracking solution based on computer vision. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
Enabling legislative coherence in the Eswatini construction industry
- Authors: Hlatshwayo, Thandiwe Ncam'sile
- Date: 2024-04
- Subjects: Construction industry -- Law and legislation -- Swaziland , Construction workers -- Legal status, laws, etc. -- Swaziland , Industrial safety -- Law and legislation -- Swaziland
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64544 , vital:73748
- Description: The construction industry is an age-old and highly dynamic sector that contributes to the betterment of human life through the development of infrastructure. The presence of regulations is crucial in ensuring the provision of quality, standardization, efficiency, and effectiveness in service delivery. Inadequate regulation of the construction industry has been identified as the primary cause of construction failures in both developing and developed nations. Eswatini is no exception to this issue of legislative failure. The Construction Industry Council (CIC) was established by the Government of Eswatini without initially determining the specific challenges faced by the construction industry in Eswatini. The unique legislative needs pertaining to Eswatini were not explored to ensure that the framework is tailor-made for the Eswatini sector. Given the industry's diverse and intricate nature, a generic approach would not be sufficient to create a unified legislative framework. The study was aimed at developing a coherent legislative framework for the Eswatini construction industry. This study used a mixed-methods research design, incorporating both quantitative and qualitative data. A total of 297 participants were randomly selected from the CIC database for the quantitative survey. A total of 45 interviewees were purposively selected for the semi-structured interviews. Descriptive and inferential analysis were used for the interpretation of the quantitative data. Thematic analysis was used for the qualitative data. Exploratory Factor Analysis, using the maximum likelihood method with Varimax Rotation was employed to analyse the factor structure and correlation between items of the quantitative data. Additionally, the KMO and Bartlett's Tests were conducted. The ANOVA Test was used to test the hypothesis. Thematic analysis was employed for the qualitative data analysis. The findings of this study revealed that contractors in Eswatini recognised the significance of a well-functioning legislative framework and expressed dissatisfaction with the existing legislative measures implemented in the country. The key informant interviews highlighted various challenges, including the absence of regulations for the implementation of the CIC Act, lack of accountability and transparency in the management of funds for CIC operations and inadequate grading criteria. Other challenges that were revealed were insufficient oversight, unfair competition, corruption and limited stakeholder engagement. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Guidelines for improved coordination of public works projects in Buffalo City Metro
- Authors: Puta, Mabhelonke
- Date: 2024-04
- Subjects: Public works -- South Africa , Infrastructure (Economics) -- South Africa , Economic development projects -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64775 , vital:73890
- Description: This aim of this study was to determine how improved coordination of public works projects in Buffalo City Metro (BCM) can be promoted. The aim was predicated on the notion that coordination failure adversely affects scope, time, budget, and quality. A pragmatic worldview related to problem- solving informed the collection of both textual and statistical data for the study through surveys and interviews. In BCM public works projects failures in coordination have resulted in negative outcomes of project implementation. The study shows a correlation between coordination and project success, whilst failure in coordination will negatively impact project cost and project scope, resulting in project failure. The study was able to determine prioritised coordination activities. The study further developed coordination guidelines that mitigate coordination failure by outlining mechanisms, which are as follows: appointment of a coordination leader, scheduling coordination activities, participate plan and quality assurance plan. The outputs of these are the coordination of meetings, the online coordination of software, a schedule of lessons learnt, the drawing up of an execution plan and establishing performance incentives. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Guidelines towards the use of virtual consultation in primary healthcare
- Authors: Ndome Ndame, Evelyne Alexandra
- Date: 2024-04
- Subjects: Telecommunication in medicine , Medicine -- Communication systems , Health services administration -- Information technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64728 , vital:73872
- Description: In an environment of expanding demand on the healthcare system to provide equitable, accessible, and safe healthcare, the use of information and communication technology (ICT) is one of the strategies identified to fulfil such expectations. To make this achievable, ICTs are integrated in healthcare using telehealth, which permits the provision of remote healthcare by using virtual health technologies. One domain of telehealth which permits remote care is virtual consultations. It is an important tool in the healthcare industry used to promote access to healthcare services, especially for elderly people or people with disabilities, those suffering from chronic diseases such as cardiovascular disease, diabetes, and hypertension, among others, and for people in rural and underserved communities. This is possible using videoconferencing technology, telephone consultations, email, or instant