Composition portfolio
- Authors: Musambasi, Richie Andile
- Date: 2024-10-11
- Subjects: Composition (Music) , Ethnoscience , Oral tradition , Traditional knowledge , Marimba , Music Zimbabwe
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/466094 , vital:76684
- Description: Indigenous Zimbabwean music is complex in its make up and reveals spiritual beliefs, modes of expression, communication patterns, and forms of entertainment. The goal of this composition portfolio is to create pieces that are imbued with the spirit of indigenous Zimbabwean music making as passed on from father to son. The pieces composed include thorough-composed (pre-determined) solo and ensemble frameworks using mostly marimbas based largely on Shona scales and tuning, but also adding mbira, hosho and djembe. All of this is presented within complex structural manipulations that include African and some Western elements of formal music structure. The compositions feature two interlocking parts, known as kushaura and kutsinhira (call and respond), which are traditionally played in a simultaneous manner by two or more musicians. In this portfolio, these voices are spread across a range of players where the interplay between the parts produces complex polyphonic and polyrhythmic musical relationships. The compositions explore modal changes which add excitement, variety and an extra layer of complexity to the pieces. The final artefact is presented as a multimedia submission recorded as a documentary in real time, which is a representation of the embodied making of the music, central to this project. As music was passed down through folk tales, religious gatherings, rock paintings and sources of art, the narration is the key element in expressing that knowledge dissemination is not only text bound, but also embodied and orally shared. , Thesis (MA) -- Faculty of Humanities, Music and Musicology, 2024
- Full Text:
- Date Issued: 2024-10-11
- Authors: Musambasi, Richie Andile
- Date: 2024-10-11
- Subjects: Composition (Music) , Ethnoscience , Oral tradition , Traditional knowledge , Marimba , Music Zimbabwe
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/466094 , vital:76684
- Description: Indigenous Zimbabwean music is complex in its make up and reveals spiritual beliefs, modes of expression, communication patterns, and forms of entertainment. The goal of this composition portfolio is to create pieces that are imbued with the spirit of indigenous Zimbabwean music making as passed on from father to son. The pieces composed include thorough-composed (pre-determined) solo and ensemble frameworks using mostly marimbas based largely on Shona scales and tuning, but also adding mbira, hosho and djembe. All of this is presented within complex structural manipulations that include African and some Western elements of formal music structure. The compositions feature two interlocking parts, known as kushaura and kutsinhira (call and respond), which are traditionally played in a simultaneous manner by two or more musicians. In this portfolio, these voices are spread across a range of players where the interplay between the parts produces complex polyphonic and polyrhythmic musical relationships. The compositions explore modal changes which add excitement, variety and an extra layer of complexity to the pieces. The final artefact is presented as a multimedia submission recorded as a documentary in real time, which is a representation of the embodied making of the music, central to this project. As music was passed down through folk tales, religious gatherings, rock paintings and sources of art, the narration is the key element in expressing that knowledge dissemination is not only text bound, but also embodied and orally shared. , Thesis (MA) -- Faculty of Humanities, Music and Musicology, 2024
- Full Text:
- Date Issued: 2024-10-11
Modelling water quality dynamics by integrating PYWR, climate change, and land-cover scenarios: a case study in the Grootdraai Dam Catchment, Upper Vaal, South Africa
- Authors: Lazar, Sofia
- Date: 2024-10-11
- Subjects: Water-supply Mathematical models , Black box , Distributed model , Water quality South Africa Grootdraai Dam , Water allocation , Land use South Africa Grootdraai Dam
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/465000 , vital:76564
- Description: Water resource management faces global challenges in allocation, quality, and sustainability. Despite extensive focus on quantity, water quality remains neglected, especially in developing nations, owing to data scarcity and funding issues. Water quantity modelling is more advanced, leaving water quality modelling lagging, as it requires finer spatiotemporal scales. Global water quality models, including those used in South Africa, encounter complexity and data requirements, and some proprietary models limit access. In South Africa, a water quality model is integrated with the less accessible Water Resources Yield Model (WRYM). However, WRYM's spatial lumping may not suffice for water quality assessment, emphasising the need for improvement. This study aims to address the gap in water quality modelling by transitioning from lumped, proprietary, and monthly time-step models applied in South Africa to more spatially distributed, user-friendly, transparent, fast models and daily time-step models, using the Grootdraai Dam Catchment in the Upper Vaal as a study region. The study examines providing water quality simulation for various variables under different tested