Factors impacting the design of a mobile application for soil management: a case study of the Eastern Cape crops
- Authors: Botha, Stephan
- Date: 2019
- Subjects: Mobile soil management application
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/44581 , vital:38127
- Description: Some of the biggest challenges the global community has to face are the ever-dwindling levels of freshwater resources, the drastic impact of the greenhouse gases on the global climate and the loss of non-renewable fertile soil. South African agriculture contributes a total of 12.7% to the overall South African GDP (gross domestic product). Only a small portion of the South African soil is considered as being able to grow healthy and nutritious crops. The world of information communication technology (ICT) is extremely vast and growing daily with newly created tools, to accommodate the needs of a specific sector, such as agriculture. As the ICT-based agricultural solutions increase and improve, the uptake of these solutions within the South African agricultural sector becomes even smaller. The reasons for the low uptake of mobile soil management solutions for crop growing farmers are unknown, due to limited research conducted. The identified problem was a lack of understanding of the way mobile technologies can be designed to adequately support farmers to correctly manage their soil to produce the best possible crops. The primary objective of this research study was to identify factors, which may have a significant impact on the design of a mobile soil management application for crop farmers in the Eastern Cape (South Africa). The secondary objectives were as follows: (i) to determine what soil management is and which aspects are required to implement soil management effectively; (ii) to identify possible mobile technologies suitable to act as an effective support structure for a mobile soil management application; and (iii) to identify which user experience guidelines are key for the development of an effective mobile soil management solution and to compile a user experience guideline for an effective mobile soil management solution. Achieving these objectives, resulted in a better understanding of the identified problem. The problem was addressed by conducting a thorough literature review and a case study to better grasp the different aspects of the identified problem. Quantitative data was collected by conducting a user interface evaluation. Qualitative data were also gathered by means of a field test using the mobile soil management application. The field test was done in conjunction with a heuristic evaluation, completed by the participants. Data triangulation was used to compare the results of the gathered data. The results from the data triangulation were used to confirm the factors, which made the most significant impact on the success of the soil management application. These confirmed design factors were used to produce a list of guidelines to improve the design of future mobile ICT soil management applications.
- Full Text:
- Date Issued: 2019
- Authors: Botha, Stephan
- Date: 2019
- Subjects: Mobile soil management application
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/44581 , vital:38127
- Description: Some of the biggest challenges the global community has to face are the ever-dwindling levels of freshwater resources, the drastic impact of the greenhouse gases on the global climate and the loss of non-renewable fertile soil. South African agriculture contributes a total of 12.7% to the overall South African GDP (gross domestic product). Only a small portion of the South African soil is considered as being able to grow healthy and nutritious crops. The world of information communication technology (ICT) is extremely vast and growing daily with newly created tools, to accommodate the needs of a specific sector, such as agriculture. As the ICT-based agricultural solutions increase and improve, the uptake of these solutions within the South African agricultural sector becomes even smaller. The reasons for the low uptake of mobile soil management solutions for crop growing farmers are unknown, due to limited research conducted. The identified problem was a lack of understanding of the way mobile technologies can be designed to adequately support farmers to correctly manage their soil to produce the best possible crops. The primary objective of this research study was to identify factors, which may have a significant impact on the design of a mobile soil management application for crop farmers in the Eastern Cape (South Africa). The secondary objectives were as follows: (i) to determine what soil management is and which aspects are required to implement soil management effectively; (ii) to identify possible mobile technologies suitable to act as an effective support structure for a mobile soil management application; and (iii) to identify which user experience guidelines are key for the development of an effective mobile soil management solution and to compile a user experience guideline for an effective mobile soil management solution. Achieving these objectives, resulted in a better understanding of the identified problem. The problem was addressed by conducting a thorough literature review and a case study to better grasp the different aspects of the identified problem. Quantitative data was collected by conducting a user interface evaluation. Qualitative data were also gathered by means of a field test using the mobile soil management application. The field test was done in conjunction with a heuristic evaluation, completed by the participants. Data triangulation was used to compare the results of the gathered data. The results from the data triangulation were used to confirm the factors, which made the most significant impact on the success of the soil management application. These confirmed design factors were used to produce a list of guidelines to improve the design of future mobile ICT soil management applications.
