A strategy towards an it governance-focused implementation of Egovernment initiatives in the Eastern Cape provincial government
- Authors: Magade, Siyabonga
- Date: 2024-12
- Subjects: Internet in public administration , Government communication systems , Public administration -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68725 , vital:77085
- Description: ICT plays a very important role in transforming organisations as well as governments around the world through eGovernment. A good implementation of eGovernment promises to transform and enhance the provision of services to citizens. The benefits of eGovernment will enable the transparency of government and engender the trust of its citizens therein. Citizens will have access to online government services that will minimise the long queues that citizens need to endure to access government services. eGovernment implementation requires ICT technologies, however, dependency on the implementation of ICT technologies to drive eGovernment initiatives will not alone succeed in transforming the delivery of services in government. Therefore, the implementation of ICT technologies in government must be focused on good IT governance principles. Such principles enable the executive council and management to direct and control the application both now and in the future of use of ICT in government. Therefore, this study develops a strategy artefact that is focused on good IT governance principles to assist in the execution of eGovernment programs in the Eastern Cape Provincial Government. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-12
- Authors: Magade, Siyabonga
- Date: 2024-12
- Subjects: Internet in public administration , Government communication systems , Public administration -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68725 , vital:77085
- Description: ICT plays a very important role in transforming organisations as well as governments around the world through eGovernment. A good implementation of eGovernment promises to transform and enhance the provision of services to citizens. The benefits of eGovernment will enable the transparency of government and engender the trust of its citizens therein. Citizens will have access to online government services that will minimise the long queues that citizens need to endure to access government services. eGovernment implementation requires ICT technologies, however, dependency on the implementation of ICT technologies to drive eGovernment initiatives will not alone succeed in transforming the delivery of services in government. Therefore, the implementation of ICT technologies in government must be focused on good IT governance principles. Such principles enable the executive council and management to direct and control the application both now and in the future of use of ICT in government. Therefore, this study develops a strategy artefact that is focused on good IT governance principles to assist in the execution of eGovernment programs in the Eastern Cape Provincial Government. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-12
Causative factors for poor contractor performance in schools infrastructure projects
- Authors: Baba, Vuyiseka
- Date: 2024-12
- Subjects: Project management , Project management -- Evaluation , School facilities -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68703 , vital:77083
- Description: The public sector infrastructure departments in South Africa rely on construction companies as the major stakeholders in the implementation and maintenance of infrastructure facilities including schools. The Limpopo Province is faced with a serious challenge of underperforming contractors. This in turn affects the Provincial Government’s effective delivery of the much-needed quality infrastructure and facilities. A significant number of schools in the province are faced with infrastructure challenges including sanitation facilities, deteriorating school buildings, storm damage, inadequate infrastructure for special schools, water provision, and general maintenance. This study sought to understand the challenges faced by contractors and further explored whether the effective application of project management methodologies can have a positive impact on improving the current underperformance. Due to the nature of the study, a qualitative research method was employed to collect data. An interpretivist paradigm was adopted as the research philosophy, as it allowed for a flexible and in-depth investigation approach. The study utilized an exploratory research design. The targeted population for the study was carefully selected to obtain relevant and reliable data, and a purposive sampling technique was chosen. Semi-structured interviews were conducted as the primary data collection method, enabling the collection of first-hand information. To ensure accuracy and prevent loss of information, the research process involved recording and transcribing the interviews, using an inductive analysis approach. Eighteen out of the twenty targeted participants were successfully interviewed, resulting in a response rate of 90%. The findings of the study revealed that poor planning, inadequate financial management, inexperienced staff, interference from stakeholders, and a misunderstanding of project scope were among the many factors contributing to poor contractor performance. Furthermore, contractors, particularly Small and Medium Enterprises (SMEs), faced serious challenges during project implementation, including a lack of proper training, budget constraints, and delayed payments from clients. Based on the study's findings, it is recommended that contractors invest in planning and cost management software, including project management methodologies such as Agile, Waterfall, and MS Project. Further, contractors are encouraged to employ adequately skilled and qualified site personnel. Clients should also consider supporting underperforming contractors by pairing them with proven-performing ones to encourage mentorship and other forms of capacity building. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Building and Human Settlements Management, 2024
- Full Text:
- Date Issued: 2024-12
- Authors: Baba, Vuyiseka
- Date: 2024-12
- Subjects: Project management , Project management -- Evaluation , School facilities -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68703 , vital:77083
- Description: The public sector infrastructure departments in South Africa rely on construction companies as the major stakeholders in the implementation and maintenance of infrastructure facilities including schools. The Limpopo Province is faced with a serious challenge of underperforming contractors. This in turn affects the Provincial Government’s effective delivery of the much-needed quality infrastructure and facilities. A significant number of schools in the province are faced with infrastructure challenges including sanitation facilities, deteriorating school buildings, storm damage, inadequate infrastructure for special schools, water provision, and general maintenance. This study sought to understand the challenges faced by contractors and further explored whether the effective application of project management methodologies can have a positive impact on improving the current underperformance. Due to the nature of the study, a qualitative research method was employed to collect data. An interpretivist paradigm was adopted as the research philosophy, as it allowed for a flexible and in-depth investigation approach. The study utilized an exploratory research design. The targeted population for the study was carefully selected to obtain relevant and reliable data, and a purposive sampling technique was chosen. Semi-structured interviews were conducted as the primary data collection method, enabling the collection of first-hand information. To ensure accuracy and prevent loss of information, the research process involved recording and transcribing the interviews, using an inductive analysis approach. Eighteen out of the twenty targeted participants were successfully interviewed, resulting in a response rate of 90%. The findings of the study revealed that poor planning, inadequate financial management, inexperienced staff, interference from stakeholders, and a misunderstanding of project scope were among the many factors contributing to poor contractor performance. Furthermore, contractors, particularly Small and Medium Enterprises (SMEs), faced serious challenges during project implementation, including a lack of proper training, budget constraints, and delayed payments from clients. Based on the study's findings, it is recommended that contractors invest in planning and cost management software, including project management methodologies such as Agile, Waterfall, and MS Project. Further, contractors are encouraged to employ adequately skilled and qualified site personnel. Clients should also consider supporting underperforming contractors by pairing them with proven-performing ones to encourage mentorship and other forms of capacity building. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Building and Human Settlements Management, 2024
