A framework for the adoption of enterprise resource planning (ERP) systems in higher education
- Authors: Scholtz, Brenda
- Date: 2011
- Subjects: Curriculum change , Enterprise resource planning.
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10485 , http://hdl.handle.net/10948/d1015961
- Description: Information Communication Technology (ICT) practitioners and Enterprise Resource Planning (ERP) specialists are highly sought after globally and in South Africa. In order to address this need for ERP specialists, several studies propose that ERP systems should be adopted in the Information Systems (IS) curricula in higher education institutions (HEIs) for instructional purposes. Whilst many HEIs in the United States, Australia and Europe have successfully adopted ERP systems into their curricula, less than 30% of South African HEIs have followed this trend. The adoption of ERP systems is a challenging process as such systems are resource-intensive, costly, complex, and have a steep learning curve. Educators are faced with resource problems and a dearth of options relating to the adoption process. In addition it is critical that the skills and knowledge competencies attained in these courses are industry-relevant. Several education frameworks have been recommended to assist educators with the process of adopting an ERP system in the curriculum, but these frameworks are not comprehensive since they do not consider all the factors relating to the adoption of an ERP system. In addition existing frameworks are not based on industry-relevant competencies but rather on educational objectives. This has resulted in a difference between the competencies required by organisations and those produced by higher education. Whilst there are several research studies on ERP education, empirical studies on frameworks supporting the adoption of ERP systems in HEIs for instructional purposes are limited, particularly on the impact of these frameworks on educational outcomes. The impact of the usability of the ERP system on educational outcomes has also not been fully explored. A survey of ERP consulting organisations in South Africa confirmed that these organisations struggle to obtain ERP specialists with the appropriate competencies. The survey results also contributed to a standardised, comprehensive, set of industry-relevant ERP competencies. The competency set forms part of a comprehensive Competency Framework for ERP System Adoption in IS Higher Education (ERPEd), which can assist educators with the decisions relating to the adoption of an ERP system into the IS curriculum. It includes all the categories of competencies relevant to industry and maps these onto a recommended ERP system adoption approach, an ERP learning tool, as well as the appropriate level of adoption. The application of the ERPEd framework to a case study, the Management Information Systems (MIS) course at the Nelson Mandela Metropolitan University (NMMU), resulted in the adoption of the SYSPRO medium-sized ERP system into the MIS course with the hands-on approach. The empirical results of the evaluation of the case study revealed that the hands-on use of a medium-sized ERP system, SYSPRO, can successfully contribute to the attainment of educational outcomes. These outcomes were mapped to the three core competencies addressed by the MIS course, which were ERP Theory and Concepts, ERP Transactions and Business Process Management (BPM). The educational outcomes evaluated were the measures of performance, self-efficacy and usability. Self-efficacy included satisfaction with the adoption approach. The results were positive in terms of all the metrics of performance, and all three competency categories had positive post-intervention self-efficacy ratings. In terms of growth in self-efficacy from pre-intervention to post-intervention, BPM was the only competency category that did not show a significant growth, however the satisfaction data indicated that students found that the use of SYSPRO improved their competencies in business process understanding. Usability was evaluated in terms of navigation, presentation and learnability. Learnability was the only usability measure in the neutral range, with the other measures falling in the positive range. This confirms related studies reporting that ERP systems are not designed for learning. Overall the students enjoyed the practical application of the theory by using SYSPRO. Several positive and negative features of the user interface were provided which can be used in the design of improved ERP systems for instructional purposes. The results of this investigation can assist in narrowing the gap between industry requirements and IS education programmes. The ERP competency set provides a standardised list of skills and knowledge which is the starting point for any skills improvement program. The ERPEd framework can improve the quality of ERP courses and the competencies of IS graduates. This in turn, can benefit the business community since it will improve the chances of ERP project success. This research is a major contribution to both government and academic initiatives in South Africa to address both the ICT skills problem as well as the need for ERP specialists.