- Full Text:
- Date Issued: 2019
A framework for the integration of mobile technology into adventure sport for the purpose of increasing participant safety
- Authors: Mills, Craig John
- Date: 2018
- Subjects: Mobile communication systems , Health promotion -- Technological innovations Sports -- Technological innovations Cell phones -- Health aspects
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/32099 , vital:31958
- Description: The sporting industry has seen incredible advancements with the use of information technology. Technology is used in the sporting industry for training, coaching and even as a deciding factor of a game result. There are certain sports which require individuals to venture into isolated environments, these sports have been termed adventure or extreme sports. Due to the extreme environmental factors that can occur with adventure sport, it is possible for an individual to experience an emergency situation. Emergency situations can occur at any time, and this is especially true in adventure sport. Adventure sport such as ocean and river kayaking require individuals to venture into isolated environments, where if an emergency situation occurs could result in an individual left stranded waiting for emergency rescue. Adventure sport participants and Event Organizers are aware of the dangers associated with this type of adventure sport, but there is currently no requirement to have a mobile technology device present during kayaking events. The main purpose of this dissertation was to evaluate the current use of mobile technology in adventure sport in the Eastern Cape province of South Africa. To accomplish this two literature reviews were conducted which identi_ed information on the two main themes which are adventure sport and mobile technology. To produce information from the ocean and river kayaking community an online questionnaire was distributed to several kayaking clubs in the Eastern Cape province of South Africa. This dissertation also presents a framework that proposes the use of mobile technology hardware and software by participants and event organisers in an attempt to increase the safety of events in this form of adventure sport. It is hoped that the framework for using mobile technology to increase the safety of adventure sport proposed in this research, may provide clear guidance for the achievement of a safer sporting experience for the participants of ocean and river kayaking.
- Full Text:
- Date Issued: 2018
- Authors: Mills, Craig John
- Date: 2018
- Subjects: Mobile communication systems , Health promotion -- Technological innovations Sports -- Technological innovations Cell phones -- Health aspects
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/32099 , vital:31958
- Description: The sporting industry has seen incredible advancements with the use of information technology. Technology is used in the sporting industry for training, coaching and even as a deciding factor of a game result. There are certain sports which require individuals to venture into isolated environments, these sports have been termed adventure or extreme sports. Due to the extreme environmental factors that can occur with adventure sport, it is possible for an individual to experience an emergency situation. Emergency situations can occur at any time, and this is especially true in adventure sport. Adventure sport such as ocean and river kayaking require individuals to venture into isolated environments, where if an emergency situation occurs could result in an individual left stranded waiting for emergency rescue. Adventure sport participants and Event Organizers are aware of the dangers associated with this type of adventure sport, but there is currently no requirement to have a mobile technology device present during kayaking events. The main purpose of this dissertation was to evaluate the current use of mobile technology in adventure sport in the Eastern Cape province of South Africa. To accomplish this two literature reviews were conducted which identi_ed information on the two main themes which are adventure sport and mobile technology. To produce information from the ocean and river kayaking community an online questionnaire was distributed to several kayaking clubs in the Eastern Cape province of South Africa. This dissertation also presents a framework that proposes the use of mobile technology hardware and software by participants and event organisers in an attempt to increase the safety of events in this form of adventure sport. It is hoped that the framework for using mobile technology to increase the safety of adventure sport proposed in this research, may provide clear guidance for the achievement of a safer sporting experience for the participants of ocean and river kayaking.
- Full Text:
- Date Issued: 2018
A social networking approach to security awareness in end-user cyber-driven financial transactions
- Authors: Maharaj, Rahul
- Date: 2018
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/48824 , vital:41144
- Description: Cyberspace, including the internet and associated technologies have become critical to social users in their day to day lives. Social users have grown to become reliant on cyberspace and associated cyber services. As such, a culture of users becoming dependent on cyberspace has formed. This cyberculture need to ensure that they can make use of cyberspace and associated cyber services in a safe and secure manner. This is particularly true for those social users involved in cyberdriven financial transactions. Therefore, the aim of this research study is to report on research undertaken, to assist said users by providing them with an alternative educational approach to cyber security, education, awareness and training.
- Full Text:
- Authors: Maharaj, Rahul
- Date: 2018
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/48824 , vital:41144
- Description: Cyberspace, including the internet and associated technologies have become critical to social users in their day to day lives. Social users have grown to become reliant on cyberspace and associated cyber services. As such, a culture of users becoming dependent on cyberspace has formed. This cyberculture need to ensure that they can make use of cyberspace and associated cyber services in a safe and secure manner. This is particularly true for those social users involved in cyberdriven financial transactions. Therefore, the aim of this research study is to report on research undertaken, to assist said users by providing them with an alternative educational approach to cyber security, education, awareness and training.
