"A lean-led-evaluation" of infrastructure development improvement programme in South Africa
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
A framework for assuring conformance of cloud-based email at higher education institutions
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
A framework for biometrics for social grants in South Africa
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
A framework for enhancing trust for improved participation in electronic marketplaces accessed from mobile platforms
- Isabirye, Naomi Nabirye, Von Solms, R
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
A framework for improving construction workers’ health and safety practices in Lagos, Nigeria
- Authors: Kukoyi, Patricia Omega
- Date: 2018
- Subjects: Construction industry -- Health aspects -- Lagos -- Nigeria , Industrial safety -- Lagos -- Nigeria Sustainable construction -- Lagos -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/30962 , vital:31235
- Description: The construction sector is known for its poor health and safety (H&S) record. This situation contributes to the poor performance of construction projects and poor worker productivity. In view of this, the research was undertaken to improve workers’ H&S practices. This study determined how the systems thinking approach will mitigate unhealthy and unsafe construction practices in Lagos, Nigeria by developing interventions, and proposing a model for improved H&S practices. The study utilised a mixed research method approach. Both quantitative and qualitative methods were used specifically the concurrent embedded method to obtain and analyse the data. The sample size for the quantitative study was 375 respondents and a total of 40 respondents were engaged in the qualitative study. The sample consisted of designers, contractors, clients, quantity surveyors, project managers, construction managers, supervisors, and construction workers (masons, carpenters, painters, roofers, electricians) based in Lagos, Nigeria. The findings reveal that there is inadequate consideration for H&S during the procurement of construction projects. Furthermore, the absence of H&S regulations relating to the construction sector was observed. Unsafe practices at construction sites in Nigeria can be attributed to this discovery. The study reveals that the regulatory system, the organisation, the individual and the work environment all have an impact on H&S work practices. Although the contractors are mainly responsible for H&S at construction sites, other construction stakeholders (such as clients, consultants, etc.) influence H&S practices. The findings highlight the need for the adoption of a holistic approach to facilitate improvement in H&S practices on construction sites. The research has contributed to the body of knowledge by developing a framework for improving workers’ H&S performance on construction sites.
- Full Text:
- Date Issued: 2018
- Authors: Kukoyi, Patricia Omega
- Date: 2018
- Subjects: Construction industry -- Health aspects -- Lagos -- Nigeria , Industrial safety -- Lagos -- Nigeria Sustainable construction -- Lagos -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/30962 , vital:31235
- Description: The construction sector is known for its poor health and safety (H&S) record. This situation contributes to the poor performance of construction projects and poor worker productivity. In view of this, the research was undertaken to improve workers’ H&S practices. This study determined how the systems thinking approach will mitigate unhealthy and unsafe construction practices in Lagos, Nigeria by developing interventions, and proposing a model for improved H&S practices. The study utilised a mixed research method approach. Both quantitative and qualitative methods were used specifically the concurrent embedded method to obtain and analyse the data. The sample size for the quantitative study was 375 respondents and a total of 40 respondents were engaged in the qualitative study. The sample consisted of designers, contractors, clients, quantity surveyors, project managers, construction managers, supervisors, and construction workers (masons, carpenters, painters, roofers, electricians) based in Lagos, Nigeria. The findings reveal that there is inadequate consideration for H&S during the procurement of construction projects. Furthermore, the absence of H&S regulations relating to the construction sector was observed. Unsafe practices at construction sites in Nigeria can be attributed to this discovery. The study reveals that the regulatory system, the organisation, the individual and the work environment all have an impact on H&S work practices. Although the contractors are mainly responsible for H&S at construction sites, other construction stakeholders (such as clients, consultants, etc.) influence H&S practices. The findings highlight the need for the adoption of a holistic approach to facilitate improvement in H&S practices on construction sites. The research has contributed to the body of knowledge by developing a framework for improving workers’ H&S performance on construction sites.
