"Soliloquy: the untold story of Sleeping Beauty's dreams"; a re-vision of Charles Perrault's "The sleeping beauty in the woods."
- Authors: Ledwick, Lisa-Mari
- Date: 2015
- Subjects: Perrault, Charles, 1628-1703 , Symbolism in fairy tales , Sleeping Beauty (Tale) in literature
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/3155 , vital:20405
- Description: Taken as a whole, the purpose of the practical and theoretical components of this research aims to contextualise and present a contemporary fairy tale heroine who recuperates and re-values traditional aspects of femininity within a feminist context.
- Full Text:
- Date Issued: 2015
- Authors: Ledwick, Lisa-Mari
- Date: 2015
- Subjects: Perrault, Charles, 1628-1703 , Symbolism in fairy tales , Sleeping Beauty (Tale) in literature
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/3155 , vital:20405
- Description: Taken as a whole, the purpose of the practical and theoretical components of this research aims to contextualise and present a contemporary fairy tale heroine who recuperates and re-values traditional aspects of femininity within a feminist context.
- Full Text:
- Date Issued: 2015
A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A case study approach to assess the growth towards world class at EH Walton Packaging (Pty) Ltd
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
A case study of the cost and causes of the Tongaat mall accident in Durban
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017
A code of practice for practitioners in private healthcare: a privacy perspective
- Authors: Harvey, Brett D
- Date: 2007
- Subjects: Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9735 , http://hdl.handle.net/10948/521 , Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Description: Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
- Full Text:
- Date Issued: 2007
- Authors: Harvey, Brett D
- Date: 2007
- Subjects: Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9735 , http://hdl.handle.net/10948/521 , Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Description: Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
- Full Text:
- Date Issued: 2007
A comparative analysis of the environmental impact of selected low-income housing developments in the Eastern Cape Province
- Authors: Kumm, Simon
- Date: 2007
- Subjects: Low-income housing -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Housing policy -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8152 , http://hdl.handle.net/10948/539 , Low-income housing -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Housing policy -- South Africa -- Eastern Cape
- Description: South Africa has a shortage of affordable housing for its poor. In order to overcome the shortage, a large number of houses need to be built. The bulk building of these houses has an effect on the environment and it is important to note whether or not this impact will be a lasting positive one or not. Governmental policies have recognised the need to create positive, sustainable settlement environments. The degree to which settlements are sustainable and reflect a positive environment is, however, a point of concern. This dissertation analyses and compares four low-income housing developments in the Eastern Cape in order to make proposals on how future low-income developments can impact more positively on their settlement environments, reduce their impact on non-renewable resources and better implement the ideals of the Development Facilitation Act. This was done in order to meet the expectations put in place by Government policies and to correct the historical shortcomings of South Africa’s low-income settlement provision. The method used was to determine, through literature study, a set of factors that most prominently impacted on low-income settlement environments. These were then compiled into a model, which was then used to analyse and compare existing settlements. This elicited a set of conclusions based on the findings and provided strategies for future settlements to follow to meet the research’s stated ideals. The literature study revealed a myriad of important principles that fell into six main categories that impacted on settlement environments. Furthermore, it was discovered that each of these principles should be assessed in the context of their human and natural environments as well as their effect at the scale of the unit, the settlement and the city. The analysis and comparison of the settlements revealed that all six of the model’s categories performed poorly in at least two of the four settlements analysed, a strong indication that the implementation of the model’s principles was not being successfully achieved in low-income settlements. It further revealed specific areas requiring attention in future developments. The analysis also revealed positive areas of implementation from each settlement that can be used in future settlements to meet the stated ideals of creating a positive impact on their settlement environments, reducing their impact on non-renewable resources and better implementing the ideals of the Development Facilitation Act. The study recommends that future settlements avoid the negative practices identified in these settlements and implement the positive strategies proposed for the benefit of future settlement environments.
