Annie de Wet (Scott) and Lynn Ann
- Subjects: Class reunions -- South Africa -- Grahamstown -- Photographs Grahamstown Teachers' Training College (South Africa) -- Photographs
- Type: Image
- Identifier: http://hdl.handle.net/10962/17596 , vital:22263 , This image is held at the Cory Library for Humanities Research at Rhodes University. For further information contact cory@ru.ac.za. The digitisation of this image was made possible through a generous grant received from the Andrew W. Mellon Foundation 2014-2017. , PIC/A 2897_010
- Description: Photograph of Annie de Wet (Scott) and Lynn Ann , Leila Kerr (Linington) (Donor)
- Full Text: false
- Subjects: Class reunions -- South Africa -- Grahamstown -- Photographs Grahamstown Teachers' Training College (South Africa) -- Photographs
- Type: Image
- Identifier: http://hdl.handle.net/10962/17596 , vital:22263 , This image is held at the Cory Library for Humanities Research at Rhodes University. For further information contact cory@ru.ac.za. The digitisation of this image was made possible through a generous grant received from the Andrew W. Mellon Foundation 2014-2017. , PIC/A 2897_010
- Description: Photograph of Annie de Wet (Scott) and Lynn Ann , Leila Kerr (Linington) (Donor)
- Full Text: false
CO2-induced woody thickening depends strongly on interacting abiotic and biotic factors
- Authors: Raubenheimer, Sarah Lynn
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164646 , vital:41151 , doi:10.21504/10962/164646
- Description: Thesis (PhD)--Rhodes University, Faculty of Science, Botany, 2020
- Full Text:
- Date Issued: 2020
- Authors: Raubenheimer, Sarah Lynn
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164646 , vital:41151 , doi:10.21504/10962/164646
- Description: Thesis (PhD)--Rhodes University, Faculty of Science, Botany, 2020
- Full Text:
- Date Issued: 2020
Dog wars : a Victorian steampunk adventure
- Authors: Molino, Nicolene Chloe
- Date: 2013
- Subjects: Creative writing , Fiction , South Africa , Creative writing (Higher education) , Short stories, South African (English) -- 21st century , South African fiction (English) -- 21st century , English language -- Writing
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: vital:5965 , http://hdl.handle.net/10962/d1001815
- Description: We're in an alternate universe, circa Dickensian London. Leofric Lieven, a local crime lord, is about to find the past catching up on him. The Romany Carnival has come to town, and a gypsy woman, his former lover and partner in crime, demands from him a favour which will redress his betrayal of years before: he must secure a stolen object and return it to her. But things go horribly wrong when local delivery boy Cards Bennish is kidnapped by Leofric’s competitor before he can deliver the goods that will cover Leofric's debt to the gypsy. In this world, humans can shape shift into animals, entirely or only partially, dog fighting is the favourite pastime for high stakes betting, and power belongs to the highest bidder. The gypsy’s final bet, for the highest stakes yet, will seal the fates of a number of people, for better or worse
- Full Text:
- Date Issued: 2013
- Authors: Molino, Nicolene Chloe
- Date: 2013
- Subjects: Creative writing , Fiction , South Africa , Creative writing (Higher education) , Short stories, South African (English) -- 21st century , South African fiction (English) -- 21st century , English language -- Writing
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: vital:5965 , http://hdl.handle.net/10962/d1001815
- Description: We're in an alternate universe, circa Dickensian London. Leofric Lieven, a local crime lord, is about to find the past catching up on him. The Romany Carnival has come to town, and a gypsy woman, his former lover and partner in crime, demands from him a favour which will redress his betrayal of years before: he must secure a stolen object and return it to her. But things go horribly wrong when local delivery boy Cards Bennish is kidnapped by Leofric’s competitor before he can deliver the goods that will cover Leofric's debt to the gypsy. In this world, humans can shape shift into animals, entirely or only partially, dog fighting is the favourite pastime for high stakes betting, and power belongs to the highest bidder. The gypsy’s final bet, for the highest stakes yet, will seal the fates of a number of people, for better or worse
- Full Text:
- Date Issued: 2013
Teaching in higher education
- Authors: Quinn, Lynn
- Date: 2014
- Language: English
- Type: text , review
- Identifier: http://hdl.handle.net/10962/66557 , vital:28963 , https://doi.org/10.1080/1360144X.2014.908094
- Description: publisher version , As Becker and Denicolo point out in their introduction, traditionally most lecturers in higher education begin teaching with little or no formal training: ‘It is assumed if you were expert in your field you would be able, by some ill-defined means, to teach others’ (p. 1). This book aims to remedy that situation and does exactly what it sets out to do: it provides a useful, step-by-step training guide for teachers in higher education. It provides much needed advice for new academics for ways in which they can successfully combine their teaching and their research roles. It is written in an accessible style, draws on the experiences of people who have taught in higher education for some time, and provides practical advice for teaching in a range of contexts and for dealing with different challenges that may arise.
