A comparison of implementation platforms for the visualisation of animal family trees
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A cyber security strategy to mitigate cloud computing risks within the investment management sector in Cape Town
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for a cybersecurity policy in South African schools
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the integration of 4IR-related topics into IT undergraduate curricula in South Africa
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A methodology for modernising legacy web applications: subtitle if needed. If no subtitle follow instructions in manual
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for speech-driven lesson summary generation in a noisy educational environment
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A process for integrated fitness and menstrual cycle data visualisations
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A qualitative review on the manner in which psychologists address language barriers in psychological testing with isiXhosa speaking clients
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
A review of the quality of the covid-19 terminology that has been translated into isiXhosa
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
A strategic approach for handling information security incidents in higher education
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A strategy for the implementation of IT shared services at the Nelson Mandela University
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
An assessment of community participation in disaster management: A Case Study of Nelson Mandela Bay Municipality
- Authors: Stemele, Lwandiso Phololo
- Date: 2024-04
- Subjects: Disaster relief -- South Africa -- Port Elizabeth , Crisis management -- South Africa -- Port Elizabeth , Political participation -- South Africa -- Eastern Cape -- Nelson Mandela Bay Municipality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63540 , vital:73489
- Description: This study sought to assess the level of community participation in disaster management by the communities that are most affected by floods and fires in informal settlements. The study aimed to assess the level of awareness of disaster risks at a community level and thereby provide recommendations to increase the level of participation, involvement and awareness in disaster management by the communities. This research adopted both qualitative and quantitative research approaches to form a mixed-method research approach. Data was collected using both approaches and converged to form the results and analysis of the empirical survey. From these results and analysis, recommendations are presented, which also draw insight from the literature review, to assist the Nelson Mandela Bay Municipality to better involve communities in disaster management. , Thesis (MA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Stemele, Lwandiso Phololo
- Date: 2024-04
- Subjects: Disaster relief -- South Africa -- Port Elizabeth , Crisis management -- South Africa -- Port Elizabeth , Political participation -- South Africa -- Eastern Cape -- Nelson Mandela Bay Municipality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63540 , vital:73489
- Description: This study sought to assess the level of community participation in disaster management by the communities that are most affected by floods and fires in informal settlements. The study aimed to assess the level of awareness of disaster risks at a community level and thereby provide recommendations to increase the level of participation, involvement and awareness in disaster management by the communities. This research adopted both qualitative and quantitative research approaches to form a mixed-method research approach. Data was collected using both approaches and converged to form the results and analysis of the empirical survey. From these results and analysis, recommendations are presented, which also draw insight from the literature review, to assist the Nelson Mandela Bay Municipality to better involve communities in disaster management. , Thesis (MA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An assessment of the presidential youth employment programme on job creation in the department of Education, Eastern Cape
- Authors: Mnqwazi, Zweledinga
- Date: 2024-04
- Subjects: Job creation -- South Africa -- Eastern Cape , Youth development -- South Africa -- Eastern Cape , Youth -- Services for
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63357 , vital:73260
