A case study approach to assess the growth towards world class at EH Walton Packaging (Pty) Ltd
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
A facilities management transformation strategy for the public sector
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
A framework for managing timetable data quality within the NMMU
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
A model for legal compliance in the South African banking sector : an information security perspective
- Maphakela, Madidimalo Rabbie
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
A model for role-based security education, training and awareness in the South African healthcare environment
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
A model to improve the effectiveness of the Occupational Health and Safety Inspectorate function relative to South African construction
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
A standards-based security model for health information systems
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
Adoption of business information systems in an automotive manufacturing environment: a case study
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
An investigation of training and mentoring of emerging contractors in the Eastern Cape
- Authors: Moss, Ian
- Date: 2008
- Subjects: Construction industry -- South Africa , Mentoring
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9680 , http://hdl.handle.net/10948/1630 , Construction industry -- South Africa , Mentoring
- Description: The first democratically elected government in South Africa came into power in 1994 and with this the whole country faced changes and new challenges. The construction industry faced the challenge of incorporating and empowering previously disadvantaged people that were part of the industry as well as new emerging contractors that entered the industry. Various training and mentoring programmes were initiated by government as well as quasi-government institutions which attempted to address these challenges. Having an effective mentoring programme in place in the construction industry is critical to the development and growth of the emerging contractors as well as the industry as a whole. This research focuses on a specific programme to establish if the need for training and mentoring programmes exist and which specific aspects of the training need the most attention. The study furthermore, investigates the effect the programme had on emerging contractors on the specific programme. Primary data was collected by means of a telephonic questionnaire to emerging contractors on the mentoring programme as well as the mentors and service providers of the programme. Secondary data was obtained from the literature reviewed and from relevant publications. The main findings were that a need for the training and mentoring of emerging contractors exists and the study emphasizes that there is a demand for the ongoing monitoring of emerging contractors after completion of the programme. The study furthermore reveals that all aspects of the training and mentoring programme is important but more time and effort should be spent on the management and financial aspects of the programme The research is limited to emerging contractors and mentors who participated in the East Cape Development Corporation (ECDC) mentoring programme in the Eastern Cape and is limited to two specific regions namely Port Elizabeth and East London. The findings from the study could be used by training providers as well as mentors to enhance the existing programme to ensure proper rounding of the emerging contractors.
- Full Text:
- Date Issued: 2008
- Authors: Moss, Ian
- Date: 2008
- Subjects: Construction industry -- South Africa , Mentoring
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9680 , http://hdl.handle.net/10948/1630 , Construction industry -- South Africa , Mentoring
- Description: The first democratically elected government in South Africa came into power in 1994 and with this the whole country faced changes and new challenges. The construction industry faced the challenge of incorporating and empowering previously disadvantaged people that were part of the industry as well as new emerging contractors that entered the industry. Various training and mentoring programmes were initiated by government as well as quasi-government institutions which attempted to address these challenges. Having an effective mentoring programme in place in the construction industry is critical to the development and growth of the emerging contractors as well as the industry as a whole. This research focuses on a specific programme to establish if the need for training and mentoring programmes exist and which specific aspects of the training need the most attention. The study furthermore, investigates the effect the programme had on emerging contractors on the specific programme. Primary data was collected by means of a telephonic questionnaire to emerging contractors on the mentoring programme as well as the mentors and service providers of the programme. Secondary data was obtained from the literature reviewed and from relevant publications. The main findings were that a need for the training and mentoring of emerging contractors exists and the study emphasizes that there is a demand for the ongoing monitoring of emerging contractors after completion of the programme. The study furthermore reveals that all aspects of the training and mentoring programme is important but more time and effort should be spent on the management and financial aspects of the programme The research is limited to emerging contractors and mentors who participated in the East Cape Development Corporation (ECDC) mentoring programme in the Eastern Cape and is limited to two specific regions namely Port Elizabeth and East London. The findings from the study could be used by training providers as well as mentors to enhance the existing programme to ensure proper rounding of the emerging contractors.