- Full Text:
- Date Issued: 2007
- Authors: Kumm, Simon
- Date: 2007
- Subjects: Low-income housing -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Housing policy -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8152 , http://hdl.handle.net/10948/539 , Low-income housing -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Housing policy -- South Africa -- Eastern Cape
- Description: South Africa has a shortage of affordable housing for its poor. In order to overcome the shortage, a large number of houses need to be built. The bulk building of these houses has an effect on the environment and it is important to note whether or not this impact will be a lasting positive one or not. Governmental policies have recognised the need to create positive, sustainable settlement environments. The degree to which settlements are sustainable and reflect a positive environment is, however, a point of concern. This dissertation analyses and compares four low-income housing developments in the Eastern Cape in order to make proposals on how future low-income developments can impact more positively on their settlement environments, reduce their impact on non-renewable resources and better implement the ideals of the Development Facilitation Act. This was done in order to meet the expectations put in place by Government policies and to correct the historical shortcomings of South Africa’s low-income settlement provision. The method used was to determine, through literature study, a set of factors that most prominently impacted on low-income settlement environments. These were then compiled into a model, which was then used to analyse and compare existing settlements. This elicited a set of conclusions based on the findings and provided strategies for future settlements to follow to meet the research’s stated ideals. The literature study revealed a myriad of important principles that fell into six main categories that impacted on settlement environments. Furthermore, it was discovered that each of these principles should be assessed in the context of their human and natural environments as well as their effect at the scale of the unit, the settlement and the city. The analysis and comparison of the settlements revealed that all six of the model’s categories performed poorly in at least two of the four settlements analysed, a strong indication that the implementation of the model’s principles was not being successfully achieved in low-income settlements. It further revealed specific areas requiring attention in future developments. The analysis also revealed positive areas of implementation from each settlement that can be used in future settlements to meet the stated ideals of creating a positive impact on their settlement environments, reducing their impact on non-renewable resources and better implementing the ideals of the Development Facilitation Act. The study recommends that future settlements avoid the negative practices identified in these settlements and implement the positive strategies proposed for the benefit of future settlement environments.
- Full Text:
- Date Issued: 2007
A comparative assessment of dairy calf feeding management systems at Fernwood Dairy Farm, Alexandria, Eastern Cape
- Phakwago, Potego Steward Kgaditsi
- Authors: Phakwago, Potego Steward Kgaditsi
- Date: 2014
- Subjects: Dairy cattle -- Nutrition -- Requirements , Dairy cattle -- Feeding and feeds , Cattle -- Feed utilization efficiency
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/48069 , vital:40468
- Description: The study compared fresh milk as group control to three different milk replacers (Blossom® Easymix, Denkavit® Milk-Bar and Surromel® Calf) and two milk supplements (Byboost Calf® and SupaCalf®) mixed with fresh milk at Fernwood Dairy Farm in Alexandria, Eastern Cape. The objectives of the study were to compare the growth rate of the calves in a trial from day two to 49 at weaning and to calculate average daily gain with the aim of comparison of the cost/weight gain ratio of each liquid feed fed. Sixty Holstein (60) heifer calves were used in a completely randomised design to calculate average daily body weight gains in the six calf groups fed six different milk feeds. Calves were fed four litres liquid feeds every day. Water and solid feeds (Olifantskop® calf starter pellets and lucerne hay) were available. Results comprise of details regarding weather conditions, weight gain results, and body stature measurements, including body weight, wither height, hip height and heart girth. Statistical analysis of the weight gain and body stature measurements was essential to determine the usefulness and reliability of the research data. Results of the statistical calculations indicated that the body weight gain data provided very useful results with statistical significant differences between the six groups (F=5.09; P=0.0008). Body stature measurements are not as reliable. Results are summarised as follows: Liquid feed Cost/kg weight gain Average daily gain • Fresh milk R 34.29 0.50 kg/day • Blossom®Easymix R39.25 0.35 kg/day • Denkavit® Milk-Bar R22.57 0.42 kg/day • Surromel® Calf R23.48 0.39 kg/day • Fresh milk + Byboost Calf® R37.46 0.47 kg/day • Fresh milk +SupaCalf® R29.76 0.62 kg/day Comparison of the cost/weight gain ratio of milk replacers and fresh milk draws the following conclusions: The cost of feeding a calf was significantly lower when milk replacers Denkavit® and Surromel® were used; however this yielded a lower average daily gain when compared with that of fresh milk. Denkavit® milk replacer had a lower cost than fresh milk in terms of the average daily gain. The cost of the Denkavit was the lowest of all the products (R22.56/kg) and was in the fourth position in weight gain (0.42kg/day). Surromel® lay in the fifth place for both cost (R23.48/kg) and weight gain (0.39 kg/day). Blossom® Easymix milk replacer had a higher cost than fresh milk. Blossom was the most costly of all the feeds (R39.25/kg) but had the lowest average daily gain (0.35 kg/day). Comparison of fresh milk plus additives to fresh milk alone: The use of SupaCalf® additive to fresh milk resulted in the highest average daily gain of 0.62 kg/day at a cost of R29.76/kg which was more cost effective than the control fresh milk group (0.50 kg/day, R34.29/kg), When using Byboost® additive the average daily gain of 0.47 kg/day at a cost of R37.46, less cost effective than fresh milk (0.50 kg/day, R34.29). Statistical analysis of body stature measurements yielded one significant result(F=3.20; p=0.0140) confirming that use of SupaCalf® additive resulted in the biggest heart girth increase at 16.90 cm and the smallest being Blossom® Easymix at 11.88 cm. Figure for the control fresh milk group was 12.86 cm. Dairy calves all over the world are fed different feeds depending on the farm owner or manager’s preference and budget. For those who have been in the industry for a while as well as the newcomers, this study can help when weighing options and deciding on which feeds to use.
