A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A comparative analysis of factors affecting the purchasing decisions of cleaning rag buyers in the Eastern Cape
- Authors: Shearer, David Charcles
- Date: 2012
- Subjects: Purchasing -- Decision making , Consumer behavior -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8898 , http://hdl.handle.net/10948/d1020928
- Description: The objectives of this research project were to identify and compare factors that influence the purchasing decisions of Multifibres’ customers active in each channel. Multifibres manufactures and distributes industrial cleaning rags to three channels or client categories, these being industrial resellers, industrial end-users and the walk-in customers. An extensive literature review revealed that purchasing decisions are influenced by, amongst other factors, the buyer’s role, the internal cognitive processes of the buyer, as well as factors present in the buyer’s business and external environment. An empirical study was conducted utilising in-depth interviews. The most prevalent, emergent themes that buyers attached the greatest weight to when purchasing cleaning rags were: price; quality; service; relationships; and, convenience. These factors were probed, analysed and compared, based on each buyer category’s unique set of characteristics. When motivating their purchasing preferences, resellers emphasised the importance of the business relationship and trust as being paramount, while end-users viewed price and service as the most important factors. Walk-in customers valued the combination of price and convenience as the most important reasons influencing their purchasing decisions.
- Full Text:
- Date Issued: 2012
- Authors: Shearer, David Charcles
- Date: 2012
- Subjects: Purchasing -- Decision making , Consumer behavior -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8898 , http://hdl.handle.net/10948/d1020928
- Description: The objectives of this research project were to identify and compare factors that influence the purchasing decisions of Multifibres’ customers active in each channel. Multifibres manufactures and distributes industrial cleaning rags to three channels or client categories, these being industrial resellers, industrial end-users and the walk-in customers. An extensive literature review revealed that purchasing decisions are influenced by, amongst other factors, the buyer’s role, the internal cognitive processes of the buyer, as well as factors present in the buyer’s business and external environment. An empirical study was conducted utilising in-depth interviews. The most prevalent, emergent themes that buyers attached the greatest weight to when purchasing cleaning rags were: price; quality; service; relationships; and, convenience. These factors were probed, analysed and compared, based on each buyer category’s unique set of characteristics. When motivating their purchasing preferences, resellers emphasised the importance of the business relationship and trust as being paramount, while end-users viewed price and service as the most important factors. Walk-in customers valued the combination of price and convenience as the most important reasons influencing their purchasing decisions.
- Full Text:
- Date Issued: 2012
A comparative study of masculinity in the Twilight films and selected teen dramas
- Theodosiou, Stephanie Nicole
- Authors: Theodosiou, Stephanie Nicole
- Date: 2012
- Subjects: Masculinity in motion pictures
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8425 , http://hdl.handle.net/10948/d1019976
- Description: This research paper aims to investigate the effect mainstream cinema has on the formulation and practice of the masculine stereotype in society, thus exploring the representations of masculinity being provided to males through mainstream cinema. This paper examines the representation of masculinity with reference to cinematic depictions of male masculinity produced in the film category of Teen Drama in the 90‘s/ 2000‘s and 2010 to determine the image the media enforces, through cinema, to influence what males modeled themselves on in both the past and present. This treatise shows the effect the media had on men in the past and how present day men continue to base their individual identity, which has been dramatically influenced and stereotyped by the high standards of the media, by analyzing the movie phenomenon of the Twilight franchise (1 to 3) with reference to Clueless (Amy Heckerling, 1995), 10 Things I hate About You (Gil Junger, 1999), Bring It On (Peyton Reed, 2000), John Tucker Must Die (Betty Thomas, 2006), Easy A (Will Gluck, 2010) and I am Number Four (D.J. Caruso, 2011) featured in the 90‘s/ 2000‘s and 2010. This was carried out through qualitative semiotic research to determine the overall influence the media, particularly mainstream cinema, has on the ideals of masculinity that heterosexual males seek to attain.
- Full Text:
- Date Issued: 2012
- Authors: Theodosiou, Stephanie Nicole
- Date: 2012
- Subjects: Masculinity in motion pictures
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8425 , http://hdl.handle.net/10948/d1019976
- Description: This research paper aims to investigate the effect mainstream cinema has on the formulation and practice of the masculine stereotype in society, thus exploring the representations of masculinity being provided to males through mainstream cinema. This paper examines the representation of masculinity with reference to cinematic depictions of male masculinity produced in the film category of Teen Drama in the 90‘s/ 2000‘s and 2010 to determine the image the media enforces, through cinema, to influence what males modeled themselves on in both the past and present. This treatise shows the effect the media had on men in the past and how present day men continue to base their individual identity, which has been dramatically influenced and stereotyped by the high standards of the media, by analyzing the movie phenomenon of the Twilight franchise (1 to 3) with reference to Clueless (Amy Heckerling, 1995), 10 Things I hate About You (Gil Junger, 1999), Bring It On (Peyton Reed, 2000), John Tucker Must Die (Betty Thomas, 2006), Easy A (Will Gluck, 2010) and I am Number Four (D.J. Caruso, 2011) featured in the 90‘s/ 2000‘s and 2010. This was carried out through qualitative semiotic research to determine the overall influence the media, particularly mainstream cinema, has on the ideals of masculinity that heterosexual males seek to attain.