- Full Text:
- Date Issued: 2008
Analysis and modelling of the temperature distribution during the friction taper stud welding of 10CrMo910
- Van Zyl, Carlo Angelo Antonio
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
Business process security maturity: a paradigm convergence
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
Designing accessible portals in South Africa: a case study
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
Development of a reciprocating aerofoil wind energy harvester
- Authors: Phillips, Russell Leslie
- Date: 2008
- Subjects: Windmills , Wind power , Wind turbines
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9622 , http://hdl.handle.net/10948/899 , Windmills , Wind power , Wind turbines
- Description: Cross flow wind turbines are not unique. The performance of Savonius and Darrieus turbines is well documented. Both share the advantage of being able to accept fluid flow from any direction. The Savonius is drag based and hence has poor power output while the Darrieus is lift based. Due to the fact that the Darrieus has fixed blades the fluid flow through the rotor does not result in optimal lift being generated at all points in the rotation circle. A drawback of the Darrieus system is that it has to operate at a high tip-to wind-speed ratio to obtain reasonable performance with the fixed blades. Deviation from a small optimal range of tip speed ratios results in poor performance. The Darrieus also has poor starting torque. The research conducted in this project focused on overcoming the shortcomings of other turbines and developing an effective cross flow turbine capable of good performance. A number of different concepts were experimented with, however all were based on a symmetrical aerofoil presented to the actual relative airflow at an angle that would produce the highest lift force at all times. The lift force was then utilized to generate movement and to do work on an electrical generator. All concepts contemplated were researched to ascertain their appropriateness for the intended application. During development of the final experimental platform and after lodging of a provisional patent (RSA 2007/00927) it was ascertained that the design shared some similarities with an American patent 5503525 dated 28/4/1994. This patent employed complex electronic sensing and control equipment for control of blade angle. This was thought to be overly complex and costly, particularly for small scale wind energy generation applications and a simpler mechanical solution was sought in the design of the final experimental platform used in this project. The design of the mechanical control system was refined in an attempt to make it simpler, more durable and employ the least number of moving parts. Literature studies and patent searches conducted, suggested that the mechanical control system as developed for the final experimental platform was unique. The enormous variation in the power available from the wind at the different wind speeds likely to be encountered by the device necessitated some means of control. In high wind conditions control of the amount of wind power into the device was deemed to be the preferable means of control. A number of different concepts to achieve this were devised and tested. The final concept employed limited the tail angle deflection and hence the lift produced by the aerofoils. This resulted in a seamless “throttle” control allowing the device to be used in any wind strength by adjusting the control to a position that resulted in the device receiving a suitable amount of power from the wind. The outcome of performance tests conducted indicated that the device has the potential to be developed into a viable wind turbine for both small and large scale applications. The ability to control the power input from the wind to the machine from zero to a maximum is considered to be one of the most beneficial outcomes of this project and together with the quiet operation and low speed, are considered the main advantages of the device over existing wind turbine designs. The possibilities of using the device to compress air for energy storage are exciting avenues that warrant further research.