- Full Text:
- Date Issued: 2011
A framework for the application of network telescope sensors in a global IP network
- Authors: Irwin, Barry Vivian William
- Date: 2011
- Subjects: Sensor networks Computer networks TCP/IP (Computer network protocol) Internet Computer security Computers -- Access control Computer networks -- Security measures Computer viruses Malware (Computer software)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4593 , http://hdl.handle.net/10962/d1004835
- Description: The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
- Full Text:
- Date Issued: 2011
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia Subsystem
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430680 , vital:72708 , https://ieeexplore.ieee.org/abstract/document/6032212
- Description: The IP Multimedia Subsystem (IMS) is a telecommunication middleware platform with robust service features that enables the delivery of a wide range of services to mobile network subscribers. Network operators are encouraged to develop services from service building blocks in order to avoid redundancies by re-using existing functionality. In this environ-ment, operators must be able to control the service execution chain in order to prevent undesirable interactions from occurring between indi-vidual building blocks. It is also in their interests to provide subscribers with personalisation options so that they can modify service composi-tions and define their own preferences for how they would like their ser-vices to behave during live sessions. This paper describes a solution for these challenges that involves the storage of service information in an XDMS and allows operator staff and subscribers to manage this in-formation using the XCAP protocol. The ETSI-defined XCAP applica-tion usage named simservs was chosen to demonstrate an application usage that can be used to create service compositions in XML format. A prototype is described that uses components of the open source Mo-bicents project to verify the suitability of the design. This work is part of a larger effort aimed at modeling interaction management in the IMS through the use of a service broker that is part of an extended IMS ser-vice layer (EISL). The service broker's functional and structural architec-ture have not yet been standardised.
- Full Text:
- Date Issued: 2011
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A fuzz testing framework for evaluating and securing network applications
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428000 , vital:72479 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622655_A_Fuzz_Testing_Framework_for_Evaluating_and_Securing_Network_Applications/links/5b9a153b92851c4ba8181b0d/A-Fuzz-Testing-Framework-for-Evaluating-and-Securing-Network-Applications.pdf
- Description: Research has shown that fuzz-testing is an effective means of increasing the quality and security of software and systems. This project proposes the im-plementation of a testing framework based on numerous fuzz-testing tech-niques. The framework will allow a user to detect errors in applications and locate critical areas in the applications that are responsible for the detected errors. The aim is to provide an all-encompassing testing framework that will allow a developer to quickly and effectively deploy fuzz tests on an applica-tion and ensure a higher level of quality control before deployment.
- Full Text:
- Date Issued: 2011
A household survey of livelihood strategies in Helenvale township, Nelson Mandela Bay Municipality
- Authors: Kakembo, Juliet
- Date: 2011
- Subjects: Unemployment -- Social aspects , Unemployment -- Nelson Mandela Bay , Working class
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9089 , http://hdl.handle.net/10948/d1011044 , Unemployment -- Social aspects , Unemployment -- Nelson Mandela Bay , Working class
- Description: A household survey of Helenvale Township in Port Elizabeth was conducted in order to gain an understanding of the strategies and activities that people in this poor community employ to sustain their livelihoods. The household profile, which entailed a survey of the household size, education levels and employment status was conducted. Dwelling units in terms of ownership, type, size, quality and building materials were also assessed. The income and expenditure of the Helenvale residents and community assets, as well as access to basic services were also assessed. The study found that the household size varied between 5 and 7 members. A more or less even distribution of the gender of household heads was noted, with 48 percent and 50 percent female male respectively. Among the HHs surveyed, no member had a higher qualification than Matric and quite a number were illiterate. Unemployment which stands at 54 percent was identified as the most serious problem plaguing Helenvale. A high level of home ownership (84 percent) was noted; of which 79 percent are formal dwellings and typically two-room structures of poor quality. Helenvale residents are largely dependent on child support grants as the major source of income. Casual jobs and disability grants are the other important sources of income identified. Human assets in the form of labour power are the most important assets that the community possesses. Physical assets are negligible, while financial ones are non-existent among all the respondents. Television and electric kettles are the most commonly owned appliances in the households. Basic services are readily accessible to the community, particularly water, health, refuse removal and sewage. Among the threats that the respondents identified, unemployment came to the fore as the biggest and major threat to households. Crime, teenage pregnancy and overcrowding are also considered as major threats, as are gangsterism and gambling violence. The study recommends the development of a long term plan for poverty alleviation. The creation of employment opportunities in the form of financing of small community projects which empower women and the youth is also recommended. All this should be underpinned by the expeditious delivery of housing.