- Full Text:
- Date Issued: 2024-12
Construction material waste control success model for the construction industry
- Authors: Musah, Abdul Razak
- Date: 2024-12
- Subjects: Construction industry -- Materials management , Construction industry -- Management , Construction industry -- Environmental aspects
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/68796 , vital:77114
- Description: Economic sustainability and reconstruction in many economies rely heavily on the construction sector and remain strategic tools for governments and industries worldwide. Excessive construction costs and materials waste among some construction companies are rampant in the construction sector. Most of this waste is poorly managed, thus triggering significant project failure problems, leading to the project stakeholders losing the value of their investment. This concern advocate for effective control of construction material to avoid wastage. The primary objective of this study was to develop a Construction Waste Material Control (CWMC) model to be used by construction project professionals throughout the Project Management (PM) phases: initiation, planning, execution, monitoring, control and closure. Significant literature on construction materials waste, Project Management (PM) processes, and project performance regarding poor waste management and project failure was reviewed. This literature review was conducted to identify factors affecting Construction Waste Material Control (CWMC). These factors were identified and defined together with their respective contributions to the model. A quantitative survey instrument (questionnaire) was used to obtain information from construction sector professionals. A total of 213 questionnaire were received and administered for the study. Structural Equation Model (SEM) SEM was used to analyse the questionnaire data, and thereby assisting the research to clearly define latent constructs statistically significant to the (CWMC) model. The finding was that, the factors identified to have impact on CWMC are Project Initiation Phase Tools (PIPTs), Project Planning Phase Tools (PPPTs), project failure/success factors (PFFs), Project Execution Phase Tools (PEPTs), Project Monitoring and Control Phase Tools (PMCPTs), Construction waste material Control (CWMC) policy and Project Management (PM) competence. The supported hypotheses also authenticated these factors. Introducing the model into the construction sector provides another dimension to CWMC. By establishing the aforementioned factors, the model gives construction professionals precise CWMC predictive accuracy. As the model reliability test of 0.734 to 0.972 satisfied the theoretical threshold and goodness of fit of 0.912 of Normed fit index respectively. The model is the first of its kind and contributes significantly to the construction sector’s existing body of knowledge. , Thesis (PhD) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-12
- Authors: Musah, Abdul Razak
- Date: 2024-12
- Subjects: Construction industry -- Materials management , Construction industry -- Management , Construction industry -- Environmental aspects
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/68796 , vital:77114
- Description: Economic sustainability and reconstruction in many economies rely heavily on the construction sector and remain strategic tools for governments and industries worldwide. Excessive construction costs and materials waste among some construction companies are rampant in the construction sector. Most of this waste is poorly managed, thus triggering significant project failure problems, leading to the project stakeholders losing the value of their investment. This concern advocate for effective control of construction material to avoid wastage. The primary objective of this study was to develop a Construction Waste Material Control (CWMC) model to be used by construction project professionals throughout the Project Management (PM) phases: initiation, planning, execution, monitoring, control and closure. Significant literature on construction materials waste, Project Management (PM) processes, and project performance regarding poor waste management and project failure was reviewed. This literature review was conducted to identify factors affecting Construction Waste Material Control (CWMC). These factors were identified and defined together with their respective contributions to the model. A quantitative survey instrument (questionnaire) was used to obtain information from construction sector professionals. A total of 213 questionnaire were received and administered for the study. Structural Equation Model (SEM) SEM was used to analyse the questionnaire data, and thereby assisting the research to clearly define latent constructs statistically significant to the (CWMC) model. The finding was that, the factors identified to have impact on CWMC are Project Initiation Phase Tools (PIPTs), Project Planning Phase Tools (PPPTs), project failure/success factors (PFFs), Project Execution Phase Tools (PEPTs), Project Monitoring and Control Phase Tools (PMCPTs), Construction waste material Control (CWMC) policy and Project Management (PM) competence. The supported hypotheses also authenticated these factors. Introducing the model into the construction sector provides another dimension to CWMC. By establishing the aforementioned factors, the model gives construction professionals precise CWMC predictive accuracy. As the model reliability test of 0.734 to 0.972 satisfied the theoretical threshold and goodness of fit of 0.912 of Normed fit index respectively. The model is the first of its kind and contributes significantly to the construction sector’s existing body of knowledge. , Thesis (PhD) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-12
Low-income area electrification systems
- Authors: Tshabeni, Thulisa
- Date: 2024-12
- Subjects: Rural electrification -- Economic aspects -- South Africa , Rural electrification -- South Africa , Remote area power supply systems -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68807 , vital:77115
- Description: This research investigated electrification systems for low-income, informal settlement areas via grid extension, photovoltaic mini-grids and solar home system (SHS). Six electrification systems were analysed; four mini-grid systems, a 100 W solar home system and a grid extension. All have different maximum power capacities and differ in the way they contribute to sustainable development. Affordability for the consumer of the total energy required (electrical and other sources) is a key factor for the sustainability of any electrification system. Two battery technologies, lithium-ion and lead acid batteries were compared for each system based on technical and economic performance. The study determined that despite the intial very high cost, lithium-ion batteries can achieve a lower levelized cost of electricity (LCOE) due to their long life span. It was found that the batteries cost between 58% and 95% of the project’s capital cost. The battery cost occurs not only in the capital cost, but in the replacement cost. This cost is so high, that it makes all the solar systems uneconomic. This research found that extending the national power grid is still much more economically viable than all other PV electrification systems, but it requires land tenure. The issue of land tenure could be solved by making some agreement with the land owner for rental. It was found that the PV systems could only be economic if they increased the income of the communities substantially. , Thesis (MEg) -- Faculty of Engineering, the Built Environment, and Technology, School of Engineering, 2024
- Full Text:
- Date Issued: 2024-12
- Authors: Tshabeni, Thulisa
- Date: 2024-12