- Full Text:
- Date Issued: 2014
- Authors: Phakwago, Potego Steward Kgaditsi
- Date: 2014
- Subjects: Dairy cattle -- Nutrition -- Requirements , Dairy cattle -- Feeding and feeds , Cattle -- Feed utilization efficiency
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/48069 , vital:40468
- Description: The study compared fresh milk as group control to three different milk replacers (Blossom® Easymix, Denkavit® Milk-Bar and Surromel® Calf) and two milk supplements (Byboost Calf® and SupaCalf®) mixed with fresh milk at Fernwood Dairy Farm in Alexandria, Eastern Cape. The objectives of the study were to compare the growth rate of the calves in a trial from day two to 49 at weaning and to calculate average daily gain with the aim of comparison of the cost/weight gain ratio of each liquid feed fed. Sixty Holstein (60) heifer calves were used in a completely randomised design to calculate average daily body weight gains in the six calf groups fed six different milk feeds. Calves were fed four litres liquid feeds every day. Water and solid feeds (Olifantskop® calf starter pellets and lucerne hay) were available. Results comprise of details regarding weather conditions, weight gain results, and body stature measurements, including body weight, wither height, hip height and heart girth. Statistical analysis of the weight gain and body stature measurements was essential to determine the usefulness and reliability of the research data. Results of the statistical calculations indicated that the body weight gain data provided very useful results with statistical significant differences between the six groups (F=5.09; P=0.0008). Body stature measurements are not as reliable. Results are summarised as follows: Liquid feed Cost/kg weight gain Average daily gain • Fresh milk R 34.29 0.50 kg/day • Blossom®Easymix R39.25 0.35 kg/day • Denkavit® Milk-Bar R22.57 0.42 kg/day • Surromel® Calf R23.48 0.39 kg/day • Fresh milk + Byboost Calf® R37.46 0.47 kg/day • Fresh milk +SupaCalf® R29.76 0.62 kg/day Comparison of the cost/weight gain ratio of milk replacers and fresh milk draws the following conclusions: The cost of feeding a calf was significantly lower when milk replacers Denkavit® and Surromel® were used; however this yielded a lower average daily gain when compared with that of fresh milk. Denkavit® milk replacer had a lower cost than fresh milk in terms of the average daily gain. The cost of the Denkavit was the lowest of all the products (R22.56/kg) and was in the fourth position in weight gain (0.42kg/day). Surromel® lay in the fifth place for both cost (R23.48/kg) and weight gain (0.39 kg/day). Blossom® Easymix milk replacer had a higher cost than fresh milk. Blossom was the most costly of all the feeds (R39.25/kg) but had the lowest average daily gain (0.35 kg/day). Comparison of fresh milk plus additives to fresh milk alone: The use of SupaCalf® additive to fresh milk resulted in the highest average daily gain of 0.62 kg/day at a cost of R29.76/kg which was more cost effective than the control fresh milk group (0.50 kg/day, R34.29/kg), When using Byboost® additive the average daily gain of 0.47 kg/day at a cost of R37.46, less cost effective than fresh milk (0.50 kg/day, R34.29). Statistical analysis of body stature measurements yielded one significant result(F=3.20; p=0.0140) confirming that use of SupaCalf® additive resulted in the biggest heart girth increase at 16.90 cm and the smallest being Blossom® Easymix at 11.88 cm. Figure for the control fresh milk group was 12.86 cm. Dairy calves all over the world are fed different feeds depending on the farm owner or manager’s preference and budget. For those who have been in the industry for a while as well as the newcomers, this study can help when weighing options and deciding on which feeds to use.
