A framework for the implementation of social media marketing strategies in political campaigning
- Authors: Ayankoya, Kayode A
- Date: 2013
- Subjects: Online social networks -- Political aspects -- South Africa , Social networks -- South Africa , Campaign management -- South Africa , Branding (Marketing) -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8850 , http://hdl.handle.net/10948/d1020118
- Description: The concept of social media has grown rapidly in the last years. This can be attributed to the rate of adoption and the penetration of social media around the world. Currently, there is an estimate of over two billion people that are actively using social media. The increased usage of social media has changed the way people interact and communicate. Literature suggests that Internet-enabled social networks (relationship between or among individuals and groups) are developing faster than offline relationships. Previous studies have linked social media to the social network theories that define social relationships based on the actors, the ties that exist and the flow of resources among them. This is made possible by social networking sites and other Internet enabled services that allow friends to meet, connect and interact. Social media allow for individuals, groups or organisations to build their social network of friends and followers. It also facilitates the formation of communities with common interest. Social media facilitate the creation and exchange of content such as text messages, images, audio and video formats among individuals or communities that share a common interest or belong to the same social network. Social capital theorists suggest that the ties that exist in social interaction like on social media have the ability to create benefit for the actors in the networks. This provides the foundation to study the benefits that individuals and organisations can obtain from social media. The opportunity to target and communicate directly with the target market and potential customer qualifies social media as a valuable marketing tool and an important component of the integrated marketing communication. As a marketing communication tool, social media introduces a completely new paradigm into marketing communications. Therefore marketing professionals and academics are continuously seeking how to take advantage of social media for different industries. In the field of politics, the use of marketing concepts to engage voters and drive collective participation in political processes has become critical due to stiff competition. The use of social media for political campaigning and engagement could be beneficial, but politicians and political organisations are not taking full advantage of the concept. Previous studies show that organisations are aware of the opportunities that social media could provide for their organisations. However, they are reluctant because they are faced with the problems of lack of information on how to implement social media for business purposes. This treatise investigates the approach and critical success factors for the use of social media for political campaigning and engagement. To evaluate the conceptual framework that was suggested by this study based on the literature review and case studies, an empirical study was conducted among the members of the Democratic Alliance in the Eastern Cape. A survey was conducted among the members of the Democratic Alliance in the Eastern Cape using a questionnaire and 92 responses were received. The questionnaire measured the respondents’ social media usage, level of political engagement, perception on the use of social media for political engagement and the level of political activities on social media. Also, hypotheses were tested to examine the assumption that there might be an association between the respondents’ gender, population group and level of political activities on social media. The findings of this study indicate that a structured approach, a strong emphasis of engaging followers socially and micro-targeting are critical to effective implementation of social media for political campaigning and engagement. Other factors include the direct involvement of leadership, listening and encouragement of user generated contents. This study concludes that political organisations can use social media to establish multi-levelled social networks that provide access to their target audience and also reach potential audience through their friends. This social connectedness can then be translated into political social capital for campaign and engagement purposes.
- Full Text:
- Date Issued: 2013
- Authors: Ayankoya, Kayode A
- Date: 2013
- Subjects: Online social networks -- Political aspects -- South Africa , Social networks -- South Africa , Campaign management -- South Africa , Branding (Marketing) -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8850 , http://hdl.handle.net/10948/d1020118
- Description: The concept of social media has grown rapidly in the last years. This can be attributed to the rate of adoption and the penetration of social media around the world. Currently, there is an estimate of over two billion people that are actively using social media. The increased usage of social media has changed the way people interact and communicate. Literature suggests that Internet-enabled social networks (relationship between or among individuals and groups) are developing faster than offline relationships. Previous studies have linked social media to the social network theories that define social relationships based on the actors, the ties that exist and the flow of resources among them. This is made possible by social networking sites and other Internet enabled services that allow friends to meet, connect and interact. Social media allow for individuals, groups or organisations to build their social network of friends and followers. It also facilitates the formation of communities with common interest. Social media facilitate the creation and exchange of content such as text messages, images, audio and video formats among individuals or communities that share a common interest or belong to the same social network. Social capital theorists suggest that the ties that exist in social interaction like on social media have the ability to create benefit for the actors in the networks. This provides the foundation to study the benefits that individuals and organisations can obtain from social media. The opportunity to target and communicate directly with the target market and potential customer qualifies social media as a valuable marketing tool and an important component of the integrated marketing communication. As a marketing communication tool, social media introduces a completely new paradigm into marketing communications. Therefore marketing professionals and academics are continuously seeking how to take advantage of social media for different industries. In the field of politics, the use of marketing concepts to engage voters and drive collective participation in political processes has become critical due to stiff competition. The use of social media for political campaigning and engagement could be beneficial, but politicians and political organisations are not taking full advantage of the concept. Previous studies show that organisations are aware of the opportunities that social media could provide for their organisations. However, they are reluctant because they are faced with the problems of lack of information on how to implement social media for business purposes. This treatise investigates the approach and critical success factors for the use of social media for political campaigning and engagement. To evaluate the conceptual framework that was suggested by this study based on the literature review and case studies, an empirical study was conducted among the members of the Democratic Alliance in the Eastern Cape. A survey was conducted among the members of the Democratic Alliance in the Eastern Cape using a questionnaire and 92 responses were received. The questionnaire measured the respondents’ social media usage, level of political engagement, perception on the use of social media for political engagement and the level of political activities on social media. Also, hypotheses were tested to examine the assumption that there might be an association between the respondents’ gender, population group and level of political activities on social media. The findings of this study indicate that a structured approach, a strong emphasis of engaging followers socially and micro-targeting are critical to effective implementation of social media for political campaigning and engagement. Other factors include the direct involvement of leadership, listening and encouragement of user generated contents. This study concludes that political organisations can use social media to establish multi-levelled social networks that provide access to their target audience and also reach potential audience through their friends. This social connectedness can then be translated into political social capital for campaign and engagement purposes.