- Full Text:
- Date Issued: 2018
A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A framework to elicit user requirements for information systems: a localised participatory approach from Southern Africa
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A framework to evaluate user experience of end user application security features
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
A mathematics rendering model to support chat-based tutoring
- Authors: Haskins, Bertram Peter
- Date: 2014
- Subjects: Intelligent tutoring systems , Educational innovations , Tutors and tutoring
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9822 , http://hdl.handle.net/10948/d1020567
- Description: Dr Math is a math tutoring service implemented on the chat application Mxit. The service allows school learners to use their mobile phones to discuss mathematicsrelated topics with human tutors. Using the broad user-base provided by Mxit, the Dr Math service has grown to consist of tens of thousands of registered school learners. The tutors on the service are all volunteers and the learners far outnumber the available tutors at any given time. School learners on the service use a shorthand language-form called microtext, to phrase their queries. Microtext is an informal form of language which consists of a variety of misspellings and symbolic representations, which emerge spontaneously as a result of the idiosyncrasies of a learner. The specific form of microtext found on the Dr Math service contains mathematical questions and example equations, pertaining to the tutoring process. Deciphering the queries, to discover their embedded mathematical content, slows down the tutoring process. This wastes time that could have been spent addressing more learner queries. The microtext language thus creates an unnecessary burden on the tutors. This study describes the development of an automated process for the translation of Dr Math microtext queries into mathematical equations. Using the design science research paradigm as a guide, three artefacts are developed. These artefacts take the form of a construct, a model and an instantiation. The construct represents the creation of new knowledge as it provides greater insight into the contents and structure of the language found on a mobile mathematics tutoring service. The construct serves as the basis for the creation of a model for the translation of microtext queries into mathematical equations, formatted for display in an electronic medium. No such technique currently exists and therefore, the model contributes new knowledge. To validate the model, an instantiation was created to serve as a proof-of-concept. The instantiation applies various concepts and techniques, such as those related to natural language processing, to the learner queries on the Dr Math service. These techniques are employed in order to translate an input microtext statement into a mathematical equation, structured by using mark-up language. The creation of the instantiation thus constitutes a knowledge contribution, as most of these techniques have never been applied to the problem of translating microtext into mathematical equations. For the automated process to have utility, it should perform on a level comparable to that of a human performing a similar translation task. To determine how closely related the results from the automated process are to those of a human, three human participants were asked to perform coding and translation tasks. The results of the human participants were compared to the results of the automated process, across a variety of metrics, including agreement, correlation, precision, recall and others. The results from the human participants served as the baseline values for comparison. The baseline results from the human participants were compared with those of the automated process. Krippendorff’s α was used to determine the level of agreement and Pearson’s correlation coefficient to determine the level of correlation between the results. The agreement between the human participants and the automated process was calculated at a level deemed satisfactory for exploratory research and the level of correlation was calculated as moderate. These values correspond with the calculations made as the human baseline. Furthermore, the automated process was able to meet or improve on all of the human baseline metrics. These results serve to validate that the automated process is able to perform the translation at a level comparable to that of a human. The automated process is available for integration into any requesting application, by means of a publicly accessible web service.
- Full Text:
- Date Issued: 2014
- Authors: Haskins, Bertram Peter
- Date: 2014
- Subjects: Intelligent tutoring systems , Educational innovations , Tutors and tutoring
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9822 , http://hdl.handle.net/10948/d1020567
- Description: Dr Math is a math tutoring service implemented on the chat application Mxit. The service allows school learners to use their mobile phones to discuss mathematicsrelated topics with human tutors. Using the broad user-base provided by Mxit, the Dr Math service has grown to consist of tens of thousands of registered school learners. The tutors on the service are all volunteers and the learners far outnumber the available tutors at any given time. School learners on the service use a shorthand language-form called microtext, to phrase their queries. Microtext is an informal form of language which consists of a variety of misspellings and symbolic representations, which emerge spontaneously as a result of the idiosyncrasies of a learner. The specific form of microtext found on the Dr Math service contains mathematical questions and example equations, pertaining to the tutoring process. Deciphering the queries, to discover their embedded mathematical content, slows down the tutoring process. This wastes time that could have been spent addressing more learner queries. The microtext language thus creates an unnecessary burden on the tutors. This study describes the development of an automated process for the translation of Dr Math microtext queries into mathematical equations. Using the design science research paradigm as a guide, three artefacts are developed. These artefacts take the form of a construct, a model and an instantiation. The construct represents the creation of new knowledge as it provides greater insight into the contents and structure of the language found on a mobile mathematics tutoring service. The construct serves as the basis for the creation of a model for the translation of microtext queries into mathematical equations, formatted for display in an electronic medium. No such technique currently exists and therefore, the model contributes new knowledge. To validate the model, an instantiation was created to serve as a proof-of-concept. The instantiation applies various concepts and techniques, such as those related to natural language processing, to the learner queries on the Dr Math service. These techniques are employed in order to translate an input microtext statement into a mathematical equation, structured by using mark-up language. The creation of the instantiation thus constitutes a knowledge contribution, as most of these techniques have never been applied to the problem of translating microtext into mathematical equations. For the automated process to have utility, it should perform on a level comparable to that of a human performing a similar translation task. To determine how closely related the results from the automated process are to those of a human, three human participants were asked to perform coding and translation tasks. The results of the human participants were compared to the results of the automated process, across a variety of metrics, including agreement, correlation, precision, recall and others. The results from the human participants served as the baseline values for comparison. The baseline results from the human participants were compared with those of the automated process. Krippendorff’s α was used to determine the level of agreement and Pearson’s correlation coefficient to determine the level of correlation between the results. The agreement between the human participants and the automated process was calculated at a level deemed satisfactory for exploratory research and the level of correlation was calculated as moderate. These values correspond with the calculations made as the human baseline. Furthermore, the automated process was able to meet or improve on all of the human baseline metrics. These results serve to validate that the automated process is able to perform the translation at a level comparable to that of a human. The automated process is available for integration into any requesting application, by means of a publicly accessible web service.