- Full Text: false
- Date Issued: 2014
- Authors: Quinn, Lynn
- Date: 2014
- Language: English
- Type: text , review
- Identifier: http://hdl.handle.net/10962/66557 , vital:28963 , https://doi.org/10.1080/1360144X.2014.908094
- Description: publisher version , As Becker and Denicolo point out in their introduction, traditionally most lecturers in higher education begin teaching with little or no formal training: ‘It is assumed if you were expert in your field you would be able, by some ill-defined means, to teach others’ (p. 1). This book aims to remedy that situation and does exactly what it sets out to do: it provides a useful, step-by-step training guide for teachers in higher education. It provides much needed advice for new academics for ways in which they can successfully combine their teaching and their research roles. It is written in an accessible style, draws on the experiences of people who have taught in higher education for some time, and provides practical advice for teaching in a range of contexts and for dealing with different challenges that may arise.
- Full Text: false
- Date Issued: 2014
Pedagogy for fostering criticality, reflectivity and praxis in a course on teaching for lecturers
- Quinn, Lynn, Vorster, Jo-Anne
- Authors: Quinn, Lynn , Vorster, Jo-Anne
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66590 , vital:28967 , https://doi.org/10.1080/02602938.2015.1066756
- Description: publisher version , Using the concepts of criticality, reflectivity and praxis, the paper presents an analysis of our reflections on participants’ responses to the assessment requirements for a course for lecturers on teaching. The context in which the course is being taught has changed considerably in the last few years in terms of the mode of delivery, as well as the number and diversity of participants. Our analysis has generated insights into ways in which the course is not meeting all the learning needs of the participants, nor preparing them adequately to demonstrate, in writing, their learning. Using insights gained, we suggest pedagogic processes and strategies for ensuring that the course focuses on both writing to learn and learning to write; and for assisting participants to acquire the practices to demonstrate their learning in written assessment tasks, using the requisite literacy including criticality, reflectivity and praxis.
- Full Text: false
- Date Issued: 2016
- Authors: Quinn, Lynn , Vorster, Jo-Anne
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66590 , vital:28967 , https://doi.org/10.1080/02602938.2015.1066756
- Description: publisher version , Using the concepts of criticality, reflectivity and praxis, the paper presents an analysis of our reflections on participants’ responses to the assessment requirements for a course for lecturers on teaching. The context in which the course is being taught has changed considerably in the last few years in terms of the mode of delivery, as well as the number and diversity of participants. Our analysis has generated insights into ways in which the course is not meeting all the learning needs of the participants, nor preparing them adequately to demonstrate, in writing, their learning. Using insights gained, we suggest pedagogic processes and strategies for ensuring that the course focuses on both writing to learn and learning to write; and for assisting participants to acquire the practices to demonstrate their learning in written assessment tasks, using the requisite literacy including criticality, reflectivity and praxis.
- Full Text: false
- Date Issued: 2016
Border gymnastics team at Nationals held in Johannesburg
- Date: 196?
- Subjects: Rhodes University -- History -- Photographs Rhodes University -- Students -- Photographs , Rhodes University -- Sports -- Photographs
- Type: Image
- Identifier: http://hdl.handle.net/10962/8708 , vital:21421 , PIC/M 6761
- Description: Border Gymnastics team at Nationals in Johannesburg - Formal photograph of young people wearing blazers with an unknown insignia on them. Jeff Dyer standing on far left. Professor Locke (coach) standing on far right. Seated, left to right: unknown man, Lynn Edley, Buddy Hanley (coach), Gail Martin, Ant Davey (manager). Babs Phillips seated on ground in foreground of photograph. , This image is held at the Cory Library for Humanities Research at Rhodes University. For further information contact cory@ru.ac.za. The digitisation of this image was made possible through a generous grant recieved from the Andrew W. Mellon Foundation 2014-2017.
- Full Text: false
- Date Issued: 196?
- Date: 196?
- Subjects: Rhodes University -- History -- Photographs Rhodes University -- Students -- Photographs , Rhodes University -- Sports -- Photographs
- Type: Image
- Identifier: http://hdl.handle.net/10962/8708 , vital:21421 , PIC/M 6761
- Description: Border Gymnastics team at Nationals in Johannesburg - Formal photograph of young people wearing blazers with an unknown insignia on them. Jeff Dyer standing on far left. Professor Locke (coach) standing on far right. Seated, left to right: unknown man, Lynn Edley, Buddy Hanley (coach), Gail Martin, Ant Davey (manager). Babs Phillips seated on ground in foreground of photograph. , This image is held at the Cory Library for Humanities Research at Rhodes University. For further information contact cory@ru.ac.za. The digitisation of this image was made possible through a generous grant recieved from the Andrew W. Mellon Foundation 2014-2017.
- Full Text: false
- Date Issued: 196?
Towards shaping the field: theorising the knowledge in a formal course for academic developers
- Vorster, Jo-Anne, Quinn, Lynn
- Authors: Vorster, Jo-Anne , Quinn, Lynn
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66578 , vital:28966 , https://doi.org/10.1080/07294360.2015.1070126
- Description: publisher version , In recent years there have been calls both for building the knowledge base of academic development (AD) and for systematic induction of newcomers to the field if AD is to advance as a professional and an academic field. Despite the importance and complexity of AD, induction of novice academic developers remains mostly informal and predominantly focuses on the practices of the field. We argue that more-experienced academic developers have an obligation to provide formal and systematic routes into the field and its knowledge base than is currently the case. One way of doing this is through offering a formal course for growing the next generation of academic developers. Such a course could equip newcomers with a more solid and shared knowledge base, thus contributing to shaping the epistemic spine of AD. In this paper, using Maton's Legitimation Code Theory, we offer an analysis of an existing course aimed at equipping novices with the theoretical and practical knowledge to enable them to solve some of the problems in higher education. From this analysis have emerged general principles that could inform the selection, sequencing and pacing of knowledge in a formal course for academic developers.