messaging. Virtual consultations are becoming an integral part of the healthcare industry all over the world, and it is important to understand how to make use of them to promote healthcare access. The purpose of this study was to create guidelines to assist primary health care professionals in the most effective ways of using virtual consultations to improve access to essential health care services. As such, the objectives governing this study were to identify the role that virtual consultations play in healthcare, to investigate the factors that impact the use of virtual consultations, to review the existing guidelines on virtual consultations, as well as to identify the requirements needed for virtual consultations. This research followed several aspects to guide the methodology of this study. The research process governing this research was the design science research process. The research made use of literature reviews, argumentation, and a survey for data collection as well as a qualitative content analysis to analyse the data. The data collection consisted of 32 survey responses, which aided in the identification of the factors impacting the use of virtual consultations. The results showed that virtual consultations are utilised for various aspects of care delivery, but face-to-face consultations are still the first choice of consultation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
Incorporating emotion detection in text-dependent speaker authentication
- Authors: van Rensburg, Ebenhaeser Otto Janse , Von Solms, Rossouw
- Date: 2024-04
- Subjects: Automatic speech recognition , Biometric identification , Computer networks -- Security measures , Computer networks -- Access control
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64566 , vital:73767
- Description: Biometric authentication allows a person to access sensitive information using unique physical characteristics. Voice, as a biometric authentication method, is gaining popularity due to its unique characteristics and widespread availability on smartphones and other devices. It offers a secure and user-friendly alternative to traditional password-based authentication and allows a less intrusive authentication method than fingerprint authentication. Furthermore, a vast amount of information is portrayed through voice, such as age, gender, health, and emotional state. Gaining illegitimate access to information becomes significantly more difficult as biometrics are difficult to steal, and countermeasures to techniques such as replay attacks are constantly being improved. However, illegitimate access can be gained by forcing a legitimate person to authenticate themselves through voice. This study investigates how the emotion(s) carried by voice can assist in detecting if authentication was performed under duress. Knowledge is contributed using a three-phased approach: information gathering, experimentation, and deliberation. The experimentation phase is further divided into three phases to extract data, implement findings, and assess the value of determining duress using voice. This phased approach to experimentation ensures minimal change in variables and allows the drawn conclusions to be relevant to each phase. The first phase examines datasets and classifiers; the second phase explores feature enhancement techniques and their impact; and the third phase discusses performance measurements and their value to emotion detection. , Thesis (DPhil) -- Faculty Of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
Investigating ways to limit wasteful expenditure due to punitive property taxes on Gauteng hospitals
- Authors: Molotsi, Obed Lucas
- Date: 2024-04
- Subjects: Real property tax -- South Africa -- Gauteng , Real property -- Valuation -- South Africa -- Gauteng , Finance, Public -- Law and legislation -- South Africa -- Gauteng , Financial management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64705 , vital:73863
- Description: The PFMA defines fruitless and wasteful expenditure as an expenditure made in vain, and it states that had reasonable care been exercised, such expenditure would and should have been avoided. Among the various forms of wasteful expenditure, the AGSA (AG, 2021) report lists the payment of penalties, or of interest accruing because of late or non-payments, and debt incurred. These expenditures are prevalent in social cluster infrastructure projects, and the waste is attributed to poor planning, weak internal control measures, and lack of oversight on contracts. The Local Municipal Property Act 6 of 2004 (SA Government, 2004) empowers municipalities to develop a land administration process to enforce compliance with land use management schemes, which often is referred to as the steps to be taken to avoid the illegal use of land. The illegal use of land arises when a property owner fails to comply with the provisions of the land scheme, and when the land owner fails to comply with the requirements set out in notices issued in terms of the land use scheme. Illegal land uses arise when property exchanges hands between government departments (vesting), resulting in a change of use. This then leads to a failure by the property owner to update the conditions and property information that should have been in line with the changes enacted in the land use schemes in the asset register. The objective of this research was to investigate ways and the process the Provincial Government of Gauteng should put in place to limit wasteful expenditure and the payment of administrative penalties, or mounting property taxes based on the punitive tariff as the result of engaging in illegal land use. Such illegal land use occurred because the new property owner failed to update the property information and conditions. Based on the data collected through semi-structured interviews, questionnaires administered to a sample completed by the study’s participants, and the