- Full Text:
- Date Issued: 2011
A knowledge management framework for automotive component manufactures in the Eastern Cape
- Authors: Lingham, Nathan
- Date: 2011
- Subjects: Knowledge management , Organisational learning , Automobile industry and trade -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8606 , http://hdl.handle.net/10948/1592 , Knowledge management , Organisational learning , Automobile industry and trade -- South Africa
- Description: It is estimated that each direct job in the automotive industry supports at least 5 indirect jobs in the global community, resulting in more than 50 million jobs to the global auto industry (Ellis, 2006). In South Africa the automotive sector, as an employer, is widely viewed to be second only to mining. In the automotive industry globally, it is being discovered that knowledge, as opposed to “data” or “information”, is becoming harder to locate as a knowledge-bleed is occurring due to the phenomenon of the “brain drain”, retirement of experienced professionals, changing work behaviours among the younger generations and the general lack of infusion of new talent into the South African automotive industry over the past decade (Liebowitz, 1999). This realisation has spawned a growing interest in the concept of knowledge management (KM). KM is the development of tools, processes, systems, structures and cultures explicitly to improve the creation, sharing and use of knowledge critical for decision making. The effective use of KM helps organisations to improve the quality of their decision making and correspondingly to reduce costs and increase efficiency (Kinicki and Kreitner, 2008). Most automotive Original Equipment Manufacturers (OEMs) have made some attempt at KM initiatives, and these attempts have been well-documented. However, among the automotive component suppliers, limited evidence exists of attempts at KM (Piderit, 2007). No standard KM application framework could be established in the literature for industry practitioners in automotive component manufacturers within the Eastern Cape. The aim of this research study is therefore to develop a framework for the application of KM in automotive component manufacturers within the Eastern Cape. The research consisted of a study of the knowledge management literature and the subsequent development of a knowledge management framework and empirical evaluation of the framework in the automotive component supply industry of the Eastern Cape. In conclusion the report presents a knowledge management framework which converts a company assessment to recommended corrective actions to be implemented and also presents the author’s findings, conclusions and recommendations derived from the study.
- Full Text:
- Date Issued: 2011
A learning state?: a case study of the post-1994 South African welfare regime
- Authors: Mungwashu, Sthembiso Handinawangu
- Date: 2011
- Subjects: South African Social Security Agency , South Africa -- Social policy , Poor -- South Africa , Social service -- South Africa , Public welfare -- South Africa , Social service -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MSocSc
- Identifier: vital:3325 , http://hdl.handle.net/10962/d1003113 , South African Social Security Agency , South Africa -- Social policy , Poor -- South Africa , Social service -- South Africa , Public welfare -- South Africa , Social service -- Government policy -- South Africa
- Description: This thesis examines the processes of policymaking in South Africa, as expressed through the shifts in income maintenance policy. The thesis focuses on the processes leading to the establishment of the South African Social Security Agency (SASSA), as its case study. SASSA is the institutional framework for the delivery of social grants. Our intention is to test the efficacy of what we have called ‘state learning’ in the South African context. Therefore, the overall aim of the study is to assess the capacity of the ‘state to learn’ in the process of policymaking as expressed through the shifts in social grant administration and the institutional framework of social welfare in South Africa. The subsidiary goals of the research includes mapping changes in the system of social grants administration since 1994 in order to assess the sources of the shifts in its institutional framework; to assess processes and responses within the state that result in policy shifts and the extent to which these can be considered dimensions of state learning; to assess the power of ideas in the policymaking process and to assess the influence of non-state agencies/actors in policy contestation