- Full Text: false
- Date Issued: 2015
- Authors: Vorster, Jo-Anne , Quinn, Lynn
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66578 , vital:28966 , https://doi.org/10.1080/07294360.2015.1070126
- Description: publisher version , In recent years there have been calls both for building the knowledge base of academic development (AD) and for systematic induction of newcomers to the field if AD is to advance as a professional and an academic field. Despite the importance and complexity of AD, induction of novice academic developers remains mostly informal and predominantly focuses on the practices of the field. We argue that more-experienced academic developers have an obligation to provide formal and systematic routes into the field and its knowledge base than is currently the case. One way of doing this is through offering a formal course for growing the next generation of academic developers. Such a course could equip newcomers with a more solid and shared knowledge base, thus contributing to shaping the epistemic spine of AD. In this paper, using Maton's Legitimation Code Theory, we offer an analysis of an existing course aimed at equipping novices with the theoretical and practical knowledge to enable them to solve some of the problems in higher education. From this analysis have emerged general principles that could inform the selection, sequencing and pacing of knowledge in a formal course for academic developers.
- Full Text: false
- Date Issued: 2015
An investigation of male and female cognitive ability on the WAIS-III
- Authors: Muirhead, Joanne
- Date: 2000
- Subjects: Wechsler Adult Intelligence Scale , Sex differences (Psychology) , Intelligence tests -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3028 , http://hdl.handle.net/10962/d1002537 , Wechsler Adult Intelligence Scale , Sex differences (Psychology) , Intelligence tests -- South Africa
- Description: This study, which formed part of a larger research project, investigated the effect of gender on test performance on the Wechsler Adult Intelligence Scale - Third Edition (WAIS-III). The WAIS-III was administered to a sample of 68 participants in the Eastern Cape following the initiative of the Human Sciences Research Council to standardise the WAIS-III for a South African population. The participants, aged 19 to 30, were stratified according to language of origin (African or English First Language), educational attainment (matriculant or graduate), quality of education (Department of Education and Training or private/"Model C" school) and gender. Analyses of variance and two sample t tests were used to compare male and female test performance. For the total sample, no significant difference between males and females on Verbal, Performance and Full Scale IQ were found. On the factor indices, females scored marginally higher than males on Processing Speed at a level which was approaching significance (p = 0.105), but no significant differences were found. On subtest performance, females significantly outperformed males on Digit Symbol (p = 0.020). Differences which were approaching significance were found on Information (p = 0.133) in favour of males, and on Matrix Reasoning (p = 0.092) in favour of females. For subgroups of the total sample, the most significant differences in test performance were found for the African First Language private/"Model C" school cohort in favour of females. Thus the overriding implication that emerged from this research was that on this relatively highly educated sample, no significant gender differences in cognitive ability were apparent.
- Full Text:
- Date Issued: 2000
- Authors: Muirhead, Joanne
- Date: 2000
- Subjects: Wechsler Adult Intelligence Scale , Sex differences (Psychology) , Intelligence tests -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3028 , http://hdl.handle.net/10962/d1002537 , Wechsler Adult Intelligence Scale , Sex differences (Psychology) , Intelligence tests -- South Africa
- Description: This study, which formed part of a larger research project, investigated the effect of gender on test performance on the Wechsler Adult Intelligence Scale - Third Edition (WAIS-III). The WAIS-III was administered to a sample of 68 participants in the Eastern Cape following the initiative of the Human Sciences Research Council to standardise the WAIS-III for a South African population. The participants, aged 19 to 30, were stratified according to language of origin (African or English First Language), educational attainment (matriculant or graduate), quality of education (Department of Education and Training or private/"Model C" school) and gender. Analyses of variance and two sample t tests were used to compare male and female test performance. For the total sample, no significant difference between males and females on Verbal, Performance and Full Scale IQ were found. On the factor indices, females scored marginally higher than males on Processing Speed at a level which was approaching significance (p = 0.105), but no significant differences were found. On subtest performance, females significantly outperformed males on Digit Symbol (p = 0.020). Differences which were approaching significance were found on Information (p = 0.133) in favour of males, and on Matrix Reasoning (p = 0.092) in favour of females. For subgroups of the total sample, the most significant differences in test performance were found for the African First Language private/"Model C" school cohort in favour of females. Thus the overriding implication that emerged from this research was that on this relatively highly educated sample, no significant gender differences in cognitive ability were apparent.