- Subjects: Rural electrification -- Economic aspects -- South Africa , Rural electrification -- South Africa , Remote area power supply systems -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/68807 , vital:77115
- Description: This research investigated electrification systems for low-income, informal settlement areas via grid extension, photovoltaic mini-grids and solar home system (SHS). Six electrification systems were analysed; four mini-grid systems, a 100 W solar home system and a grid extension. All have different maximum power capacities and differ in the way they contribute to sustainable development. Affordability for the consumer of the total energy required (electrical and other sources) is a key factor for the sustainability of any electrification system. Two battery technologies, lithium-ion and lead acid batteries were compared for each system based on technical and economic performance. The study determined that despite the intial very high cost, lithium-ion batteries can achieve a lower levelized cost of electricity (LCOE) due to their long life span. It was found that the batteries cost between 58% and 95% of the project’s capital cost. The battery cost occurs not only in the capital cost, but in the replacement cost. This cost is so high, that it makes all the solar systems uneconomic. This research found that extending the national power grid is still much more economically viable than all other PV electrification systems, but it requires land tenure. The issue of land tenure could be solved by making some agreement with the land owner for rental. It was found that the PV systems could only be economic if they increased the income of the communities substantially. , Thesis (MEg) -- Faculty of Engineering, the Built Environment, and Technology, School of Engineering, 2024
- Full Text:
- Date Issued: 2024-12
A cyber security strategy to mitigate cloud computing risks within the investment management sector in Cape Town
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for a cybersecurity policy in South African schools
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the integration of 4IR-related topics into IT undergraduate curricula in South Africa
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A leadership model for South Africa’s infrastructure-related State-owned Enterprises
- Authors: Notununu, Fezile
- Date: 2024-04
- Subjects: Government business enterprises -- South Africa , Construction industry , Leadership -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64750 , vital:73885
- Description: The objective of this research was to create a leadership model designed specifically to address the challenges faced by South Africa's infrastructure-related, state-owned enterprises. Both Eskom and Transnet are currently experiencing leadership crises, which might be further exacerbated by the global economic difficulties. Through an initial literature review it became evident that there was a knowledge gap regarding leadership within South Africa's state-owned enterprises. Consequently, it was crucial to conduct an extensive analysis of leadership styles to ensure effective infrastructure management for these state-owned enterprises. The primary aim of this study was to propose a leadership model that would be suitable for South Africa's infrastructure-related, state-owned enterprises. To achieve this objective, the relationship between effective leadership and perceived success in infrastructure development was explored, as well as the relationship between effective planning and perceived success in infrastructure development within these enterprises. Additionally, the connection between leadership training and perceived success in infrastructure development was investigated in the study. Quantitative research methods were employed to address these research objectives. The data for this study were collected through an online survey, with a total of 335 respondents from South Africa. Descriptive statistics and structural equation modelling (SEM) were used for analysis, using SPSS AMOS 29 Software. The findings of the study indicated a significant positive relationship between effective management and perceived success in infrastructure development for state-owned enterprises. However, the results regarding the relationship between effective planning and perceived success were not statistically significant, as the p-value exceeded 0.05. Based on the outcomes of the study, appropriate and meaningful recommendations have been provided regarding the leadership model necessary for effective infrastructure management in South Africa's infrastructure-related, state-owned enterprises. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Notununu, Fezile
- Date: 2024-04
- Subjects: Government business enterprises -- South Africa , Construction industry , Leadership -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64750 , vital:73885
- Description: The objective of this research was to create a leadership model designed specifically to address the challenges faced by South Africa's infrastructure-related, state-owned enterprises. Both Eskom and Transnet are currently experiencing leadership crises, which might be further exacerbated by the global economic difficulties. Through an initial literature review it became evident that there was a knowledge gap regarding leadership within South Africa's state-owned enterprises. Consequently, it was crucial to conduct an extensive analysis of leadership styles to ensure effective infrastructure management for these state-owned enterprises. The primary aim of this study was to propose a leadership model that would be suitable for South Africa's infrastructure-related, state-owned enterprises. To achieve this objective, the relationship between effective leadership and perceived success in infrastructure development was explored, as well as the relationship between effective planning and perceived success in infrastructure development within these enterprises. Additionally, the connection between leadership training and perceived success in infrastructure development was investigated in the study. Quantitative research methods were employed to address these research objectives. The data for this study were collected through an online survey, with a total of 335 respondents from South Africa. Descriptive statistics and structural equation modelling (SEM) were used for analysis, using SPSS AMOS 29 Software. The findings of the study indicated a significant positive relationship between effective management and perceived success in infrastructure development for state-owned enterprises. However, the results regarding the relationship between effective planning and perceived success were not statistically significant, as the p-value exceeded 0.05. Based on the outcomes of the study, appropriate and meaningful recommendations have been provided regarding the leadership model necessary for effective infrastructure management in South Africa's infrastructure-related, state-owned enterprises. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A model for speech-driven lesson summary generation in a noisy educational environment
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A model to measure the digital competence of South African citizens
- Authors: Du Preez, Creswell Martin
- Date: 2024-04
- Subjects: Communication of technical information , Digital divide , Information technology -- Social aspects , Information society
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64522 , vital:73746