- Description: The presidential youth employment stimulus programme is a prominent imitative by the South African government aimed at addressing poverty and youth unemployment in the country. the programme has created many job opportunities for the youth in various government departments. in this study, the primary focus was on examining the impact of the programme on job creation within the Eastern Cape Department of Education, a province characterized by unique socio-economic challenges. The focused approach aimed to provide contextually relevant findings that may possibly contribute to the broader understanding of youth employment interventions on job creation. A qualitative study based on secondary data collection techniques was used to find answers to the research questions. Government reports, textbooks, and reports from the Eastern Cape Department of Education were the sources of data collection . In analyzing the gathered data, thematic analysis was employed following the guidelines by Braun and Clarke (2006). The study findings provide insights into the strengths of the presidential youth employment initiative, which includes employment opportunities, skills development and training. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mnqwazi, Zweledinga
- Date: 2024-04
- Subjects: Job creation -- South Africa -- Eastern Cape , Youth development -- South Africa -- Eastern Cape , Youth -- Services for
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63357 , vital:73260
- Description: The presidential youth employment stimulus programme is a prominent imitative by the South African government aimed at addressing poverty and youth unemployment in the country. the programme has created many job opportunities for the youth in various government departments. in this study, the primary focus was on examining the impact of the programme on job creation within the Eastern Cape Department of Education, a province characterized by unique socio-economic challenges. The focused approach aimed to provide contextually relevant findings that may possibly contribute to the broader understanding of youth employment interventions on job creation. A qualitative study based on secondary data collection techniques was used to find answers to the research questions. Government reports, textbooks, and reports from the Eastern Cape Department of Education were the sources of data collection . In analyzing the gathered data, thematic analysis was employed following the guidelines by Braun and Clarke (2006). The study findings provide insights into the strengths of the presidential youth employment initiative, which includes employment opportunities, skills development and training. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An assessment of the youth employment creation strategy in Buffalo City Metropolitan Municipality: a case of Isiqalo Youth Fund
- Authors: Tantsi, Yanga Ntombizodidi
- Date: 2024-04
- Subjects: Youth -- Employment -- South Africa -- Eastern Cape -- Buffalo City Metropolitan Municipality , Youth -- Employment -- Government policy , Youth development -- South Africa Eastern Cape -- Finance
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63551 , vital:73492
- Description: Youth unemployment is a persistent and pressing challenge faced by communities and governments worldwide. In Buffalo City Metropolitan Municipality, a region characterised by its diverse socioeconomic landscape and unique set of opportunities and constraints, the issue of youth unemployment is of particular concern. The Isiqalo Youth Fund was established as a strategic initiative to address this challenge and promote economic empowerment and employability among the youth. This fund was designed to provide financial support and resources to young individuals in the municipality, offering them the opportunity to gain the skills, training, and experience required to enter the workforce and make meaningful contributions to the local economy. The study aimed to assess the implementation of the Isiqalo Youth Fund, which aims to facilitate youth employment in Buffalo City Metropolitan Municipality. The study utilised the qualitative research methodology, and the sample was selected using a purposive sampling technique. The sample for this study comprised ten youth beneficiaries of the Isiqalo Youth Fund, five officials from the Office of the Premier, and five officials from the Department of Economic Development, Environmental Affairs and Tourism (DEDEAT) responsible for the administration and oversight of the fund. Semi-structured interviews were conducted to capture the experiences and perceptions of the youth beneficiaries and the insights of the officials involved in the implementation of the Isiqalo Youth Fund. The study’s findings from the beneficiaries’ perspective indicate that accessing the Isiqalo Youth Fund is associated with several challenges, such as high levels of bureaucracy, poor fund management, a lack of information, lack of proper monitoring and evaluation mechanisms, and complex application procedures. The findings from the administrators’ perspectives indicated that a lack of ethics, fair dealing, and accountability adversely influenced the effective administration of the Isiqalo Youth Fund. The study recommends that local authorities and stakeholders collaborate to simplify the application process, improve fund management, increase awareness, offer support and mentorship, and enhance project monitoring and evaluation. , Thesis (MA) -- Faculty of Humanities, School of Public Management and Leadership, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Tantsi, Yanga Ntombizodidi