- Full Text:
- Date Issued: 2012
A comparison between the approaches to unfair discrimination in employment in South Africa and Nigeria
- Authors: Odeyemi, Hannah Olubunmi
- Date: 2012
- Subjects: Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: vital:10270 , http://hdl.handle.net/10948/d1012054 , Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Description: Issues concerning employment are some of the most serious issues of our time. But it is in the last two decades or so that these started receiving consideration. For instance, South Africa has experienced changes in the landscape of employment relations in organisations in the last decades. And no area of South Africa law is more critical than the prohibition of unfair discrimination, especially in the workpalce. The enactment of the Constitution brought about the need to eradicate unfair discrimination in the workpalce. Section 9 of the Constitution states that no person may unfairly discriminate directly or indirectly against anyone and that national legislation must be enacted to prevent or prohibit unfair discrimination. To enforce this, certain legislations like the Labour Law Act, Employment Act, Promotion of Equality and Prohibition of Unfair Discrimination Act (Equality Act), were enacted to give effect to the equality provision of the Constitution. In a similar vein, in Nigeria, workplace discrimination which is at the top of human rights violation perpetrated by employers of labour is of paramount concern to legislators and the government. Sex , age, ethinicty, religion, trade union membership and political opinion are some of the grounds upon which workers may not be discriminated against in Nigeria. Section 17 of the Constitution states that the State social order is founded on the ideals of freedom, equality and justice. It goes on to provide that every citizen shall have equality of rights, obligations and opportunities before the law. More specifically, the section stipilates that the State shall ensure that all citizens, without discrimination of any group whatsoever, have the opportunity of livehood as well as adequate opportunity to secure suitable employment and that there is equal pay for equal work without discrimination on account of sex, or any ground. Hence, there are The Nigerian Labour Act, the Federal Character Commission, etc that are saddled with the responsibility of addressing unfair discrimination and giving force to the provision of the Constitution. Despite the anti-discrimination laws and provisions made available in both countries, it is still alarming to see that unfair discrimination in the workplace is still on the increase. This, as will be discussed later, is probably due to factors such as lack of communication, long-stading patterns of educational inequalities that have resulted in inequalities in manpower, differences in drive, motivation, cultural disposition and geographical opportunities, racial difference and ethnicity, domination of one group by the other, etc. This research will briefly focus on the comparison between the approaches to unfair discrimination in employment between South Africa and Nigeria. It will discuss the development of unfair discrimination, grounds on which it is perpetrated, defences relating to unfair discrimination, and anti-discrimination laws put in place by the two jurisdictions to curb discrimination, as well as suggest on how to forestall unfair discrimination.
- Full Text:
- Date Issued: 2012
- Authors: Odeyemi, Hannah Olubunmi
- Date: 2012
- Subjects: Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: vital:10270 , http://hdl.handle.net/10948/d1012054 , Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Description: Issues concerning employment are some of the most serious issues of our time. But it is in the last two decades or so that these started receiving consideration. For instance, South Africa has experienced changes in the landscape of employment relations in organisations in the last decades. And no area of South Africa law is more critical than the prohibition of unfair discrimination, especially in the workpalce. The enactment of the Constitution brought about the need to eradicate unfair discrimination in the workpalce. Section 9 of the Constitution states that no person may unfairly discriminate directly or indirectly against anyone and that national legislation must be enacted to prevent or prohibit unfair discrimination. To enforce this, certain legislations like the Labour Law Act, Employment Act, Promotion of Equality and Prohibition of Unfair Discrimination Act (Equality Act), were enacted to give effect to the equality provision of the Constitution. In a similar vein, in Nigeria, workplace discrimination which is at the top of human rights violation perpetrated by employers of labour is of paramount concern to legislators and the government. Sex , age, ethinicty, religion, trade union membership and political opinion are some of the grounds upon which workers may not be discriminated against in Nigeria. Section 17 of the Constitution states that the State social order is founded on the ideals of freedom, equality and justice. It goes on to provide that every citizen shall have equality of rights, obligations and opportunities before the law. More specifically, the section stipilates that the State shall ensure that all citizens, without discrimination of any group whatsoever, have the opportunity of livehood as well as adequate opportunity to secure suitable employment and that there is equal pay for equal work without discrimination on account of sex, or any ground. Hence, there are The Nigerian Labour Act, the Federal Character Commission, etc that are saddled with the responsibility of addressing unfair discrimination and giving force to the provision of the Constitution. Despite the anti-discrimination laws and provisions made available in both countries, it is still alarming to see that unfair discrimination in the workplace is still on the increase. This, as will be discussed later, is probably due to factors such as lack of communication, long-stading patterns of educational inequalities that have resulted in inequalities in manpower, differences in drive, motivation, cultural disposition and geographical opportunities, racial difference and ethnicity, domination of one group by the other, etc. This research will briefly focus on the comparison between the approaches to unfair discrimination in employment between South Africa and Nigeria. It will discuss the development of unfair discrimination, grounds on which it is perpetrated, defences relating to unfair discrimination, and anti-discrimination laws put in place by the two jurisdictions to curb discrimination, as well as suggest on how to forestall unfair discrimination.
