A cyber security awareness and education framework for South Africa
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
A framework for assuring conformance of cloud-based email at higher education institutions
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
A framework for biometrics for social grants in South Africa
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
A framework to mitigate phishing threats
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
A model for managing user experience
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
A strategy to make ICT accessible in rural Zambia: a case study of Macha
- Authors: Van Stam, Gertjan
- Date: 2013
- Subjects: Communication in rural development -- Zambia , Communication and technology -- Zambia
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9830
- Description: The problem discussed in this dissertation is to gather evidence of good practice and derive strategy for the development of ICT access in rural Zambia. Access to ICT services is important, also in rural areas of Africa. The challenges are many. There is a distinct void in tangible descriptions of the realities of ICT Access in rural areas or actionable guidelines for practitioners. This study involves a case study in the rural areas of Zambia. It does so through ethnography involving 10 years of observation of aspects of ICT access in rural Macha, Zambia. In this community, emerging from an articulated vision, ICT access in the form of the Internet arrived in 2004. Macha Works with its ICT unit LinkNet provides the basis for this interpretive approach from within the rural cultural setting. The purpose of the study is to benefit the local rural community, addressing the fundamentals of reality to add to the body of knowledge. The study involves cross cultural interaction and takes a trans-disciplinary view on science. It involves Participative Action Learning and Research aimed at recognising the complex adaptive systems while being aligned with the ethics of the rural African environment. Emphasis is on the needs of the community, rather than of the individual utilising empirical evidence. The good practices in Macha that inform strategy to make ICT accessible in rural areas are: engaging the community, building relationships; workforce development, unlocking productivity; thought leadership, establishing authority.
- Full Text:
- Date Issued: 2013
- Authors: Van Stam, Gertjan
- Date: 2013
- Subjects: Communication in rural development -- Zambia , Communication and technology -- Zambia
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9830
- Description: The problem discussed in this dissertation is to gather evidence of good practice and derive strategy for the development of ICT access in rural Zambia. Access to ICT services is important, also in rural areas of Africa. The challenges are many. There is a distinct void in tangible descriptions of the realities of ICT Access in rural areas or actionable guidelines for practitioners. This study involves a case study in the rural areas of Zambia. It does so through ethnography involving 10 years of observation of aspects of ICT access in rural Macha, Zambia. In this community, emerging from an articulated vision, ICT access in the form of the Internet arrived in 2004. Macha Works with its ICT unit LinkNet provides the basis for this interpretive approach from within the rural cultural setting. The purpose of the study is to benefit the local rural community, addressing the fundamentals of reality to add to the body of knowledge. The study involves cross cultural interaction and takes a trans-disciplinary view on science. It involves Participative Action Learning and Research aimed at recognising the complex adaptive systems while being aligned with the ethics of the rural African environment. Emphasis is on the needs of the community, rather than of the individual utilising empirical evidence. The good practices in Macha that inform strategy to make ICT accessible in rural areas are: engaging the community, building relationships; workforce development, unlocking productivity; thought leadership, establishing authority.
- Full Text:
- Date Issued: 2013
A value framework for information and communication technology governance in South African higher education institutions
- Authors: Johl, Christian Peter
- Date: 2013
- Subjects: Information technology -- South Africa -- Management , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9821 , http://hdl.handle.net/10948/d1020281
- Description: The public higher education sector in South Africa is governed by an act of Parliament which defines the governance organs and mechanisms required within institutions and the sector. This doctoral thesis begins by contextualising ICT governance within the levels of systemic governance in South Africa that have relevance to this study. It then continues by advancing the understanding of the state of Information and Communication Technology (ICT) governance in public higher education institutions in South Africa by investigating the level of pervasiveness, the level of ICT process maturity and the alignment of ICT to the institutional processes within these institutions. Subsequently, this thesis results in the production of a contextually appropriate value framework that contributes towards an understanding of the need for the improvement of ICT governance. A survey of the extant literature on governance, ICT governance, and the frameworks and standards associated with governance indicates that the methodological approach currently favoured in ICT governance research is predominantly interpretive and based on surveys and interviews. This study leans towards a Design Science approach paradigm using surveys for the qualitative data collection process. The empirical research data was gathered from the highest ranking ICT officers at public higher education institutions in South Africa. This study makes contributions on a number of levels – from the first known measurement of ICT pervasiveness within the context of higher education, to the measurement of ICT process maturity and the measurement of the alignment of ICT and institutional processes, to the design of a value framework that breaks down governance into layers indicating which governance organs are appropriate at the relevant layers and which governance mechanisms can be used to address governance at each layer of governance. This study therefore makes a contribution to the ICT domain for development research by demonstrating praxis for the improvement of ICT governance implementation in the public higher education sector in South Africa. This study makes both method design and practical contributions to the ICT body of knowledge at various stages of the research process. These contributions include reflection on and analysis of the data gathering approaches that occur within the public higher education sector and in the complex environment of institutional autonomy and academic freedom; the use of Agency Theory to support the ‗governance intent‘ transfer between the layers of governance in the value framework and the synthesis of the improvement of ICT governance with value creation. The findings of this study further contribute to an understanding of the dynamics and interrelatedness of aspects of governance and management, while making a contribution to theoretical research by extending practical and empirical understanding of the ICT governance environment in the public higher education sector in South Africa.