- Full Text:
- Date Issued: 2000
A phenomenological investigation into lecturers' understanding of themselves as assessors at Rhodes University
- Authors: Grant, Rose
- Date: 2005
- Subjects: Curriculum-based assessment -- South Africa Education, Higher -- South Africa -- Evaluation Educational tests and measurements -- South Africa Education, Higher -- Evaluation Case studies Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1315 , http://hdl.handle.net/10962/d1003948
- Description: This thesis sets out to obtain an understanding of what it means to be an assessor in higher education, more especially within the Rhodes University context. The concept of assessment, a highly contentious and complex issue, is examined against a background of competing understandings of the nature and purpose of higher education, including the striving for excellence versus the call to more equitable ideals associated with a mass higher education and training system. An overview of salient issues is presented in which both traditional and alternative paradigms of measurement and assessment theory are explored with a view to considering foundational principles upon which sound assessment practice should be based. Specific methods and instruments of assessment are examined with the purpose of evaluating their potential for empowering students as active participants in their own learning and in the assessment process. In a field in which much of the literature seeks improved assessment merely through the administration of increasingly sophisticated assessment techniques, a phenomenological investigation offered a unique way of understanding the meaning assessors make of their practice. Making use of in-depth interviews with five lecturers at Rhodes University the researcher, interacting in a personal manner with people not viewed as experimental objects but as human subjects, assisted participants in moving towards non-theoretical descriptions that accurately reflected their experience. Insights contained in the data were synthesised and integrated into a consistent description of the essential nature of the experience, the primary endeavour of the phenomenologist being to transform naïve experience into more explicitly detailed conceptual knowledge. The essence of how these educators understand themselves as assessors at Rhodes University is perhaps best encapsulated by a considerable sense of agency or initiative on their part. While participants make use of a variety of assessment strategies, they are conscious that assessment cannot be viewed in isolation from other aspects of their teaching and the curriculum. Not only do they make use of different assessment methods but, conscious of accommodating the diverse needs of students, understand their responsibility in terms of providing learning opportunities to assist students in meeting the course outcomes and fulfilling their potential. Rather than allowing pressures from within and outside of the academy to dictate, these lecturers, with significant hard work, courage and a capacity for reflective practice, have embraced the challenges associated with higher education in a state of transition.
- Full Text:
- Date Issued: 2005
- Authors: Grant, Rose
- Date: 2005
- Subjects: Curriculum-based assessment -- South Africa Education, Higher -- South Africa -- Evaluation Educational tests and measurements -- South Africa Education, Higher -- Evaluation Case studies Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1315 , http://hdl.handle.net/10962/d1003948
- Description: This thesis sets out to obtain an understanding of what it means to be an assessor in higher education, more especially within the Rhodes University context. The concept of assessment, a highly contentious and complex issue, is examined against a background of competing understandings of the nature and purpose of higher education, including the striving for excellence versus the call to more equitable ideals associated with a mass higher education and training system. An overview of salient issues is presented in which both traditional and alternative paradigms of measurement and assessment theory are explored with a view to considering foundational principles upon which sound assessment practice should be based. Specific methods and instruments of assessment are examined with the purpose of evaluating their potential for empowering students as active participants in their own learning and in the assessment process. In a field in which much of the literature seeks improved assessment merely through the administration of increasingly sophisticated assessment techniques, a phenomenological investigation offered a unique way of understanding the meaning assessors make of their practice. Making use of in-depth interviews with five lecturers at Rhodes University the researcher, interacting in a personal manner with people not viewed as experimental objects but as human subjects, assisted participants in moving towards non-theoretical descriptions that accurately reflected their experience. Insights contained in the data were synthesised and integrated into a consistent description of the essential nature of the experience, the primary endeavour of the phenomenologist being to transform naïve experience into more explicitly detailed conceptual knowledge. The essence of how these educators understand themselves as assessors at Rhodes University is perhaps best encapsulated by a considerable sense of agency or initiative on their part. While participants make use of a variety of assessment strategies, they are conscious that assessment cannot be viewed in isolation from other aspects of their teaching and the curriculum. Not only do they make use of different assessment methods but, conscious of accommodating the diverse needs of students, understand their responsibility in terms of providing learning opportunities to assist students in meeting the course outcomes and fulfilling their potential. Rather than allowing pressures from within and outside of the academy to dictate, these lecturers, with significant hard work, courage and a capacity for reflective practice, have embraced the challenges associated with higher education in a state of transition.
- Full Text:
- Date Issued: 2005
Isn’t it time to start thinking about ‘developing’ academic developers in a more systematic way?
- Quinn, Lynn, Vorster, Jo-Anne
- Authors: Quinn, Lynn , Vorster, Jo-Anne
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66546 , vital:28961 , https://doi.org/10.1080/1360144X.2013.879719
- Description: publisher version , There is no defined route to becoming an academic developer. The research on pathways into the field (e.g. Kensington-Miller, Brailsford, and Gossman, 2012; McDonald, 2010; McDonald and Stockley, 2008) shows that in most cases ‘serendipity and chance played a role’ (McDonald, 2010, p. 40). Moreover, induction into academic development (AD) is often ad hoc, haphazard, and informal. Due to the changing higher education (HE) context, the field has grown exponentially and in many countries now plays a central role in institutions. This has generated increased demand for knowledgeable and competent developers that are able to contribute towards solving some vexing problems in contemporary HE. Current recruitment and induction processes of new developers do not necessarily meet this demand. In light of the above, we pose the question: given the changing context of HE and the field of AD, is it not time for us to induct newcomers into the field more systematically? As Kensington-Miller et al. (2012) suggest, we should not leave the induction of the next generation of developers to chance. We suggest that one way of ensuring appropriate induction is through a formal course for developers. Difficulties for newcomers to the field are illustrated by Kensington-Miller et al. (2012) when they report seeking ‘top tips’ at a HERDSA conference. We do not dismiss informal learning at conferences or the role of mentoring, coaching, apprenticeship, and so on, in inducting developers, nor do we minimise the benefits of relatively structured processes such as fellowship programmes, workshops, and postgraduate qualifications in related fields. However, these ways of induction may not offer novices the structured and systematic developmental opportunities needed to become developers able to fulfil varied, complex, and sometimes contradictory roles.