and learning processes. This is essential, because social policy, especially welfare policy research in post-apartheid South Africa, has focused on the economic value of policies and not the political processes in policymaking. For the framework of analysis the study draws on theories of learning, especially at the organizational or institutional level. We start from the perspective that policymaking and implementation cannot be reduced to a neatly ordered schema (Lamb: 1987:6). Further, that policy change and policymaking are “iterative, haphazard, and highly political processes, in which the apparently logical sequences of decision-making, may turn out to be the reverse” (Lamb, 1987:6). This is mainly because state building is a complex affair and a contested terrain; policy learning and making are neither benign nor do they involve the state working in isolation (Sabatier, 1998). To understand processes of policymaking in South Africa, we rely on content analysis of primary and secondary materials or documents and in-depth interviews with key informants involved in the policy process. The documentary sources include records of parliamentary debates, green and white papers on social welfare, ANC party documents, presidential task force reports, newspapers, magazines and court judgments. The study reveals that the establishment of SASSA lends itself to the idea of ‘state learning’. Learning is indicated in South Africa by the capacity and ability of the state to stimulate ideas, debate ideas to establish ideational matrixes as well as paradigms that have informed the development of policy, take ideas and implement them to try and solve mismatches between the intention of the state and the outcomes and the ability of the state to produce policy.
- Full Text:
- Date Issued: 2011
A legal-comparative study of the interpretation and application of the doctrines of the sham and the alter-ego in the context of South African trust law: the dangers of translocating company law principles into trust law
- Authors: Stafford, Rowan Bell
- Date: 2011
- Subjects: Trusts and trustees -- South Africa , Equity -- South Africa , Law reform -- South Africa
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: vital:3695 , http://hdl.handle.net/10962/d1003210 , Trusts and trustees -- South Africa , Equity -- South Africa , Law reform -- South Africa
- Description: This thesis analyses the doctrines of the sham and the alter-ego and their application to the law of trusts in South Africa. Following an initial examination of the historical development of the law of trusts in English law and the principles of equity law, the study focuses on the current legal status of the trust inter vivos in South Africa and the similarities to its English forerunner. The work traces the sham doctrine back to its origins in English law, where the term “sham” was first used in the context of fraud and dishonesty in cases involving matters arising from hire-purchase agreements, and explains how it gradually began to find its place in the law of trusts. During the exploration, the work highlights the cornerstone of the sham doctrine’s development, the Snook test, which in effect became the internationally accepted guideline for any sham trust enquiry. In terms of the alter-ego doctrine, the work highlights the birth of the principle in Australian law and the doctrine’s immediate reception into other common law jurisdictions and its resultant development. The growth, maturity and popularity of the doctrines are key to the thesis and, in the course of the investigation, the study provides a legal-comparative analysis of the treatment of the doctrines in the context of trusts against that in other common law countries. The study then shifts its focus to South Africa’s interpretation and application of these doctrines in trust law, and reveals the erroneous judicial development in which the courts have in some instances mistakenly replaced the sham doctrine with the company law doctrine of piercing the corporate veil or, in other instances, have erroneously conflated the two trust doctrines. The results highlight a breach of a fundamental rule observed overseas – the “no half way house” rule, which specifically cautions against South Africa’s chosen direction when allowing the lifting of a trust’s veil. The study closes with suggestions as to how the country could reconcile the problems underlined in the thesis by means of law reform, as well as offering practical advice for settlors, trustees and beneficiaries, the core of which is given in the handbook that accompanies this thesis.