- Date: 2024-04
- Subjects: Youth -- Employment -- South Africa -- Eastern Cape -- Buffalo City Metropolitan Municipality , Youth -- Employment -- Government policy , Youth development -- South Africa Eastern Cape -- Finance
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63551 , vital:73492
- Description: Youth unemployment is a persistent and pressing challenge faced by communities and governments worldwide. In Buffalo City Metropolitan Municipality, a region characterised by its diverse socioeconomic landscape and unique set of opportunities and constraints, the issue of youth unemployment is of particular concern. The Isiqalo Youth Fund was established as a strategic initiative to address this challenge and promote economic empowerment and employability among the youth. This fund was designed to provide financial support and resources to young individuals in the municipality, offering them the opportunity to gain the skills, training, and experience required to enter the workforce and make meaningful contributions to the local economy. The study aimed to assess the implementation of the Isiqalo Youth Fund, which aims to facilitate youth employment in Buffalo City Metropolitan Municipality. The study utilised the qualitative research methodology, and the sample was selected using a purposive sampling technique. The sample for this study comprised ten youth beneficiaries of the Isiqalo Youth Fund, five officials from the Office of the Premier, and five officials from the Department of Economic Development, Environmental Affairs and Tourism (DEDEAT) responsible for the administration and oversight of the fund. Semi-structured interviews were conducted to capture the experiences and perceptions of the youth beneficiaries and the insights of the officials involved in the implementation of the Isiqalo Youth Fund. The study’s findings from the beneficiaries’ perspective indicate that accessing the Isiqalo Youth Fund is associated with several challenges, such as high levels of bureaucracy, poor fund management, a lack of information, lack of proper monitoring and evaluation mechanisms, and complex application procedures. The findings from the administrators’ perspectives indicated that a lack of ethics, fair dealing, and accountability adversely influenced the effective administration of the Isiqalo Youth Fund. The study recommends that local authorities and stakeholders collaborate to simplify the application process, improve fund management, increase awareness, offer support and mentorship, and enhance project monitoring and evaluation. , Thesis (MA) -- Faculty of Humanities, School of Public Management and Leadership, 2024
- Full Text:
- Date Issued: 2024-04
An evaluation of the monitoring and evaluation process of the scholar transport programme: a case of Amthole West Education District
- Authors: Tengile, Sindisiwe
- Date: 2024-04
- Subjects: Monitoring , Evaluation , Transportation -- South Africa -- Eastern Cape
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63562 , vital:73503
- Description: Access to education is a constitutional right, calling for the state to institute reasonable measures to ensure every learner has access to education. The scholar transport programme was introduced to ensure access to education for learners who live far from school, particularly those living in rural areas. The study aimed to evaluate the processes that the scholar transport programme utilizes in the Amatole West Education District. Change theory served as the theoretical framework underpinning this qualitative study. Secondary data was collected and analyzed using thematic analysis. The study revealed that the Amatole West Education District employs several strategies, including stakeholder participation, route scrutiny, and safety checks. The research identified a lack of resources and capacity constraints as challenges to the Amatole West Education District encounter. The study recommends that the district enhance the competence of employees and other stakeholders with the necessary skills and knowledge to enable them to perform monitoring and evaluation(M&E) completely. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Tengile, Sindisiwe
- Date: 2024-04
- Subjects: Monitoring , Evaluation , Transportation -- South Africa -- Eastern Cape
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63562 , vital:73503