- Description: The rapid proliferation of disruptive technologies is a paradigm shift fundamentally changing how humanity lives, works, communicates, and relates to each other. Many governments are implementing digital transformation strategies to improve service delivery, citizen participation, and information-sharing mechanisms. South Africa has identified digital skills as a key challenge to becoming a professional and globally competitive knowledge society. However, the 2016 Global IT Report of the World Economic Forum highlights the skills problem in South Africa, ranking it 95th out of 139 countries on the skills pillar. This is due to poor quality of education, particularly in math and science. Furthermore, the COVID-19 pandemic significantly underscored the importance of digital competence in South Africa, highlighting both challenges and opportunities. As the pandemic forced a shift to remote work, education, and digital service delivery, the disparities in digital access and skills became more apparent, especially in under-resourced communities. This situation revealed the urgent need to enhance digital competence across the population to bridge the digital divide. On the other hand, the pandemic also acted as a catalyst for digital transformation in the country. There was an accelerated adoption of digital technologies in various sectors, from education using online platforms to businesses embracing e-commerce. This rapid shift showcased the potential of digital technology to foster resilience against such disruptions. It highlighted citizens’ critical need for comprehensive digital competence to navigate this new digital landscape effectively. A gap exists between current online digital skills training programmes and the ability of citizens to participate in the same. While mega-vendors like Microsoft, Google, and Oracle offer virtual training on specific technologies, it is argued that users need digital competence training before participating in these opportunities. In other words, be able to access online training platforms, create a user account, use secure passwords, and navigate online training systems. This critical component is not holistically addressed across the education system in South Africa. Furthermore, digital competence is a new concept in the South African context and has not been holistically assessed until now. This study sets out to develop a digital competence assessment model to measure the digital competence of South African citizens. Research was conducted to understand digital competence, its characteristics and assessment models and frameworks. A suitable framework was then selected and adapted for the South African context. The adapted framework was used to develop a South African Digital Competence Assessment Model. The model consists of a Digital Competence Assessment Grid, which forms the core of the Digital Competence Assessment Model, as well as an example of how the model can be used to develop an assessment questionnaire. The South African Digital Competence Assessment Grid and the Digital Competence Assessment Example were reviewed by experts as part of an expert review process. The recommendations from the experts were used to refine the Digital Competence Assessment Grid. As the concept of digital competence is new to South Africa, implementation strategies and considerations were discussed for the model. As a starting point, implementation resources were developed on how to use the model in the form of a Digital Competence Assessment Model Guide. The study thus makes an important contribution to advancing digital competence assessment in South Africa, which will inform the nature of the development programs needed and from which the competence profiles for various jobs and job families can be generated. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Du Preez, Creswell Martin
- Date: 2024-04
- Subjects: Communication of technical information , Digital divide , Information technology -- Social aspects , Information society
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64522 , vital:73746
- Description: The rapid proliferation of disruptive technologies is a paradigm shift fundamentally changing how humanity lives, works, communicates, and relates to each other. Many governments are implementing digital transformation strategies to improve service delivery, citizen participation, and information-sharing mechanisms. South Africa has identified digital skills as a key challenge to becoming a professional and globally competitive knowledge society. However, the 2016 Global IT Report of the World Economic Forum highlights the skills problem in South Africa, ranking it 95th out of 139 countries on the skills pillar. This is due to poor quality of education, particularly in math and science. Furthermore, the COVID-19 pandemic significantly underscored the importance of digital competence in South Africa, highlighting both challenges and opportunities. As the pandemic forced a shift to remote work, education, and digital service delivery, the disparities in digital access and skills became more apparent, especially in under-resourced communities. This situation revealed the urgent need to enhance digital competence across the population to bridge the digital divide. On the other hand, the pandemic also acted as a catalyst for digital transformation in the country. There was an accelerated adoption of digital technologies in various sectors, from education using online platforms to businesses embracing e-commerce. This rapid shift showcased the potential of digital technology to foster resilience against such disruptions. It highlighted citizens’ critical need for comprehensive digital competence to navigate this new digital landscape effectively. A gap exists between current online digital skills training programmes and the ability of citizens to participate in the same. While mega-vendors like Microsoft, Google, and Oracle offer virtual training on specific technologies, it is argued that users need digital competence training before participating in these opportunities. In other words, be able to access online training platforms, create a user account, use secure passwords, and navigate online training systems. This critical component is not holistically addressed across the education system in South Africa. Furthermore, digital competence is a new concept in the South African context and has not been holistically assessed until now. This study sets out to develop a digital competence assessment model to measure the digital competence of South African citizens. Research was conducted to understand digital competence, its characteristics and assessment models and frameworks. A suitable framework was then selected and adapted for the South African context. The adapted framework was used to develop a South African Digital Competence Assessment Model. The model consists of a Digital Competence Assessment Grid, which forms the core of the Digital Competence Assessment Model, as well as an example of how the model can be used to develop an assessment questionnaire. The South African Digital Competence Assessment Grid and the Digital Competence Assessment Example were reviewed by experts as part of an expert review process. The recommendations from the experts were used to refine the Digital Competence Assessment Grid. As the concept of digital competence is new to South Africa, implementation strategies and considerations were discussed for the model. As a starting point, implementation resources were developed on how to use the model in the form of a Digital Competence Assessment Model Guide. The study thus makes an important contribution to advancing digital competence assessment in South Africa, which will inform the nature of the development programs needed and from which the competence profiles for various jobs and job families can be generated. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A skills development framework for the built environment
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A strategic approach for handling information security incidents in higher education
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A strategy for the implementation of IT shared services at the Nelson Mandela University
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
An implementation model: photovoltaic application for sustainable energy in South Africa
- Authors: Bukula, Mvuleni
- Date: 2024-04
- Subjects: Energy development -- South Africa , Renewable energy sources -- South Africa , Sustainable engineering -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64511 , vital:73743