- Full Text:
- Date Issued: 2013
- Authors: Johl, Christian Peter
- Date: 2013
- Subjects: Information technology -- South Africa -- Management , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9821 , http://hdl.handle.net/10948/d1020281
- Description: The public higher education sector in South Africa is governed by an act of Parliament which defines the governance organs and mechanisms required within institutions and the sector. This doctoral thesis begins by contextualising ICT governance within the levels of systemic governance in South Africa that have relevance to this study. It then continues by advancing the understanding of the state of Information and Communication Technology (ICT) governance in public higher education institutions in South Africa by investigating the level of pervasiveness, the level of ICT process maturity and the alignment of ICT to the institutional processes within these institutions. Subsequently, this thesis results in the production of a contextually appropriate value framework that contributes towards an understanding of the need for the improvement of ICT governance. A survey of the extant literature on governance, ICT governance, and the frameworks and standards associated with governance indicates that the methodological approach currently favoured in ICT governance research is predominantly interpretive and based on surveys and interviews. This study leans towards a Design Science approach paradigm using surveys for the qualitative data collection process. The empirical research data was gathered from the highest ranking ICT officers at public higher education institutions in South Africa. This study makes contributions on a number of levels – from the first known measurement of ICT pervasiveness within the context of higher education, to the measurement of ICT process maturity and the measurement of the alignment of ICT and institutional processes, to the design of a value framework that breaks down governance into layers indicating which governance organs are appropriate at the relevant layers and which governance mechanisms can be used to address governance at each layer of governance. This study therefore makes a contribution to the ICT domain for development research by demonstrating praxis for the improvement of ICT governance implementation in the public higher education sector in South Africa. This study makes both method design and practical contributions to the ICT body of knowledge at various stages of the research process. These contributions include reflection on and analysis of the data gathering approaches that occur within the public higher education sector and in the complex environment of institutional autonomy and academic freedom; the use of Agency Theory to support the ‗governance intent‘ transfer between the layers of governance in the value framework and the synthesis of the improvement of ICT governance with value creation. The findings of this study further contribute to an understanding of the dynamics and interrelatedness of aspects of governance and management, while making a contribution to theoretical research by extending practical and empirical understanding of the ICT governance environment in the public higher education sector in South Africa.
- Full Text:
- Date Issued: 2013
An Android and Visual C-based controller for a Delta Parallel Robot for use as a classroom training tool
- Authors: Bezuidenhout, Sarel
- Date: 2013
- Subjects: Robotics -- Human factors , Human-robot interaction , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9656 , http://hdl.handle.net/10948/d1020284
- Description: This report will show the development of a Delta Parallel robot, to aid in teaching the basics of robotic motion programming. The platform developed will be created at a fraction of the cost of conventional commercial training systems. This report will therefore show the development procedure as well as the development of some of the example training material. The system will use wireless serial data communication in the form of a Bluetooth connection. This connection will allow an Android tablet, functioning as the human-machine interface (HMI) for the system, to communicate with the motion controller. The motion controller is based in the C environment. This will allow future development of the machine, and allow the system to be used on an integral level, should the trainers require an in depth approach. The motion control software will be implemented on a RoBoard, a development board specifically designed for low- to mid-range robotics. The conclusion of this report will show an example task being completed on the training platform. This will demonstrate some of the basic robotic motion programming aspects which include point to point, linear, and circular motion types but will also include setting and resetting outputs. Performance parameters such as repeatability and reproducibility are important, as it will indirectly show the level of ease with which the system can be manipulated from the software. Finally, the results will be briefly discussed and some recommendations for improvements on the training system and suggestions for future development will be given.
- Full Text:
- Date Issued: 2013
- Authors: Bezuidenhout, Sarel
- Date: 2013
- Subjects: Robotics -- Human factors , Human-robot interaction , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9656 , http://hdl.handle.net/10948/d1020284
- Description: This report will show the development of a Delta Parallel robot, to aid in teaching the basics of robotic motion programming. The platform developed will be created at a fraction of the cost of conventional commercial training systems. This report will therefore show the development procedure as well as the development of some of the example training material. The system will use wireless serial data communication in the form of a Bluetooth connection. This connection will allow an Android tablet, functioning as the human-machine interface (HMI) for the system, to communicate with the motion controller. The motion controller is based in the C environment. This will allow future development of the machine, and allow the system to be used on an integral level, should the trainers require an in depth approach. The motion control software will be implemented on a RoBoard, a development board specifically designed for low- to mid-range robotics. The conclusion of this report will show an example task being completed on the training platform. This will demonstrate some of the basic robotic motion programming aspects which include point to point, linear, and circular motion types but will also include setting and resetting outputs. Performance parameters such as repeatability and reproducibility are important, as it will indirectly show the level of ease with which the system can be manipulated from the software. Finally, the results will be briefly discussed and some recommendations for improvements on the training system and suggestions for future development will be given.
- Full Text:
- Date Issued: 2013
Analysis of factors influencing the performance of a hydrokinetic coil pump
- Authors: Opperman, Adriaan Jacobus
- Date: 2013
- Subjects: Pumping machinery, Electric , Pumping machinery -- Performance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9640 , http://hdl.handle.net/10948/d1021041
- Description: A hydrokinetic coil pump (HCP) is described by its name. It is a coil pump driven by the kinetic energy in flowing water. The hydrokinetic energy is converted into mechanical energy by means of a paddle-wheel. The coil pump makes up part of the paddle-wheel and together is called a HCP. The HCP floats in a stream of flowing water while tethered to the bank. The focus of the study was to identify and analyse the factors influencing the HCP. The HCP was then optimized for rural application. Data acquisition took place through experimentation on a full scale experimental platform according to a central composite experimental design. Variables used for the experimentation included; Stream Velocity, Delivery Head, Number of Coils, Discharge, Number of Paddles, Paddle-Wheel rotational speed Overall HCP efficiencies of up to 22 percent were obtained. The efficiency would drop as the stream velocity increased. Stream velocity has been identified as the most influential factor with regards to the variables analysed by this study. The HCP is ideal for rural application. The simplicity of the design ensures reliability as well as an effective water supply solution. The HCP is ideal for slow flowing rivers and can deliver up to 1190ℓ/h to a delivery head of 5m with a stream velocity of 1.2m/s. This is sufficient to supply a small rural community with running water.
- Full Text:
- Date Issued: 2013
- Authors: Opperman, Adriaan Jacobus
- Date: 2013
- Subjects: Pumping machinery, Electric , Pumping machinery -- Performance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9640 , http://hdl.handle.net/10948/d1021041
- Description: A hydrokinetic coil pump (HCP) is described by its name. It is a coil pump driven by the kinetic energy in flowing water. The hydrokinetic energy is converted into mechanical energy by means of a paddle-wheel. The coil pump makes up part of the paddle-wheel and together is called a HCP. The HCP floats in a stream of flowing water while tethered to the bank. The focus of the study was to identify and analyse the factors influencing the HCP. The HCP was then optimized for rural application. Data acquisition took place through experimentation on a full scale experimental platform according to a central composite experimental design. Variables used for the experimentation included; Stream Velocity, Delivery Head, Number of Coils, Discharge, Number of Paddles, Paddle-Wheel rotational speed Overall HCP efficiencies of up to 22 percent were obtained. The efficiency would drop as the stream velocity increased. Stream velocity has been identified as the most influential factor with regards to the variables analysed by this study. The HCP is ideal for rural application. The simplicity of the design ensures reliability as well as an effective water supply solution. The HCP is ideal for slow flowing rivers and can deliver up to 1190ℓ/h to a delivery head of 5m with a stream velocity of 1.2m/s. This is sufficient to supply a small rural community with running water.