secondary research process that included the review of official policy documents, qualitative, and quantitative analysis were performed to achieve important findings of this study. Zoning applies to land with cadastral boundaries, implying that zoning is only applicable to surveyed land. Zones are depicted on the zone scheme maps, and these have the aim to inform land owners of potential development rights that are stipulated in the land use management schemes. Zoning forms the basis for property valuations and property tax (rates) calculation purposes. The other factor used in the calculation of the rate is the value of the rateable properties registered in the valuation roll. Every five years, a new valuation roll is published for review before the adoption by the various municipalities’ councils. The setting of tariffs is informed by the budget requirements of the municipalities to enable them to finance or deliver municipal services. The tariff scales are determined in line with the land use categories. Municipalities publish the tariffs yearly, after the adoption of the budget by the municipalities’ councils. The remedies available to municipalities is levying a punitive rate to try to change the owner’s land use and move it from unauthorised/illegal use of the land outside the category of use to an updated, legal use. The research findings indicate that the Gauteng Provincial Government’s relevant department lacks the necessary structures and processes to monitor changes in the bylaws or land use schemes of municipalities, and the payment of property rates does not hold any strategic importance in the management of properties. The department did not have a system or process in place to review the valuation roll, or to monitor the annual tariff rate adjustments. Therefore, the present research recommends several measures the department will have to implement to limit wasteful and fruitless expenditure regarding property rate payments. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Modelling offsite construction to control hazards and direct cost of accidents
- Authors: Simukonda, Wakisa Tulombolombo
- Date: 2024-04
- Subjects: Construction industry -- Accidents , Construction industry -- Risk management , Building -- Safety measures
- Language: English
- Type: Doctotal theses , text
- Identifier: http://hdl.handle.net/10948/64818 , vital:73923
- Description: The construction industry contributes significantly to the growth of developed and emerging economies. The industry contributes a sizeable proportion of Gross Domestic Product and Gross National Product. However, the poor safety performance of the industry and its consequential socio-economic impact threatens the industry’s significant contributions. It is for this reason that off-site construction has been identified as a sine qua non for addressing poor safety performance. The application of design for manufacture and assembly and lean techniques in the manufacture and assembly processes of off-site construction is suggested to minimise safety hazards in construction. The research was conducted to establish the relevant design for manufacture and assembly and lean techniques for addressing safety hazards in off-site construction and to develop a conceptual model of off-site construction for controlling hazards and direct costs of accidents to protect people and profits in construction. A preliminary conceptual model of off-site construction was initially devised based on a literature review and later refined into a developed conceptual model of off-site construction using findings from the qualitative phase of the study. The confirmation of the relationships and concepts presented in the developed conceptual model of off-site construction was based on the findings from quantitative data. The quantitative data were analysed using the Statistical Package for Social Science (SPSS) Version 26. Within SPSS, descriptive and inferential statistics were used to examine the relationships between off-site construction methods and safety issues, while Cronbach’s alpha was used to measure the validity of the findings. Based on the findings of the study, significant safety benefits of off-site construction methods of design for manufacture and assembly and lean techniques were identified. The benefits relate to the elimination of safety hazards including lack of personal protective equipment, work at height, poor work methods, poor house-keeping and lack of training and experience. Furthermore, the research findings indicated that implementing design for manufacture and assembly and lean practices limits direct costs of accidents, including costs expended on wages and medical bills. The positive outcomes of applying design for manufacture and assembly and lean techniques include better project management and working conditions, improved quality, minimised construction waste, and increased productivity. Factors impeding application of design for manufacture and assembly and lean techniques within contracting organisations include lack of stakeholder collaboration, a conservative mind-set towards traditional construction, lack of preferential policies and expensive logistics. These challenges can be addressed by promoting awareness of off-site construction methods, capacity-building, establishing a robust local supply chain and the involvement of government in creating an enabling political and legal environment, among others. Based on the research, an integrated conceptual model of off-site construction was developed for using off-site construction to control hazards and direct costs of accidents to protect people and profits in construction. In essence, the model can be used to identify design for manufacture and assembly and lean practices applicable in off-site construction projects to control potential safety hazards and risks. Identification and application of appropriate design for