- Full Text:
- Date Issued: 2014
A maturity grid-based method for assessing communication in business-IT alignment
- Authors: Coertze, Jacques Jacobus
- Date: 2016
- Subjects: Business communication , Management information systems
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/6740 , vital:21139
- Description: This thesis reports on the research undertaken to develop a method for organisations to assess human communication between their business and IT personnel as part of business–IT alignment. The research described in this thesis involves (i) a literature review in business–IT alignment and related fields, such as management studies and communication science; (ii) a Delphi study conducted among industry members, practitioners, and academics operating in the IT advisory, auditing and communication disciplines; and (iii) a case study of a public sector organisation in South Africa. By adopting a system-theoretic perspective on communication, this thesis proposes that communication in business–IT alignment can be seen as coordinating behaviour and a series of learning and reflection events, consequently culminating in increased mutual understanding. Various conceptualisations of communication are explored and, together with several industry elicited factors that influence communication in business–IT alignment, are incorporated into a conceptual model informing the assessment method. This research developed, applied, and tested a method whereby organisations can assess the quality of the human communication between their business and IT personnel as part of the business–IT alignment endeavour. The aim of this method is to trigger reflection on communication by considering communication philosophy and practices in business–IT alignment. The method, termed the ‘Business-IT Communication Alignment Maturity Improvement Communication Alignment Maturity Improvement (CAMI) method’, is based on a maturity grid-based approach, which stems originally from process improvement in software development and quality management. This thesis is most closely aligned with the research performed by Maier, Eckert, and Clarkson (2004, 2006), who successfully applied the maturity grid-based approach to investigate, audit and assess communication within the engineering design process. The question addressed in this thesis is whether this approach can be successfully extrapolated to the business–IT alignment context and whether it would yield similar benefits. Furthermore, the issue of whether it would offer a practical method for use in organisations is also addressed. Having applied the CAMI method at a public sector organisation, this thesis proposes that the maturity grid-based approach can indeed be extrapolated to iv the business–IT alignment context, consequently offering a viable and practical method for assessing communication in organisations. In particular, the CAMI method allows organisations to capture both their current and their desired communication situations and to expose discrepancies between the perceptions held by their business and IT personnel. These results form a basis for action planning, strategizing, and, ultimately, interventions for improvement. In conclusion, the thesis discusses further application and extension possibilities for the assessment method.