- Full Text:
- Date Issued: 2013
Analysis of restricted earth fault relay application within a shunt capacitor bank design impacting on protection stability
- Authors: Minkley, Warick
- Date: 2013
- Subjects: Electric power systems -- Protection , Electric power transmission -- Equipment and supplies -- Protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9604 , http://hdl.handle.net/10948/d1021106
- Description: This research is aimed at analyzing the performance of the restricted earth fault relay used on a 400kV capacitor bank scheme used on the Eskom Transmission network. After the commissioning of two Capacitor Banks using the above mentioned scheme design the plant was energized. As a result of the energization the Shunt Capacitor Bank (SCB) then experienced spurious trips. The cause of the trips was found to be the operation of the restricted earth fault relay. In this research project, restricted earth fault protection on SCBs in the Eskom Transmission environment will be the area of interest. The proposed research will analyze the current SCB protection scheme in service specifically looking at the restricted earth fault circuit design and relay performance. An equivalent model of the SCB from primary plant perspective based on theory will be derived. Recording and analyzing of Comtrade transient waveforms respectively, when the bank is nergized, will be done in order to provide a reference base to work from. Manual alculations of various parameters from the derived model including transient inrush currents and fault currents will be performed to access applicable scheme parameters. Further calculations will include the voltage setting for the restricted earth fault relay. As a result of the analysis a recommendation will be made on a viable solution or a revised design will be put forward, based on the results, to improve the scheme’s performance. The protection scheme is used on the two 400kV 100MVAR capacitor banks 11 and 12 at Hydra Substation.
- Full Text:
- Date Issued: 2013
- Authors: Minkley, Warick
- Date: 2013
- Subjects: Electric power systems -- Protection , Electric power transmission -- Equipment and supplies -- Protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9604 , http://hdl.handle.net/10948/d1021106
- Description: This research is aimed at analyzing the performance of the restricted earth fault relay used on a 400kV capacitor bank scheme used on the Eskom Transmission network. After the commissioning of two Capacitor Banks using the above mentioned scheme design the plant was energized. As a result of the energization the Shunt Capacitor Bank (SCB) then experienced spurious trips. The cause of the trips was found to be the operation of the restricted earth fault relay. In this research project, restricted earth fault protection on SCBs in the Eskom Transmission environment will be the area of interest. The proposed research will analyze the current SCB protection scheme in service specifically looking at the restricted earth fault circuit design and relay performance. An equivalent model of the SCB from primary plant perspective based on theory will be derived. Recording and analyzing of Comtrade transient waveforms respectively, when the bank is nergized, will be done in order to provide a reference base to work from. Manual alculations of various parameters from the derived model including transient inrush currents and fault currents will be performed to access applicable scheme parameters. Further calculations will include the voltage setting for the restricted earth fault relay. As a result of the analysis a recommendation will be made on a viable solution or a revised design will be put forward, based on the results, to improve the scheme’s performance. The protection scheme is used on the two 400kV 100MVAR capacitor banks 11 and 12 at Hydra Substation.
- Full Text:
- Date Issued: 2013
Development of a creep sample retrieval technique and friction weld site repair procedure
- Authors: Wedderburn, Ian Norman
- Date: 2013
- Subjects: Friction welding
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9635 , http://hdl.handle.net/10948/d1020116
- Description: The remnant life monitoring of creep loaded high temperature and pressure components in power stations is critical to ensuring their safe and cost effective operation as failures can have severe consequences. Effective creep life condition monitoring allows for optimising component life predictions and subsequent plant maintenance decisions. In South Africa many power generation stations have been in operation well beyond their 30 year design service life, as such knowledge of the remnant creep life of high temperature and pressure components, such as steam pipelines, becomes of utmost importance. Techniques for the remnant creep life assessments of critical high temperature and pressure components must therefore be as effective as possible. The common and well accepted in-situ inspection technique for assessing creep damage in steam pipes is by the metallographic replication technique. The technique is however limited to the outer surface of the pipe, without information on damage within the wall. This research will illustrate a means of obtaining a sample for creep life analysis with depth through the wall of a pipe, as wells as an alternative technique for the repair of the sample retrieval site. A sample retrieval technique was developed that would retrieve a small diameter cylindrical sample from a cored blind hole for creep analysis by visual creep void assessment or by the small punch creep test. The small punch creep test requires only a small diameter thin disc of material for testing for which its results are comparable with conventional uniaxial creep testing which requires a much larger sample of material. The smaller sample requirement of the small punch creep test therefore allows for a vastly reduced invasive sample retrieval operation and consequently smaller repair size area. Also the fact that the sample is retrieved from a blind hole is advantageous since the pipe wall is not penetrated which would require full plant shutdown. A friction welding technique was identified as an alternative to traditional arc fusion welding for the repair of the sample retrieval site, this technique being the Friction Hydro Pillar Processing technique. Friction Hydro Pillar Processing is a solid-state welding technique and as such has a number of inherent benefits over arc fusion welding as the weld is performed below the melting temperature of the material. From a process point of view Friction Hydro Pillar Processing is ideally suited for automation, has virtually no fumes generated, minimal distortion is experienced and no spatter has to be removed afterwards. The technique has yet to see industrial application and as such development of suitable process parameters was undertaken. Finally, to apply the sample retrieval and repair operations in-situ to a steam pipe in a power plant suitable equipment was developed. Existing friction welding equipment is generally bulky workshop based equipment and is unsuitable for on-site work due to its size and weight. Therefore development of dedicated equipment was required to enable Friction Hydro Pillar Processing to be applied to steam pipes within a power plant environment.