- Full Text:
- Date Issued: 2012
A comparison of harvester productivity and stump volume waste in coppiced and planted eucalyptus grandis pulpwood compartments in the KwaZulu-Natal forestry region of South Africa
- Ramantswana, Mufhumudzi Muedanyi
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A conflict theory analysis of the 2007 South African public sector strike using a conflict model
- Authors: Knowles, Kelvin David
- Date: 2012
- Subjects: Collective bargaining -- South Africa , Dispute resolution (Law) -- South Africa , Strikes and lockouts -- Law and legislation -- South Africa , Industrial relations -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9407 , http://hdl.handle.net/10948/d1015033
- Description: Conflict is an inherent part of any service relationship, and is one of the important methods of effective organisational functioning. Depending on its management, it has both constructive and negative outcomes. The most extreme outcome of conflict in an industrial relationship is a strike. The South African Public Service strike of 2007 was the most protracted and united strike in the history of South Africa. In order to provide an insight into this strike, this treatise explores the following key aspects: • To present a short background of collective bargaining in the public sector through time. • To provide a short background to the public sector strike in 2007. • To develop a conflict model for analytic purposes based on a literature review and to use the conflict model to analyse the strike. A study of the strike was deemed essential because of its current nature and it being charged with political undertones. Moreover, conflict in the employment relationship has had an important influence on theories of industrial relations. The South African labour relations system is pluralist in nature, with a focus on the formal institutions of industrial relations. The focus should be on the motives and actions of parties in the employment relationship. Hence, one should look beyond conventional explanations in understanding conflict.
- Full Text:
- Date Issued: 2012
- Authors: Knowles, Kelvin David
- Date: 2012
- Subjects: Collective bargaining -- South Africa , Dispute resolution (Law) -- South Africa , Strikes and lockouts -- Law and legislation -- South Africa , Industrial relations -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9407 , http://hdl.handle.net/10948/d1015033
- Description: Conflict is an inherent part of any service relationship, and is one of the important methods of effective organisational functioning. Depending on its management, it has both constructive and negative outcomes. The most extreme outcome of conflict in an industrial relationship is a strike. The South African Public Service strike of 2007 was the most protracted and united strike in the history of South Africa. In order to provide an insight into this strike, this treatise explores the following key aspects: • To present a short background of collective bargaining in the public sector through time. • To provide a short background to the public sector strike in 2007. • To develop a conflict model for analytic purposes based on a literature review and to use the conflict model to analyse the strike. A study of the strike was deemed essential because of its current nature and it being charged with political undertones. Moreover, conflict in the employment relationship has had an important influence on theories of industrial relations. The South African labour relations system is pluralist in nature, with a focus on the formal institutions of industrial relations. The focus should be on the motives and actions of parties in the employment relationship. Hence, one should look beyond conventional explanations in understanding conflict.
- Full Text:
- Date Issued: 2012
A critical study of voice teaching method, with specific reference to solo singing, choral singing and vocal health for the teenage singer
- Authors: Olivier, Madelie Charlotte
- Date: 2012
- Subjects: Singing -- Instruction and study , Voice culture -- Exercises , Singing -- Methods
- Language: English
- Type: Thesis , Masters , MMus
- Identifier: vital:8523 , http://hdl.handle.net/10948/d1019926
- Description: This dissertation presents a critical study of voice teaching method as this pertains to the high school learner studying voice within the South African educational environment, with learning outcomes determined for subject music within the GET (General Education and Training) and FET (Further Education and Training) bands of the Department of Basic Education at each school grade level, as well as by external examining bodies such as Unisa (University of South Africa), Trinity Guildhall and ABRSM (Amalgamated Board of the Royal Schools of Music). Emphasis is placed on the methodological principles applicable in the case of the Western classical music solo vocal repertoire, but reference is also made to the applicability of this method in other vocal genres and, in particular, in the case of choral music participation. Special attention is given to the subject of the vocal health of the developing teenage voice, which includes an overview of vocal disorders and suggestions for rehabilitation and remedial programmes where necessary. Triangulation of research results is achieved in this study through inclusion of: - A thorough survey of selected pertinent bibliographic sources - Description of and engagement with the researcher’s own numerous phenomenological encounters in this field - Interviews conducted in Port Elizabeth with Jill Nock, voice teacher, on the subject of voice teaching method, and with John Black, Ear, Nose and Throat Specialist, on the subject of vocal health. The researcher concludes that there is a need for continued education and training of music educators in the South African high school environment, many of whom are not trained voice specialists, in order to cater for the growing number of high school music learners who choose to specialise in voice. Although educator networking can go a long way towards creating an informal support system to address this need, it is ultimately the responsibility of the Department of Basic Education to address this in a formal and all-encompassing fashion.