- Full Text:
Users’ perceptions regarding password policies
- Authors: Fredericks, Damian Todd
- Date: 2018
- Subjects: Computers -- Access control , Computer networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/30205 , vital:30896
- Description: Information is considered a valuable asset to most organisations and is often exposed to various threats which exploit its confidentiality, integrity and availability (CIA). Identification and Authentication are commonly used to help ensure the CIA of information. This research study specifically focused on password-based authentication. Passwords are used to log into personal computers, company computers, email accounts, bank accounts and various software systems and mobile applications. Passwords act like a protective barrier between a user and their personal and company information, and remain the most cost-effective and most efficient method to control access to computer systems. An extensive content analysis was conducted regarding the security of passwords, as well as users’ password management coping strategies. It was determined that very little research has been conducted in relation to users’ perceptions towards password policies. The problem identified by this research is that organisations often implement password policy guidelines without taking into consideration users’ perceptions regarding such guidelines. This could result in users adopting various password management coping strategies. This research therefore aimed to determine users’ perceptions with regard to current password-related standards and best practices (password policy guidelines). Standards and best practices such as ISO/IEC 27002 (2013), NIST SP 800-118 (2009), NIST SP 800-63-2 (2013), NIST SP 800-63B (2016) and the SANS Password Protection Policy (2014b) were studied in order to determine the common elements of password policies. This research argued that before organisations implement password policy guidelines, they need to determine users’ perceptions towards such guidelines. It was identified that certain human factors such as human memory, attitude and apathy often cause users to adopt insecure coping strategies such as Reusing Passwords, Writing Down Passwords and Not Changing Passwords. This research included a survey which took the form of a questionnaire. The aim of the survey was to determine users’ perceptions towards common elements of password policies and to determine the coping strategies users commonly adopt. The survey included questions related to the new NIST SP 800-63B (2016) that sought to determine users’ perceptions towards these new NIST password policy iii guidelines. Findings from the survey indicated that respondents found the new NIST guidelines to be helpful, secure and easier to adhere to. Finally, recommendations regarding password policies were presented based on the common elements of password policies and users’ perceptions of the new NIST password guidelines. These recommendations could help policy makers in the implementation of new password policies or the revision of current password policies.
- Full Text:
- Date Issued: 2018
- Authors: Fredericks, Damian Todd
- Date: 2018
- Subjects: Computers -- Access control , Computer networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/30205 , vital:30896
- Description: Information is considered a valuable asset to most organisations and is often exposed to various threats which exploit its confidentiality, integrity and availability (CIA). Identification and Authentication are commonly used to help ensure the CIA of information. This research study specifically focused on password-based authentication. Passwords are used to log into personal computers, company computers, email accounts, bank accounts and various software systems and mobile applications. Passwords act like a protective barrier between a user and their personal and company information, and remain the most cost-effective and most efficient method to control access to computer systems. An extensive content analysis was conducted regarding the security of passwords, as well as users’ password management coping strategies. It was determined that very little research has been conducted in relation to users’ perceptions towards password policies. The problem identified by this research is that organisations often implement password policy guidelines without taking into consideration users’ perceptions regarding such guidelines. This could result in users adopting various password management coping strategies. This research therefore aimed to determine users’ perceptions with regard to current password-related standards and best practices (password policy guidelines). Standards and best practices such as ISO/IEC 27002 (2013), NIST SP 800-118 (2009), NIST SP 800-63-2 (2013), NIST SP 800-63B (2016) and the SANS Password Protection Policy (2014b) were studied in order to determine the common elements of password policies. This research argued that before organisations implement password policy guidelines, they need to determine users’ perceptions towards such guidelines. It was identified that certain human factors such as human memory, attitude and apathy often cause users to adopt insecure coping strategies such as Reusing Passwords, Writing Down Passwords and Not Changing Passwords. This research included a survey which took the form of a questionnaire. The aim of the survey was to determine users’ perceptions towards common elements of password policies and to determine the coping strategies users commonly adopt. The survey included questions related to the new NIST SP 800-63B (2016) that sought to determine users’ perceptions towards these new NIST password policy iii guidelines. Findings from the survey indicated that respondents found the new NIST guidelines to be helpful, secure and easier to adhere to. Finally, recommendations regarding password policies were presented based on the common elements of password policies and users’ perceptions of the new NIST password guidelines. These recommendations could help policy makers in the implementation of new password policies or the revision of current password policies.