- Full Text:
- Date Issued: 2014
A comparative study of performance and efficiency of a tube and fin type domestic solar water heat collector
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
A comparison between the game and hunting industries in KwaZulu-Natal and the Eastern Cape
- Authors: Kobus, Louann
- Date: 2007
- Subjects: Big game hunting -- South Africa -- KwaZulu-Natal , Big game hunting -- South Africa -- Eastern Cape , Hunting -- South Africa -- KwaZulu-Natal , Hunting -- South Africa -- Eastern Cape , Game farms -- South Africa -- KwaZulu-Natal , Game farms -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10590 , http://hdl.handle.net/10948/534 , http://hdl.handle.net/10948/d1011724 , Big game hunting -- South Africa -- KwaZulu-Natal , Big game hunting -- South Africa -- Eastern Cape , Hunting -- South Africa -- KwaZulu-Natal , Hunting -- South Africa -- Eastern Cape , Game farms -- South Africa -- KwaZulu-Natal , Game farms -- South Africa -- Eastern Cape
- Description: The objectives of this research, were to investigate the characteristics and develop a profile of the game and hunting industries of KwaZulu-Natal, and to undertake a comparison between the game and hunting industries in KwaZulu-Natal and the Eastern Cape. The comparative part of this study was completed using results obtained from a study done in 2002 in the Eastern Cape (van Niekerk, 2002). The main farming activities in KwaZulu-Natal are large livestock production and sugar cane production. In recent years, private landowners in KwaZulu-Natal have undergone a transition from livestock production to game ranching due to the problems faced and the cost implications of the HIV epidemic, stock theft, difficulties faced with changes in the labour laws and the increasing number of land claims against farmers. Although the game and hunting industries are relatively young industries in KwaZulu-Natal they contribute significantly to the economy of the province. Not only is greater conservation of the biodiversity more effective in game ranching but it is also proving to yield great economic returns. The increase in game ranching in recent years is namely due to the monetary value placed on wildlife, the increased value in ecotourism and its value as an earner of foreign exchange, less dependency on unskilled labour than that of livestock farming and lower rates of animal loss through theft compared to that of livestock farming. In KwaZulu-Natal game numbers indicate that impala have the greatest population amongst the respondents, followed by nyala, blesbok, common reedbuck, kudu and blue wildebeest, whilst other game species occur in smaller numbers. Respondents in KwaZulu-Natal indicate that nyala is the largest economic earner for them followed by buffalo, whereas in the Eastern Cape (2002), kudu and springbok provide the greatest income for the province. In KwaZulu-Natal income generated from hunting is second to that of live game sales compared to the Eastern Cape (2002) where hunting is the most important form of game utilisation in terms of income generated. At the time of this study, respondents in KwaZulu-Natal reported an income of R 15 382 397 generated from live sales and R 13 561 459 from hunting. These respondents also indicated that the total value of game utilised annually was in excess of R 30 million. Although game utilisation is occurring on a sustainable basis, there is room for greater utilisation of some game species which, if undertaken correctly, can increase the revenue for the province significantly and also contribute positively to further sustainability of the game populations. KwaZulu-Natal’s competitive advantage is derived from the fact that there is an abundance of game on the ranches, quality trophy animals are available, the number of game species available for hunting and quality of service rendered to hunters by the professional hunters and ranch owners. This study has clearly shown that there is a need for further investigation into the game and hunting industries in KwaZulu-Natal.
- Full Text:
- Date Issued: 2007
- Authors: Kobus, Louann
- Date: 2007
- Subjects: Big game hunting -- South Africa -- KwaZulu-Natal , Big game hunting -- South Africa -- Eastern Cape , Hunting -- South Africa -- KwaZulu-Natal , Hunting -- South Africa -- Eastern Cape , Game farms -- South Africa -- KwaZulu-Natal , Game farms -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10590 , http://hdl.handle.net/10948/534 , http://hdl.handle.net/10948/d1011724 , Big game hunting -- South Africa -- KwaZulu-Natal , Big game hunting -- South Africa -- Eastern Cape , Hunting -- South Africa -- KwaZulu-Natal , Hunting -- South Africa -- Eastern Cape , Game farms -- South Africa -- KwaZulu-Natal , Game farms -- South Africa -- Eastern Cape
- Description: The objectives of this research, were to investigate the characteristics and develop a profile of the game and hunting industries of KwaZulu-Natal, and to undertake a comparison between the game and hunting industries in KwaZulu-Natal and the Eastern Cape. The comparative part of this study was completed using results obtained from a study done in 2002 in the Eastern Cape (van Niekerk, 2002). The main farming activities in KwaZulu-Natal are large livestock production and sugar cane production. In recent years, private landowners in KwaZulu-Natal have undergone a transition from livestock production to game ranching due to the problems faced and the cost implications of the HIV epidemic, stock theft, difficulties faced with changes in the labour laws and the increasing number of land claims against farmers. Although the game and hunting industries are relatively young industries in KwaZulu-Natal they contribute significantly to the economy of the province. Not only is greater conservation of the biodiversity more effective in game ranching but it is also proving to yield great economic returns. The increase in game ranching in recent years is namely due to the monetary value placed on wildlife, the increased value in ecotourism and its value as an earner of foreign exchange, less dependency on unskilled labour than that of livestock farming and lower rates of animal loss through theft compared to that of livestock farming. In KwaZulu-Natal game numbers indicate that impala have the greatest population amongst the respondents, followed by nyala, blesbok, common reedbuck, kudu and blue wildebeest, whilst other game species occur in smaller numbers. Respondents in KwaZulu-Natal indicate that nyala is the largest economic earner for them followed by buffalo, whereas in the Eastern Cape (2002), kudu and springbok provide the greatest income for the province. In KwaZulu-Natal income generated from hunting is second to that of live game sales compared to the Eastern Cape (2002) where hunting is the most important form of game utilisation in terms of income generated. At the time of this study, respondents in KwaZulu-Natal reported an income of R 15 382 397 generated from live sales and R 13 561 459 from hunting. These respondents also indicated that the total value of game utilised annually was in excess of R 30 million. Although game utilisation is occurring on a sustainable basis, there is room for greater utilisation of some game species which, if undertaken correctly, can increase the revenue for the province significantly and also contribute positively to further sustainability of the game populations. KwaZulu-Natal’s competitive advantage is derived from the fact that there is an abundance of game on the ranches, quality trophy animals are available, the number of game species available for hunting and quality of service rendered to hunters by the professional hunters and ranch owners. This study has clearly shown that there is a need for further investigation into the game and hunting industries in KwaZulu-Natal.