- Full Text:
- Date Issued: 2012
- Authors: Olivier, Madelie Charlotte
- Date: 2012
- Subjects: Singing -- Instruction and study , Voice culture -- Exercises , Singing -- Methods
- Language: English
- Type: Thesis , Masters , MMus
- Identifier: vital:8523 , http://hdl.handle.net/10948/d1019926
- Description: This dissertation presents a critical study of voice teaching method as this pertains to the high school learner studying voice within the South African educational environment, with learning outcomes determined for subject music within the GET (General Education and Training) and FET (Further Education and Training) bands of the Department of Basic Education at each school grade level, as well as by external examining bodies such as Unisa (University of South Africa), Trinity Guildhall and ABRSM (Amalgamated Board of the Royal Schools of Music). Emphasis is placed on the methodological principles applicable in the case of the Western classical music solo vocal repertoire, but reference is also made to the applicability of this method in other vocal genres and, in particular, in the case of choral music participation. Special attention is given to the subject of the vocal health of the developing teenage voice, which includes an overview of vocal disorders and suggestions for rehabilitation and remedial programmes where necessary. Triangulation of research results is achieved in this study through inclusion of: - A thorough survey of selected pertinent bibliographic sources - Description of and engagement with the researcher’s own numerous phenomenological encounters in this field - Interviews conducted in Port Elizabeth with Jill Nock, voice teacher, on the subject of voice teaching method, and with John Black, Ear, Nose and Throat Specialist, on the subject of vocal health. The researcher concludes that there is a need for continued education and training of music educators in the South African high school environment, many of whom are not trained voice specialists, in order to cater for the growing number of high school music learners who choose to specialise in voice. Although educator networking can go a long way towards creating an informal support system to address this need, it is ultimately the responsibility of the Department of Basic Education to address this in a formal and all-encompassing fashion.
- Full Text:
- Date Issued: 2012
A data warehouse structure design methodology to support the efficient and effective analysis of online resource usage data
- Authors: Ferreira, Cornél
- Date: 2012
- Subjects: Data warehousing , Electronic information resources
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10486 , http://hdl.handle.net/10948/d1016072
- Description: The use of electronic services results in the generation of vast amounts of Online Resource Usage (ORU) data. ORU data typically consists of user login, printing and executed process information. The structure of this type of data restricts the ability of decision makers to effectively and efficiently analyse ORU data. A data warehouse (DW) structure is required which satisfies an organisation’s information requirements. In order to design a DW structure a methodology is needed to provide a design template according to acknowledged practices. The aim of this research was to primarily propose a methodology specifically for the design of a DW structure to support the efficient and effective analysis of ORU data. A variety of relevant DW structure design methodologies were investigated and a number of limitations were identified. These methodologies do not provide methodological support for metadata documentation, physical design and implementation. The most comprehensive methodology identified in the investigation was modified and the Adapted Triple-Driven DW Structure Design Methodology (ATDM) was proposed. The ATDM was successfully applied to the information and communication technology services (ICTS) department of the Nelson Mandela Metropolitan University as the case study for this research. The proposed ATDM consists of different phases which include a requirements analysis phase that was adapted from the identified comprehensive methodology. A physical design and an implementation phase were included in the ATDM. The ATDM was successfully applied to the ICTS case study as a proof of concept. The application of the ATDM to ICTS resulted in the generation and documentation of semantic and technical metadata which describes the DW structure derived from the application of the ATDM at a logical and physical level respectively. The implementation phase was applied using the Microsoft SQL Server integrated tool to obtain an implemented DW structure for ICTS that is described by technical metadata at an implementation level. This research has shown that the ATDM can be successfully applied to obtain an effective and efficient DW structure for analysing ORU data. The ATDM provides guidelines to develop a DW structure for ORU data and future research includes the generalisation of the ATDM to accommodate various domains and different data types.