- Full Text:
- Date Issued: 2013
- Authors: Wedderburn, Ian Norman
- Date: 2013
- Subjects: Friction welding
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9635 , http://hdl.handle.net/10948/d1020116
- Description: The remnant life monitoring of creep loaded high temperature and pressure components in power stations is critical to ensuring their safe and cost effective operation as failures can have severe consequences. Effective creep life condition monitoring allows for optimising component life predictions and subsequent plant maintenance decisions. In South Africa many power generation stations have been in operation well beyond their 30 year design service life, as such knowledge of the remnant creep life of high temperature and pressure components, such as steam pipelines, becomes of utmost importance. Techniques for the remnant creep life assessments of critical high temperature and pressure components must therefore be as effective as possible. The common and well accepted in-situ inspection technique for assessing creep damage in steam pipes is by the metallographic replication technique. The technique is however limited to the outer surface of the pipe, without information on damage within the wall. This research will illustrate a means of obtaining a sample for creep life analysis with depth through the wall of a pipe, as wells as an alternative technique for the repair of the sample retrieval site. A sample retrieval technique was developed that would retrieve a small diameter cylindrical sample from a cored blind hole for creep analysis by visual creep void assessment or by the small punch creep test. The small punch creep test requires only a small diameter thin disc of material for testing for which its results are comparable with conventional uniaxial creep testing which requires a much larger sample of material. The smaller sample requirement of the small punch creep test therefore allows for a vastly reduced invasive sample retrieval operation and consequently smaller repair size area. Also the fact that the sample is retrieved from a blind hole is advantageous since the pipe wall is not penetrated which would require full plant shutdown. A friction welding technique was identified as an alternative to traditional arc fusion welding for the repair of the sample retrieval site, this technique being the Friction Hydro Pillar Processing technique. Friction Hydro Pillar Processing is a solid-state welding technique and as such has a number of inherent benefits over arc fusion welding as the weld is performed below the melting temperature of the material. From a process point of view Friction Hydro Pillar Processing is ideally suited for automation, has virtually no fumes generated, minimal distortion is experienced and no spatter has to be removed afterwards. The technique has yet to see industrial application and as such development of suitable process parameters was undertaken. Finally, to apply the sample retrieval and repair operations in-situ to a steam pipe in a power plant suitable equipment was developed. Existing friction welding equipment is generally bulky workshop based equipment and is unsuitable for on-site work due to its size and weight. Therefore development of dedicated equipment was required to enable Friction Hydro Pillar Processing to be applied to steam pipes within a power plant environment.
- Full Text:
- Date Issued: 2013
Development of thick section friction stir welding using a sliding tool shoulder
- Authors: Chetty, Shamalin
- Date: 2013
- Subjects: Friction welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9633 , http://hdl.handle.net/10948/d1015081
- Description: Sliding shoulder friction stir welding (SSFSW) is an alternative joining technique to the conventional friction stir welding process. The welding mechanism comprises of a rotating probe and a non-rotating shoulder. The shoulder therefore does not contribute to any heat generation or plastic deformation. When welding thicker section material, the contribution of heat generation from the shoulder becomes less significant and most of the heat and plastic deformation must be generated by the tool probe. For this reason it was decided to develop the process for thick section AA6082-T6. Due to the stationary (non-rotating) shoulder the weld track is smooth and there is no reduction in cross-sectional area. This research is based on the development of a sliding shoulder friction stir welding tool with the ability to create joints of up to 25mm thick on aluminium alloy 6082-T6 plate as well as the associated process development. The sliding shoulder friction stir welding tool was designed, manufactured and tested by initially performing partial penetration welds with various size tool probes and then finally by performing a sliding shoulder friction stir butt weld on 25mm thick plate. As welds were performed and more knowledge gained about the process, design modifications were made. These included varying the clearance between the tool probe and stationary shoulder; the profile of the shoulder which contributes to material flow during the process; and supporting the tool probe to prevent deflection when welding thicker sections at high forge forces. From the sliding shoulder friction stir welds performed, an understanding of material flow during the process was gained when analysing the macro-sections and exit holes of the welds. Typical process forces and torques associated with the process were measured to assist with future head unit and tool designs with regard to sliding shoulder friction stir welding.
- Full Text:
- Date Issued: 2013
- Authors: Chetty, Shamalin
- Date: 2013
- Subjects: Friction welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9633 , http://hdl.handle.net/10948/d1015081
- Description: Sliding shoulder friction stir welding (SSFSW) is an alternative joining technique to the conventional friction stir welding process. The welding mechanism comprises of a rotating probe and a non-rotating shoulder. The shoulder therefore does not contribute to any heat generation or plastic deformation. When welding thicker section material, the contribution of heat generation from the shoulder becomes less significant and most of the heat and plastic deformation must be generated by the tool probe. For this reason it was decided to develop the process for thick section AA6082-T6. Due to the stationary (non-rotating) shoulder the weld track is smooth and there is no reduction in cross-sectional area. This research is based on the development of a sliding shoulder friction stir welding tool with the ability to create joints of up to 25mm thick on aluminium alloy 6082-T6 plate as well as the associated process development. The sliding shoulder friction stir welding tool was designed, manufactured and tested by initially performing partial penetration welds with various size tool probes and then finally by performing a sliding shoulder friction stir butt weld on 25mm thick plate. As welds were performed and more knowledge gained about the process, design modifications were made. These included varying the clearance between the tool probe and stationary shoulder; the profile of the shoulder which contributes to material flow during the process; and supporting the tool probe to prevent deflection when welding thicker sections at high forge forces. From the sliding shoulder friction stir welds performed, an understanding of material flow during the process was gained when analysing the macro-sections and exit holes of the welds. Typical process forces and torques associated with the process were measured to assist with future head unit and tool designs with regard to sliding shoulder friction stir welding.
- Full Text:
- Date Issued: 2013
Dysfunctional facilities management service provision in an outsource environment
- Authors: Otoo, Ernest Kweku
- Date: 2013
- Subjects: Facility management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9725 , http://hdl.handle.net/10948/d1019717
- Full Text:
- Date Issued: 2013
- Authors: Otoo, Ernest Kweku
- Date: 2013
- Subjects: Facility management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9725 , http://hdl.handle.net/10948/d1019717
- Full Text:
- Date Issued: 2013
Enhancing vehicle dynamics through real-time tyre temperature analysis
- Authors: Stroud, Trevor
- Date: 2013
- Subjects: Automobiles, Racing -- Tires -- Testing , Tires -- Performance , Motor vehicles -- Springs and suspension , Motor vehicles -- Dynamics
- Language: English
- Type: Thesis , Masters , MTech (Mechanical Engineering)
- Identifier: vital:9638 , http://hdl.handle.net/10948/d1020599
- Description: Vehicle suspension optimisation is a complex and difficult task, as there are a variety of factors influencing the dynamic performance of a vehicle. During suspension development, the optimisation of a selected few of these factors is often to the detriment of others, as they are all inter-related. In addition, expertise in vehicle setup and suspension tuning is scarce, and is limited to experienced racing teams and large automotive manufacturers with extensive research and development capabilities. The motivation for this research was therefore to provide objective and user-friendly methodologies for vehicle suspension optimisation, in order to support student projects like Formula Student, while having relevance to the needs of the South African automotive industry and racing community. With the onset of digital data acquisition, it has become feasible to take real-time measurements of tyre temperatures, to provide information on how a tyre is performing at a specific point on the track. Measuring the tyre surface temperature can provide a useful indication on whether the tyre is loaded equally or not, and what suspension adjustments should be made to improve tyre load distribution.