- Full Text: false
- Date Issued: 2014
- Authors: Quinn, Lynn , Vorster, Jo-Anne
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66546 , vital:28961 , https://doi.org/10.1080/1360144X.2013.879719
- Description: publisher version , There is no defined route to becoming an academic developer. The research on pathways into the field (e.g. Kensington-Miller, Brailsford, and Gossman, 2012; McDonald, 2010; McDonald and Stockley, 2008) shows that in most cases ‘serendipity and chance played a role’ (McDonald, 2010, p. 40). Moreover, induction into academic development (AD) is often ad hoc, haphazard, and informal. Due to the changing higher education (HE) context, the field has grown exponentially and in many countries now plays a central role in institutions. This has generated increased demand for knowledgeable and competent developers that are able to contribute towards solving some vexing problems in contemporary HE. Current recruitment and induction processes of new developers do not necessarily meet this demand. In light of the above, we pose the question: given the changing context of HE and the field of AD, is it not time for us to induct newcomers into the field more systematically? As Kensington-Miller et al. (2012) suggest, we should not leave the induction of the next generation of developers to chance. We suggest that one way of ensuring appropriate induction is through a formal course for developers. Difficulties for newcomers to the field are illustrated by Kensington-Miller et al. (2012) when they report seeking ‘top tips’ at a HERDSA conference. We do not dismiss informal learning at conferences or the role of mentoring, coaching, apprenticeship, and so on, in inducting developers, nor do we minimise the benefits of relatively structured processes such as fellowship programmes, workshops, and postgraduate qualifications in related fields. However, these ways of induction may not offer novices the structured and systematic developmental opportunities needed to become developers able to fulfil varied, complex, and sometimes contradictory roles.
- Full Text: false
- Date Issued: 2014
Rhodes University Graduation Ceremony 1990
- Authors: Rhodes University
- Date: 1990
- Language: English
- Type: text
- Identifier: vital:8124 , http://hdl.handle.net/10962/d1005707
- Description: Rhodes University Graduation Ceremonies on Friday, 6 April 1990 at 8 p.m. [and] on Saturday, 7 April 1990 at 10 a.m. in the 1820 Settlers National Monument. , Rhodes University East London Graduation Ceremony Saturday; 12 May 1990 at 11.30 a.m. in the Guild Theatre.
- Full Text:
- Date Issued: 1990
- Authors: Rhodes University
- Date: 1990
- Language: English
- Type: text
- Identifier: vital:8124 , http://hdl.handle.net/10962/d1005707
- Description: Rhodes University Graduation Ceremonies on Friday, 6 April 1990 at 8 p.m. [and] on Saturday, 7 April 1990 at 10 a.m. in the 1820 Settlers National Monument. , Rhodes University East London Graduation Ceremony Saturday; 12 May 1990 at 11.30 a.m. in the Guild Theatre.
- Full Text:
- Date Issued: 1990
Physicians' perspectives on personal health records: a descriptive study
- Authors: Harmse, Magda Susanna
- Date: 2016
- Subjects: Medical records -- Data processing , Medical records -- Management , Information storage and retrieval systems -- Hospitals , Personal information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/6876 , vital:21156
- Description: A Personal Health Record (PHR) is an electronic record of a patient’s health-related information that is managed by the patient. The patient can give access to other parties, such as healthcare providers and family members, as they see fit. These parties can use the information in emergency situations, in order to help improve the patient’s healthcare. PHRs have an important role to play in ensuring that a patient’s complete health history is available to his healthcare providers at the point of care. This is especially true in South Africa, where the majority of healthcare organizations still rely on paper-based methods of record-keeping. Research indicates that physicians play an important role in encouraging the adoption of PHRs amongst patients. Whilst various studies have focused on the perceptions of South African citizens towards PHRs, to date no research has focused on the perceptions of South African physicians. Considering the importance of physicians in encouraging the adoption of PHRs, the problem being addressed by this research project thus relates to the lack of information relating to the perceptions of South African physicians of PHRs. Physicians with private practices at private hospitals in Port Elizabeth, South Africa were surveyed in order to determine their perceptions towards PHRs. Results indicate perceptions regarding benefits to the physician and the patient, as well as concerns to the physician and the patient. The levels of trust in various potential PHR providers and the potential uses of a PHR for the physician were also explored. The results of the survey were compared with the results of relevant international literature in order to describe the perceptions of physicians towards PHRs.
- Full Text:
- Date Issued: 2016
- Authors: Harmse, Magda Susanna
- Date: 2016
- Subjects: Medical records -- Data processing , Medical records -- Management , Information storage and retrieval systems -- Hospitals , Personal information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/6876 , vital:21156
- Description: A Personal Health Record (PHR) is an electronic record of a patient’s health-related information that is managed by the patient. The patient can give access to other parties, such as healthcare providers and family members, as they see fit. These parties can use the information in emergency situations, in order to help improve the patient’s healthcare. PHRs have an important role to play in ensuring that a patient’s complete health history is available to his healthcare providers at the point of care. This is especially true in South Africa, where the majority of healthcare organizations still rely on paper-based methods of record-keeping. Research indicates that physicians play an important role in encouraging the adoption of PHRs amongst patients. Whilst various studies have focused on the perceptions of South African citizens towards PHRs, to date no research has focused on the perceptions of South African physicians. Considering the importance of physicians in encouraging the adoption of PHRs, the problem being addressed by this research project thus relates to the lack of information relating to the perceptions of South African physicians of PHRs. Physicians with private practices at private hospitals in Port Elizabeth, South Africa were surveyed in order to determine their perceptions towards PHRs. Results indicate perceptions regarding benefits to the physician and the patient, as well as concerns to the physician and the patient. The levels of trust in various potential PHR providers and the potential uses of a PHR for the physician were also explored. The results of the survey were compared with the results of relevant international literature in order to describe the perceptions of physicians towards PHRs.