- Description: South African electrical grid faces significant risks that the state produced electricity supply from electricity network to premises for consumption will not meet the electricity demand. Certain sectors of the economy and essential social services such as the hospitals, the telecommunications networks, and water companies are heavily impacted on by load management, through load shedding by rotating power outages or reducing power consumption from primary sources until demand decreases. Eskom, as the major electricity supplier in South Africa's aging infrastructure, with declining reliability, substandard quality coal and large gaps between generating capacity and demand, leaves the country vulnerable to electricity blackouts. The consequences of such power outages are devastating, but no single technology solution can meet the demand. Localised backup solutions such as solar power and battery backup limit the risk of power outages and provide power security during the periods of load shedding. Quantitative research method is pursued as a systematic survey to collect quantitative data by means of sampling and submitting online survey questionnaires. After receiving the data, statistical techniques were performed through structural equation modeling to analyse the structural relationship between the measured variables and the underlying variables. This research focuses on photovoltaic applications as a means of harnessing solar energy to convert solar energy into electricity. Solar panels consist of photovoltaic cells made of semiconductors or materials that respond to the action of photons of light. Energy availability to all can promote economic development and human well-being. Without the improvements in energy efficiency and development costs of new energy technologies such as photovoltaics, the global energy system will come under even more pressure. Therefore, changes in the global trend towards a decentralised low-carbon energy system are inevitable to ensure affordable, reliable and sustainable energy access for all. This research seeks to contribute to the present challenges that are facing South Africa’s electricity supply industry by increasing the energy mix of renewable energy as compared to the fossil fuel-based electricity supply. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Bukula, Mvuleni
- Date: 2024-04
- Subjects: Energy development -- South Africa , Renewable energy sources -- South Africa , Sustainable engineering -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64511 , vital:73743
- Description: South African electrical grid faces significant risks that the state produced electricity supply from electricity network to premises for consumption will not meet the electricity demand. Certain sectors of the economy and essential social services such as the hospitals, the telecommunications networks, and water companies are heavily impacted on by load management, through load shedding by rotating power outages or reducing power consumption from primary sources until demand decreases. Eskom, as the major electricity supplier in South Africa's aging infrastructure, with declining reliability, substandard quality coal and large gaps between generating capacity and demand, leaves the country vulnerable to electricity blackouts. The consequences of such power outages are devastating, but no single technology solution can meet the demand. Localised backup solutions such as solar power and battery backup limit the risk of power outages and provide power security during the periods of load shedding. Quantitative research method is pursued as a systematic survey to collect quantitative data by means of sampling and submitting online survey questionnaires. After receiving the data, statistical techniques were performed through structural equation modeling to analyse the structural relationship between the measured variables and the underlying variables. This research focuses on photovoltaic applications as a means of harnessing solar energy to convert solar energy into electricity. Solar panels consist of photovoltaic cells made of semiconductors or materials that respond to the action of photons of light. Energy availability to all can promote economic development and human well-being. Without the improvements in energy efficiency and development costs of new energy technologies such as photovoltaics, the global energy system will come under even more pressure. Therefore, changes in the global trend towards a decentralised low-carbon energy system are inevitable to ensure affordable, reliable and sustainable energy access for all. This research seeks to contribute to the present challenges that are facing South Africa’s electricity supply industry by increasing the energy mix of renewable energy as compared to the fossil fuel-based electricity supply. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Barriers faced by women in public sector leadership roles
- Authors: Khoza, Zelda
- Date: 2024-04
- Subjects: Women construction workers -- South Africa -- Management , Construction industry -- South Africa -- Management , Leadership -- South Africa , Equality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64599 , vital:73770
- Description: This research aims to analyse barriers that hinder women from occupying senior leadership posi-tions and to identify strategies that can be utilised to enable women to be appointed in these posi-tions at Transnet. The study identifies implementable strategies to assist women who aspire to be part of senior leadership and face barriers that hinder them from progressing to leadership posi-tions. The research adopts a pragmatic research paradigm, including quantitative and qualitative meth-ods, to explain the barriers associated with women advancing to leadership positions within the company. The data was collected through survey questionnaires and in-depth interviews. The analysis indicates that women are still under-represented in Transnet, even though efforts are being made to close this gap. Ineffective implementation of policies, due to lack of facilitating roles by HRM and line managers as expected, and lack of required support from the organisation play a significant role in creating barriers hindering senior leadership positions. The research findings can inform Human Resource Management (HRM) about the need for effec-tive implementation of policies and intensified monitoring to address the identified barriers that hin-der women from occupying senior leadership positions. Transnet should foster an organisational culture to build solid connections and engage diverse stakeholders to increase their impact and access to resources and drive positive organisational change. Transnet can leverage these find-ings to develop programmes and initiatives that support women’s career advancement and skills development. With these findings, Transnet should consider implementing strategies that provide flexible working conditions. Lastly, these findings aid Transnet in providing mentorship to women as a valuable leadership opportunity in the organisation. This study contributes to the existing literature on barriers that hinder women from occupying sen-ior leadership positions within organisations. The study also provides vital insights into the rolling out of women’s development programmes and the encouragement they bring. It offers implications for future research, policy changes, professional practices, and strategies to assist women in lead-ership positions. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Khoza, Zelda
- Date: 2024-04
- Subjects: Women construction workers -- South Africa -- Management , Construction industry -- South Africa -- Management , Leadership -- South Africa , Equality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64599 , vital:73770
- Description: This research aims to analyse barriers that hinder women from occupying senior leadership posi-tions and to identify strategies that can be utilised to enable women to be appointed in these posi-tions at Transnet. The study identifies implementable strategies to assist women who aspire to be part of senior leadership and face barriers that hinder them from progressing to leadership posi-tions. The research adopts a pragmatic research paradigm, including quantitative and qualitative meth-ods, to explain the barriers associated with women advancing to leadership positions within the company. The data was collected through survey questionnaires and in-depth interviews. The analysis indicates that women are still under-represented in Transnet, even though efforts are being made to close this gap. Ineffective implementation of policies, due to lack of facilitating roles by HRM and line managers as expected, and lack of required support from the organisation play a significant role in creating barriers hindering senior leadership positions. The research findings can inform Human Resource Management (HRM) about the need for effec-tive implementation of policies and intensified monitoring to address the identified barriers that hin-der women from occupying senior leadership positions. Transnet should foster an organisational culture to build solid connections and engage diverse stakeholders to increase their impact and access to resources and drive positive organisational change. Transnet can leverage these find-ings to develop programmes and initiatives that support women’s career advancement and skills development. With these findings, Transnet should consider implementing strategies that provide flexible working conditions. Lastly, these findings aid Transnet in providing mentorship to women as a valuable leadership opportunity in the organisation. This study contributes to the existing literature on barriers that hinder women from occupying sen-ior leadership positions within organisations. The study also provides vital insights into the rolling out of women’s development programmes and the encouragement they bring. It offers implications for future research, policy changes, professional practices, and strategies to assist women in lead-ership positions. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Computer vision as a tool for tracking gastropod chemical trails