scenarios, including (i) land-use scenarios (e.g., urbanisation, industrialisation, population growth and expansion in agricultural areas); (ii) mixed scenarios (e.g., climate change, mine closure, and demand increase). The study proposed a framework shifting from the WRYM to a Python water resources (Pywr) model, linked with the Water Quality Systems Assessment Model (WQSAM) in the Grootdraai Dam Catchment. This integration, the Python water resources-Water Quality (Pywr-WQ) model, was developed by the Water Research centre (WRc) in the United Kingdom. The study employed multiple regression models to develop land-use models, the outcomes of which were integrated into the Pywr-WQ model for medium and long term land-use scenario predictions. The study resulted in the following findings: (1) significant patterns emerge concerning the impacts of urbanisation, mining, and agricultural expansion on water quality; (2) urban areas exhibit elevated levels of nitrate plus nitrite and ammonium over the long term associated with human activities and infrastructure development; (3) increased cultivation leads to heightened phosphate levels, indicative of agricultural runoff and potential high fertiliser usage, while the expansion of mining activities results in elevated concentrations of sulphate and Total Dissolved Solids (TDS), attributed to the discharge of mine effluents; (4) noticeable declines in the concentrations of TDS and sulphate are evident in the medium to long term when compared to the baseline simulations. However, the worst-case scenario (i.e., a 70% abstraction increase) exhibits elevated peaks and concentrations compared to scenarios with more probable demand increases (e.g., a 5% increase). , Thesis (MSc) -- Faculty of Science, Institute for Water Research, 2024
- Full Text:
- Date Issued: 2024-10-11
- Authors: Lazar, Sofia
- Date: 2024-10-11
- Subjects: Water-supply Mathematical models , Black box , Distributed model , Water quality South Africa Grootdraai Dam , Water allocation , Land use South Africa Grootdraai Dam
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/465000 , vital:76564
- Description: Water resource management faces global challenges in allocation, quality, and sustainability. Despite extensive focus on quantity, water quality remains neglected, especially in developing nations, owing to data scarcity and funding issues. Water quantity modelling is more advanced, leaving water quality modelling lagging, as it requires finer spatiotemporal scales. Global water quality models, including those used in South Africa, encounter complexity and data requirements, and some proprietary models limit access. In South Africa, a water quality model is integrated with the less accessible Water Resources Yield Model (WRYM). However, WRYM's spatial lumping may not suffice for water quality assessment, emphasising the need for improvement. This study aims to address the gap in water quality modelling by transitioning from lumped, proprietary, and monthly time-step models applied in South Africa to more spatially distributed, user-friendly, transparent, fast models and daily time-step models, using the Grootdraai Dam Catchment in the Upper Vaal as a study region. The study examines providing water quality simulation for various variables under different tested scenarios, including (i) land-use scenarios (e.g., urbanisation, industrialisation, population growth and expansion in agricultural areas); (ii) mixed scenarios (e.g., climate change, mine closure, and demand increase). The study proposed a framework shifting from the WRYM to a Python water resources (Pywr) model, linked with the Water Quality Systems Assessment Model (WQSAM) in the Grootdraai Dam Catchment. This integration, the Python water resources-Water Quality (Pywr-WQ) model, was developed by the Water Research centre (WRc) in the United Kingdom. The study employed multiple regression models to develop land-use models, the outcomes of which were integrated into the Pywr-WQ model for medium and long term land-use scenario predictions. The study resulted in the following findings: (1) significant patterns emerge concerning the impacts of urbanisation, mining, and agricultural expansion on water quality; (2) urban areas exhibit elevated levels of nitrate plus nitrite and ammonium over the long term associated with human activities and infrastructure development; (3) increased cultivation leads to heightened phosphate levels, indicative of agricultural runoff and potential high fertiliser usage, while the expansion of mining activities results in elevated concentrations of sulphate and Total Dissolved Solids (TDS), attributed to the discharge of mine effluents; (4) noticeable declines in the concentrations of TDS and sulphate are evident in the medium to long term when compared to the baseline simulations. However, the worst-case scenario (i.e., a 70% abstraction increase) exhibits elevated peaks and concentrations compared to scenarios with more probable demand increases (e.g., a 5% increase). , Thesis (MSc) -- Faculty of Science, Institute for Water Research, 2024
- Full Text:
- Date Issued: 2024-10-11
A comparison of implementation platforms for the visualisation of animal family trees
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A critical analysis of the interpretation of a permanent establishment created where a subsidiary acts as a dependent agent for its parent company
- Authors: Potgieter, Gizelle Kara
- Date: 2024-04
- Subjects: Double taxation , Taxation