- Full Text:
- Date Issued: 2016
Unfair discrimination and affirmative action in the South African Police Service
- Authors: Taylor, Nicola
- Date: 2012
- Subjects: Discrimination in employment -- South Africa , Affirmative action programs -- South Africa , South African Police
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: http://hdl.handle.net/10948/8693 , vital:26421
- Description: Affirmative action is the purposeful, planned placement and development of competent or potentially competent persons in or to positions from which they were debarred in the past. Affirmative action is an attempt to redress past population, on a local and national level. One of the requirements of affirmative action in South Africa is that it must target persons who have been discriminted by unfair discrimination in the past. the Emplyment Equity Act was brought into the South African government to bring equality to all. Unfair discrimination is a branch of affirmative action in which individuals are discriminated against not only on race, but includes colour, sex, religion, age, disability, language and the likes. Section 9 of the Constitution of South Africa prohibits unfair discrimination against any person on any of the listed grounds. Section 2 of the Employment Equity Act is in place to aim to achieve equity within the workplace by promoting equal opportunity and fair treatment as well as eliminating unfair discrimination. Section 6, like the Constitution, lists grounds against which an individual may not be discriminated. Historically, the South African Police Services were a deeply-routed racist organization, where only white males were afforded better opportunities. This however changed after South Africa became a democratic country and with the introduction of the SAPS Act. Transformation within the SAPS took place after South Africa moved towards a democratic society.
- Full Text: false
- Date Issued: 2012
- Authors: Taylor, Nicola
- Date: 2012
- Subjects: Discrimination in employment -- South Africa , Affirmative action programs -- South Africa , South African Police
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: http://hdl.handle.net/10948/8693 , vital:26421
- Description: Affirmative action is the purposeful, planned placement and development of competent or potentially competent persons in or to positions from which they were debarred in the past. Affirmative action is an attempt to redress past population, on a local and national level. One of the requirements of affirmative action in South Africa is that it must target persons who have been discriminted by unfair discrimination in the past. the Emplyment Equity Act was brought into the South African government to bring equality to all. Unfair discrimination is a branch of affirmative action in which individuals are discriminated against not only on race, but includes colour, sex, religion, age, disability, language and the likes. Section 9 of the Constitution of South Africa prohibits unfair discrimination against any person on any of the listed grounds. Section 2 of the Employment Equity Act is in place to aim to achieve equity within the workplace by promoting equal opportunity and fair treatment as well as eliminating unfair discrimination. Section 6, like the Constitution, lists grounds against which an individual may not be discriminated. Historically, the South African Police Services were a deeply-routed racist organization, where only white males were afforded better opportunities. This however changed after South Africa became a democratic country and with the introduction of the SAPS Act. Transformation within the SAPS took place after South Africa moved towards a democratic society.
- Full Text: false
- Date Issued: 2012
Re-framing academic staff development
- Vorster, Jo-Anne, Quinn, Lynn
- Authors: Vorster, Jo-Anne , Quinn, Lynn
- Date: 2017
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/66535 , vital:28960 , https://doi.org/10.1007/978-94-6300-983-6_8
- Description: publisher version , Globally higher education is situated in a supercomplex world (Barnett, 2000) that is constantly in a state of flux and subject to multiple pressures. This situation has been exacerbated in South African higher education that has been characterised by student protests in the last two years (2015–2016). One of the major causes for the recents protests, particularly in our institutional context, has been students’ anger that despite the official demise of apartheid and the end of colonial rule, some universities in South Africa are still attempting to be copies of Oxford and Harvard.
- Full Text: false
- Date Issued: 2017
- Authors: Vorster, Jo-Anne , Quinn, Lynn
- Date: 2017
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/66535 , vital:28960 , https://doi.org/10.1007/978-94-6300-983-6_8
- Description: publisher version , Globally higher education is situated in a supercomplex world (Barnett, 2000) that is constantly in a state of flux and subject to multiple pressures. This situation has been exacerbated in South African higher education that has been characterised by student protests in the last two years (2015–2016). One of the major causes for the recents protests, particularly in our institutional context, has been students’ anger that despite the official demise of apartheid and the end of colonial rule, some universities in South Africa are still attempting to be copies of Oxford and Harvard.
- Full Text: false
- Date Issued: 2017
Management education and training
- Authors: Amos, Trevor L , Quinn, Lynn
- Date: 1997
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/270902 , vital:54490 , xlink:href="https://hdl.handle.net/10520/AJA10113487_559"
- Description: The paper outlines the role of language in leaming and cognitive development and argues that management education and training needs to be integrated with language development to enable students to cope with the demands made of them at university as well as with those of careers in the business world. An integrated language developmEint project developed by the Depanment of Management and academic language practitioners at Rhodes Uhlvetsity is descriptionbed and suggestions are outlined as to how university Management departments can integrate language development in their mainstream teaching.