- Full Text:
- Date Issued: 2012
- Authors: Ferreira, Cornél
- Date: 2012
- Subjects: Data warehousing , Electronic information resources
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10486 , http://hdl.handle.net/10948/d1016072
- Description: The use of electronic services results in the generation of vast amounts of Online Resource Usage (ORU) data. ORU data typically consists of user login, printing and executed process information. The structure of this type of data restricts the ability of decision makers to effectively and efficiently analyse ORU data. A data warehouse (DW) structure is required which satisfies an organisation’s information requirements. In order to design a DW structure a methodology is needed to provide a design template according to acknowledged practices. The aim of this research was to primarily propose a methodology specifically for the design of a DW structure to support the efficient and effective analysis of ORU data. A variety of relevant DW structure design methodologies were investigated and a number of limitations were identified. These methodologies do not provide methodological support for metadata documentation, physical design and implementation. The most comprehensive methodology identified in the investigation was modified and the Adapted Triple-Driven DW Structure Design Methodology (ATDM) was proposed. The ATDM was successfully applied to the information and communication technology services (ICTS) department of the Nelson Mandela Metropolitan University as the case study for this research. The proposed ATDM consists of different phases which include a requirements analysis phase that was adapted from the identified comprehensive methodology. A physical design and an implementation phase were included in the ATDM. The ATDM was successfully applied to the ICTS case study as a proof of concept. The application of the ATDM to ICTS resulted in the generation and documentation of semantic and technical metadata which describes the DW structure derived from the application of the ATDM at a logical and physical level respectively. The implementation phase was applied using the Microsoft SQL Server integrated tool to obtain an implemented DW structure for ICTS that is described by technical metadata at an implementation level. This research has shown that the ATDM can be successfully applied to obtain an effective and efficient DW structure for analysing ORU data. The ATDM provides guidelines to develop a DW structure for ORU data and future research includes the generalisation of the ATDM to accommodate various domains and different data types.
- Full Text:
- Date Issued: 2012
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for parental control of mobile devices in South Africa
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
A framework for personal health records in online social networking
- Van der Westhuizen, Eldridge Werner
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
A framework for the governance of social media in the workplace
- Authors: Scharneck, Justin William
- Date: 2012
- Subjects: Social media -- Law and legislation , Social media -- Economic aspects , Work environment , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8861 , http://hdl.handle.net/10948/d1020180
- Description: Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
- Full Text:
- Date Issued: 2012
- Authors: Scharneck, Justin William
- Date: 2012
- Subjects: Social media -- Law and legislation , Social media -- Economic aspects , Work environment , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8861 , http://hdl.handle.net/10948/d1020180
- Description: Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
- Full Text:
- Date Issued: 2012
A framework to investigate risk management in commercial banks
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
A guide for using online social media and social networking activities for SMME's
- Authors: Morley, Charmaine Joan
- Date: 2012
- Subjects: Electronic commerce , Social media -- Economic aspects , Customer relations , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8873 , http://hdl/handle.net/10948/d1020350
- Description: Social media is playing an increasingly important role in people’s lives and is becoming a part of most organisations’ business models. Businesses cannot ignore this phenomenon due to the increasing influx of Generation Y employees in their businesses and the Generation Y consumers who are going to buy their products and services in the future. Social media is changing the way that marketing is being conducted, in a positive way. It is changing from businesses focusing on selling products or services to customers, to businesses building relationships with customers and adding value to their lives through their products and services. This phenomenon was the base for this study. The research problem was identified as follows: SMME business owners do not understand the importance and impact of social media on their businesses. Sub-problems were identified as: defining social media and networking, describing the importance of this, which strategies are currently being used in business, how it compares to traditional networking, how this is used in recruitment strategies and what are the disadvantages of social media and networking. The research problem and sub-problems were addressed in a literature study and an empirical study. The literature study included information on SMME businesses, their importance in our economy and how social media can help them. The empirical study was done using SMME’s registered with the George Business Chamber. A questionnaire was designed and distributed to the owners of the businesses by email. The answers were analysed and collated on a spreadsheet which were presented in graph and diagram format. Social media and networking are becoming an integral part of businesses especially small businesses. They specifically have an important role to play in creating economic wealth and creating employment. SMME’s are faced with a lot of challenges which make it difficult for them to become successful and sustainable. Social media can play a role in overcoming a lot of these challenges by helping SMME’s with marketing, customer engagement, relationship building, recruitment, and finding valuable information, experience and partners. Social media also has disadvantages which include: virus attacks, risk of confidential information leaking and so forth, but these can easily be managed by social media polices and rules. A bigger risk lies in the fact that if a business owner ignores the existence of social media, this can lead to conversations by consumers about this business being ignored and not responded to. Another big risk for SMME’s is the fact they are at a competitive disadvantage by ignoring this new technology. This was clear from the empirical results in this study which stated that 53 percent of the businesses surveyed, were aware their competitors are using social media. The empirical results indicated a very low use of social media activities among the SMME’s surveyed but showed potential as the SMME’s understood the importance of social media and were eager to implement strategies in their businesses. The reasons offered for not using social media included the fact that it was difficult to measure its worth in time and money, advice is needed from experts and so forth. Social media and networking are not quick or cheap methods for businesses to advertise and sell their products or services. They are tools to be used over time, in order to engage with customers and build relationships. Consumers and customers expect value for their money and if they find this from a business, they will gladly share it with others. On the other hand, if they do not find value for money it could have a negative impact on the business. SMME’s must not try to replace their current marketing strategy with social networking activities. They should integrate it slowly into their current business models and search for unique ways in which it could improve the relationship with their current customers and find new customers. It should help them to either showcase their existing value added products or services, or improve it if it is not worth selling. Small businesses now have the platform to compete.