- Full Text:
- Date Issued: 2007
A comparison of harvester productivity and stump volume waste in coppiced and planted eucalyptus grandis pulpwood compartments in the KwaZulu-Natal forestry region of South Africa
- Ramantswana, Mufhumudzi Muedanyi
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A control framework for the assessment of information security culture
- Authors: Okere, Irene Onyekachi
- Date: 2013
- Subjects: Data encryption (Computer science) , Business -- Data processing -- Security measures , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9818 , http://hdl.handle.net/10948/d1019861
- Description: The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a culture of information security so that information security becomes second nature to employees. Information security culture as defined for this research study exists in four levels namely artefacts, espoused values, shared tacit assumptions and information security knowledge. An important step in the fostering of an information security culture is the assessment of the current state of such a culture. Gaps in current approaches for assessing information security culture were identified and this research study proposes the use of a control framework to address the identified gaps. This research study focuses on the assessment of information security culture and addresses 5 research objectives namely 1) to describe information security culture in the field of information security, 2) to determine ways to foster information security culture in an organisation, 3) to demonstrate the gap in current approaches used to assess information security culture, 4) to determine the components that could be used for the assessment of information security culture for each of the culture’s underlying levels and 5) to describe a process for the assessment of information security culture for all four levels. This research study follows a qualitative approach utilising a design science strategy and multi-method qualitative data collection techniques including literature review, qualitative content analysis, argumentation, and modelling techniques. The research methods provide a means for the interpretation of the data and the development of the proposed control framework.
- Full Text:
- Date Issued: 2013
- Authors: Okere, Irene Onyekachi
- Date: 2013
- Subjects: Data encryption (Computer science) , Business -- Data processing -- Security measures , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9818 , http://hdl.handle.net/10948/d1019861
- Description: The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a culture of information security so that information security becomes second nature to employees. Information security culture as defined for this research study exists in four levels namely artefacts, espoused values, shared tacit assumptions and information security knowledge. An important step in the fostering of an information security culture is the assessment of the current state of such a culture. Gaps in current approaches for assessing information security culture were identified and this research study proposes the use of a control framework to address the identified gaps. This research study focuses on the assessment of information security culture and addresses 5 research objectives namely 1) to describe information security culture in the field of information security, 2) to determine ways to foster information security culture in an organisation, 3) to demonstrate the gap in current approaches used to assess information security culture, 4) to determine the components that could be used for the assessment of information security culture for each of the culture’s underlying levels and 5) to describe a process for the assessment of information security culture for all four levels. This research study follows a qualitative approach utilising a design science strategy and multi-method qualitative data collection techniques including literature review, qualitative content analysis, argumentation, and modelling techniques. The research methods provide a means for the interpretation of the data and the development of the proposed control framework.
- Full Text:
- Date Issued: 2013
A COP optimized control system for a CO₂ based automotive A/C-system
- Authors: Rapp, Tobias
- Date: 2007
- Subjects: Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9624 , http://hdl.handle.net/10948/773 , Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Description: In the last few years carbon dioxide received increasing attention as a possible replacement for fluorocarbon-based refrigerants used within present automotive A/C system technology. R-134a is harmless to the ozone layer but the greenhouse effect is more than 1300 times higher than that of an equivalent amount of CO2. Alternative refrigerants are natural gasses such as propane and butane, however these gasses are considered explosive. With many objections raised it appears if CO2 will be the future refrigrant for automotive use. One concern with R-744 is its high operating pressure and suction/discharge pressure difference when compared to common refrigeration processes. A major problem with the CO2 cycle is the loss of effciency at high ambient temperatures. With a COP optimized control system for the expansion value based on pressure, temperature and mass flow of the refrigerant, an effective A/C system for CO2 could be deleloped. This resrach offers basic knowledge of refrigerant cycles and gives an overall view of the refrigerant change-over problem. With the results obtained from the experimental work a better understanding of the CO2 cycle and a better understanding towards effective A/C systems have been realized.