- Description: Access to education is a constitutional right, calling for the state to institute reasonable measures to ensure every learner has access to education. The scholar transport programme was introduced to ensure access to education for learners who live far from school, particularly those living in rural areas. The study aimed to evaluate the processes that the scholar transport programme utilizes in the Amatole West Education District. Change theory served as the theoretical framework underpinning this qualitative study. Secondary data was collected and analyzed using thematic analysis. The study revealed that the Amatole West Education District employs several strategies, including stakeholder participation, route scrutiny, and safety checks. The research identified a lack of resources and capacity constraints as challenges to the Amatole West Education District encounter. The study recommends that the district enhance the competence of employees and other stakeholders with the necessary skills and knowledge to enable them to perform monitoring and evaluation(M&E) completely. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An in vitro assessment of pharmacodynamic interactions between selected herbal extracts and anticancer chemotherapeutic agents
- Hwehwe, Nyashadzashe, Swanepoel, Bresler
- Authors: Hwehwe, Nyashadzashe , Swanepoel, Bresler
- Date: 2024-04
- Subjects: Chemotherapy , Herbs -- Therapeutic use , Antineoplastic agents
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63506 , vital:73383
- Description: Cancer is a disease caused by uncontrolled growth and spreading of abnormal cells to distant body parts. Approximately 19.3 million and 10 million new cancer cases and cancer deaths, respectively were recorded in 2020. Despite advancements in prevention and therapeutic strategies, cancer remains a global health problem. Cancer patients are increasingly seeking complementary and alternative medicines, of which herbal medicines are the most common form of CAM used by patients. Numerous in vitro and in vivo studies of herbal medicines in cancer have shown that they have antioxidant and anticancer (antitumor and anti-proliferative) properties. While concurrent use with conventional cancer treatments may improve treatment efficacy, alleviate chemotherapy-related side effects, boost the immune system, or impede drug resistance, it can also prompt drug-herbal interactions, and this may affect the pharmacodynamics and pharmacokinetics of the chemotherapeutic drug. This study aimed to determine relevant pharmacodynamic interactions with chemotherapeutic drugs and investigate such interactions' mechanisms. The objectives of the study were to screen the cytotoxicity effects of drug compounds, herbal extracts, and drug-herb combinations, to determine the ability of treatments to induce apoptosis, and to determine the most beneficial treatment. The cytotoxic effects of cisplatin in HeLa cells, tamoxifen in MCF7 cells, 5-fluorouracil in Caco-2 cells, and grapeseed, green tea, fermented rooibos, and green rooibos in all the listed cell lines were evaluated individually and in combination using the bis-Benzamide H 33342 trihydrochloride/propidium iodide (Hoechst 33342/PI) dual staining method. CompuSyn 1.0 Software was used to quantify synergism and antagonism. The mechanism of apoptosis induction of the different synergetic combinations, drug compounds, and herbal extracts was illustrated by quantitative fluorescence image analysis, specifically cell cycle analysis, phosphatidylserine translocation, mitochondrial membrane potential analysis, caspase 3 activation, and reactive oxygen species production using the relevant contrast dyes. Grapeseed displayed cytotoxicity towards MCF7 and HeLa cells (IC50 57.98 and 83.28 μg/mL, respectively). Green tea was only cytotoxic against HeLa cells at an IC50 of 91,92 μg/mL. None of the extracts displayed cytotoxicity against Caco-2 cells (IC50 values > 200μg/mL). If the herbal extracts had inconclusive IC50 values in the three cell lines subsequent experiments were conducted using 100 μg/mL. The results showed that most of the combinations were antagonistic but, some combinations had synergistic or enhancement effects(1:3 for cisplatin with grape seed or green tea and tamoxifen with grapeseed or green tea, and 3:1 for cisplatin with green tea as well as for tamoxifen with fermented rooibos or green rooibos, and all the 1:1 combinations of 5- fluorouracil with all herbal extracts) with a combination index (CI) < 1. Grape seed and green tea were found to induce apoptosis in the three cell lines. Assays that were conducted to detect apoptosis induction showed positive staining for phosphatidylserine (PS), activated caspase 3, and reactive oxygen species (ROS), mitochondrial membrane depolarization. Analysis of the cell cycle showed two things; 1) that grape seed and green tea were apoptotic in HeLa and MCF7 cells only, and 2) the extracts of green tea and green rooibos, and the combinations of grape seed with all drug compounds arrested the cell in more than one phase of the cell cycle. The combinations of grapeseed and green tea potentially induced apoptosis in various manners but those with both rooibos extracts were unclear in all the cell lines. The results for combinations with grapeseed and green tea are promising and provide a basis for further research as combinations of chemotherapeutic drugs and herbal extracts may be effective therapeutic strategies. , Thesis (MPharm) -- Faculty of Health Sciences, School of Clinical Care & Medicinal Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Hwehwe, Nyashadzashe , Swanepoel, Bresler