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65389 , vital:74112
- Description: In recent years, the need arose to amend the DAPE provisions in the OECD MTC due to the ever-evolving nature of the tax avoidance strategies employed globally. This research study analysed the amendments that were made to the DAPE provisions of Article 5(5) of the 2014 OECD MTC, including the related OECD Commentary thereto and the extent to which the Commentary can be relied on. The relevance of the amended DAPE provisions were discussed by analysing the PE definition in SA’s domestic tax law, SA’s position on the MLI and consequently its position on Article 12 of the MLI which incorporates the amended DAPE provisions into existing DTAs. The scope of the research was limited to the DAPE provisions, and the research did not focus on the PE provisions in general. The focal point of the study was specifically on SA subsidiaries acting as dependent agents for its parent companies located in foreign jurisdictions, thereby creating deemed PEs for the foreign parent companies in SA based on the relevant criteria set out in Article 5(5) of the OECD MTC. The research study further explored specific French court cases that focussed on the interpretation of the DAPE provisions in the relevant DTAs and commented on the appropriateness of the decisions reached in these cases. The primary objective of the research was to determine how the DAPE provisions should be interpreted for purposes of SA’s domestic law, as well as its DTAs concluded with both France and Ireland. The research study therefore concluded with an interpretation of a case study based on a similar set of facts to the foreign court cases explored, where an SA subsidiary acted as a dependent agent on behalf of its foreign parent company. The conclusion reached on the appropriate interpretation for domestic law purposes differed significantly to the interpretation for purposes of the DTAs as a result of the significant amendments that were made to the DAPE provisions in the 2017 MTC. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Potgieter, Gizelle Kara
- Date: 2024-04
- Subjects: Double taxation , Taxation
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65389 , vital:74112
- Description: In recent years, the need arose to amend the DAPE provisions in the OECD MTC due to the ever-evolving nature of the tax avoidance strategies employed globally. This research study analysed the amendments that were made to the DAPE provisions of Article 5(5) of the 2014 OECD MTC, including the related OECD Commentary thereto and the extent to which the Commentary can be relied on. The relevance of the amended DAPE provisions were discussed by analysing the PE definition in SA’s domestic tax law, SA’s position on the MLI and consequently its position on Article 12 of the MLI which incorporates the amended DAPE provisions into existing DTAs. The scope of the research was limited to the DAPE provisions, and the research did not focus on the PE provisions in general. The focal point of the study was specifically on SA subsidiaries acting as dependent agents for its parent companies located in foreign jurisdictions, thereby creating deemed PEs for the foreign parent companies in SA based on the relevant criteria set out in Article 5(5) of the OECD MTC. The research study further explored specific French court cases that focussed on the interpretation of the DAPE provisions in the relevant DTAs and commented on the appropriateness of the decisions reached in these cases. The primary objective of the research was to determine how the DAPE provisions should be interpreted for purposes of SA’s domestic law, as well as its DTAs concluded with both France and Ireland. The research study therefore concluded with an interpretation of a case study based on a similar set of facts to the foreign court cases explored, where an SA subsidiary acted as a dependent agent on behalf of its foreign parent company. The conclusion reached on the appropriate interpretation for domestic law purposes differed significantly to the interpretation for purposes of the DTAs as a result of the significant amendments that were made to the DAPE provisions in the 2017 MTC. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
A critical evaluation of the state of capital asset management in Nelson Mandela Bay Municipality and its impact on service delivery
- Authors: Ndleleni, Neziwe
- Date: 2024-04
- Subjects: Nelson Mandela Bay Municipality (South Africa) , Asset-liability management , Asset management accounts -- South Africa -- Port Elizabeth
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65285 , vital:74088