- Authors: Viviers, Andre
- Date: 2024-04
- Subjects: Computers , Electronic data processing , Machine learning
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64863 , vital:73934
- Description: The difficulties encountered in previous gastropod research with human intervention (Raw, Miranda, & Perissinotto, 2013) inspired this dissertation. More specifically the tedious task of human intervention in the tracking of gastropod chemical trails, which is a time-consuming and error-prone exercise. In this study, computer vision is proposed as an alternative to human intervention. A machine learning literature review was conducted to identify relevant methodologies and techniques for the research. Furthermore, it investigates data preprocessing techniques on a variety of different data types. This sets the stage for a deeper investigation of techniques used for pre-processing image and video data. Following that, another literature review delved deeper into the computer vision pipeline. The review is divided into two parts: data pre-processing and model training. First, it provides a deeper investigation into relevant data pre-processing techniques for use in constructing a dataset comprised of gastropod images. Following that, it delves into the complexities of training a computer vision model. The study then investigates convolutional neural networks, revealing the neural networks’ suitability in image/video processing. A convolutional neural network is selected as the foundation for the best-effort model. This serves as the foundation for the subsequent experimental research. The first part of the experimental work involves creating a labelled dataset from the video dataset provided by Raw et al. (2013). By employing data preprocessing techniques in a strategic manner, an unlabeled dataset is generated. Then a labelled dataset is generated using a simple K-Means clustering algorithm and manual labelling. Thereafter, a best-effort model is trained to detect gastropods within images using this dataset. After making the labelled dataset, the next step in the exploration is to build a prototype that can find gastropods and draw trace lines based on their movement. Five evaluation runs serve to gauge the prototype’s effectiveness. Videos with varying properties from the original dataset are purposefully chosen for each run. The prototype’s trace lines are compared to the original dataset’s human-drawn pathways. The versatility of the prototype is demonstrated in the final evaluation by generating fine-grained trace lines post-processing. This enables the plot to be adjusted to different parameters based on the characteristics that the resulting plot should have. Through the versatility and accuracy demonstrated by the evaluation runs, this research found that a gastropod tracking solution based on computer vision can alleviate human intervention. The dissertation concludes with a discourse on the lessons learned from the research study. These are presented as guidelines to aid future work in developing a gastropod tracking solution based on computer vision. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Viviers, Andre
- Date: 2024-04
- Subjects: Computers , Electronic data processing , Machine learning
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64863 , vital:73934
- Description: The difficulties encountered in previous gastropod research with human intervention (Raw, Miranda, & Perissinotto, 2013) inspired this dissertation. More specifically the tedious task of human intervention in the tracking of gastropod chemical trails, which is a time-consuming and error-prone exercise. In this study, computer vision is proposed as an alternative to human intervention. A machine learning literature review was conducted to identify relevant methodologies and techniques for the research. Furthermore, it investigates data preprocessing techniques on a variety of different data types. This sets the stage for a deeper investigation of techniques used for pre-processing image and video data. Following that, another literature review delved deeper into the computer vision pipeline. The review is divided into two parts: data pre-processing and model training. First, it provides a deeper investigation into relevant data pre-processing techniques for use in constructing a dataset comprised of gastropod images. Following that, it delves into the complexities of training a computer vision model. The study then investigates convolutional neural networks, revealing the neural networks’ suitability in image/video processing. A convolutional neural network is selected as the foundation for the best-effort model. This serves as the foundation for the subsequent experimental research. The first part of the experimental work involves creating a labelled dataset from the video dataset provided by Raw et al. (2013). By employing data preprocessing techniques in a strategic manner, an unlabeled dataset is generated. Then a labelled dataset is generated using a simple K-Means clustering algorithm and manual labelling. Thereafter, a best-effort model is trained to detect gastropods within images using this dataset. After making the labelled dataset, the next step in the exploration is to build a prototype that can find gastropods and draw trace lines based on their movement. Five evaluation runs serve to gauge the prototype’s effectiveness. Videos with varying properties from the original dataset are purposefully chosen for each run. The prototype’s trace lines are compared to the original dataset’s human-drawn pathways. The versatility of the prototype is demonstrated in the final evaluation by generating fine-grained trace lines post-processing. This enables the plot to be adjusted to different parameters based on the characteristics that the resulting plot should have. Through the versatility and accuracy demonstrated by the evaluation runs, this research found that a gastropod tracking solution based on computer vision can alleviate human intervention. The dissertation concludes with a discourse on the lessons learned from the research study. These are presented as guidelines to aid future work in developing a gastropod tracking solution based on computer vision. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
Enabling legislative coherence in the Eswatini construction industry
- Hlatshwayo, Thandiwe Ncam'sile
- Authors: Hlatshwayo, Thandiwe Ncam'sile
- Date: 2024-04
- Subjects: Construction industry -- Law and legislation -- Swaziland , Construction workers -- Legal status, laws, etc. -- Swaziland , Industrial safety -- Law and legislation -- Swaziland
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64544 , vital:73748