- Full Text:
- Date Issued: 2008
- Authors: Phillips, Russell Leslie
- Date: 2008
- Subjects: Windmills , Wind power , Wind turbines
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9622 , http://hdl.handle.net/10948/899 , Windmills , Wind power , Wind turbines
- Description: Cross flow wind turbines are not unique. The performance of Savonius and Darrieus turbines is well documented. Both share the advantage of being able to accept fluid flow from any direction. The Savonius is drag based and hence has poor power output while the Darrieus is lift based. Due to the fact that the Darrieus has fixed blades the fluid flow through the rotor does not result in optimal lift being generated at all points in the rotation circle. A drawback of the Darrieus system is that it has to operate at a high tip-to wind-speed ratio to obtain reasonable performance with the fixed blades. Deviation from a small optimal range of tip speed ratios results in poor performance. The Darrieus also has poor starting torque. The research conducted in this project focused on overcoming the shortcomings of other turbines and developing an effective cross flow turbine capable of good performance. A number of different concepts were experimented with, however all were based on a symmetrical aerofoil presented to the actual relative airflow at an angle that would produce the highest lift force at all times. The lift force was then utilized to generate movement and to do work on an electrical generator. All concepts contemplated were researched to ascertain their appropriateness for the intended application. During development of the final experimental platform and after lodging of a provisional patent (RSA 2007/00927) it was ascertained that the design shared some similarities with an American patent 5503525 dated 28/4/1994. This patent employed complex electronic sensing and control equipment for control of blade angle. This was thought to be overly complex and costly, particularly for small scale wind energy generation applications and a simpler mechanical solution was sought in the design of the final experimental platform used in this project. The design of the mechanical control system was refined in an attempt to make it simpler, more durable and employ the least number of moving parts. Literature studies and patent searches conducted, suggested that the mechanical control system as developed for the final experimental platform was unique. The enormous variation in the power available from the wind at the different wind speeds likely to be encountered by the device necessitated some means of control. In high wind conditions control of the amount of wind power into the device was deemed to be the preferable means of control. A number of different concepts to achieve this were devised and tested. The final concept employed limited the tail angle deflection and hence the lift produced by the aerofoils. This resulted in a seamless “throttle” control allowing the device to be used in any wind strength by adjusting the control to a position that resulted in the device receiving a suitable amount of power from the wind. The outcome of performance tests conducted indicated that the device has the potential to be developed into a viable wind turbine for both small and large scale applications. The ability to control the power input from the wind to the machine from zero to a maximum is considered to be one of the most beneficial outcomes of this project and together with the quiet operation and low speed, are considered the main advantages of the device over existing wind turbine designs. The possibilities of using the device to compress air for energy storage are exciting avenues that warrant further research.
- Full Text:
- Date Issued: 2008
Information communication and technology in Port Elizabeth secondary schools : exploring the digital divide
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008
Manufacturing as a reference for rethinking construction design management
- Authors: Sidloyi, Xabiso
- Date: 2008
- Subjects: Industrial design -- Management , Construction industry -- Management -- South Africa -- Eastern Cape , Architecture -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9667 , http://hdl.handle.net/10948/766 , Industrial design -- Management , Construction industry -- Management -- South Africa -- Eastern Cape , Architecture -- Management
- Description: Design changes due to lack of constructability, cost overruns, delays and dissatisfied clients are but a few problems experienced in construction due to poor management of the design processes. Increased problems, challenges, demands and continuous criticism of the architectural profession has led to increased demand for research into the improvement of design processes. The aims of this research were to determine the adequacy of design management processes used by Eastern Cape (EC) architectural companies and compare these with the design management processes used in manufacturing in order to establish practices, theories, principles, technologies and deliverables that can be transferred from the manufacturing into the construction to improve efficiency of architectural design management. The quantitative research approach was implemented for this research, the questionnaire was designed to acquire primary, factual and attitudinal data from EC architectural companies and secondary data were acquired through a literature review. The results revealed that design management processes, continuous improvement philosophies, lean principles, and Information and Communication Technology (ICT) used by EC architectural companies are not similar to those used in manufacturing. Therefore EC architectural companies could increase their efficiency by adopting some of the design management processes, ICT, continuous improvement philosophies and lean principles originating from the manufacturing industry.