- Full Text:
- Date Issued: 1997
- Authors: Amos, Trevor L , Quinn, Lynn
- Date: 1997
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/270902 , vital:54490 , xlink:href="https://hdl.handle.net/10520/AJA10113487_559"
- Description: The paper outlines the role of language in leaming and cognitive development and argues that management education and training needs to be integrated with language development to enable students to cope with the demands made of them at university as well as with those of careers in the business world. An integrated language developmEint project developed by the Depanment of Management and academic language practitioners at Rhodes Uhlvetsity is descriptionbed and suggestions are outlined as to how university Management departments can integrate language development in their mainstream teaching.
- Full Text:
- Date Issued: 1997
An examination of feedback on draft essays, using Halliday's definition of context:
- Authors: Quinn, Lynn
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/69500 , vital:29544 , https://doi.org/10.1080/10286632.2016.1255206
- Description: An historical structural understanding underpins the research reported on in this paper. The ideas of the systemic functional linguist, Michael Halliday, are used to examine a draftingresponding-redrafting process used to develop students'. academic writing in the English Language for Academic Purposes (ELAP) course at Rhodes University. Using the Hallidayan framework, I examine how the process can help students adapt to the broader culture of the university and at a more micro level how the comments made by the respondent can help student writers to acquire the academic literacy required to write essays in the context of situation of the ELAP course. The features of field, tenor and mode and their associated textual meanings (that is, experiential meaning, interpersonal meaning and textual meaning) are used to categorise the ways in which comments made at the draft stage of the writing process can develop students' writing. As a result of my research I argue in this paper that it might be useful for writing consultants/lecturers to think of their feedback to students' writing in terms of these categories and to consider whether they have helped students to develop their writing by taking into account the features of the particular social context in which the writing takes place.
- Full Text:
- Date Issued: 2009
- Authors: Quinn, Lynn
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/69500 , vital:29544 , https://doi.org/10.1080/10286632.2016.1255206
- Description: An historical structural understanding underpins the research reported on in this paper. The ideas of the systemic functional linguist, Michael Halliday, are used to examine a draftingresponding-redrafting process used to develop students'. academic writing in the English Language for Academic Purposes (ELAP) course at Rhodes University. Using the Hallidayan framework, I examine how the process can help students adapt to the broader culture of the university and at a more micro level how the comments made by the respondent can help student writers to acquire the academic literacy required to write essays in the context of situation of the ELAP course. The features of field, tenor and mode and their associated textual meanings (that is, experiential meaning, interpersonal meaning and textual meaning) are used to categorise the ways in which comments made at the draft stage of the writing process can develop students' writing. As a result of my research I argue in this paper that it might be useful for writing consultants/lecturers to think of their feedback to students' writing in terms of these categories and to consider whether they have helped students to develop their writing by taking into account the features of the particular social context in which the writing takes place.
- Full Text:
- Date Issued: 2009
Metaheuristic design: the parametric blueprint of a processing plant
- Authors: Ley, Braddin
- Date: 2016
- Subjects: Architectural design -- Data processing
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/38819 , vital:34985
- Description: Architectural design “folds” deeply into associative logic, which is used to create a system of grammar responsive to a dialect. Within traditional design practices, these associations create themselves through additive logic, thereby making them laborious in their response to any change in the language. The implementation of computers in architectural design was initially considered a mode to overcome this - to automate the design process. Until now, it has primarily only afforded the designer the opportunity to perform repetitive tasks faster than traditional drawing methods, without enhancing any depth to associative parameters. The current state of the architectural discourse has opened itself up to advanced computation and is beginning to use this capacity fully. Using algorithmic logic to instantaneously process and compare multiple conditions, the designer now holds the power to determine which grammars he desires to engage with, which solutions he is required to review and which outcomes he wishes to find. He no longer labours over repetitive and additive tasks; rather, he focuses on reviewing iterative changes in dialect in order to produce a highly responsive and technically comprehensive architectural solution. It is important to note that these changes in dialect can refer to any field of qualitative or quantitative data, such as quantified climatic or census data, or qualities of light and volume, so long as the designer transposes quality into a scaled matrix of values. The author is captivated by both digital technologies and sensory experiences in architecture, guiding this treatise to understand natural phenomena and their complexities - expressly, environmental responses to field conditions. The design response to this research is formulated from an algorithm that devises a fl oor plan layout; the methodology used is from a close-packed perimeter cell network, most notably found in floor plans of industrial architectures, henceforth the design articulates as industrial architecture in a context reactive to this typology. The agrarian town of Patensie lies in a rich valley of agriculture, climate and field conditions, and provides the opportunity for this treatise to develop.