- Description: Over the past decades, municipalities have emerged as a significant sphere of government that provides essential services to the general population, thereby improving their standard of living. While the communities have been vocal in their demand for improved service delivery, some municipalities are finding it difficult to provide sustainable services because of their deteriorating infrastructure. As a result,this exhibits a negative impact on the citizens' standard of living. Good capital asset management and efficient use of resources, including suitable amenities to offer services as needed by communities, are required to improve the quality of services. Municipalities must comply with this directive, adhere to the governance requirement, alongside their consequent obligations to follow laws and regulations, execute their duties and deliver promises set within the communities that they serve. The objective of this research was to critically examine the state of capital asset management in NMBM and its influence on service delivery.The research adopted a qualitative method of enquiry. The researcher employed a qualitative methodology to acquire data using an interview schedule. Some basic findings suggest that aspects of capital asset management, including leadership, planning and budgetary concerns, a scarcity of technical staff, managerial dedication and engagement, political support, insufficient or absent capital asset conditions, present a challenge in NMBM. The study recommends that management take steps to enhance the implementation of an asset management policy, at the same time developing strategies and interventions to assist related service delivery directorates and personnel in the application, controlling andmonitoring of capital assets. It is necessary to improve the competence and efficiency of assets as well prioritise the required services and sustainability. The argument reflects that the techniques suggested in conjunction with the findings provide novel perspectives on the problems associated with capital assetmanagement. In the end, putting these recommendations into practice might greatly enhance asset management and service delivery in NMBM. , Thesis (MBA) -- Faculty of Business and Economic Sciences, Business School, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Ndleleni, Neziwe
- Date: 2024-04
- Subjects: Nelson Mandela Bay Municipality (South Africa) , Asset-liability management , Asset management accounts -- South Africa -- Port Elizabeth
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65285 , vital:74088
- Description: Over the past decades, municipalities have emerged as a significant sphere of government that provides essential services to the general population, thereby improving their standard of living. While the communities have been vocal in their demand for improved service delivery, some municipalities are finding it difficult to provide sustainable services because of their deteriorating infrastructure. As a result,this exhibits a negative impact on the citizens' standard of living. Good capital asset management and efficient use of resources, including suitable amenities to offer services as needed by communities, are required to improve the quality of services. Municipalities must comply with this directive, adhere to the governance requirement, alongside their consequent obligations to follow laws and regulations, execute their duties and deliver promises set within the communities that they serve. The objective of this research was to critically examine the state of capital asset management in NMBM and its influence on service delivery.The research adopted a qualitative method of enquiry. The researcher employed a qualitative methodology to acquire data using an interview schedule. Some basic findings suggest that aspects of capital asset management, including leadership, planning and budgetary concerns, a scarcity of technical staff, managerial dedication and engagement, political support, insufficient or absent capital asset conditions, present a challenge in NMBM. The study recommends that management take steps to enhance the implementation of an asset management policy, at the same time developing strategies and interventions to assist related service delivery directorates and personnel in the application, controlling andmonitoring of capital assets. It is necessary to improve the competence and efficiency of assets as well prioritise the required services and sustainability. The argument reflects that the techniques suggested in conjunction with the findings provide novel perspectives on the problems associated with capital assetmanagement. In the end, putting these recommendations into practice might greatly enhance asset management and service delivery in NMBM. , Thesis (MBA) -- Faculty of Business and Economic Sciences, Business School, 2024
- Full Text:
- Date Issued: 2024-04
A cyber security strategy to mitigate cloud computing risks within the investment management sector in Cape Town
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for a cybersecurity policy in South African schools
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the integration of 4IR-related topics into IT undergraduate curricula in South Africa
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A methodology for modernising legacy web applications: subtitle if needed. If no subtitle follow instructions in manual
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for speech-driven lesson summary generation in a noisy educational environment
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A process for integrated fitness and menstrual cycle data visualisations
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A qualitative review on the manner in which psychologists address language barriers in psychological testing with isiXhosa speaking clients
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
A review of the quality of the covid-19 terminology that has been translated into isiXhosa
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
A skills development framework for the built environment
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A strategic approach for handling information security incidents in higher education