- Date: 2024-04
- Subjects: Chemotherapy , Herbs -- Therapeutic use , Antineoplastic agents
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63506 , vital:73383
- Description: Cancer is a disease caused by uncontrolled growth and spreading of abnormal cells to distant body parts. Approximately 19.3 million and 10 million new cancer cases and cancer deaths, respectively were recorded in 2020. Despite advancements in prevention and therapeutic strategies, cancer remains a global health problem. Cancer patients are increasingly seeking complementary and alternative medicines, of which herbal medicines are the most common form of CAM used by patients. Numerous in vitro and in vivo studies of herbal medicines in cancer have shown that they have antioxidant and anticancer (antitumor and anti-proliferative) properties. While concurrent use with conventional cancer treatments may improve treatment efficacy, alleviate chemotherapy-related side effects, boost the immune system, or impede drug resistance, it can also prompt drug-herbal interactions, and this may affect the pharmacodynamics and pharmacokinetics of the chemotherapeutic drug. This study aimed to determine relevant pharmacodynamic interactions with chemotherapeutic drugs and investigate such interactions' mechanisms. The objectives of the study were to screen the cytotoxicity effects of drug compounds, herbal extracts, and drug-herb combinations, to determine the ability of treatments to induce apoptosis, and to determine the most beneficial treatment. The cytotoxic effects of cisplatin in HeLa cells, tamoxifen in MCF7 cells, 5-fluorouracil in Caco-2 cells, and grapeseed, green tea, fermented rooibos, and green rooibos in all the listed cell lines were evaluated individually and in combination using the bis-Benzamide H 33342 trihydrochloride/propidium iodide (Hoechst 33342/PI) dual staining method. CompuSyn 1.0 Software was used to quantify synergism and antagonism. The mechanism of apoptosis induction of the different synergetic combinations, drug compounds, and herbal extracts was illustrated by quantitative fluorescence image analysis, specifically cell cycle analysis, phosphatidylserine translocation, mitochondrial membrane potential analysis, caspase 3 activation, and reactive oxygen species production using the relevant contrast dyes. Grapeseed displayed cytotoxicity towards MCF7 and HeLa cells (IC50 57.98 and 83.28 μg/mL, respectively). Green tea was only cytotoxic against HeLa cells at an IC50 of 91,92 μg/mL. None of the extracts displayed cytotoxicity against Caco-2 cells (IC50 values > 200μg/mL). If the herbal extracts had inconclusive IC50 values in the three cell lines subsequent experiments were conducted using 100 μg/mL. The results showed that most of the combinations were antagonistic but, some combinations had synergistic or enhancement effects(1:3 for cisplatin with grape seed or green tea and tamoxifen with grapeseed or green tea, and 3:1 for cisplatin with green tea as well as for tamoxifen with fermented rooibos or green rooibos, and all the 1:1 combinations of 5- fluorouracil with all herbal extracts) with a combination index (CI) < 1. Grape seed and green tea were found to induce apoptosis in the three cell lines. Assays that were conducted to detect apoptosis induction showed positive staining for phosphatidylserine (PS), activated caspase 3, and reactive oxygen species (ROS), mitochondrial membrane depolarization. Analysis of the cell cycle showed two things; 1) that grape seed and green tea were apoptotic in HeLa and MCF7 cells only, and 2) the extracts of green tea and green rooibos, and the combinations of grape seed with all drug compounds arrested the cell in more than one phase of the cell cycle. The combinations of grapeseed and green tea potentially induced apoptosis in various manners but those with both rooibos extracts were unclear in all the cell lines. The results for combinations with grapeseed and green tea are promising and provide a basis for further research as combinations of chemotherapeutic drugs and herbal extracts may be effective therapeutic strategies. , Thesis (MPharm) -- Faculty of Health Sciences, School of Clinical Care & Medicinal Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An in vitro evaluation of the anti-breast cancer activity of Nigella sativa extracts and its bioactive compound in combination with curcumin