- Full Text:
- Date Issued: 2013
- Authors: Stroud, Trevor
- Date: 2013
- Subjects: Automobiles, Racing -- Tires -- Testing , Tires -- Performance , Motor vehicles -- Springs and suspension , Motor vehicles -- Dynamics
- Language: English
- Type: Thesis , Masters , MTech (Mechanical Engineering)
- Identifier: vital:9638 , http://hdl.handle.net/10948/d1020599
- Description: Vehicle suspension optimisation is a complex and difficult task, as there are a variety of factors influencing the dynamic performance of a vehicle. During suspension development, the optimisation of a selected few of these factors is often to the detriment of others, as they are all inter-related. In addition, expertise in vehicle setup and suspension tuning is scarce, and is limited to experienced racing teams and large automotive manufacturers with extensive research and development capabilities. The motivation for this research was therefore to provide objective and user-friendly methodologies for vehicle suspension optimisation, in order to support student projects like Formula Student, while having relevance to the needs of the South African automotive industry and racing community. With the onset of digital data acquisition, it has become feasible to take real-time measurements of tyre temperatures, to provide information on how a tyre is performing at a specific point on the track. Measuring the tyre surface temperature can provide a useful indication on whether the tyre is loaded equally or not, and what suspension adjustments should be made to improve tyre load distribution.
- Full Text:
- Date Issued: 2013
Evaluating the training and supply of artisans in the South African construction industry
- Authors: Anugwo, Iruka Chijindu
- Date: 2013
- Subjects: Skilled labor -- South Africa , Skilled labor -- Training -- South Africa , Artisans -- South Africa , Construction industry -- Employees --Training of -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9672 , http://hdl.handle.net/10948/d1020042
- Description: The study focused on identifying ways in which to improve and increase the quality of training and supply of skilled artisans in the South African construction industry (especially in Gauteng Province) in terms of short and medium term approach. The construction industry is facing a severe skills crisis and this has made it so difficult to recruit competent artisans. This may be as a result of artisans being regarded as the lowest in the hierarchy of construction worker positions. In addition, these artisans warrant less training than those at executive- and managerial levels. This negative attitude towards artisans training has plunged the industry into crisis. Those involved find it difficult to successfully complete projects on time, within budgeted project costs and within the required quality specification due to lack of competent artisans. However, serious attention is required towards enhancing artisan training in the industry. It is imperative and vital to ensure the survival of the industry. The cardinal aim of this research project was to demonstrate a guiding solution towards the skills crisis. Thus, in order to initiate a tremendous change in the skills profile, certain measures are required, e.g. expanding training institutions to local regions; upgrading and aligning facilities in the training institutions to industrial demands and the dissemination of vital information that will ensure the attractiveness of the industry. This will safeguard the construction organisations operating in Gauteng Province. Although the industry is a major player in the economy, there is need for special attention in order to ensure sustainable growth and economic development. The Government, construction industry stakeholders and training institutions personnel should collaborate to salvage the skills crisis by strategically developing programmes (in accordance with industrial requirements) that will benefit prospective learners. The researcher adopted the descriptive- and analytical survey method, which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The methodology used in the research was the quantitative data analysis. The feature findings of the research concluded that the skilled artisans profile is insufficient to meet industry demands. In addition, training institutions and primary- and secondary educational systems are characterized by ninadequacy and incompetency to produce skilled artisans. The situation is exacerbated by the lack of harmonization between the training institutions and the vindustry’s requirements. Furthermore, the majority of the respondents acknowledged that training of their workers is an important aspect to them, but few of these organisations indicated that they make use of formal training institutions such as FET colleges. The recommendation include that all the stakeholders in the construction industry should form collaborations to strategically develop programmes that would upgrade the existing training institutions. This could be done through provision of adequate funds and resources and the dissemination of vital information that is capable to promote the attractiveness of the industry image.
- Full Text:
- Date Issued: 2013
- Authors: Anugwo, Iruka Chijindu
- Date: 2013
- Subjects: Skilled labor -- South Africa , Skilled labor -- Training -- South Africa , Artisans -- South Africa , Construction industry -- Employees --Training of -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9672 , http://hdl.handle.net/10948/d1020042
- Description: The study focused on identifying ways in which to improve and increase the quality of training and supply of skilled artisans in the South African construction industry (especially in Gauteng Province) in terms of short and medium term approach. The construction industry is facing a severe skills crisis and this has made it so difficult to recruit competent artisans. This may be as a result of artisans being regarded as the lowest in the hierarchy of construction worker positions. In addition, these artisans warrant less training than those at executive- and managerial levels. This negative attitude towards artisans training has plunged the industry into crisis. Those involved find it difficult to successfully complete projects on time, within budgeted project costs and within the required quality specification due to lack of competent artisans. However, serious attention is required towards enhancing artisan training in the industry. It is imperative and vital to ensure the survival of the industry. The cardinal aim of this research project was to demonstrate a guiding solution towards the skills crisis. Thus, in order to initiate a tremendous change in the skills profile, certain measures are required, e.g. expanding training institutions to local regions; upgrading and aligning facilities in the training institutions to industrial demands and the dissemination of vital information that will ensure the attractiveness of the industry. This will safeguard the construction organisations operating in Gauteng Province. Although the industry is a major player in the economy, there is need for special attention in order to ensure sustainable growth and economic development. The Government, construction industry stakeholders and training institutions personnel should collaborate to salvage the skills crisis by strategically developing programmes (in accordance with industrial requirements) that will benefit prospective learners. The researcher adopted the descriptive- and analytical survey method, which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The methodology used in the research was the quantitative data analysis. The feature findings of the research concluded that the skilled artisans profile is insufficient to meet industry demands. In addition, training institutions and primary- and secondary educational systems are characterized by ninadequacy and incompetency to produce skilled artisans. The situation is exacerbated by the lack of harmonization between the training institutions and the vindustry’s requirements. Furthermore, the majority of the respondents acknowledged that training of their workers is an important aspect to them, but few of these organisations indicated that they make use of formal training institutions such as FET colleges. The recommendation include that all the stakeholders in the construction industry should form collaborations to strategically develop programmes that would upgrade the existing training institutions. This could be done through provision of adequate funds and resources and the dissemination of vital information that is capable to promote the attractiveness of the industry image.