- Full Text:
- Date Issued: 2011
A model for assessing the anticipated relative financial impact of implementing the tools of lean manufacturing on a manufacturing concern
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
A model for cultivating resistance to social engineering attacks
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
A model for privacy-aware presence management in mobile communications
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
A participatory communication approach of rural cattle project: a case study of Nguni cattle project in the Eastern Cape, South Africa
- Authors: Usadolo, Sam Erevbenagie
- Date: 2011
- Subjects: Communication in community development -- South Africa , Nguni cattle -- South Africa , Participatory rural appraisal
- Language: English
- Type: Thesis , Doctoral , PhD (Com)
- Identifier: vital:11370 , http://hdl.handle.net/10353/d1015407 , Communication in community development -- South Africa , Nguni cattle -- South Africa , Participatory rural appraisal
- Description: project. It did this by reviewing relevant literature in development communication. The review done showed that literature is replete with arguments critical of the dominant paradigm due to its top-down nature of communication. Scholars critical of dominant paradigm argue that participatory communication should be given a prominent role to ensure that stakeholders work in concert to realise the stated objectives of their development project. The study highlighted many contentious issues surrounding the nature and practices of participatory communication. It pointed out that the issues have played themselves out in literature in the form of different typologies of participatory practices, which were dealt with extensively in this study. The discussion of participatory communication in literature is also mindful of different models of communication and the space they occupy in participatory communication practices. In this study, there was a discussion of transactional communication models as depicted by Nair and White (1993:52) and Steinberg (1997:19). Both scholars emphasise that participatory communication will not achieve its stated purpose without mutual agreement of the parties in communication. They equally stress the recognition of the possible effects of some contextual factors which may have bearing on the prevailing nature of communication. A review of different communication tools used by participatory development communicator was given in the study. These different communication tools were discussed in view of how these tools can be used to advance participatory practice in a development project, especially with reference to the project examined in this study. Using qualitative research method, different and appropriate interview methods such as semi-structured, focus group and post-survey interviews were used to collect data from the respondents in this study. The analysis and discussion of the data revealed that different challenges on the ground could affect participatory communication practices in a development project. With regard to the project examined in this study, the analysis showed that there is a weak stakeholder relationship, especially stakeholders identified in this study as field officers. The study highlighted that stakeholders such as the agricultural extension officers and animal health technicians are not very active in the implementation process of the project. Some of the reasons pointed out is the fact that the secondary stakeholder such as the Provincial Department of Agricultural (PDoA) to which these field officers belong is not playing active role in ensuring that they complement the efforts of other field officers such as the IDC representatives. The second reason is the fact that the participatory focus of the project was not properly communicated to the beneficiaries. This also transpired in their inability to reflect participatory practice in their relationship with the beneficiaries and other stakeholders of the project. Other challenges, among others, as pointed out in the analysis showed that participatory communication practice requires expert personnel to be successful. In the case of the project examined, apart from the fact that there is shortage of manpower to handle the challenges mentioned in the study, there is no communication expert among the few active personnel in the field. The findings of this study showed that there was no clear role and identification of responsibilities let alone coordination of all actors involved in the project. Through the selected case study, this study has not only provided avenue to explore both theoretically and practically participatory communication, but has added to participatory communication discourse that there is no easy answer to challenges field officers encounter in practice. This is the reason the different participatory practices characterising nature of the project this study has investigated was given.