- Authors: Botha, Susanna Gertruida
- Date: 2024-04
- Subjects: Herbs -- Therapeutic use , Radiation-protective agents , Breast -- Cancer -- Treatment
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63639 , vital:73571
- Description: Breast cancer constitutes 23% of all cancers in South African females. Curcumin and Nigella sativa have anti-cancer, anti-metastatic and antioxidant-properties and may be effective against breast cancer. This study focused on the effect of N. sativa extracts or thymoquinone and curcumin, individually and in combination, on breast cancer cells. An MTT assay showed that curcumin reduced cell viability by 50% (IC50) at 18 ± 2.63 μg/mL and thymoquinone (TQ) at 5 ± 0.95 μg/mL against the MDA-MB-231 cells. The IC50 values for curcumin and TQ were 35 ± 6.98 μg/mL and 4 ± 0.96 μg/mL against the MCF-7 cells, respectively. The IC50 value for the NSBE was determined to be 350 ± 55 μg/mL. The IC50 value of NSAE did not fall within the selected concentration range. Synergism was noted for combinations of NSBE with curcumin, and combinations of TQ with curcumin, against both MCF-7 and MDA-MB-231 cells. Two synergistic combinations per treatment per cell line, as determined by the combination index analysis, were chosen for further investigation. The combinations and individual treatments tested against the MCF-10A cells, were not significant, except for NSBE80:CURC20 combination. Curcumin had the most significant anti-oxidant activity; however, no link was noted between the anti-oxidant activity and the cytotoxicity of the combinations. The combination treatments induced apoptosis more effectively than the individual treatments. Caspase-3 dependent apoptosis was noted for NSBE10:CURC90 and TQ80:CURC20 combinations against the MDA-MB-231 cells, and the TQ60:CURC40 combination against the MCF-7 cells. The individual and combined treatments effectively reduced MDA-MB-231 cell adhesion to fibronectin, but not all reduced the cell adhesion to laminin. Based on these results, the combinations of curcumin with TQ or NSBE, have promising anticancer benefits against breast cancer. , Thesis (MSc) -- Faculty of Science, School of Biomolecular & Chemical Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Botha, Susanna Gertruida
- Date: 2024-04
- Subjects: Herbs -- Therapeutic use , Radiation-protective agents , Breast -- Cancer -- Treatment
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63639 , vital:73571
- Description: Breast cancer constitutes 23% of all cancers in South African females. Curcumin and Nigella sativa have anti-cancer, anti-metastatic and antioxidant-properties and may be effective against breast cancer. This study focused on the effect of N. sativa extracts or thymoquinone and curcumin, individually and in combination, on breast cancer cells. An MTT assay showed that curcumin reduced cell viability by 50% (IC50) at 18 ± 2.63 μg/mL and thymoquinone (TQ) at 5 ± 0.95 μg/mL against the MDA-MB-231 cells. The IC50 values for curcumin and TQ were 35 ± 6.98 μg/mL and 4 ± 0.96 μg/mL against the MCF-7 cells, respectively. The IC50 value for the NSBE was determined to be 350 ± 55 μg/mL. The IC50 value of NSAE did not fall within the selected concentration range. Synergism was noted for combinations of NSBE with curcumin, and combinations of TQ with curcumin, against both MCF-7 and MDA-MB-231 cells. Two synergistic combinations per treatment per cell line, as determined by the combination index analysis, were chosen for further investigation. The combinations and individual treatments tested against the MCF-10A cells, were not significant, except for NSBE80:CURC20 combination. Curcumin had the most significant anti-oxidant activity; however, no link was noted between the anti-oxidant activity and the cytotoxicity of the combinations. The combination treatments induced apoptosis more effectively than the individual treatments. Caspase-3 dependent apoptosis was noted for NSBE10:CURC90 and TQ80:CURC20 combinations against the MDA-MB-231 cells, and the TQ60:CURC40 combination against the MCF-7 cells. The individual and combined treatments effectively reduced MDA-MB-231 cell adhesion to fibronectin, but not all reduced the cell adhesion to laminin. Based on these results, the combinations of curcumin with TQ or NSBE, have promising anticancer benefits against breast cancer. , Thesis (MSc) -- Faculty of Science, School of Biomolecular & Chemical Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An Investigation into the challenges of translating mathematical terminologies into Xitsonga
- Authors: Sambo, Tintswalo Teressa
- Date: 2024-04
- Subjects: Mathematical linguistics , Mathematics , Translating and interpreting
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63495 , vital:73382