- Full Text:
- Date Issued: 2008
- Authors: Sidloyi, Xabiso
- Date: 2008
- Subjects: Industrial design -- Management , Construction industry -- Management -- South Africa -- Eastern Cape , Architecture -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9667 , http://hdl.handle.net/10948/766 , Industrial design -- Management , Construction industry -- Management -- South Africa -- Eastern Cape , Architecture -- Management
- Description: Design changes due to lack of constructability, cost overruns, delays and dissatisfied clients are but a few problems experienced in construction due to poor management of the design processes. Increased problems, challenges, demands and continuous criticism of the architectural profession has led to increased demand for research into the improvement of design processes. The aims of this research were to determine the adequacy of design management processes used by Eastern Cape (EC) architectural companies and compare these with the design management processes used in manufacturing in order to establish practices, theories, principles, technologies and deliverables that can be transferred from the manufacturing into the construction to improve efficiency of architectural design management. The quantitative research approach was implemented for this research, the questionnaire was designed to acquire primary, factual and attitudinal data from EC architectural companies and secondary data were acquired through a literature review. The results revealed that design management processes, continuous improvement philosophies, lean principles, and Information and Communication Technology (ICT) used by EC architectural companies are not similar to those used in manufacturing. Therefore EC architectural companies could increase their efficiency by adopting some of the design management processes, ICT, continuous improvement philosophies and lean principles originating from the manufacturing industry.
- Full Text:
- Date Issued: 2008
Mitigating risk through effective information technology operations in local governments : towards a best practice
- Authors: Kaselowski, Emile
- Date: 2008
- Subjects: Information technology -- South Africa , Local government -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9779 , http://hdl.handle.net/10948/776 , Information technology -- South Africa , Local government -- South Africa -- Data processing
- Description: Sound IT governance is becoming increasingly important for any public or private organisation. However, based on previous research, it can be argued that local municipalities in South Africa are seemingly struggling to implement sound IT governance practices. As a result, very few municipalities perform strategic IT planning and as many as 80percent of municipalities do not have a Master System Plan (MSP) in place, which is required by law. IT governance and corporate governance are lately viewed as one and no longer as two separate governance disciplines, because computer systems and electronic communication are more important now than ever for the survival of any organisation. Therefore, it is important for municipalities to streamline their efforts towards sound IT governance. There are limitations which are faced by municipalities that limit these efforts. Possibly the biggest contributing factor towards this current municipal IT governance predicament, among others, is the fact that there are very few, if any, guidelines and resources available to municipalities to aid them in implementing proper IT infrastructures, systems and governance procedures. To improve the current state of IT governance in municipalities, better guidelines and procedures are required. This dissertation presents an IT governance framework to meet this aforementioned requirement. It is tailored to the requirements of local municipalities and is based on the international best practice, the Control Objectives for Information and related Technologies (COBIT) and the ISO/IEC 17799 code of practice for information security management. This proposed framework takes into account the Municipal Systems Act (nr 32 of 2000), Municipal Structures Act (nr 117 of 1998) and annual municipal IT audit reports’ requirements. Research was conducted at a district and its underlying, local municipalities to determine the proper IT governance criteria for municipalities. Case studies were performed at the municipalities and consisted of performing literature studies on the available municipal legislation and annual, municipal IT audit reports, conducting COBIT gap analyses, an ISO 17799 analysis, conducting interviews and developing questionnaires and data capturing and presentation tools. The resultant, proposed IT governance framework, titled the IT strategic objective plan (IT-SOP), when implemented by a municipality, should provide a solid governance foundation on which to base its business processes on.