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A strategy for the implementation of IT shared services at the Nelson Mandela University
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A university-based entrepreneurial ecosystem framework in a developing country context
- Authors: Nkotha, Atlehang
- Date: 2024-04
- Subjects: Entrepreneurship , Student-owned business enterprises -- Management , New business enterprises -- Management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65331 , vital:74092
- Description: As finding employment in South Africa remains difficult, venture creation is a necessary alternative source of income and employment. The literature suggests that a university should serve as an incubator for student entrepreneurs and provide a supportive environment for their entrepreneurial ventures. Universities are also important to the development of entrepreneurial thinking among faculty, students, and other stakeholders. Furthermore, a university-based entrepreneurial ecosystem (U-BEE) is perceived as a source of support for successful student start-up ventures. The literature suggests that the elements of U-BEEs and the interaction between them vary depending on regional and local conditions. Furthermore, the key components of a U-BEE are not appropriate for all regions or contexts. As U-BEEs are dynamic and student start-ups vary, the need exists to understand the interacting elements of the system before it can be built, or the strategies implemented. Against this background, the primary objective of this study was to map and assess a student U-BEE in a developing country context. The current study was situated in an interpretive research paradigm and deductive reasoning was applied. As a single case study research strategy was used and based on convenience sampling, Nelson Mandela University (NMU) was selected as the case to be investigated. Data was collected through a document review, surveying 33 respondents as well as conducting semi-structured interviews with 12 entrepreneurship stakeholders at one point in time. Deductive codes and thematic analysis were used to analyze the data. Through identifying and delineating the elements of NMU’s student U-BEE, it was noted that the elements in the system varied in degree of importance and prevalence. The elements investigated were people, infrastructure, funding, leadership and governance, entrepreneurship activities, reward system, collaboration, monitoring and evaluation, as well as organizational culture and outcomes. Several people were identified as supporting student entrepreneurship at NMU ranging from top management, and academics to support staff. Although a science and technology park did not exist at NMU, the findings showed that physical infrastructure and IT facilities existed to support student entrepreneurship. Despite some funding being provided for student entrepreneurship support (SES) development, none was provided for entrepreneurial infrastructure. Some top management personnel were identified as providing leadership for SES at NMU including the Vice-Chancellor who was committed to contributing to the ecosystem. In addition, various co-curricular SES activities were identified as taking place at NMU with most being offered free to registered students. However, NMU did not provide any incentives to encourage staff or students to provide SES at NMU and no formal system for rewards existed. Several internal and external collaborations to provide SES activities effectively at NMU were identified, with most occurring through the Entrepreneurship Development in Higher Education Community of Practice Network. SES activities were not monitored at NMU, but some student entrepreneurship data was handled by the Department of Institutional Planning. As a result, NMU was not perceived as having an entrepreneurially supportive culture, and the use of metrics to establish measurable outcomes were limited. In addition to identifying the challenges faced when building a student U-BEE ecosystem in a developing country context, the study elaborated on several suggestions on how these challenges could be overcome and what improvements could be made in terms of SES at NMU. The challenges identified related to NMU being under-resourced in terms of funds, staff, and infrastructure to support student entrepreneurship. In general, the findings of this study highlighted the need for student entrepreneurship to be a strategic priority at NMU. The increased involvement of top management, entrepreneurship staff, students, and other stakeholders needs to be encouraged and incentivized. In addition, faculties across the university should encourage student entrepreneurship involvement and encourage students to participate in programmes offered on campuses. The importance of appropriately skilled staff to handle all matters relating to student entrepreneurship was also emphasized. This study has theoretical significance because it identifies, maps, and assesses the elements of a student U-BEE in a developing country context. As such, it paves the way for future researchers to investigate other universities in these contexts, and to undertake further empirical studies. This study also has practical significance in that it makes several recommendations that might be of value to stakeholders within U-BEEs in developing country contexts. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Management Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Nkotha, Atlehang
- Date: 2024-04