- Full Text:
- Date Issued: 2016
- Authors: Coertze, Jacques Jacobus
- Date: 2016
- Subjects: Business communication , Management information systems
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/6740 , vital:21139
- Description: This thesis reports on the research undertaken to develop a method for organisations to assess human communication between their business and IT personnel as part of business–IT alignment. The research described in this thesis involves (i) a literature review in business–IT alignment and related fields, such as management studies and communication science; (ii) a Delphi study conducted among industry members, practitioners, and academics operating in the IT advisory, auditing and communication disciplines; and (iii) a case study of a public sector organisation in South Africa. By adopting a system-theoretic perspective on communication, this thesis proposes that communication in business–IT alignment can be seen as coordinating behaviour and a series of learning and reflection events, consequently culminating in increased mutual understanding. Various conceptualisations of communication are explored and, together with several industry elicited factors that influence communication in business–IT alignment, are incorporated into a conceptual model informing the assessment method. This research developed, applied, and tested a method whereby organisations can assess the quality of the human communication between their business and IT personnel as part of the business–IT alignment endeavour. The aim of this method is to trigger reflection on communication by considering communication philosophy and practices in business–IT alignment. The method, termed the ‘Business-IT Communication Alignment Maturity Improvement Communication Alignment Maturity Improvement (CAMI) method’, is based on a maturity grid-based approach, which stems originally from process improvement in software development and quality management. This thesis is most closely aligned with the research performed by Maier, Eckert, and Clarkson (2004, 2006), who successfully applied the maturity grid-based approach to investigate, audit and assess communication within the engineering design process. The question addressed in this thesis is whether this approach can be successfully extrapolated to the business–IT alignment context and whether it would yield similar benefits. Furthermore, the issue of whether it would offer a practical method for use in organisations is also addressed. Having applied the CAMI method at a public sector organisation, this thesis proposes that the maturity grid-based approach can indeed be extrapolated to iv the business–IT alignment context, consequently offering a viable and practical method for assessing communication in organisations. In particular, the CAMI method allows organisations to capture both their current and their desired communication situations and to expose discrepancies between the perceptions held by their business and IT personnel. These results form a basis for action planning, strategizing, and, ultimately, interventions for improvement. In conclusion, the thesis discusses further application and extension possibilities for the assessment method.
- Full Text:
- Date Issued: 2016
A model for automated topic spotting in a mobile chat based mathematics tutoring environment
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
A model for enhancing trust in South African automotive supply chains through information technology
- Authors: Piderit, Roxanne
- Date: 2012
- Subjects: Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9793 , http://hdl.handle.net/10948/d1011851 , Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Description: The South African automotive industry is recognised as an important sector for the economy and has thus been prioritised by the South African government. The success of the automotive manufacturers depends on the efficiency and effectiveness of their supply chain. Due to the large number of suppliers involved in these supply chains, enhancing trust in the inter-organisational relationships can ensure the competitiveness of the supply chain. Additionally, insufficient trust can disrupt information sharing between supply chain partners which further impacts on supply chain operations and hence supply chain competitiveness. Thus, both insufficient trust and insufficient information sharing are viewed as contributing factors to the inefficiency and ineffectiveness of a supply chain’s operations. The use of Information Technology to facilitate inter-organisational relationships, in particular in terms of improving information sharing, is an important consideration in this research project. As in the Prisoner’s Dilemma, when supply chain members share information freely, trust levels are increased, hence supply chain effectiveness and efficiency is achieved and therefore the competitiveness of the supply chain is optimised. This study addresses the problem of enhancing trust in automotive supply chains using Information Technology. Previous studies have recognised the importance of trust and information sharing in supply chain relationships. These previous studies have also considered the effect of trust on information sharing, or the effect of information sharing on trust in a single direction. Thus, to address this research problem, a cyclical relationship between trust and information sharing is proposed. In this respect, Information Technology should be used to nurture this cyclical relationship between trust and information sharing. A model for the enhancement of trust in automotive supply chains through Information Technology is proposed to achieve the objectives of this research project. This model includes risk perception; information sharing as a means of enhancing trust; a trust area that consists of both supply chain partner trustworthiness and system trust; the resultant trusting behaviour; and the resultant improved information sharing. As this study is concerned with the use of IT to enhance trust, the inclusion of system trust as a component of the model is a significant contribution of this study which is complementary to the proposed cyclical relationship between trust and information sharing.
- Full Text:
- Date Issued: 2012
A model for enhancing trust in South African automotive supply chains through information technology
- Authors: Piderit, Roxanne
- Date: 2012
- Subjects: Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9793 , http://hdl.handle.net/10948/d1011851 , Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Description: The South African automotive industry is recognised as an important sector for the economy and has thus been prioritised by the South African government. The success of the automotive manufacturers depends on the efficiency and effectiveness of their supply chain. Due to the large number of suppliers involved in these supply chains, enhancing trust in the inter-organisational relationships can ensure the competitiveness of the supply chain. Additionally, insufficient trust can disrupt information sharing between supply chain partners which further impacts on supply chain operations and hence supply chain competitiveness. Thus, both insufficient trust and insufficient information sharing are viewed as contributing factors to the inefficiency and ineffectiveness of a supply chain’s operations. The use of Information Technology to facilitate inter-organisational relationships, in particular in terms of improving information sharing, is an important consideration in this research project. As in the Prisoner’s Dilemma, when supply chain members share information freely, trust levels are increased, hence supply chain effectiveness and efficiency is achieved and therefore the competitiveness of the supply chain is optimised. This study addresses the problem of enhancing trust in automotive supply chains using Information Technology. Previous studies have recognised the importance of trust and information sharing in supply chain relationships. These previous studies have also considered the effect of trust on information sharing, or the effect of information sharing on trust in a single direction. Thus, to address this research problem, a cyclical relationship between trust and information sharing is proposed. In this respect, Information Technology should be used to nurture this cyclical relationship between trust and information sharing. A model for the enhancement of trust in automotive supply chains through Information Technology is proposed to achieve the objectives of this research project. This model includes risk perception; information sharing as a means of enhancing trust; a trust area that consists of both supply chain partner trustworthiness and system trust; the resultant trusting behaviour; and the resultant improved information sharing. As this study is concerned with the use of IT to enhance trust, the inclusion of system trust as a component of the model is a significant contribution of this study which is complementary to the proposed cyclical relationship between trust and information sharing.