- Full Text:
- Date Issued: 2016
- Authors: Ley, Braddin
- Date: 2016
- Subjects: Architectural design -- Data processing
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/38819 , vital:34985
- Description: Architectural design “folds” deeply into associative logic, which is used to create a system of grammar responsive to a dialect. Within traditional design practices, these associations create themselves through additive logic, thereby making them laborious in their response to any change in the language. The implementation of computers in architectural design was initially considered a mode to overcome this - to automate the design process. Until now, it has primarily only afforded the designer the opportunity to perform repetitive tasks faster than traditional drawing methods, without enhancing any depth to associative parameters. The current state of the architectural discourse has opened itself up to advanced computation and is beginning to use this capacity fully. Using algorithmic logic to instantaneously process and compare multiple conditions, the designer now holds the power to determine which grammars he desires to engage with, which solutions he is required to review and which outcomes he wishes to find. He no longer labours over repetitive and additive tasks; rather, he focuses on reviewing iterative changes in dialect in order to produce a highly responsive and technically comprehensive architectural solution. It is important to note that these changes in dialect can refer to any field of qualitative or quantitative data, such as quantified climatic or census data, or qualities of light and volume, so long as the designer transposes quality into a scaled matrix of values. The author is captivated by both digital technologies and sensory experiences in architecture, guiding this treatise to understand natural phenomena and their complexities - expressly, environmental responses to field conditions. The design response to this research is formulated from an algorithm that devises a fl oor plan layout; the methodology used is from a close-packed perimeter cell network, most notably found in floor plans of industrial architectures, henceforth the design articulates as industrial architecture in a context reactive to this typology. The agrarian town of Patensie lies in a rich valley of agriculture, climate and field conditions, and provides the opportunity for this treatise to develop.
- Full Text:
- Date Issued: 2016
Rhodes University Graduation Ceremony 1966
- Authors: Rhodes University
- Date: 1966
- Subjects: Busschau, William John
- Language: English
- Type: text
- Identifier: vital:8100 , http://hdl.handle.net/10962/d1004433
- Description: Rhodes University Graduation Ceremony on Saturday 2 April 1966 at 10:30 a.m. in the University Great Hall. , The order for the special graduation and the installation of William John Busschau as Chancellor of Rhodes University within the Great Hall on Friday 1 April 1966 at 5.30 p.m.
- Full Text:
- Date Issued: 1966
- Authors: Rhodes University
- Date: 1966
- Subjects: Busschau, William John
- Language: English
- Type: text
- Identifier: vital:8100 , http://hdl.handle.net/10962/d1004433
- Description: Rhodes University Graduation Ceremony on Saturday 2 April 1966 at 10:30 a.m. in the University Great Hall. , The order for the special graduation and the installation of William John Busschau as Chancellor of Rhodes University within the Great Hall on Friday 1 April 1966 at 5.30 p.m.
- Full Text:
- Date Issued: 1966
Economic geology of sulphide nickel deposits
- Authors: Harrison, P A
- Date: 1983
- Subjects: Nickel sulfide , Ore deposits , Geology, Economic , Silicate minerals , Geochemistry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5022 , http://hdl.handle.net/10962/d1006349
- Description: From Chapter 1: It has been a long standing belief that many nickel sulphide ores are derivatives of magmatic processes in ultramafic and mafic rocks, and that they segregate from these magmas as immiscible sulphide droplets which are then concentrated into an orebody by gravitational settling either during intrusion or extrusion, or during the early stages of crystallization of the magma (Naldrett, 1981). Some geologists however, have suggested alternative mechanisms to explain the concentration of nickeliferous sulphides in the mafic and ultramafic hosts. These include hydrothermal replacement (Fleet, 1977), exhalative volcanic processes (Lusk, 1976), or major metamorphic upgrading of low grade, initially magmatic deposits (Barrett et al., 1977). It is not the purpose of this study to verify or disprove these hypotheses, but in so far as the initial concentration of sulphides in most deposits is concerned, these effects are relatively unimportant (Naldrett, 1981). The nickel sulphide ores associated with these mafic and ultramafic host rocks, invariably consist of nickeliferous pyrrhotite as the dominant phase, together with lesser, but variable, amounts of magnetite, pentlandite, chalcopyrite, cubanite, and platinum group elements (Reynolds, 1982).
- Full Text:
- Date Issued: 1983
- Authors: Harrison, P A
- Date: 1983
- Subjects: Nickel sulfide , Ore deposits , Geology, Economic , Silicate minerals , Geochemistry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5022 , http://hdl.handle.net/10962/d1006349
- Description: From Chapter 1: It has been a long standing belief that many nickel sulphide ores are derivatives of magmatic processes in ultramafic and mafic rocks, and that they segregate from these magmas as immiscible sulphide droplets which are then concentrated into an orebody by gravitational settling either during intrusion or extrusion, or during the early stages of crystallization of the magma (Naldrett, 1981). Some geologists however, have suggested alternative mechanisms to explain the concentration of nickeliferous sulphides in the mafic and ultramafic hosts. These include hydrothermal replacement (Fleet, 1977), exhalative volcanic processes (Lusk, 1976), or major metamorphic upgrading of low grade, initially magmatic deposits (Barrett et al., 1977). It is not the purpose of this study to verify or disprove these hypotheses, but in so far as the initial concentration of sulphides in most deposits is concerned, these effects are relatively unimportant (Naldrett, 1981). The nickel sulphide ores associated with these mafic and ultramafic host rocks, invariably consist of nickeliferous pyrrhotite as the dominant phase, together with lesser, but variable, amounts of magnetite, pentlandite, chalcopyrite, cubanite, and platinum group elements (Reynolds, 1982).
- Full Text:
- Date Issued: 1983
Towards a framework for the integration of information security into undergraduate computing curricula
- Gomana, Lindokuhle Gcina, Thomson, Kerry-Lynn
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017