- Subjects: Entrepreneurship , Student-owned business enterprises -- Management , New business enterprises -- Management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65331 , vital:74092
- Description: As finding employment in South Africa remains difficult, venture creation is a necessary alternative source of income and employment. The literature suggests that a university should serve as an incubator for student entrepreneurs and provide a supportive environment for their entrepreneurial ventures. Universities are also important to the development of entrepreneurial thinking among faculty, students, and other stakeholders. Furthermore, a university-based entrepreneurial ecosystem (U-BEE) is perceived as a source of support for successful student start-up ventures. The literature suggests that the elements of U-BEEs and the interaction between them vary depending on regional and local conditions. Furthermore, the key components of a U-BEE are not appropriate for all regions or contexts. As U-BEEs are dynamic and student start-ups vary, the need exists to understand the interacting elements of the system before it can be built, or the strategies implemented. Against this background, the primary objective of this study was to map and assess a student U-BEE in a developing country context. The current study was situated in an interpretive research paradigm and deductive reasoning was applied. As a single case study research strategy was used and based on convenience sampling, Nelson Mandela University (NMU) was selected as the case to be investigated. Data was collected through a document review, surveying 33 respondents as well as conducting semi-structured interviews with 12 entrepreneurship stakeholders at one point in time. Deductive codes and thematic analysis were used to analyze the data. Through identifying and delineating the elements of NMU’s student U-BEE, it was noted that the elements in the system varied in degree of importance and prevalence. The elements investigated were people, infrastructure, funding, leadership and governance, entrepreneurship activities, reward system, collaboration, monitoring and evaluation, as well as organizational culture and outcomes. Several people were identified as supporting student entrepreneurship at NMU ranging from top management, and academics to support staff. Although a science and technology park did not exist at NMU, the findings showed that physical infrastructure and IT facilities existed to support student entrepreneurship. Despite some funding being provided for student entrepreneurship support (SES) development, none was provided for entrepreneurial infrastructure. Some top management personnel were identified as providing leadership for SES at NMU including the Vice-Chancellor who was committed to contributing to the ecosystem. In addition, various co-curricular SES activities were identified as taking place at NMU with most being offered free to registered students. However, NMU did not provide any incentives to encourage staff or students to provide SES at NMU and no formal system for rewards existed. Several internal and external collaborations to provide SES activities effectively at NMU were identified, with most occurring through the Entrepreneurship Development in Higher Education Community of Practice Network. SES activities were not monitored at NMU, but some student entrepreneurship data was handled by the Department of Institutional Planning. As a result, NMU was not perceived as having an entrepreneurially supportive culture, and the use of metrics to establish measurable outcomes were limited. In addition to identifying the challenges faced when building a student U-BEE ecosystem in a developing country context, the study elaborated on several suggestions on how these challenges could be overcome and what improvements could be made in terms of SES at NMU. The challenges identified related to NMU being under-resourced in terms of funds, staff, and infrastructure to support student entrepreneurship. In general, the findings of this study highlighted the need for student entrepreneurship to be a strategic priority at NMU. The increased involvement of top management, entrepreneurship staff, students, and other stakeholders needs to be encouraged and incentivized. In addition, faculties across the university should encourage student entrepreneurship involvement and encourage students to participate in programmes offered on campuses. The importance of appropriately skilled staff to handle all matters relating to student entrepreneurship was also emphasized. This study has theoretical significance because it identifies, maps, and assesses the elements of a student U-BEE in a developing country context. As such, it paves the way for future researchers to investigate other universities in these contexts, and to undertake further empirical studies. This study also has practical significance in that it makes several recommendations that might be of value to stakeholders within U-BEEs in developing country contexts. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Management Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An assessment of community participation in disaster management: A Case Study of Nelson Mandela Bay Municipality
- Authors: Stemele, Lwandiso Phololo
- Date: 2024-04
- Subjects: Disaster relief -- South Africa -- Port Elizabeth , Crisis management -- South Africa -- Port Elizabeth , Political participation -- South Africa -- Eastern Cape -- Nelson Mandela Bay Municipality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63540 , vital:73489