- Full Text:
- Date Issued: 2008
- Authors: Kaselowski, Emile
- Date: 2008
- Subjects: Information technology -- South Africa , Local government -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9779 , http://hdl.handle.net/10948/776 , Information technology -- South Africa , Local government -- South Africa -- Data processing
- Description: Sound IT governance is becoming increasingly important for any public or private organisation. However, based on previous research, it can be argued that local municipalities in South Africa are seemingly struggling to implement sound IT governance practices. As a result, very few municipalities perform strategic IT planning and as many as 80percent of municipalities do not have a Master System Plan (MSP) in place, which is required by law. IT governance and corporate governance are lately viewed as one and no longer as two separate governance disciplines, because computer systems and electronic communication are more important now than ever for the survival of any organisation. Therefore, it is important for municipalities to streamline their efforts towards sound IT governance. There are limitations which are faced by municipalities that limit these efforts. Possibly the biggest contributing factor towards this current municipal IT governance predicament, among others, is the fact that there are very few, if any, guidelines and resources available to municipalities to aid them in implementing proper IT infrastructures, systems and governance procedures. To improve the current state of IT governance in municipalities, better guidelines and procedures are required. This dissertation presents an IT governance framework to meet this aforementioned requirement. It is tailored to the requirements of local municipalities and is based on the international best practice, the Control Objectives for Information and related Technologies (COBIT) and the ISO/IEC 17799 code of practice for information security management. This proposed framework takes into account the Municipal Systems Act (nr 32 of 2000), Municipal Structures Act (nr 117 of 1998) and annual municipal IT audit reports’ requirements. Research was conducted at a district and its underlying, local municipalities to determine the proper IT governance criteria for municipalities. Case studies were performed at the municipalities and consisted of performing literature studies on the available municipal legislation and annual, municipal IT audit reports, conducting COBIT gap analyses, an ISO 17799 analysis, conducting interviews and developing questionnaires and data capturing and presentation tools. The resultant, proposed IT governance framework, titled the IT strategic objective plan (IT-SOP), when implemented by a municipality, should provide a solid governance foundation on which to base its business processes on.
- Full Text:
- Date Issued: 2008
South African public private partnership (PPP) projects
- Nyagwachi, Josiah Nyangaresi
- Authors: Nyagwachi, Josiah Nyangaresi
- Date: 2008
- Subjects: Public-private sector cooperation -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9696 , http://hdl.handle.net/10948/716 , Public-private sector cooperation -- South Africa
- Description: The purpose of this thesis is to disseminate research work done towards a higher degree and report on the findings of the research that was conducted relative to South African Public Private Partnership (PPP) projects. The research investigated perceptions of PPP actors on the performance of operational PPP projects. The aim of the research was to fulfil the requirements for the award of the degree of philosophiae doctor in construction management; contribute to the PPP body of knowledge; contribute further understanding of the performance of PPP projects in South Africa; and develop a systemic model for a sustainable PPP system within the country and beyond. All the aforementioned have been achieved, despite the research limitations as indicated in Chapter 1. A case study approach was adopted to examine various performance aspects of operational South African PPP projects. The research was a multi-case study design. Each individual case study consisted of a ‘whole’ study, in which facts were gathered from the selected PPP projects and conclusions drawn on those facts. A web-based questionnaire was used to capture the experiences and perceptions of various actors involved directly, or indirectly in selected PPP projects. The sample stratum consisted of all operational PPP projects registered in accordance with Treasury Regulations as of December 2005 and other projects that reached financial closure before the Public Finance Management Act of 1999 became effective. PPPs involve highly complex procurement processes, are relatively new in South Africa and to date have attracted limited investigation to refine our understanding of the operational performance of PPP projects. This is notable, as significant financial and other resources are involved, and the perception exists that service delivery in most parts of the country is poor. Key empirical evidence from the research indicates that South Africa has developed a robust policy and regulatory framework for PPPs; has an inadequate level of PPP awareness and training; and lacks the project management capacity to facilitate deal flow. It is suggested that further research be conducted on a yearly basis, preferably every six months, so that trends can be established concerning various aspects of other operational PPPs. Further, it is recommended that the PPP Unit commission sector-specific studies that will conduct further research, to compare research across PPP and non-PPP contracts. The choice to conduct a multi-case study required extensive resources and time beyond the means available to the researcher. Further, the sensitive nature of PPP projects made it difficult to obtain required data at the first attempt. However, the researcher made several follow up calls and reminders before eventually obtaining the required data from the respondents. A systemic PPP model has been developed for PPP implementation and management. This model was tested for appropriateness by conducting a further survey on PPP participants attending an international conference on 'Financing of Infrastructure Development in Africa through Public Private Partnerships’ staged in August 2007, in the St. George Hotel, Johannesburg, South Africa. The findings from this research make an invaluable and original contribution to the PPP body of knowledge, provide insight for further research in this important field, refine the understanding of operational PPP projects, and provide direction for policy and decision makers in the public and private sectors, within South Africa and beyond.