- Full Text:
- Date Issued: 2007
- Authors: Rapp, Tobias
- Date: 2007
- Subjects: Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9624 , http://hdl.handle.net/10948/773 , Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Description: In the last few years carbon dioxide received increasing attention as a possible replacement for fluorocarbon-based refrigerants used within present automotive A/C system technology. R-134a is harmless to the ozone layer but the greenhouse effect is more than 1300 times higher than that of an equivalent amount of CO2. Alternative refrigerants are natural gasses such as propane and butane, however these gasses are considered explosive. With many objections raised it appears if CO2 will be the future refrigrant for automotive use. One concern with R-744 is its high operating pressure and suction/discharge pressure difference when compared to common refrigeration processes. A major problem with the CO2 cycle is the loss of effciency at high ambient temperatures. With a COP optimized control system for the expansion value based on pressure, temperature and mass flow of the refrigerant, an effective A/C system for CO2 could be deleloped. This resrach offers basic knowledge of refrigerant cycles and gives an overall view of the refrigerant change-over problem. With the results obtained from the experimental work a better understanding of the CO2 cycle and a better understanding towards effective A/C systems have been realized.
- Full Text:
- Date Issued: 2007
A critical analysis of the definition of gross income
- Authors: Beck, Tracy Geraldine
- Date: 2008
- Subjects: Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8977 , http://hdl.handle.net/10948/805 , Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Description: Income tax is levied upon a taxpayer’s taxable income. Various steps are taken in order to arrive at the taxpayer’s taxable income. The starting point when calculating taxable income is determining the taxpayer’s ‘gross income’. ‘Gross income’ is defined in terms of section 1 of the Act. Various terms within the gross income definition are not clearly defined, except in the case of a ‘resident’. Even in the case of the definition of a ‘resident’, the aspect of ‘ordinarily resident’ is not defined and nor is the ‘place of effective management’. The following components fall within the definition of ‘gross income’: • The total amount in cash or otherwise; • received by or accrued to, or in favour of, a person; • from anywhere, in the case of a person who is a resident; • from a South African source (or deemed source), in the case of a non-resident; • other than receipts or accruals of a capital nature. The ‘total amount’ in ‘cash or otherwise’ is the first step when determining the taxable income of a taxpayer for a particular year of assessment. Gross income only arises if an amount is received or has accrued; this amount need not be in the form of money but must have a money value. The next component, ‘received by or accrued to’, is related to time and implies that a taxpayer should include amounts that have been ‘received by’, as well as amounts that have ‘accrued to’ him during the year of assessment. ‘Resident’ and ‘non-resident’ unlike the other components, are defined in terms of section 1 of the Income Tax Act. There are two rules used to determine whether natural persons are residents, these are: • To determine whether natural persons are ‘ordinarily resident’; or • where the natural person is not an ‘ordinarily resident’, the ‘physical presence test’ will be applied. ‘Source’ means origin and not place; it is therefore the ‘originating cause of the receipt of the money’. There is no single definition for the word ‘source’ as circumstances may differ in various cases. The facts of each case must be analysed in order to determine the actual source of income for that particular case. The last component of the definition of ‘gross income’ is the exclusion of ‘receipts and accruals of a capital nature’. The Act does not define the meaning of ‘capital nature’ but does indicate that receipts or accruals of a capital nature are, with certain exceptions, not included in ‘gross income’. Receipts or accruals that are not of a capital nature is known as ‘revenue’ and subjected to tax. This study is primarily aimed at an examination of court cases related to the various components falling within the definition of ‘gross income’.