- Description: Mathematics in South Africa is one of the subjects that is considered ‘difficult’ by many learners. The proof of this statement is reflected by the low mathematical pass rate in many South African schools. One of the challenges that has been highlighted by learners and teachers is that the language of mathematics is challenging. This implies that learners find it difficult to understand some of the mathematical terminologies and content that is being taught. The main reason for the challenge of grasping mathematical terminologies that has been cited by learners and educators is the language of learning and teaching (LOLT). Mathematics is taught in English in most South African schools even though many learners speak one of the indigenous South African official languages (if one excludes English and Afrikaans) at home and get to use and be exposed to English as the medium of learning and teaching only at school. While mathematics remains a challenge in South Africa, research shows that when home languages are used in a mathematics classroom, it enhances the learners understanding. However, it is not always simple to transfer mathematics from English to an African language. There are complexities associated with translation that include the lack of vocabulary in the target language which in this case is Xitsonga. The lack of terminologies in Xitsonga is one of the challenges that occur during the process of translation. This purpose of this research is to examine the challenges of translating mathematical terminologies from English into Xitsonga and to find the strategies that can be used to assist learners to improve their understanding of mathematics. As such, a qualitative research method will be used to select the mathematical terminologies extracted froma mathematics bilingual dictionary with the aim of examining the quality of the translation and identifying the challenges that have been experience by translators. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Sambo, Tintswalo Teressa
- Date: 2024-04
- Subjects: Mathematical linguistics , Mathematics , Translating and interpreting
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63495 , vital:73382
- Description: Mathematics in South Africa is one of the subjects that is considered ‘difficult’ by many learners. The proof of this statement is reflected by the low mathematical pass rate in many South African schools. One of the challenges that has been highlighted by learners and teachers is that the language of mathematics is challenging. This implies that learners find it difficult to understand some of the mathematical terminologies and content that is being taught. The main reason for the challenge of grasping mathematical terminologies that has been cited by learners and educators is the language of learning and teaching (LOLT). Mathematics is taught in English in most South African schools even though many learners speak one of the indigenous South African official languages (if one excludes English and Afrikaans) at home and get to use and be exposed to English as the medium of learning and teaching only at school. While mathematics remains a challenge in South Africa, research shows that when home languages are used in a mathematics classroom, it enhances the learners understanding. However, it is not always simple to transfer mathematics from English to an African language. There are complexities associated with translation that include the lack of vocabulary in the target language which in this case is Xitsonga. The lack of terminologies in Xitsonga is one of the challenges that occur during the process of translation. This purpose of this research is to examine the challenges of translating mathematical terminologies from English into Xitsonga and to find the strategies that can be used to assist learners to improve their understanding of mathematics. As such, a qualitative research method will be used to select the mathematical terminologies extracted froma mathematics bilingual dictionary with the aim of examining the quality of the translation and identifying the challenges that have been experience by translators. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
Assessing rural senior primary school natural science teachers’ TPACK: a case study
- Authors: Silvanus, Secilia Tulikefo
- Date: 2024-04
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/423902 , vital:72103