- Full Text:
- Date Issued: 2013
Green building guidelines at Nelson Mandela Metropolitan University
- Authors: Smit, Gerrit
- Date: 2013
- Subjects: Sustainable buildings , Sustainable architecture -- South Africa -- Port Elizabeth , College campuses
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9697 , http://hdl.handle.net/10948/d1010974 , Sustainable buildings , Sustainable architecture -- South Africa -- Port Elizabeth , College campuses
- Description: Although much research has been conducted on the greening of universities in the international context, not many studies focus on this topic in the South African context. A literature overview also identified that there are insufficient guidelines for green buildings at South African universities. Even though the Green Star rating tool is implemented in South Africa, no set of guidelines for green buildings exits at South African universities. The development of guidelines for green buildings at Nelson Mandela Metropolitan is a challenge which needs to be investigated. From the literature overview, it was possible to develop a framework containing seventeen green building aspects which could assist in developing green building guidelines. For this study, a two stage process was used to obtain information to evaluate green building guidelines critically at South African universities. Green building guidelines, as available at South African universities, were firstly explored by conducting a content analysis of all South African university websites. The information available on South African university websites regarding green buildings was scant and only two universities, namely the University of Cape Town and the University of Pretoria, reported that they had a green building. Stage two in the research process involved the empirical investigation of guidelines for green buildings at Nelson Mandela Metropolitan University. The results of the descriptive statistics showed that most building guidelines were perceived as important, but difficult to implement. The building guideline that was ranked the most important was the design of buildings that required low levels of maintenance or were maintenance free. The building guideline that was ranked the easiest to implement was to save energy in general. Considering the 17 suggested aspects and the five groups identified, a proposed set of green building guidelines was developed. The data gathered in this study is important as it could be utilised by the university to develop and implement the proposed green building guidelines.
- Full Text:
- Date Issued: 2013
- Authors: Smit, Gerrit
- Date: 2013
- Subjects: Sustainable buildings , Sustainable architecture -- South Africa -- Port Elizabeth , College campuses
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9697 , http://hdl.handle.net/10948/d1010974 , Sustainable buildings , Sustainable architecture -- South Africa -- Port Elizabeth , College campuses
- Description: Although much research has been conducted on the greening of universities in the international context, not many studies focus on this topic in the South African context. A literature overview also identified that there are insufficient guidelines for green buildings at South African universities. Even though the Green Star rating tool is implemented in South Africa, no set of guidelines for green buildings exits at South African universities. The development of guidelines for green buildings at Nelson Mandela Metropolitan is a challenge which needs to be investigated. From the literature overview, it was possible to develop a framework containing seventeen green building aspects which could assist in developing green building guidelines. For this study, a two stage process was used to obtain information to evaluate green building guidelines critically at South African universities. Green building guidelines, as available at South African universities, were firstly explored by conducting a content analysis of all South African university websites. The information available on South African university websites regarding green buildings was scant and only two universities, namely the University of Cape Town and the University of Pretoria, reported that they had a green building. Stage two in the research process involved the empirical investigation of guidelines for green buildings at Nelson Mandela Metropolitan University. The results of the descriptive statistics showed that most building guidelines were perceived as important, but difficult to implement. The building guideline that was ranked the most important was the design of buildings that required low levels of maintenance or were maintenance free. The building guideline that was ranked the easiest to implement was to save energy in general. Considering the 17 suggested aspects and the five groups identified, a proposed set of green building guidelines was developed. The data gathered in this study is important as it could be utilised by the university to develop and implement the proposed green building guidelines.
- Full Text:
- Date Issued: 2013
Guidelines for the effective use of telemedicine in public healthcare in resource constrained settings
- Authors: Kativu, Kevin
- Date: 2013
- Subjects: Telecommunication in medicine , Medical care- technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9820 , http://hdl.handle.net/10948/d1020061
- Description: On September 8 2000, world leaders gathered at the United Nations summit and resolved to help citizens in the world's poorest countries to achieve a better life by the year 2015. This resolve was outlined in the Millennium Development Goals that were subsequently published with goals 4, 5 and 6 specific to healthcare. The integration of ICT‘s in the remote delivery of services has opened new avenues from which centralised, scarce resources can be accessed remotely for the benefit of the general population. Telemedicine has made great strides in the developed world with remote populations benefiting from the improved access to healthcare. In the Eastern Cape Province of South Africa, the sub-field of teleradiology has shown promise for enabling the wider delivery of specialist services. However, in resource constrained settings such as developing countries, telemedicine has had limited success and as a result, the equitable access to healthcare for remote populations remains inconceivable. This is exacerbated by the migration of healthcare professionals both domestically and internationally. The public sector has suffered the most with acute staff shortages in the public healthcare institutions, more so in rural and remote areas. This study identifies the prevailing challenges posing as barriers to the effective use of telemedicine services in the Public health sector in resource constrained settings and provides recommendations and guidelines aimed at facilitating the adoption and effective use of telemedicine. Challenges are identified from literature and from the first person accounts of specific role-players who are directly involved with telemedicine in their respective institutions. Participants are drawn from institutions offering telemedicine services within the Eastern Cape Province of South Africa. Challenges identified from literature are collated with those identified from the participant interviews to provide a concise list of factors that is used as input to the recommendation and guideline development process. The results thus far point to an enthusiastic environment coupled with a semi-capable infrastructure but however hampered by staff shortages and a general lack of support structures and propulsion mechanisms to adequately encourage the wider use of telemedicine. The proposed guidelines aim to address the challenges at the different role-player levels.