- Full Text:
- Date Issued: 2008
- Authors: Beck, Tracy Geraldine
- Date: 2008
- Subjects: Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8977 , http://hdl.handle.net/10948/805 , Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Description: Income tax is levied upon a taxpayer’s taxable income. Various steps are taken in order to arrive at the taxpayer’s taxable income. The starting point when calculating taxable income is determining the taxpayer’s ‘gross income’. ‘Gross income’ is defined in terms of section 1 of the Act. Various terms within the gross income definition are not clearly defined, except in the case of a ‘resident’. Even in the case of the definition of a ‘resident’, the aspect of ‘ordinarily resident’ is not defined and nor is the ‘place of effective management’. The following components fall within the definition of ‘gross income’: • The total amount in cash or otherwise; • received by or accrued to, or in favour of, a person; • from anywhere, in the case of a person who is a resident; • from a South African source (or deemed source), in the case of a non-resident; • other than receipts or accruals of a capital nature. The ‘total amount’ in ‘cash or otherwise’ is the first step when determining the taxable income of a taxpayer for a particular year of assessment. Gross income only arises if an amount is received or has accrued; this amount need not be in the form of money but must have a money value. The next component, ‘received by or accrued to’, is related to time and implies that a taxpayer should include amounts that have been ‘received by’, as well as amounts that have ‘accrued to’ him during the year of assessment. ‘Resident’ and ‘non-resident’ unlike the other components, are defined in terms of section 1 of the Income Tax Act. There are two rules used to determine whether natural persons are residents, these are: • To determine whether natural persons are ‘ordinarily resident’; or • where the natural person is not an ‘ordinarily resident’, the ‘physical presence test’ will be applied. ‘Source’ means origin and not place; it is therefore the ‘originating cause of the receipt of the money’. There is no single definition for the word ‘source’ as circumstances may differ in various cases. The facts of each case must be analysed in order to determine the actual source of income for that particular case. The last component of the definition of ‘gross income’ is the exclusion of ‘receipts and accruals of a capital nature’. The Act does not define the meaning of ‘capital nature’ but does indicate that receipts or accruals of a capital nature are, with certain exceptions, not included in ‘gross income’. Receipts or accruals that are not of a capital nature is known as ‘revenue’ and subjected to tax. This study is primarily aimed at an examination of court cases related to the various components falling within the definition of ‘gross income’.
- Full Text:
- Date Issued: 2008
A critical analysis of the influence of the performance management system used in the financial department at General Motors South Africa
- Authors: Beckett, Yasmien
- Date: 2005
- Subjects: Performance -- Management , Employees, Rating of , Organizational effectiveness , Finance departments , General Motors (South Africa)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10925 , http://hdl.handle.net/10948/155 , Performance -- Management , Employees, Rating of , Organizational effectiveness , Finance departments , General Motors (South Africa)
- Description: Recently, organisations have been faced with challenges like never before. Increasing competition from businesses across the world has meant that businesses must be more careful about the choice of strategies to remain competitive. This situation has placed more focus on organizational effectiveness in that systems and processes be applied in the right way to the right things to achieve results. All of the organisational processes must continue to be aligned to achieve the overall results desired by the organisation for it to survive and thrive. Performance management is an ongoing process that should reflect the current and emerging business challenges, as well as the company’s values about performance and careers. As the business and workforce change, the performance management process should be modified to ensure that the process and tools remain congruent with organisational values and priorities. The objective of this study was to identify the influence of the current performance management system, in the Finance department at General Motors South Africa, as a facilitation tool in aiding or assisting management in achieving individual and departmental goals. To achieve this objective a comprehensive literature study was performed to determine the views on performance, and on performance management systems. A questionnaire was designed based on the guidelines in the literature study, in order to establish the extent to which the organisation manages performance. The researcher used the random sampling method of selection and distributed the questionnaire to eighty one potential respondents via mail and electronic e-mail. Forty one completed questionnaires were returned and these were processed and -iiianalysed using Microsoft Office Excel 2003, running on the Windows XP suite of computer packages. The respondent’s opinion obtained from the questionnaires were compared with the guidelines provided by the literature study in order to identify shortcomings of the influence that the performance management system has on the achievement of individual and departmental goals at the selected organisation. It can be concluded from the respondent’s opinions that the greatest shortcomings of the current performance management system are the link between performance and reward, and commitment to the process in its totality. The other areas of concern are the lack of training and development, and the necessary resources required to achieve objectives. The study also indicates there is no overwhelming agreement that feedback, both positive and negative, takes place as the literature suggests. The following were the main recommendations and conclusions made: • Firstly, it is imperative that management undergoes training in the feedback and review process which is a critical element in the performance management cycle. • Secondly, to realise the benefit of increased employee effectiveness, management should undergo training to become more effective career coaches to promote a climate of continuous learning and professional growth. • Thirdly, the reward system should be reviewed, if management is committed to using pay as an incentive for desired levels and directions of performance. • Fourthly, management can set an example and build commitment for effective performance management and be leaders at all levels.