- Description: The construction industry is an age-old and highly dynamic sector that contributes to the betterment of human life through the development of infrastructure. The presence of regulations is crucial in ensuring the provision of quality, standardization, efficiency, and effectiveness in service delivery. Inadequate regulation of the construction industry has been identified as the primary cause of construction failures in both developing and developed nations. Eswatini is no exception to this issue of legislative failure. The Construction Industry Council (CIC) was established by the Government of Eswatini without initially determining the specific challenges faced by the construction industry in Eswatini. The unique legislative needs pertaining to Eswatini were not explored to ensure that the framework is tailor-made for the Eswatini sector. Given the industry's diverse and intricate nature, a generic approach would not be sufficient to create a unified legislative framework. The study was aimed at developing a coherent legislative framework for the Eswatini construction industry. This study used a mixed-methods research design, incorporating both quantitative and qualitative data. A total of 297 participants were randomly selected from the CIC database for the quantitative survey. A total of 45 interviewees were purposively selected for the semi-structured interviews. Descriptive and inferential analysis were used for the interpretation of the quantitative data. Thematic analysis was used for the qualitative data. Exploratory Factor Analysis, using the maximum likelihood method with Varimax Rotation was employed to analyse the factor structure and correlation between items of the quantitative data. Additionally, the KMO and Bartlett's Tests were conducted. The ANOVA Test was used to test the hypothesis. Thematic analysis was employed for the qualitative data analysis. The findings of this study revealed that contractors in Eswatini recognised the significance of a well-functioning legislative framework and expressed dissatisfaction with the existing legislative measures implemented in the country. The key informant interviews highlighted various challenges, including the absence of regulations for the implementation of the CIC Act, lack of accountability and transparency in the management of funds for CIC operations and inadequate grading criteria. Other challenges that were revealed were insufficient oversight, unfair competition, corruption and limited stakeholder engagement. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Hlatshwayo, Thandiwe Ncam'sile
- Date: 2024-04
- Subjects: Construction industry -- Law and legislation -- Swaziland , Construction workers -- Legal status, laws, etc. -- Swaziland , Industrial safety -- Law and legislation -- Swaziland
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64544 , vital:73748
- Description: The construction industry is an age-old and highly dynamic sector that contributes to the betterment of human life through the development of infrastructure. The presence of regulations is crucial in ensuring the provision of quality, standardization, efficiency, and effectiveness in service delivery. Inadequate regulation of the construction industry has been identified as the primary cause of construction failures in both developing and developed nations. Eswatini is no exception to this issue of legislative failure. The Construction Industry Council (CIC) was established by the Government of Eswatini without initially determining the specific challenges faced by the construction industry in Eswatini. The unique legislative needs pertaining to Eswatini were not explored to ensure that the framework is tailor-made for the Eswatini sector. Given the industry's diverse and intricate nature, a generic approach would not be sufficient to create a unified legislative framework. The study was aimed at developing a coherent legislative framework for the Eswatini construction industry. This study used a mixed-methods research design, incorporating both quantitative and qualitative data. A total of 297 participants were randomly selected from the CIC database for the quantitative survey. A total of 45 interviewees were purposively selected for the semi-structured interviews. Descriptive and inferential analysis were used for the interpretation of the quantitative data. Thematic analysis was used for the qualitative data. Exploratory Factor Analysis, using the maximum likelihood method with Varimax Rotation was employed to analyse the factor structure and correlation between items of the quantitative data. Additionally, the KMO and Bartlett's Tests were conducted. The ANOVA Test was used to test the hypothesis. Thematic analysis was employed for the qualitative data analysis. The findings of this study revealed that contractors in Eswatini recognised the significance of a well-functioning legislative framework and expressed dissatisfaction with the existing legislative measures implemented in the country. The key informant interviews highlighted various challenges, including the absence of regulations for the implementation of the CIC Act, lack of accountability and transparency in the management of funds for CIC operations and inadequate grading criteria. Other challenges that were revealed were insufficient oversight, unfair competition, corruption and limited stakeholder engagement. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Guidelines for improved coordination of public works projects in Buffalo City Metro
- Authors: Puta, Mabhelonke
- Date: 2024-04
- Subjects: Public works -- South Africa , Infrastructure (Economics) -- South Africa , Economic development projects -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64775 , vital:73890
- Description: This aim of this study was to determine how improved coordination of public works projects in Buffalo City Metro (BCM) can be promoted. The aim was predicated on the notion that coordination failure adversely affects scope, time, budget, and quality. A pragmatic worldview related to problem- solving informed the collection of both textual and statistical data for the study through surveys and interviews. In BCM public works projects failures in coordination have resulted in negative outcomes of project implementation. The study shows a correlation between coordination and project success, whilst failure in coordination will negatively impact project cost and project scope, resulting in project failure. The study was able to determine prioritised coordination activities. The study further developed coordination guidelines that mitigate coordination failure by outlining mechanisms, which are as follows: appointment of a coordination leader, scheduling coordination activities, participate plan and quality assurance plan. The outputs of these are the coordination of meetings, the online coordination of software, a schedule of lessons learnt, the drawing up of an execution plan and establishing performance incentives. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Puta, Mabhelonke
- Date: 2024-04
- Subjects: Public works -- South Africa , Infrastructure (Economics) -- South Africa , Economic development projects -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64775 , vital:73890
- Description: This aim of this study was to determine how improved coordination of public works projects in Buffalo City Metro (BCM) can be promoted. The aim was predicated on the notion that coordination failure adversely affects scope, time, budget, and quality. A pragmatic worldview related to problem- solving informed the collection of both textual and statistical data for the study through surveys and interviews. In BCM public works projects failures in coordination have resulted in negative outcomes of project implementation. The study shows a correlation between coordination and project success, whilst failure in coordination will negatively impact project cost and project scope, resulting in project failure. The study was able to determine prioritised coordination activities. The study further developed coordination guidelines that mitigate coordination failure by outlining mechanisms, which are as follows: appointment of a coordination leader, scheduling coordination activities, participate plan and quality assurance plan. The outputs of these are the coordination of meetings, the online coordination of software, a schedule of lessons learnt, the drawing up of an execution plan and establishing performance incentives. , Thesis (MSc) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
Guidelines towards the use of virtual consultation in primary healthcare
- Ndome Ndame, Evelyne Alexandra
- Authors: Ndome Ndame, Evelyne Alexandra
- Date: 2024-04
- Subjects: Telecommunication in medicine , Medicine -- Communication systems , Health services administration -- Information technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64728 , vital:73872