- Full Text:
- Date Issued: 2011
a pH-metric speciation and anti-diabetic study of oxovanadium (IV) amino acid derivatives
- Authors: Gundhla, Isaac Zvikomborero
- Date: 2011 , 2011-03-15
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4399 , http://hdl.handle.net/10962/d1006691
- Description: Novel oxovanadium(IV) complexes of glycine, ʟ-alanine, 1-methylimidazole-2-carboxylic acid, imidazole-2-caboxylic acid and imidazole-4-carboxylic acid were synthesized and isolated in the solid state. The ligands and complexes were characterized by elemental analysis, melting point, NMR, IR and UV-vis spectroscopy. The IR studies showed that glycine and ʟ-alanine coordinate monodentately through the amine nitrogen whilst the imidazole-carboxylic acid derivatives assume a bidentate chelation. The electronic spectroscopic studies indicate distorted octahedral geometry for the oxovanadium complexes of amino acids and a square pyramidal geometry for oxovanadium(IV) complexes of imidazole carboxylic acid derivatives. The reaction of vanadyl (VO2+) with glycine, ʟ-alanine, imidazole-2-cabrboxylic acid, imidazole-4-carboxylic acid and 1-methylimidazole-2-carboxylic acid was studied in aqueous solution by pH-potentiometry under oxygen and carbon dioxide-free conditions. The data obtained from these titrations were used to calculate the protonation and stability constants. The results showed that all ligands are suitable for bidentate coordination in the formation of monomeric species although the solid state studies of the oxovanadium(IV) complexes of amino acids showed a monodentate coordination. The overall stability constants for the (VIVO)-ʟ-alanine system (log β120 = 18.27(6)), (VIVO)-glycine system (β120 = 17.22(6)), (VIVO)-imidazole-4-carboxyic acid (β120 = 11.38(8)), (VIVO)-imidazole-2-carboxylic acid (β120 = 11.62(6)) and (VIVO)-1-methylimidazole-2-carboxylic acid (β120 = 15.49(9)) were obtained. The calculations for the species distribution in the experimental pH range showed that the neutral bis-coordinated complexes are dominant over the biological pH range. The glucose uptake effect of oxovanadium(IV) complex of ʟ-alanine, imidazole-4-carboxylic acid, imidazole-2-carboxylic acid and 1-methylimidazole-2-carboxylic acid was investigated using 3T3-L1 adipocytes, Chang liver and C2C12 muscle cells at various concentrations. The compounds had significant glucose uptake on Chang liver cells only at a concentration of 0.1-10 μM whilst in the C2C12 muscle and 3T3-L1 cells the compounds showed little to no activity probably due to the lower concentrations employed as a result of the cytotoxicity of these compounds on these two cell lines.
- Full Text:
- Date Issued: 2011
A platform for computer-assisted multilingual literacy development
- Authors: Mudimba, Bwini Chizabubi
- Date: 2011
- Subjects: FundaWethu , Language acquisition -- Computer-assisted instruction , Language arts (Elementary) -- Computer-assisted instruction , Language and education , Education, Bilingual , Computer-assisted instruction , Educational technology , Computers and literacy
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4600 , http://hdl.handle.net/10962/d1004850 , FundaWethu , Language acquisition -- Computer-assisted instruction , Language arts (Elementary) -- Computer-assisted instruction , Language and education , Education, Bilingual , Computer-assisted instruction , Educational technology , Computers and literacy
- Description: FundaWethu is reading software that is designed to deliver reading lessons to Grade R-3 (foundation phase) children who are learning to read in a multilingual context. Starting from a premise that the system should be both educative and entertaining, the system allows literacy researchers or teachers to construct rich multimedia reading lessons, with text, pictures (possibly animated), and audio files. Using the design-based research methodology which is problem driven and iterative, we followed a user-centred design process in creating FundaWethu. To promote sustainability of the software, we chose to bring teachers on board as “co-designers” using the lesson authoring tool. We made the authoring tool simple enough for use by non computer specialists, but expressive enough to enable a wide range of beginners reading exercises to be constructed in a number of different languages (indigenous South African languages in particular). This project therefore centred on the use of designbased research to build FundaWethu, the design and construction of FundaWethu and the usability study carried out to determine the adequacy of FundaWethu.