manufacture and assembly and lean practices, while addressing safety challenges, would result in the elimination of safety hazards and direct costs associated with the occurrence of accidents. Consequently, prevention of accidents would ensure the safety and health of people in construction, while the reduction of direct costs of accidents would improve the profitability margins of contracting organisations. Based on the study, recommendations are made for wider adoption of off-site construction as a modern construction method, and application of design for manufacture and assembly and lean techniques in off-site construction as strategic, industry and national, initiatives for improving safety in the construction industry. , Thesis (DPhil) -- Faculty ofEngineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Multi-purpose community centres as catalysts for socio-economic development in Eastern Cape province, South Africa
- Authors: Gobe, Cynthia Bongiwe Ntombikayise
- Date: 2024-04
- Subjects: Community centers -- South Africa , Buildings -- Environmental engineering -- South Africa , Sustainable construction -- Economic aspects , Infrastructure (Economics) -- South Africa Sustainable development
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64533 , vital:73747
- Description: The central issue facing African society, especially underdeveloped countries is that most of the population lives below the poverty line, experiences high levels of unemployment and unsustainable livelihoods. The poor and marginalised groups in many communities are deprived access to infrastructure and socio-economic amenities, this includes accessibility to government services, information, and developmental opportunities. The development of Multi-purpose Community Centres (MPCCs) is viewed as a value-adding solution to several challenges facing unequal societies, such as inadequate infrastructure, remote settlement patterns, poor access to basic services, poor access to technology, poor access to information, increased unemployment rate, increased poverty rate, and many others. The study examines the socio-economic impact of MPCCs on municipalities of the Eastern Cape Province in South Africa and explores how these centres, as built environment outputs can become a stimulus for sustainable livelihoods in urban, rural, and peri-urban human settlements, including informal settlements. The study falls under implementation evaluation research methodologies which assesses whether a programme has been adequately implemented before making inference on its effectiveness. Anchored in a Social Constructivism knowledge paradigm and leaning on a Systems and Development Theories, the study adopted a Mixed Method Research approach. In view of the data required document reviews, field observations, interviews and questionnaire surveys were employed. The research findings revealed that despite the delivery of MPCCs by the Department of Human Settlements, these centers have not provided much socio-economic opportunities to members of the communities where they are built. The MPCCs under study are facing many challenges that render them ineffective to fulfill their mandate of improving the lives of residents. The study yielded an inclusive and responsive human settlements development model for the creation of well-functioning socio-economic impactful MPCCs within existing and forth-coming housing projects and informal settlements. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Numerical modelling of power law constants established through impression and micro-Uniaxial creep methods for service exposed A234WPB steel
- Authors: Tembo, Blessed
- Date: 2024-04
- Subjects: Number theory , Numerical analysis , Mechanical engineering
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64852 , vital:73931
- Description: Continuous monitoring of creep life in materials operating at high temperatures and pressures is imperative to prevent catastrophic failures and ensure timely replacement of worn-out components in industrial plants. Small-scale creep testing methodologies offer a valuable means of assessing material creep life while preserving structural integrity. Motivated by the need for reliable methods in creep life assessment, this study aimed to investigate the creep properties of A234WPB material subjected to service conditions using Impression creep and micro-uniaxial creep testing techniques. The research questions focused on establishing power law constants through small-scale creep testing, validating these constants using numerical modelling, and assessing their practical implementation in predicting material creep life. Samples extracted from service-exposed A234WPB steel alloy underwent step-load impression creep tests and step-temperature micro-uniaxial creep tests to derive the power law creep equation. The determined stress exponent of 3.967 indicated that dislocation creep was the dominant creep-controlling mechanism at 520 °C. A numerical model, utilizing the established power law constants, demonstrated a strong correlation with experimental findings in steady-state creep rates. Furthermore, the conventional Monkman-Grant approach was employed to predict the remaining life of the service-exposed material using impression creep data. The predicted remaining life aligned with the scatter band of uniaxial rupture life on a Larson-Miller plot, highlighting the practical utility of impression creep and micro-uniaxial creep testing techniques in assessing creep life. This study contributes to the advancement of small-scale creep testing methods and underscores their potential for practical implementation in industrial settings, thereby enhancing the reliability and safety of high-temperature and high-pressure operations. , Thesis (MEng) -- Faculty of Engineering, the Built Environment, and Technology, School of Engineering, 2024
- Full Text:
- Date Issued: 2024-04