- Full Text:
- Date Issued: 2013
- Authors: Kativu, Kevin
- Date: 2013
- Subjects: Telecommunication in medicine , Medical care- technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9820 , http://hdl.handle.net/10948/d1020061
- Description: On September 8 2000, world leaders gathered at the United Nations summit and resolved to help citizens in the world's poorest countries to achieve a better life by the year 2015. This resolve was outlined in the Millennium Development Goals that were subsequently published with goals 4, 5 and 6 specific to healthcare. The integration of ICT‘s in the remote delivery of services has opened new avenues from which centralised, scarce resources can be accessed remotely for the benefit of the general population. Telemedicine has made great strides in the developed world with remote populations benefiting from the improved access to healthcare. In the Eastern Cape Province of South Africa, the sub-field of teleradiology has shown promise for enabling the wider delivery of specialist services. However, in resource constrained settings such as developing countries, telemedicine has had limited success and as a result, the equitable access to healthcare for remote populations remains inconceivable. This is exacerbated by the migration of healthcare professionals both domestically and internationally. The public sector has suffered the most with acute staff shortages in the public healthcare institutions, more so in rural and remote areas. This study identifies the prevailing challenges posing as barriers to the effective use of telemedicine services in the Public health sector in resource constrained settings and provides recommendations and guidelines aimed at facilitating the adoption and effective use of telemedicine. Challenges are identified from literature and from the first person accounts of specific role-players who are directly involved with telemedicine in their respective institutions. Participants are drawn from institutions offering telemedicine services within the Eastern Cape Province of South Africa. Challenges identified from literature are collated with those identified from the participant interviews to provide a concise list of factors that is used as input to the recommendation and guideline development process. The results thus far point to an enthusiastic environment coupled with a semi-capable infrastructure but however hampered by staff shortages and a general lack of support structures and propulsion mechanisms to adequately encourage the wider use of telemedicine. The proposed guidelines aim to address the challenges at the different role-player levels.
- Full Text:
- Date Issued: 2013
Guidelines for the use of the Indie approach in game development projects in the context of a capstone experience
- Authors: Marais, Craig
- Date: 2013
- Subjects: Computer games -- Design , Computer games -- Programming
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9824
- Description: This research addresses the challenges associated with the supervision of game development projects as part of a capstone experience. The context of this research is the capstone experience as undertaken by third year software development students who have chosen to develop a game for their project at the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). This research begins by determining the curricular requirements with respect to the capstone experience for Information Technology (IT) qualifications. This is done by investigating the applicable documentation at the international, national and departmental levels. The position of game development as a sub-category of software development is established and the Indie paradigm is investigated as a further sub-category of game development. Furthermore, the Indie paradigm is investigated through in-depth analyses of the techniques used in the development of ten Indie games. This investigation serves to identify the commonly used techniques in the Indie paradigm. The research presents a case study of the game development projects at the School of ICT at the NMMU for the period from 2009 to 2013. This case study combined with the techniques identifed from the Indie paradigm forms the basis of the guidelines presented by this research. The guidelines are subject to a review by an industry expert. The review takes the form of an expert interview, which serves to verify the guidelines. This research concludes by demonstrating alignment with the objectives it set out to achieve and motivating the success of the research conducted.
- Full Text:
- Date Issued: 2013
- Authors: Marais, Craig
- Date: 2013
- Subjects: Computer games -- Design , Computer games -- Programming
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9824
- Description: This research addresses the challenges associated with the supervision of game development projects as part of a capstone experience. The context of this research is the capstone experience as undertaken by third year software development students who have chosen to develop a game for their project at the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). This research begins by determining the curricular requirements with respect to the capstone experience for Information Technology (IT) qualifications. This is done by investigating the applicable documentation at the international, national and departmental levels. The position of game development as a sub-category of software development is established and the Indie paradigm is investigated as a further sub-category of game development. Furthermore, the Indie paradigm is investigated through in-depth analyses of the techniques used in the development of ten Indie games. This investigation serves to identify the commonly used techniques in the Indie paradigm. The research presents a case study of the game development projects at the School of ICT at the NMMU for the period from 2009 to 2013. This case study combined with the techniques identifed from the Indie paradigm forms the basis of the guidelines presented by this research. The guidelines are subject to a review by an industry expert. The review takes the form of an expert interview, which serves to verify the guidelines. This research concludes by demonstrating alignment with the objectives it set out to achieve and motivating the success of the research conducted.
- Full Text:
- Date Issued: 2013
Hardware evolution of a digital circuit using a custom VLSI architecture
- Authors: Van den Berg, Allan Edward
- Date: 2013
- Subjects: Digital electronics , Field programmable gate arrays , Sequential machine theory
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9661 , http://hdl.handle.net/10948/d1020984
- Description: This research investigates three solutions to overcoming portability and scalability concerns in the Evolutionary Hardware (EHW) field. Firstly, the study explores if the V-FPGA—a new, portable Virtual-Reconfigurable-Circuit architecture—is a practical and viable evolution platform. Secondly, the research looks into two possible ways of making EHW systems more scalable: by optimising the system’s genetic algorithm; and by decomposing the solution circuit into smaller, evolvable sub-circuits or modules. GA optimisation is done is by: omitting a canonical GA’s crossover operator (i.e. by using an algorithm); applying evolution constraints; and optimising the fitness function. The circuit decomposition is done in order to demonstrate modular evolution. Three two-bit multiplier circuits and two sub-circuits of a simple, but real-world control circuit are evolved. The results show that the evolved multiplier circuits, when compared to a conventional multiplier, are either equal or more efficient. All the evolved circuits improve two of the four critical paths, and all are unique. Thus, it is experimentally shown that the V-FPGA is a viable hardware-platform on which hardware evolution can be implemented; and how hardware evolution is able to synthesise novel, optimised versions of conventional circuits. By comparing the and canonical GAs, the results verify that optimised GAs can find solutions quicker, and with fewer attempts. Part of the optimisation also includes a comprehensive critical-path analysis, where the findings show that the identification of dependent critical paths is vital in enhancing a GA’s efficiency. Finally, by demonstrating the modular evolution of a finite-state machine’s control circuit, it is found that although the control circuit as a whole makes use of more than double the available hardware resources on the V-FPGA and is therefore not evolvable, the evolution of each state’s sub-circuit is possible. Thus, modular evolution is shown to be a successful tool when dealing with scalability.