- Full Text:
- Date Issued: 2008
- Authors: Nyagwachi, Josiah Nyangaresi
- Date: 2008
- Subjects: Public-private sector cooperation -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9696 , http://hdl.handle.net/10948/716 , Public-private sector cooperation -- South Africa
- Description: The purpose of this thesis is to disseminate research work done towards a higher degree and report on the findings of the research that was conducted relative to South African Public Private Partnership (PPP) projects. The research investigated perceptions of PPP actors on the performance of operational PPP projects. The aim of the research was to fulfil the requirements for the award of the degree of philosophiae doctor in construction management; contribute to the PPP body of knowledge; contribute further understanding of the performance of PPP projects in South Africa; and develop a systemic model for a sustainable PPP system within the country and beyond. All the aforementioned have been achieved, despite the research limitations as indicated in Chapter 1. A case study approach was adopted to examine various performance aspects of operational South African PPP projects. The research was a multi-case study design. Each individual case study consisted of a ‘whole’ study, in which facts were gathered from the selected PPP projects and conclusions drawn on those facts. A web-based questionnaire was used to capture the experiences and perceptions of various actors involved directly, or indirectly in selected PPP projects. The sample stratum consisted of all operational PPP projects registered in accordance with Treasury Regulations as of December 2005 and other projects that reached financial closure before the Public Finance Management Act of 1999 became effective. PPPs involve highly complex procurement processes, are relatively new in South Africa and to date have attracted limited investigation to refine our understanding of the operational performance of PPP projects. This is notable, as significant financial and other resources are involved, and the perception exists that service delivery in most parts of the country is poor. Key empirical evidence from the research indicates that South Africa has developed a robust policy and regulatory framework for PPPs; has an inadequate level of PPP awareness and training; and lacks the project management capacity to facilitate deal flow. It is suggested that further research be conducted on a yearly basis, preferably every six months, so that trends can be established concerning various aspects of other operational PPPs. Further, it is recommended that the PPP Unit commission sector-specific studies that will conduct further research, to compare research across PPP and non-PPP contracts. The choice to conduct a multi-case study required extensive resources and time beyond the means available to the researcher. Further, the sensitive nature of PPP projects made it difficult to obtain required data at the first attempt. However, the researcher made several follow up calls and reminders before eventually obtaining the required data from the respondents. A systemic PPP model has been developed for PPP implementation and management. This model was tested for appropriateness by conducting a further survey on PPP participants attending an international conference on 'Financing of Infrastructure Development in Africa through Public Private Partnerships’ staged in August 2007, in the St. George Hotel, Johannesburg, South Africa. The findings from this research make an invaluable and original contribution to the PPP body of knowledge, provide insight for further research in this important field, refine the understanding of operational PPP projects, and provide direction for policy and decision makers in the public and private sectors, within South Africa and beyond.