- Full Text:
- Date Issued: 2005
- Authors: Beckett, Yasmien
- Date: 2005
- Subjects: Performance -- Management , Employees, Rating of , Organizational effectiveness , Finance departments , General Motors (South Africa)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10925 , http://hdl.handle.net/10948/155 , Performance -- Management , Employees, Rating of , Organizational effectiveness , Finance departments , General Motors (South Africa)
- Description: Recently, organisations have been faced with challenges like never before. Increasing competition from businesses across the world has meant that businesses must be more careful about the choice of strategies to remain competitive. This situation has placed more focus on organizational effectiveness in that systems and processes be applied in the right way to the right things to achieve results. All of the organisational processes must continue to be aligned to achieve the overall results desired by the organisation for it to survive and thrive. Performance management is an ongoing process that should reflect the current and emerging business challenges, as well as the company’s values about performance and careers. As the business and workforce change, the performance management process should be modified to ensure that the process and tools remain congruent with organisational values and priorities. The objective of this study was to identify the influence of the current performance management system, in the Finance department at General Motors South Africa, as a facilitation tool in aiding or assisting management in achieving individual and departmental goals. To achieve this objective a comprehensive literature study was performed to determine the views on performance, and on performance management systems. A questionnaire was designed based on the guidelines in the literature study, in order to establish the extent to which the organisation manages performance. The researcher used the random sampling method of selection and distributed the questionnaire to eighty one potential respondents via mail and electronic e-mail. Forty one completed questionnaires were returned and these were processed and -iiianalysed using Microsoft Office Excel 2003, running on the Windows XP suite of computer packages. The respondent’s opinion obtained from the questionnaires were compared with the guidelines provided by the literature study in order to identify shortcomings of the influence that the performance management system has on the achievement of individual and departmental goals at the selected organisation. It can be concluded from the respondent’s opinions that the greatest shortcomings of the current performance management system are the link between performance and reward, and commitment to the process in its totality. The other areas of concern are the lack of training and development, and the necessary resources required to achieve objectives. The study also indicates there is no overwhelming agreement that feedback, both positive and negative, takes place as the literature suggests. The following were the main recommendations and conclusions made: • Firstly, it is imperative that management undergoes training in the feedback and review process which is a critical element in the performance management cycle. • Secondly, to realise the benefit of increased employee effectiveness, management should undergo training to become more effective career coaches to promote a climate of continuous learning and professional growth. • Thirdly, the reward system should be reviewed, if management is committed to using pay as an incentive for desired levels and directions of performance. • Fourthly, management can set an example and build commitment for effective performance management and be leaders at all levels.
- Full Text:
- Date Issued: 2005
A critical review of the IFIP TC11 Security Conference Series
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
A cyber security awareness and education framework for South Africa
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
A flexible vehicle measurement system for modern automobile production
- Authors: Lichtenberg, Thilo
- Subjects: Automobile industry and trade -- Quality control -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9632 , http://hdl.handle.net/10948/546 , Automobile industry and trade -- Quality control -- South Africa
- Description: To stay competitive and to be able to sell high-class products in the modern automobile production it is absolutely necessary to check the quality standard of a manufactured vehicle. The normal measurement strategy to check the quality standard of a completely assembled car is through a complex measurement strategy whilst the vehicle is in the actual series production. This is an immensely time and money consuming process. Furthermore, measurement systems are fixed within a certain position and the flexible measurement of a produced vehicle is very difficult to realize. This project presents a measurement system compliant to all quality guidelines, with which it is possible to measure any mounted component from a completely assembled vehicle wherever and whenever required. For the first time it is possible to measure the vehicle quality and dimensional standard from the first body in white prototype assembled in production up to the completely assembled vehicle delivered to the customer. The result of this project is a measurement system that consists of a hardware tool and a specially programmed software add-on. The complete system could easily be carried to the vehicle that must be analysed. This gives a lot of advantages. Furthermore it is possible to use this developed technology for the whole Volkswagen Company including the other brands like Audi, Skoda and Seat.
- Full Text:
- Authors: Lichtenberg, Thilo
- Subjects: Automobile industry and trade -- Quality control -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9632 , http://hdl.handle.net/10948/546 , Automobile industry and trade -- Quality control -- South Africa
- Description: To stay competitive and to be able to sell high-class products in the modern automobile production it is absolutely necessary to check the quality standard of a manufactured vehicle. The normal measurement strategy to check the quality standard of a completely assembled car is through a complex measurement strategy whilst the vehicle is in the actual series production. This is an immensely time and money consuming process. Furthermore, measurement systems are fixed within a certain position and the flexible measurement of a produced vehicle is very difficult to realize. This project presents a measurement system compliant to all quality guidelines, with which it is possible to measure any mounted component from a completely assembled vehicle wherever and whenever required. For the first time it is possible to measure the vehicle quality and dimensional standard from the first body in white prototype assembled in production up to the completely assembled vehicle delivered to the customer. The result of this project is a measurement system that consists of a hardware tool and a specially programmed software add-on. The complete system could easily be carried to the vehicle that must be analysed. This gives a lot of advantages. Furthermore it is possible to use this developed technology for the whole Volkswagen Company including the other brands like Audi, Skoda and Seat.
- Full Text:
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017