- Full Text:
- Date Issued: 2018
Modelling the intention to change Facebook privacy settings on mobile phones
- Authors: Miya, Asanda Christopher
- Date: 2017
- Subjects: Online social networks -- Security measures Cell phone systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/19531 , vital:28890
- Description: Facebook and other social networking services have significantly changed the way people communicate and share information on the Internet. People are increasingly accessing these networking services on mobile phones as opposed to traditional computers. While privacy in social networking services always was a concern, mobile phones make it even easier to share personal information, thus spotlighting privacy concerns. Facebook has privacy settings for the users who use the service on various mobile phones. However, the failure of Facebook users to change privacy settings on mobile phones may result in undesirable sharing of personal information thereby exposing the users to privacy threats. This study extends the understanding of the use of Facebook privacy settings by investigating what impacts the intention to change the privacy settings on mobile phones. The Theory of Planned Behaviour (TPB) is identified as a theoretical underpinning that relates to the intention to perform a behaviour. Structural equation modelling is chosen as a suitable research method. A conceptual model is theorized by building on the Theory of Planned Behaviour. Following suggestions by other studies, the Perceived Behavioural Control (PBC) construct are speci_cally deconstructed into internal and external factors. Nine hypotheses are predicted. A measurement instrument in the form of a questionnaire consisting of 43 items is developed. The conceptual model is evaluated using empirical data, which is gathered from a sample of 414 South African Facebook users. The evaluation of the conceptual model shows it to be a good fit. Out of the nine hypotheses, five are accepted for the final model of the study. Self-efficacy are found to be a positive internal factor that inuences user's perceived control of changing Facebook privacy settings on mobile phones. Facilitating conditions and Perceived Required effort are found to be external factors that respectively have a positive and negative inuence on user's Perceived Behavioural Control. Attitude and Perceived Behavioural Control are both found to have a positive inuence on user's intention to change Facebook privacy settings on mobile phones. The hypotheses that could not be accepted are discussed and it is argued that potential unintended bias in the sample may have had an inuence. More detailed investigation are left for future studies.
- Full Text:
- Date Issued: 2017
- Authors: Miya, Asanda Christopher
- Date: 2017
- Subjects: Online social networks -- Security measures Cell phone systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/19531 , vital:28890
- Description: Facebook and other social networking services have significantly changed the way people communicate and share information on the Internet. People are increasingly accessing these networking services on mobile phones as opposed to traditional computers. While privacy in social networking services always was a concern, mobile phones make it even easier to share personal information, thus spotlighting privacy concerns. Facebook has privacy settings for the users who use the service on various mobile phones. However, the failure of Facebook users to change privacy settings on mobile phones may result in undesirable sharing of personal information thereby exposing the users to privacy threats. This study extends the understanding of the use of Facebook privacy settings by investigating what impacts the intention to change the privacy settings on mobile phones. The Theory of Planned Behaviour (TPB) is identified as a theoretical underpinning that relates to the intention to perform a behaviour. Structural equation modelling is chosen as a suitable research method. A conceptual model is theorized by building on the Theory of Planned Behaviour. Following suggestions by other studies, the Perceived Behavioural Control (PBC) construct are speci_cally deconstructed into internal and external factors. Nine hypotheses are predicted. A measurement instrument in the form of a questionnaire consisting of 43 items is developed. The conceptual model is evaluated using empirical data, which is gathered from a sample of 414 South African Facebook users. The evaluation of the conceptual model shows it to be a good fit. Out of the nine hypotheses, five are accepted for the final model of the study. Self-efficacy are found to be a positive internal factor that inuences user's perceived control of changing Facebook privacy settings on mobile phones. Facilitating conditions and Perceived Required effort are found to be external factors that respectively have a positive and negative inuence on user's Perceived Behavioural Control. Attitude and Perceived Behavioural Control are both found to have a positive inuence on user's intention to change Facebook privacy settings on mobile phones. The hypotheses that could not be accepted are discussed and it is argued that potential unintended bias in the sample may have had an inuence. More detailed investigation are left for future studies.
- Full Text:
- Date Issued: 2017
- «
- ‹
- 1
- ›
- »