- Full Text:
- Date Issued: 2008
The effectiveness of the Joint Building Contracts Committee Series 2000 Principal Building Agreement
- Authors: Cumberlege, Roy Charles
- Date: 2008
- Subjects: Joint Building Contracts Committee (South Africa) , Construction contracts -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9665 , http://hdl.handle.net/10948/768 , Joint Building Contracts Committee (South Africa) , Construction contracts -- South Africa
- Description: With the growth experienced in the Building Industry, it is increasingly important to have a contract document that can be used on projects that is reasonably acceptable to all parties concerned. The objective of the research was to determine the effectiveness of the Joint Building Contracts Committee Series 2000 Principal Building Agreement (JBCC 2000 PBA)(Edition 4.1, March 2005) currently used in the Building Industry. The literature reviewed and results of quantitative research amongst contractors formed the basis of this study. The study revealed that the JBCC 2000 PBA is the most favourable contract document used by contractors in the Building Industry. With the inclusion of a range of construction guarantee alternatives in the contract document in lieu of the retention clause, more than half of the respondents have indicated that they are in favour of a retention clause to be included in the contract document as an alternative security option. The study also showed that there are still areas of concern with regards to the difficulty in interpreting and implementing numerous clauses of the document and that amendments were made to the document without legal advice, resulting in disputes. The research further also revealed that developing building contractors experience difficulties in general where the JBCC 2000 PBA is used as contract document on projects. There also seems to be no balance of risk between the employer and contractor in most cases where this contract document is used. The research concluded with proposals on revisions to some clauses to ensure a better contract document that will be acceptable to all contractors in the Building Industry and ultimately to be an internationally acceptable document.
- Full Text:
- Date Issued: 2008
The effectiveness of the Joint Building Contracts Committee Series 2000 Principal Building Agreement
- Authors: Cumberlege, Roy Charles
- Date: 2008
- Subjects: Joint Building Contracts Committee (South Africa) , Construction contracts -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9665 , http://hdl.handle.net/10948/768 , Joint Building Contracts Committee (South Africa) , Construction contracts -- South Africa
- Description: With the growth experienced in the Building Industry, it is increasingly important to have a contract document that can be used on projects that is reasonably acceptable to all parties concerned. The objective of the research was to determine the effectiveness of the Joint Building Contracts Committee Series 2000 Principal Building Agreement (JBCC 2000 PBA)(Edition 4.1, March 2005) currently used in the Building Industry. The literature reviewed and results of quantitative research amongst contractors formed the basis of this study. The study revealed that the JBCC 2000 PBA is the most favourable contract document used by contractors in the Building Industry. With the inclusion of a range of construction guarantee alternatives in the contract document in lieu of the retention clause, more than half of the respondents have indicated that they are in favour of a retention clause to be included in the contract document as an alternative security option. The study also showed that there are still areas of concern with regards to the difficulty in interpreting and implementing numerous clauses of the document and that amendments were made to the document without legal advice, resulting in disputes. The research further also revealed that developing building contractors experience difficulties in general where the JBCC 2000 PBA is used as contract document on projects. There also seems to be no balance of risk between the employer and contractor in most cases where this contract document is used. The research concluded with proposals on revisions to some clauses to ensure a better contract document that will be acceptable to all contractors in the Building Industry and ultimately to be an internationally acceptable document.
- Full Text:
- Date Issued: 2008
The impact of cultural context on web design for e-Government in South Africa
- Authors: Yeratziotis, Alexandros
- Date: 2008
- Subjects: Internet in public administration -- South Africa , Web sites -- Design , Culture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9741 , http://hdl.handle.net/10948/2116 , Internet in public administration -- South Africa , Web sites -- Design , Culture
- Description: The role and power of ICT today, particularly the Internet, cannot be underestimated. The Internet has a great impact on the business environment, where a large majority of companies and organisations have made substantial investments in an online presence in the form of websites, as well as the IT infrastructure needed to improve business processes. In terms of websites, research has shown that it is critical to identify the target market of the site and the actual users, and to construct the site according to their specific needs and preferences. This is to a large extent the focus of the field of Human Computer Interaction. It therefore makes perfect sense that many software products and websites fail to meet the users‟ needs, as they are designed mainly by Western designers for Eastern and African users. In essence, the failure is due to the fact that the design does not accommodate the cultural behaviours, understandings and preferences of the intended users, thus making it difficult for them to use and adopt them. This has been confirmed by many researchers who have studied various culture dimensions and their relation to Web design. As mentioned, the role of the Internet in terms of its effect in the business world is becoming increasingly important. However, the Internet could prove to play an influential role in the public sector as well and could therefore be used as a critical tool by government in the form of e-Government. Many countries are adopting e-Government initiatives in an attempt to improve their relations within government itself and with their citizens and businesses. This would help them to render better service delivery and at the same time empower the citizens to also participate in the governance of the country itself. The concept for this dissertation was formulated in terms of three key ingredients: e-Government, culture dimensions and Web design. The purpose of this dissertation is to examine the way a specific culture dimension, referred to as the cultural-context dimension, which focuses on the communication process, can impact in Web design. Once this is achieved, it will be possible to determine how this can positively affect the design of the South African e-Government website so that the overall usability of the site may be improved. The improvements will be justified because the site would then match the cultural behaviours, perceptions and Web design preferences of South African users. In short, the goal of this III dissertation is to provide guidelines and recommendations that will improve the South African e-Government website (www.gov.za) by examining anthropologist Edward Hall‟s cultural-context dimension and its role in the Web design process.