- Full Text:
- Date Issued: 2012
A model for managing user experience
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
A model for privacy-aware presence management in mobile communications
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
A model to improve the effectiveness of the Occupational Health and Safety Inspectorate function relative to South African construction
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
- Authors: Geminiani, Franco Luciano
- Date: 2008
- Subjects: Construction industry -- Safety measures
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9695 , http://hdl.handle.net/10948/719 , Construction industry -- Safety measures
- Description: Irrespective of all the efforts made by the Department of Labour (DoL) and other relevant stakeholders to improve the performance of Occupational Health and Safety (OH&S) in construction. In the Construction Industry, there is still a very high level of accidents and fatalities in South Africa. Injuries and accidents to workers do not help a community in any nation. The construction industry in South Africa is generally known to be one of the most hazardous and has one of the most dismal OH&S records among all industrial segments with an unacceptably high level of injuries and fatalities resulting in considerable human suffering. A doctoral study was recently conducted with the aim of investigating the effectiveness and performance of the DoL OH&S Inspectorate in South Africa. The empirical study was conducted among a range of stakeholders: civil engineering and building contractors; OH&S consultants; project managers; DoL inspectors; and designers by means of a questionnaire survey. The methodology adopted in this study included the exploratory and descriptive methods, which entails the technique of observation including the use of questionnaires and data analysis. The salient findings of the study are presented and elucidate that the DoL OH&S Inspectorate is not effective in terms of OH&S relative to the construction industry in South Africa. Conclusions and recommendations included expound that the DoL OH&S Inspectorate is not effectively conducting their duties reinforcing the need for a reviewed OH&S Inspectorate model framework. The proposed structured normative model consists of fundamental elements which would improve the effectiveness of the DoL OH&S Inspectorate. The findings of the study with recommendations are included.
- Full Text:
- Date Issued: 2008
A multi-stakeholder approach to productivity improvement in the South African construction industry
- Authors: Adebowale, Oluseyi Julius
- Date: 2018
- Subjects: Labor productivity , Construction industry -- Labor productivity Construction industry -- South Africa Construction industry -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19597 , vital:28902
- Description: As poor productivity in construction continues to constitute a setback to projects’ success in different countries of the world, the situation in South African construction is no exception. Poor productivity on construction projects and its detrimental impact on project objectives have continually resonated for decades. As a result, several strategies, interventions, and measures that aimed at improving productivity in the construction sector have been proposed. Nevertheless, the phenomenon importunately creates a major challenge on construction projects, and by extension, the construction industry especially in developing countries. Even when construction management literature acknowledged the commonalities in productivity influences, the practice of addressing construction productivity influences as separate entities has gained much relevance over the years. Taking into perspective, the multidisciplinary and complexity inherent in construction, a systemic approach to addressing construction productivity influences is fast becoming essential. This study addressed productivity-influencing factors by considering factors that are related to rework, shortage of construction resources, constructability, political, socio-economic, working environment, welfare conditions, disputes, planning and training. Consequently, the interdependencies of the most significant productivity-influencing factors in South African construction was developed in the form of a qualitative model. The study adopts the underlying assumptions of the quantitative approach, but also accepts some qualitative data. With regards to the subject of enquiry, the paradigm of the research is positivism which consists of realists’ ontological prescriptions and objectivists’ epistemological prescriptions. Site engineers, site managers, and site supervisors working for cidb registered contractors in four South African provinces constitute the sample stratum. Statistical Package for the Social Sciences (SPSS) version 24 was used to analyse the data gathered from these project participants; both descriptive and inferential statistics were used. Descriptive statistics was used to summarise and describe the data obtained, while inferential statistics in the form of analysis of variance, T-test, and Tukey post hoc test were adopted. The study reported the most significant factors which negatively influence productivity on South African construction projects as inadequate workers’ skills, defective workmanship, the practice of awarding contracts to lowest bidders, political activities resulting in industrial action, inadequate contractors’ experience in project planning, payment delays by contractors, and corruption. Furthermore, it was