- Full Text:
- Date Issued: 2011
A psychobiography of Archbishop Emeritus Desmond Mpilo Tutu
- Authors: Eliastam, Liesl Marijke
- Date: 2011
- Subjects: Developmental psychology , Life cycle, Human -- Psychological aspects , Psychology -- Biographical methods , Personality -- Research -- Methodology , Emotional intelligence
- Language: English
- Type: Thesis , Masters , M Soc Sc (C Psy)
- Identifier: vital:11856 , http://hdl.handle.net/10353/537 , Developmental psychology , Life cycle, Human -- Psychological aspects , Psychology -- Biographical methods , Personality -- Research -- Methodology , Emotional intelligence
- Description: Psychobiographies offer the illuminating experience of uncovering the story of an individual’s life through the lens of a psychological theory. Psychobiographies offer the chance to gain a deeper understanding of what makes that individual unique. This study aimed to explore and describe the emotional intelligence of Archbishop Emeritus Desmond Tutu according to Goleman’s (1998) theory of Emotional Intelligence. Tutu was chosen as a subject for this study because of his extraordinary life and accomplishments, and because he is regarded as a prominent figure of moral leadership in South Africa. A qualitative psychobiographical research method was utilised. Data was collected from both primary and secondary sources to enhance internal validity, and was then analysed according to Miles and Huberman’s (1994) approach. The findings suggest that Tutu applied all of the twenty five emotional intelligence capacities during his life, and that at times, some were used more extensively than others. This study is groundbreaking in that it is the first psychobiography on Desmond Tutu, and it is the first psychobiography undertaken at the University of Fort Hare. Psychobiographies offer an opportunity to evaluate the psychological theory which is applied. It was found that Goleman’s (1998) theory of Emotional Intelligence is supported by this study.
- Full Text:
- Date Issued: 2011
A regulationist approach to South Africa and a critique of inflation targeting
- Authors: Bax, Ryan Michael Jonathan
- Date: 2011
- Subjects: Inflation (Finance) -- South Africa International finance Economic development -- South Africa Sustainable development -- South Africa Inflation targeting -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1036 , http://hdl.handle.net/10962/d1004533
- Description: Since the 1970s, the international economic system has become prone to the volatility and undue effects associated with booms and busts. This forty year period spanning the present has exhibited restrained growth and repressive economic development. Critical changes to the system are presented by the transition from "Fordism" to the post 1970s neoliberal regime and the globalization of world markets. Underpinning this transformation is an ideological shift towards free market capitalism and the adoption of "reduced form" market models. These "reduced form" models appear to hinder economic sustainability as their grounding in economics fails to account for real economic activity. This thesis aims to provide a more holistic perception of sustainability, one that provides a sound basis on which to develop sustainable economic policy. The Regulationist Approach presents the requisite understanding of economic sustainability required within this research. The inclusion of economic, historical and socio-political fields of research proposes a wider understanding of the political economy and sustainability. The application of the Regulation Approach to the South African economy illustrates many problem areas that require attention. The examination found that firstly, aggregate demand in the South African economy was unsustainable due to the debt driven nature of demand under the asset price bubble of the mid to late 2000s. Secondly, aggregate supply also proved unsustainable as government is failing to provide any substantive growth within important sectors of the economy such as education and the provision of general services. Furthermore, the adoption of inflation targeting in South Africa poses a barrier to sustained economic growth as it focuses singularly on price inflation. The "reduced form" model of inflation targeting fails to account for market failures and a number of vital indicators of sustainability most notably, debt levels and asset prices. The inclusion of these indicators, and financial stability more generally, are found to provide a more holistic and sustainable approach to macroeconomic policymaking.
- Full Text:
- Date Issued: 2011
A research tool for analysing and monitoring the Extent to which Environmental issues are integrated into teachers’ lessons
- Authors: Nsubuga, Yvonne
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/386447 , vital:68142 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122246"
- Description: South Africa enjoys strong policy support for the integration of environmental issues into school curricula. However, much doubt exists over the extent to which this has been converted into appropriate classroom practice at the majority of under-resourced rural schools in the country. This article reports on a study which piloted a research tool which can be used to analyse teachers’ lessons, with the aim of gaining insight into the extent to which they integrate natural resource management issues. The research tool was based on Bernstein’s concept of classification and consisted of five indicators of natural resource management integration into Life Sciences lessons. The study contributes to the design of research tools that can be used to analyse and monitor the integration of environmental issues into teachers’ lessons. It also provides some insight into the environmental content of a sample of Grade 10 Life Sciences lessons at four rural underresourced schools in the Eastern Cape.
- Full Text:
- Date Issued: 2011