- Full Text:
- Date Issued: 2012
- Authors: Morley, Charmaine Joan
- Date: 2012
- Subjects: Electronic commerce , Social media -- Economic aspects , Customer relations , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8873 , http://hdl/handle.net/10948/d1020350
- Description: Social media is playing an increasingly important role in people’s lives and is becoming a part of most organisations’ business models. Businesses cannot ignore this phenomenon due to the increasing influx of Generation Y employees in their businesses and the Generation Y consumers who are going to buy their products and services in the future. Social media is changing the way that marketing is being conducted, in a positive way. It is changing from businesses focusing on selling products or services to customers, to businesses building relationships with customers and adding value to their lives through their products and services. This phenomenon was the base for this study. The research problem was identified as follows: SMME business owners do not understand the importance and impact of social media on their businesses. Sub-problems were identified as: defining social media and networking, describing the importance of this, which strategies are currently being used in business, how it compares to traditional networking, how this is used in recruitment strategies and what are the disadvantages of social media and networking. The research problem and sub-problems were addressed in a literature study and an empirical study. The literature study included information on SMME businesses, their importance in our economy and how social media can help them. The empirical study was done using SMME’s registered with the George Business Chamber. A questionnaire was designed and distributed to the owners of the businesses by email. The answers were analysed and collated on a spreadsheet which were presented in graph and diagram format. Social media and networking are becoming an integral part of businesses especially small businesses. They specifically have an important role to play in creating economic wealth and creating employment. SMME’s are faced with a lot of challenges which make it difficult for them to become successful and sustainable. Social media can play a role in overcoming a lot of these challenges by helping SMME’s with marketing, customer engagement, relationship building, recruitment, and finding valuable information, experience and partners. Social media also has disadvantages which include: virus attacks, risk of confidential information leaking and so forth, but these can easily be managed by social media polices and rules. A bigger risk lies in the fact that if a business owner ignores the existence of social media, this can lead to conversations by consumers about this business being ignored and not responded to. Another big risk for SMME’s is the fact they are at a competitive disadvantage by ignoring this new technology. This was clear from the empirical results in this study which stated that 53 percent of the businesses surveyed, were aware their competitors are using social media. The empirical results indicated a very low use of social media activities among the SMME’s surveyed but showed potential as the SMME’s understood the importance of social media and were eager to implement strategies in their businesses. The reasons offered for not using social media included the fact that it was difficult to measure its worth in time and money, advice is needed from experts and so forth. Social media and networking are not quick or cheap methods for businesses to advertise and sell their products or services. They are tools to be used over time, in order to engage with customers and build relationships. Consumers and customers expect value for their money and if they find this from a business, they will gladly share it with others. On the other hand, if they do not find value for money it could have a negative impact on the business. SMME’s must not try to replace their current marketing strategy with social networking activities. They should integrate it slowly into their current business models and search for unique ways in which it could improve the relationship with their current customers and find new customers. It should help them to either showcase their existing value added products or services, or improve it if it is not worth selling. Small businesses now have the platform to compete.
- Full Text:
- Date Issued: 2012
A historical overview of the development of the trading stock provisions in the Income Tax Act
- Authors: Skotidas, Maria
- Date: 2012
- Subjects: Income tax , Stocks , Taxation
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:8967 , http://hdl.handle.net/10948/d1020829
- Description: The aim of the treatise was to provide a clear understanding of the changes to the trading stock provisions in the Income Tax Act. Various sections of the Act were covered and case law was reviewed with relevance in relation to this research project in order to gain a deeper understanding of the development of the trading stock provisions, thus bringing together the tax legislation and the case law principles. Emphasis was placed on the development of the trading stock provisions. The conclusion from this was that some of the amendments were merely textual in nature whilst others were driven by case law. There were instances where cases did not give rise to amendments but simply reinforced existing provisions by providing guidance and clarity by way of the judges’ interpretations of those provisions. The amendments relating to the trading stock provisions in the Act and the judges’ interpretation of the applicable case law have resulted in a comprehensive understanding of the treatment of trading stock.