found that contractors largely share similar perceptions regarding the factors that constrain productivity growth in South African construction. The approximate level of labour, material, and plant productivity on South African construction projects is 50.4%, 72.9%, and 62.0% respectively, while the approximate multifactor productivity was estimated as 61.8%. The study concluded that productivity has a considerable relationship with time and cost and a less potent relationship with quality. Based on the research findings, contractors’, consultants’, clients’ and government qualitative intervention models were proposed while recommendations towards improving South African construction productivity were made. The study recommended the reinvention of the apprentice training system to develop skills in construction, the involvement of stakeholders in improving workers’ skills, improved collaboration between the construction industry and higher institutions of learning regarding curricula development, adequate supervision of construction activities to mitigate the propagation of rework on construction projects, character in leadership, and integrity of project stakeholders.
- Full Text:
- Date Issued: 2018
- Authors: Adebowale, Oluseyi Julius
- Date: 2018
- Subjects: Labor productivity , Construction industry -- Labor productivity Construction industry -- South Africa Construction industry -- Management
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19597 , vital:28902
- Description: As poor productivity in construction continues to constitute a setback to projects’ success in different countries of the world, the situation in South African construction is no exception. Poor productivity on construction projects and its detrimental impact on project objectives have continually resonated for decades. As a result, several strategies, interventions, and measures that aimed at improving productivity in the construction sector have been proposed. Nevertheless, the phenomenon importunately creates a major challenge on construction projects, and by extension, the construction industry especially in developing countries. Even when construction management literature acknowledged the commonalities in productivity influences, the practice of addressing construction productivity influences as separate entities has gained much relevance over the years. Taking into perspective, the multidisciplinary and complexity inherent in construction, a systemic approach to addressing construction productivity influences is fast becoming essential. This study addressed productivity-influencing factors by considering factors that are related to rework, shortage of construction resources, constructability, political, socio-economic, working environment, welfare conditions, disputes, planning and training. Consequently, the interdependencies of the most significant productivity-influencing factors in South African construction was developed in the form of a qualitative model. The study adopts the underlying assumptions of the quantitative approach, but also accepts some qualitative data. With regards to the subject of enquiry, the paradigm of the research is positivism which consists of realists’ ontological prescriptions and objectivists’ epistemological prescriptions. Site engineers, site managers, and site supervisors working for cidb registered contractors in four South African provinces constitute the sample stratum. Statistical Package for the Social Sciences (SPSS) version 24 was used to analyse the data gathered from these project participants; both descriptive and inferential statistics were used. Descriptive statistics was used to summarise and describe the data obtained, while inferential statistics in the form of analysis of variance, T-test, and Tukey post hoc test were adopted. The study reported the most significant factors which negatively influence productivity on South African construction projects as inadequate workers’ skills, defective workmanship, the practice of awarding contracts to lowest bidders, political activities resulting in industrial action, inadequate contractors’ experience in project planning, payment delays by contractors, and corruption. Furthermore, it was found that contractors largely share similar perceptions regarding the factors that constrain productivity growth in South African construction. The approximate level of labour, material, and plant productivity on South African construction projects is 50.4%, 72.9%, and 62.0% respectively, while the approximate multifactor productivity was estimated as 61.8%. The study concluded that productivity has a considerable relationship with time and cost and a less potent relationship with quality. Based on the research findings, contractors’, consultants’, clients’ and government qualitative intervention models were proposed while recommendations towards improving South African construction productivity were made. The study recommended the reinvention of the apprentice training system to develop skills in construction, the involvement of stakeholders in improving workers’ skills, improved collaboration between the construction industry and higher institutions of learning regarding curricula development, adequate supervision of construction activities to mitigate the propagation of rework on construction projects, character in leadership, and integrity of project stakeholders.
- Full Text:
- Date Issued: 2018
A national strategy towards cultivating a cybersecurity culture in South Africa
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017