- Description: This study sought to assess the level of community participation in disaster management by the communities that are most affected by floods and fires in informal settlements. The study aimed to assess the level of awareness of disaster risks at a community level and thereby provide recommendations to increase the level of participation, involvement and awareness in disaster management by the communities. This research adopted both qualitative and quantitative research approaches to form a mixed-method research approach. Data was collected using both approaches and converged to form the results and analysis of the empirical survey. From these results and analysis, recommendations are presented, which also draw insight from the literature review, to assist the Nelson Mandela Bay Municipality to better involve communities in disaster management. , Thesis (MA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Stemele, Lwandiso Phololo
- Date: 2024-04
- Subjects: Disaster relief -- South Africa -- Port Elizabeth , Crisis management -- South Africa -- Port Elizabeth , Political participation -- South Africa -- Eastern Cape -- Nelson Mandela Bay Municipality
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63540 , vital:73489
- Description: This study sought to assess the level of community participation in disaster management by the communities that are most affected by floods and fires in informal settlements. The study aimed to assess the level of awareness of disaster risks at a community level and thereby provide recommendations to increase the level of participation, involvement and awareness in disaster management by the communities. This research adopted both qualitative and quantitative research approaches to form a mixed-method research approach. Data was collected using both approaches and converged to form the results and analysis of the empirical survey. From these results and analysis, recommendations are presented, which also draw insight from the literature review, to assist the Nelson Mandela Bay Municipality to better involve communities in disaster management. , Thesis (MA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
An assessment of the presidential youth employment programme on job creation in the department of Education, Eastern Cape
- Authors: Mnqwazi, Zweledinga
- Date: 2024-04
- Subjects: Job creation -- South Africa -- Eastern Cape , Youth development -- South Africa -- Eastern Cape , Youth -- Services for
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63357 , vital:73260
- Description: The presidential youth employment stimulus programme is a prominent imitative by the South African government aimed at addressing poverty and youth unemployment in the country. the programme has created many job opportunities for the youth in various government departments. in this study, the primary focus was on examining the impact of the programme on job creation within the Eastern Cape Department of Education, a province characterized by unique socio-economic challenges. The focused approach aimed to provide contextually relevant findings that may possibly contribute to the broader understanding of youth employment interventions on job creation. A qualitative study based on secondary data collection techniques was used to find answers to the research questions. Government reports, textbooks, and reports from the Eastern Cape Department of Education were the sources of data collection . In analyzing the gathered data, thematic analysis was employed following the guidelines by Braun and Clarke (2006). The study findings provide insights into the strengths of the presidential youth employment initiative, which includes employment opportunities, skills development and training. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mnqwazi, Zweledinga
- Date: 2024-04
- Subjects: Job creation -- South Africa -- Eastern Cape , Youth development -- South Africa -- Eastern Cape , Youth -- Services for
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63357 , vital:73260
- Description: The presidential youth employment stimulus programme is a prominent imitative by the South African government aimed at addressing poverty and youth unemployment in the country. the programme has created many job opportunities for the youth in various government departments. in this study, the primary focus was on examining the impact of the programme on job creation within the Eastern Cape Department of Education, a province characterized by unique socio-economic challenges. The focused approach aimed to provide contextually relevant findings that may possibly contribute to the broader understanding of youth employment interventions on job creation. A qualitative study based on secondary data collection techniques was used to find answers to the research questions. Government reports, textbooks, and reports from the Eastern Cape Department of Education were the sources of data collection . In analyzing the gathered data, thematic analysis was employed following the guidelines by Braun and Clarke (2006). The study findings provide insights into the strengths of the presidential youth employment initiative, which includes employment opportunities, skills development and training. , Thesis (MPA) -- Faculty of Humanities, School of Governmental and Social Sciences, 2024
- Full Text:
- Date Issued: 2024-04