- Full Text:
- Date Issued: 2012
- Authors: Skotidas, Maria
- Date: 2012
- Subjects: Income tax , Stocks , Taxation
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:8967 , http://hdl.handle.net/10948/d1020829
- Description: The aim of the treatise was to provide a clear understanding of the changes to the trading stock provisions in the Income Tax Act. Various sections of the Act were covered and case law was reviewed with relevance in relation to this research project in order to gain a deeper understanding of the development of the trading stock provisions, thus bringing together the tax legislation and the case law principles. Emphasis was placed on the development of the trading stock provisions. The conclusion from this was that some of the amendments were merely textual in nature whilst others were driven by case law. There were instances where cases did not give rise to amendments but simply reinforced existing provisions by providing guidance and clarity by way of the judges’ interpretations of those provisions. The amendments relating to the trading stock provisions in the Act and the judges’ interpretation of the applicable case law have resulted in a comprehensive understanding of the treatment of trading stock.
- Full Text:
- Date Issued: 2012
A post restucturing assessment of employee attitudes in South African National Science Council
- Authors: Bugaari, Lynn
- Date: 2012
- Subjects: Job enrichment , Employees -- Attitudes , Employee morale , Performance standards
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9945 , http://hdl.handle.net/10948/d1013702
- Description: Research problem: The restructuring of an organisation can be classified as a transformational intervention (Litwin & Burke, 1992). As such is it has a potential to significantly influence key employee attitudes that are related to employee and organisational performance. Any deterioration in these attitudes could impact negatively on organisational outcomes. As part of the monitoring and review of change interventions, management needs to understand the change in employee attitudes towards their work and management in their business units and towards the broader organisation in order that, if necessary, corrective action can be taken. Research objectives: To address the research problem, research objectives and questions were established. The main objective of the study was to investigate whether there has been a change in attitudes of employees in two business units of a South African National Science Council after the implementation of restructuring in the organisation and the business units. The key attitudes to be measured are job and management satisfaction, perceived organisational support, organisational commitment and a dimension of employee engagement, dedication. Research questions: Four research questions were established and these were; What is the change in employee attitudes post-restructuring? In particular what is the change in employee job satisfaction; management satisfaction, employee engagement, commitment to the organisation and perceived organisational support? What is the relationship between the sub-groups, distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and employee attitudes pre-restructuring? What is the relationship between the sub-groups distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and employee attitudes post-restructuring? What is the relationship between the sub-groups distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and the change in employee attitudes pre and post-restructuring? Research design: The nature of this research is descriptive. In order to solve the research questions the researcher used a pre-test and post-test measurement of employee attitudes. A survey using a structured self-administered questionnaire was used to collect information regarding employee attitudes before and after the restructuring of the organisation and business units. Major findings: The results from the survey showed that there was a change in the levels of organisational commitment, job satisfaction and management satisfaction at the National Science Council after the restructuring had taken place. Also, the impact of the sub-groups in the organisation on affective factors was evident in the level of occupation and employee engagement, race and management satisfaction, the business unit and the levels of perceived organisational support, management satisfaction and employee engagement, home language and employee engagement, the number of years the employee had worked for the organisation and management satisfaction, age and job satisfaction and employee engagement.
- Full Text:
- Date Issued: 2012
- Authors: Bugaari, Lynn
- Date: 2012
- Subjects: Job enrichment , Employees -- Attitudes , Employee morale , Performance standards
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9945 , http://hdl.handle.net/10948/d1013702
- Description: Research problem: The restructuring of an organisation can be classified as a transformational intervention (Litwin & Burke, 1992). As such is it has a potential to significantly influence key employee attitudes that are related to employee and organisational performance. Any deterioration in these attitudes could impact negatively on organisational outcomes. As part of the monitoring and review of change interventions, management needs to understand the change in employee attitudes towards their work and management in their business units and towards the broader organisation in order that, if necessary, corrective action can be taken. Research objectives: To address the research problem, research objectives and questions were established. The main objective of the study was to investigate whether there has been a change in attitudes of employees in two business units of a South African National Science Council after the implementation of restructuring in the organisation and the business units. The key attitudes to be measured are job and management satisfaction, perceived organisational support, organisational commitment and a dimension of employee engagement, dedication. Research questions: Four research questions were established and these were; What is the change in employee attitudes post-restructuring? In particular what is the change in employee job satisfaction; management satisfaction, employee engagement, commitment to the organisation and perceived organisational support? What is the relationship between the sub-groups, distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and employee attitudes pre-restructuring? What is the relationship between the sub-groups distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and employee attitudes post-restructuring? What is the relationship between the sub-groups distinguished by gender, occupational level, race, home language, age, number of years of service and business unit, and the change in employee attitudes pre and post-restructuring? Research design: The nature of this research is descriptive. In order to solve the research questions the researcher used a pre-test and post-test measurement of employee attitudes. A survey using a structured self-administered questionnaire was used to collect information regarding employee attitudes before and after the restructuring of the organisation and business units. Major findings: The results from the survey showed that there was a change in the levels of organisational commitment, job satisfaction and management satisfaction at the National Science Council after the restructuring had taken place. Also, the impact of the sub-groups in the organisation on affective factors was evident in the level of occupation and employee engagement, race and management satisfaction, the business unit and the levels of perceived organisational support, management satisfaction and employee engagement, home language and employee engagement, the number of years the employee had worked for the organisation and management satisfaction, age and job satisfaction and employee engagement.