- Full Text:
- Date Issued: 2013
- Authors: Van den Berg, Allan Edward
- Date: 2013
- Subjects: Digital electronics , Field programmable gate arrays , Sequential machine theory
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9661 , http://hdl.handle.net/10948/d1020984
- Description: This research investigates three solutions to overcoming portability and scalability concerns in the Evolutionary Hardware (EHW) field. Firstly, the study explores if the V-FPGA—a new, portable Virtual-Reconfigurable-Circuit architecture—is a practical and viable evolution platform. Secondly, the research looks into two possible ways of making EHW systems more scalable: by optimising the system’s genetic algorithm; and by decomposing the solution circuit into smaller, evolvable sub-circuits or modules. GA optimisation is done is by: omitting a canonical GA’s crossover operator (i.e. by using an algorithm); applying evolution constraints; and optimising the fitness function. The circuit decomposition is done in order to demonstrate modular evolution. Three two-bit multiplier circuits and two sub-circuits of a simple, but real-world control circuit are evolved. The results show that the evolved multiplier circuits, when compared to a conventional multiplier, are either equal or more efficient. All the evolved circuits improve two of the four critical paths, and all are unique. Thus, it is experimentally shown that the V-FPGA is a viable hardware-platform on which hardware evolution can be implemented; and how hardware evolution is able to synthesise novel, optimised versions of conventional circuits. By comparing the and canonical GAs, the results verify that optimised GAs can find solutions quicker, and with fewer attempts. Part of the optimisation also includes a comprehensive critical-path analysis, where the findings show that the identification of dependent critical paths is vital in enhancing a GA’s efficiency. Finally, by demonstrating the modular evolution of a finite-state machine’s control circuit, it is found that although the control circuit as a whole makes use of more than double the available hardware resources on the V-FPGA and is therefore not evolvable, the evolution of each state’s sub-circuit is possible. Thus, modular evolution is shown to be a successful tool when dealing with scalability.
- Full Text:
- Date Issued: 2013
Improving decision making through analysing the economic impact of budget allocation at the city of Cape Town
- Authors: Kaiser, Gisela Noelle
- Date: 2013
- Subjects: Cape Town (South Africa) -- Politics and government , City planning -- South Africa --Cape Town , Budget -- South Africa -- Cape Town , Local government
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9684 , http://hdl.handle.net/10948/d1008305 , Cape Town (South Africa) -- Politics and government , City planning -- South Africa --Cape Town , Budget -- South Africa -- Cape Town , Local government
- Description: Local government is at the forefront of engagement between the government and South Africa’s people, delivering basic services to communities. Following the transition to a democratic government in 1994, the country was demarcated in a manner that provides complete coverage by local government. Annually, managing the administration of service delivery implementation at local government level costs the country many billions. Much of the revenue used by local government in providing services is derived from income from sale of basic services and property rates, augmented by allocations from national and provincial government, equitably shared amongst municipalities. Local government has autonomy in its operations, but is strictly governed by a collection of cascading legislation, introduced to protect the interests of the people. The primary objective of the research was to investigate the efficacy of budget expenditure in local government, in particular the City of Cape Town as a metropolitan municipality. With an annual budget approaching R30 billion, the aim was to establish how the budget was determined and allocated to the service menu provided by the City, and to investigate whether better methods of allocating expenditure could be developed. A mixed research methodology was followed, relying on quantitative methods for analysing survey data statistically, while providing for detailed qualitative methods in interviewing and studying the specific case in detail. The theoretical perspective most suited to this research was found to be that of pragmatism, for its flexibility of interpretation, practicality and space for multiple perspectives. A constructivist epistemology was adopted to provide for the interplay between object and subject in constructing meaning. This research focused on examination of applicable legislation, secondary data in reports, and statistical analysis of opinion surveys of municipal officials involved in budgeting at different levels and interviews with key stakeholders. The findings indicate that budget allocation can be improved upon in a number of ways, despite complying with a myriad of restrictive and onerous regulations applicable to local government. It was found that the administration is fragmented in its operations and that the structure of necessity favours isolated service delivery rather than integration. Further, that compliance impacts negatively on time spent in planning and pursuit of strategic intent to the extent that Reporting often becomes a more important deliverable than basic services. The size of the City hinders common understanding, and introducing any change in political vision requires particular attention.
- Full Text:
- Date Issued: 2013
- Authors: Kaiser, Gisela Noelle
- Date: 2013
- Subjects: Cape Town (South Africa) -- Politics and government , City planning -- South Africa --Cape Town , Budget -- South Africa -- Cape Town , Local government
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9684 , http://hdl.handle.net/10948/d1008305 , Cape Town (South Africa) -- Politics and government , City planning -- South Africa --Cape Town , Budget -- South Africa -- Cape Town , Local government
- Description: Local government is at the forefront of engagement between the government and South Africa’s people, delivering basic services to communities. Following the transition to a democratic government in 1994, the country was demarcated in a manner that provides complete coverage by local government. Annually, managing the administration of service delivery implementation at local government level costs the country many billions. Much of the revenue used by local government in providing services is derived from income from sale of basic services and property rates, augmented by allocations from national and provincial government, equitably shared amongst municipalities. Local government has autonomy in its operations, but is strictly governed by a collection of cascading legislation, introduced to protect the interests of the people. The primary objective of the research was to investigate the efficacy of budget expenditure in local government, in particular the City of Cape Town as a metropolitan municipality. With an annual budget approaching R30 billion, the aim was to establish how the budget was determined and allocated to the service menu provided by the City, and to investigate whether better methods of allocating expenditure could be developed. A mixed research methodology was followed, relying on quantitative methods for analysing survey data statistically, while providing for detailed qualitative methods in interviewing and studying the specific case in detail. The theoretical perspective most suited to this research was found to be that of pragmatism, for its flexibility of interpretation, practicality and space for multiple perspectives. A constructivist epistemology was adopted to provide for the interplay between object and subject in constructing meaning. This research focused on examination of applicable legislation, secondary data in reports, and statistical analysis of opinion surveys of municipal officials involved in budgeting at different levels and interviews with key stakeholders. The findings indicate that budget allocation can be improved upon in a number of ways, despite complying with a myriad of restrictive and onerous regulations applicable to local government. It was found that the administration is fragmented in its operations and that the structure of necessity favours isolated service delivery rather than integration. Further, that compliance impacts negatively on time spent in planning and pursuit of strategic intent to the extent that Reporting often becomes a more important deliverable than basic services. The size of the City hinders common understanding, and introducing any change in political vision requires particular attention.
- Full Text:
- Date Issued: 2013