- Description: In today's world, technology has changed how people live and behave. The influence of technology contemplates a similar change in the education processes of teaching and learning. Many governments worldwide invest hugely in providing technological tools and facilities and training teachers to improve teaching and learning. The availability and access to technologies in schools seem to offer teachers opportunities to develop technological knowledge and integrate technology into teaching. Literature indicates that teachers must possess technological pedagogical content knowledge (TPACK) to integrate technology into teaching and learning processes effectively. However, other scholars have also suggested that teachers' TPACK develops and is shaped by many contexts. This study, therefore, sought to assess the rural senior primary Natural science teachers' TPACK. This qualitative case study was conducted with senior primary Natural science teachers in the educational circuit of Endola. An interpretive paradigm underpinned the study. The study employed semi-structured questionnaires, semi-structured interviews, focus group interviews, and observation to collect the data. The study used the TPACK as a theoretical and analytical framework. The study results showed that participants had a firmer grasp of subject content (CK) and traditional teaching methods (Pedagogical Knowledge - PK and Pedagogical Content Knowledge - PCK) compared to technological knowledge (TK) and technology-based pedagogies (Technological Pedagogical Knowledge - TPK, Technological Content Knowledge - TCK, and Technological Pedagogical Content Knowledge (TPCK). Findings support that the participants draw upon sources of Technological Pedagogical Content Knowledge (TPACK) closely aligned with Content Knowledge (CK), Technological Content Knowledge (TCK), and Technological Pedagogical Knowledge (TPK) to integrate technology. The study included inadequate professional development, teachers' attitudes, insufficient hardware and internet connectivity, limited technological knowledge, time constraints, and restricted access to technology tools and resources as obstacles for teachers attempting to incorporate technology into their classrooms effectively. Furthermore, the data highlights ICT training and teachers' interest as enablers that motivated participants to integrate technology into their teaching practices. Therefore, the study recommends professional development programs focusing on providing science teachers with practical skills to utilise different technologies and address common technical issues. , Thesis (MEd) -- Faculty of Education, Secondary and Post-School Education, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Silvanus, Secilia Tulikefo
- Date: 2024-04
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/423902 , vital:72103
- Description: In today's world, technology has changed how people live and behave. The influence of technology contemplates a similar change in the education processes of teaching and learning. Many governments worldwide invest hugely in providing technological tools and facilities and training teachers to improve teaching and learning. The availability and access to technologies in schools seem to offer teachers opportunities to develop technological knowledge and integrate technology into teaching. Literature indicates that teachers must possess technological pedagogical content knowledge (TPACK) to integrate technology into teaching and learning processes effectively. However, other scholars have also suggested that teachers' TPACK develops and is shaped by many contexts. This study, therefore, sought to assess the rural senior primary Natural science teachers' TPACK. This qualitative case study was conducted with senior primary Natural science teachers in the educational circuit of Endola. An interpretive paradigm underpinned the study. The study employed semi-structured questionnaires, semi-structured interviews, focus group interviews, and observation to collect the data. The study used the TPACK as a theoretical and analytical framework. The study results showed that participants had a firmer grasp of subject content (CK) and traditional teaching methods (Pedagogical Knowledge - PK and Pedagogical Content Knowledge - PCK) compared to technological knowledge (TK) and technology-based pedagogies (Technological Pedagogical Knowledge - TPK, Technological Content Knowledge - TCK, and Technological Pedagogical Content Knowledge (TPCK). Findings support that the participants draw upon sources of Technological Pedagogical Content Knowledge (TPACK) closely aligned with Content Knowledge (CK), Technological Content Knowledge (TCK), and Technological Pedagogical Knowledge (TPK) to integrate technology. The study included inadequate professional development, teachers' attitudes, insufficient hardware and internet connectivity, limited technological knowledge, time constraints, and restricted access to technology tools and resources as obstacles for teachers attempting to incorporate technology into their classrooms effectively. Furthermore, the data highlights ICT training and teachers' interest as enablers that motivated participants to integrate technology into their teaching practices. Therefore, the study recommends professional development programs focusing on providing science teachers with practical skills to utilise different technologies and address common technical issues. , Thesis (MEd) -- Faculty of Education, Secondary and Post-School Education, 2024
- Full Text:
- Date Issued: 2024-04