- Full Text:
- Date Issued: 2012
A process model for e-voting in South Africa
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
A profile for a successful MBA candidate at the NMMU Business School
- Authors: Mafani, Mzilindile Claudius
- Date: 2012
- Subjects: Business schools -- Admission , Universities and colleges
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8702 , http://hdl.handle.net/10948/d1009509 , Business schools -- Admission , Universities and colleges
- Description: The objective of the study is to investigate and compare the 2010 first year intake students’ profile, for the NMMU Business School MBA programme with their module success rate against success indicators derived from previous literature and the SHL tests results in order to compile a conceptual framework as a guide to analyse the database used. The MBA success indicators, as provided in previous literature, were analysed by addressing the following: The psychometric tests as predictors of success; Age as a predictor of success; Cultural background as a predictor of success; Work experience as a predictor of success; and, Educational background as a predictor of success. The NMMU Business School MBA students’ historical data were used as a database for this study. The module pass rates were collated as part of the database, which included the students’ biographical information. The results of the SHL test battery used as the entrance test for admission could not be obtained as the information is regarded as confidential given that the nature of the assessment data requires certain training qualifications from users; and SHL South Africa was approached to collaborate on this study. SHL South Africa performed the statistical analysis and provided these for interpretation and use in the study. The study revealed that more than half of the NMMU MBA candidates did not complete the programme in the minimum prescribed period, as only 40.5 percent of the candidates completed successfully all modules in this period, and 52 percent of them were in the 30 -39 years-age category. It also revealed that 78.1 percent of those that had successfully completed the programme were males compared with the 21.9 percent of females that completed the course. The study showed that in the 59.5 percent of those that were not successful, 40.4 percent were females compared to 59.6 percent of unsuccessful males in the same sample. Although the pass rates ranged above 75 percent, only one module had the full sample writing the examination, and the lowest core module had 67percent candidates writing the examination. The current entrance process is recommended with improvements to increase the pass rates, throughputs, and to allow for a stricter analysis of the entrance test results.
- Full Text:
- Date Issued: 2012
- Authors: Mafani, Mzilindile Claudius
- Date: 2012
- Subjects: Business schools -- Admission , Universities and colleges
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8702 , http://hdl.handle.net/10948/d1009509 , Business schools -- Admission , Universities and colleges
- Description: The objective of the study is to investigate and compare the 2010 first year intake students’ profile, for the NMMU Business School MBA programme with their module success rate against success indicators derived from previous literature and the SHL tests results in order to compile a conceptual framework as a guide to analyse the database used. The MBA success indicators, as provided in previous literature, were analysed by addressing the following: The psychometric tests as predictors of success; Age as a predictor of success; Cultural background as a predictor of success; Work experience as a predictor of success; and, Educational background as a predictor of success. The NMMU Business School MBA students’ historical data were used as a database for this study. The module pass rates were collated as part of the database, which included the students’ biographical information. The results of the SHL test battery used as the entrance test for admission could not be obtained as the information is regarded as confidential given that the nature of the assessment data requires certain training qualifications from users; and SHL South Africa was approached to collaborate on this study. SHL South Africa performed the statistical analysis and provided these for interpretation and use in the study. The study revealed that more than half of the NMMU MBA candidates did not complete the programme in the minimum prescribed period, as only 40.5 percent of the candidates completed successfully all modules in this period, and 52 percent of them were in the 30 -39 years-age category. It also revealed that 78.1 percent of those that had successfully completed the programme were males compared with the 21.9 percent of females that completed the course. The study showed that in the 59.5 percent of those that were not successful, 40.4 percent were females compared to 59.6 percent of unsuccessful males in the same sample. Although the pass rates ranged above 75 percent, only one module had the full sample writing the examination, and the lowest core module had 67percent candidates writing the examination. The current entrance process is recommended with improvements to increase the pass rates, throughputs, and to allow for a stricter analysis of the entrance test results.
- Full Text:
- Date Issued: 2012