- Full Text:
- Date Issued: 2008
- Authors: Yeratziotis, Alexandros
- Date: 2008
- Subjects: Internet in public administration -- South Africa , Web sites -- Design , Culture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9741 , http://hdl.handle.net/10948/2116 , Internet in public administration -- South Africa , Web sites -- Design , Culture
- Description: The role and power of ICT today, particularly the Internet, cannot be underestimated. The Internet has a great impact on the business environment, where a large majority of companies and organisations have made substantial investments in an online presence in the form of websites, as well as the IT infrastructure needed to improve business processes. In terms of websites, research has shown that it is critical to identify the target market of the site and the actual users, and to construct the site according to their specific needs and preferences. This is to a large extent the focus of the field of Human Computer Interaction. It therefore makes perfect sense that many software products and websites fail to meet the users‟ needs, as they are designed mainly by Western designers for Eastern and African users. In essence, the failure is due to the fact that the design does not accommodate the cultural behaviours, understandings and preferences of the intended users, thus making it difficult for them to use and adopt them. This has been confirmed by many researchers who have studied various culture dimensions and their relation to Web design. As mentioned, the role of the Internet in terms of its effect in the business world is becoming increasingly important. However, the Internet could prove to play an influential role in the public sector as well and could therefore be used as a critical tool by government in the form of e-Government. Many countries are adopting e-Government initiatives in an attempt to improve their relations within government itself and with their citizens and businesses. This would help them to render better service delivery and at the same time empower the citizens to also participate in the governance of the country itself. The concept for this dissertation was formulated in terms of three key ingredients: e-Government, culture dimensions and Web design. The purpose of this dissertation is to examine the way a specific culture dimension, referred to as the cultural-context dimension, which focuses on the communication process, can impact in Web design. Once this is achieved, it will be possible to determine how this can positively affect the design of the South African e-Government website so that the overall usability of the site may be improved. The improvements will be justified because the site would then match the cultural behaviours, perceptions and Web design preferences of South African users. In short, the goal of this III dissertation is to provide guidelines and recommendations that will improve the South African e-Government website (www.gov.za) by examining anthropologist Edward Hall‟s cultural-context dimension and its role in the Web design process.
- Full Text:
- Date Issued: 2008
Towards a user centric model for identity and access management within the online environment
- Authors: Deas, Matthew Burns
- Date: 2008
- Subjects: Computers -- Access control , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9780 , http://hdl.handle.net/10948/775 , Computers -- Access control , Computer networks -- Security measures
- Description: Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication.
- Full Text:
- Date Issued: 2008
- Authors: Deas, Matthew Burns
- Date: 2008
- Subjects: Computers -- Access control , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9780 , http://hdl.handle.net/10948/775 , Computers -- Access control , Computer networks -- Security measures
- Description: Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication.
- Full Text:
- Date Issued: 2008