- Description: In an environment of expanding demand on the healthcare system to provide equitable, accessible, and safe healthcare, the use of information and communication technology (ICT) is one of the strategies identified to fulfil such expectations. To make this achievable, ICTs are integrated in healthcare using telehealth, which permits the provision of remote healthcare by using virtual health technologies. One domain of telehealth which permits remote care is virtual consultations. It is an important tool in the healthcare industry used to promote access to healthcare services, especially for elderly people or people with disabilities, those suffering from chronic diseases such as cardiovascular disease, diabetes, and hypertension, among others, and for people in rural and underserved communities. This is possible using videoconferencing technology, telephone consultations, email, or instant messaging. Virtual consultations are becoming an integral part of the healthcare industry all over the world, and it is important to understand how to make use of them to promote healthcare access. The purpose of this study was to create guidelines to assist primary health care professionals in the most effective ways of using virtual consultations to improve access to essential health care services. As such, the objectives governing this study were to identify the role that virtual consultations play in healthcare, to investigate the factors that impact the use of virtual consultations, to review the existing guidelines on virtual consultations, as well as to identify the requirements needed for virtual consultations. This research followed several aspects to guide the methodology of this study. The research process governing this research was the design science research process. The research made use of literature reviews, argumentation, and a survey for data collection as well as a qualitative content analysis to analyse the data. The data collection consisted of 32 survey responses, which aided in the identification of the factors impacting the use of virtual consultations. The results showed that virtual consultations are utilised for various aspects of care delivery, but face-to-face consultations are still the first choice of consultation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Ndome Ndame, Evelyne Alexandra
- Date: 2024-04
- Subjects: Telecommunication in medicine , Medicine -- Communication systems , Health services administration -- Information technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64728 , vital:73872
- Description: In an environment of expanding demand on the healthcare system to provide equitable, accessible, and safe healthcare, the use of information and communication technology (ICT) is one of the strategies identified to fulfil such expectations. To make this achievable, ICTs are integrated in healthcare using telehealth, which permits the provision of remote healthcare by using virtual health technologies. One domain of telehealth which permits remote care is virtual consultations. It is an important tool in the healthcare industry used to promote access to healthcare services, especially for elderly people or people with disabilities, those suffering from chronic diseases such as cardiovascular disease, diabetes, and hypertension, among others, and for people in rural and underserved communities. This is possible using videoconferencing technology, telephone consultations, email, or instant messaging. Virtual consultations are becoming an integral part of the healthcare industry all over the world, and it is important to understand how to make use of them to promote healthcare access. The purpose of this study was to create guidelines to assist primary health care professionals in the most effective ways of using virtual consultations to improve access to essential health care services. As such, the objectives governing this study were to identify the role that virtual consultations play in healthcare, to investigate the factors that impact the use of virtual consultations, to review the existing guidelines on virtual consultations, as well as to identify the requirements needed for virtual consultations. This research followed several aspects to guide the methodology of this study. The research process governing this research was the design science research process. The research made use of literature reviews, argumentation, and a survey for data collection as well as a qualitative content analysis to analyse the data. The data collection consisted of 32 survey responses, which aided in the identification of the factors impacting the use of virtual consultations. The results showed that virtual consultations are utilised for various aspects of care delivery, but face-to-face consultations are still the first choice of consultation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
Incorporating emotion detection in text-dependent speaker authentication
- van Rensburg, Ebenhaeser Otto Janse, Von Solms, Rossouw
- Authors: van Rensburg, Ebenhaeser Otto Janse , Von Solms, Rossouw
- Date: 2024-04
- Subjects: Automatic speech recognition , Biometric identification , Computer networks -- Security measures , Computer networks -- Access control
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64566 , vital:73767
- Description: Biometric authentication allows a person to access sensitive information using unique physical characteristics. Voice, as a biometric authentication method, is gaining popularity due to its unique characteristics and widespread availability on smartphones and other devices. It offers a secure and user-friendly alternative to traditional password-based authentication and allows a less intrusive authentication method than fingerprint authentication. Furthermore, a vast amount of information is portrayed through voice, such as age, gender, health, and emotional state. Gaining illegitimate access to information becomes significantly more difficult as biometrics are difficult to steal, and countermeasures to techniques such as replay attacks are constantly being improved. However, illegitimate access can be gained by forcing a legitimate person to authenticate themselves through voice. This study investigates how the emotion(s) carried by voice can assist in detecting if authentication was performed under duress. Knowledge is contributed using a three-phased approach: information gathering, experimentation, and deliberation. The experimentation phase is further divided into three phases to extract data, implement findings, and assess the value of determining duress using voice. This phased approach to experimentation ensures minimal change in variables and allows the drawn conclusions to be relevant to each phase. The first phase examines datasets and classifiers; the second phase explores feature enhancement techniques and their impact; and the third phase discusses performance measurements and their value to emotion detection. , Thesis (DPhil) -- Faculty Of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: van Rensburg, Ebenhaeser Otto Janse , Von Solms, Rossouw
- Date: 2024-04
- Subjects: Automatic speech recognition , Biometric identification , Computer networks -- Security measures , Computer networks -- Access control
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64566 , vital:73767
- Description: Biometric authentication allows a person to access sensitive information using unique physical characteristics. Voice, as a biometric authentication method, is gaining popularity due to its unique characteristics and widespread availability on smartphones and other devices. It offers a secure and user-friendly alternative to traditional password-based authentication and allows a less intrusive authentication method than fingerprint authentication. Furthermore, a vast amount of information is portrayed through voice, such as age, gender, health, and emotional state. Gaining illegitimate access to information becomes significantly more difficult as biometrics are difficult to steal, and countermeasures to techniques such as replay attacks are constantly being improved. However, illegitimate access can be gained by forcing a legitimate person to authenticate themselves through voice. This study investigates how the emotion(s) carried by voice can assist in detecting if authentication was performed under duress. Knowledge is contributed using a three-phased approach: information gathering, experimentation, and deliberation. The experimentation phase is further divided into three phases to extract data, implement findings, and assess the value of determining duress using voice. This phased approach to experimentation ensures minimal change in variables and allows the drawn conclusions to be relevant to each phase. The first phase examines datasets and classifiers; the second phase explores feature enhancement techniques and their impact; and the third phase discusses performance measurements and their value to emotion detection. , Thesis (DPhil) -- Faculty Of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04