- Full Text:
- Date Issued: 2013
A framework for the inclusion of students with visual impairments: a case of a Zimbabwe state university
- Authors: Manyumwa, Ennie
- Date: 2016
- Subjects: Inclusive education -- Zimbabwe Students with disabilities -- Education (Higher) -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/29805 , vital:30780
- Description: The aim of this study was to explore the experiences of students with visual impairments in a selected state university in Zimbabwe in order to develop a framework for their inclusion. The study was necessitated by the increased enrolment of students with visual impairments in universities worldwide in response to inclusion in education and the continuous search for the best placement model for students with disabilities. Studies conducted internationally show that students with visual impairments have unique learning needs which must be addressed if their inclusion in universities is to be successful. The study was informed by Bronfenbrenner’s ecological and Bandura’s agentic theories, both of which stress the bi-directional relationship between an individual and the environment. The transformative paradigm which guided this study, lays emphasis on the need to improve the social situation of individuals with disabilities in order to bring about a more equitable society. Since the study intended to gain an understanding of how students with visual impairments interpret their experiences within a selected state university in Zimbabwe which practices inclusion, the qualitative case study design was used. Purposeful sampling was also used in the selection of both the university studied and the participants. Data generation methods employed included the semi-structured interview, photo-voice, document analysis and observation. Data generated were analysed following emergent themes that were used to answer the research questions. Findings revealed that the university started enrolling students with visual impairments in 2004 and has since established a Disability Resource Centre which is equipped with assistive devices and is manned by caring staff. Findings revealed a glaring absence of a university policy on inclusion. The guiding principles used did not clearly articulate issues of inclusion. The students’ positive experiences resulted from single rooms allocated to them and the support received from friends and caring staff. Negative experiences emanated from bureaucratic admission procedures, challenges of adjusting to university life in the absence of orientation and mobility training, financial challenges, hostile social environment and the students’ perceptions of themselves. The students suggested that the university should assist them with fees and expressed their wish to be consulted on matters that concern them. They xviii also suggested close co-operation between the administration and the Disability Resource Centre. The conclusion reached was that although the university was sensitive to issues of inclusion, there were still some deficiencies in the system that were impacting negatively on the inclusion of students with visual impairments. The study recommended a framework which shows the different committees and support systems which can be formed at different levels to facilitate the development of a comprehensive policy on inclusion and expedite its implementation. The involvement of students with visual impairments in the different committees was also recommended. This would afford them the chance to exercise their agentic resources and be involved in matters which concern them, rather than rely on decisions made by sighted individuals who might not possess adequate knowledge of what visual impairment entails.
- Full Text:
- Date Issued: 2016
- Authors: Manyumwa, Ennie
- Date: 2016
- Subjects: Inclusive education -- Zimbabwe Students with disabilities -- Education (Higher) -- Zimbabwe
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/29805 , vital:30780
- Description: The aim of this study was to explore the experiences of students with visual impairments in a selected state university in Zimbabwe in order to develop a framework for their inclusion. The study was necessitated by the increased enrolment of students with visual impairments in universities worldwide in response to inclusion in education and the continuous search for the best placement model for students with disabilities. Studies conducted internationally show that students with visual impairments have unique learning needs which must be addressed if their inclusion in universities is to be successful. The study was informed by Bronfenbrenner’s ecological and Bandura’s agentic theories, both of which stress the bi-directional relationship between an individual and the environment. The transformative paradigm which guided this study, lays emphasis on the need to improve the social situation of individuals with disabilities in order to bring about a more equitable society. Since the study intended to gain an understanding of how students with visual impairments interpret their experiences within a selected state university in Zimbabwe which practices inclusion, the qualitative case study design was used. Purposeful sampling was also used in the selection of both the university studied and the participants. Data generation methods employed included the semi-structured interview, photo-voice, document analysis and observation. Data generated were analysed following emergent themes that were used to answer the research questions. Findings revealed that the university started enrolling students with visual impairments in 2004 and has since established a Disability Resource Centre which is equipped with assistive devices and is manned by caring staff. Findings revealed a glaring absence of a university policy on inclusion. The guiding principles used did not clearly articulate issues of inclusion. The students’ positive experiences resulted from single rooms allocated to them and the support received from friends and caring staff. Negative experiences emanated from bureaucratic admission procedures, challenges of adjusting to university life in the absence of orientation and mobility training, financial challenges, hostile social environment and the students’ perceptions of themselves. The students suggested that the university should assist them with fees and expressed their wish to be consulted on matters that concern them. They xviii also suggested close co-operation between the administration and the Disability Resource Centre. The conclusion reached was that although the university was sensitive to issues of inclusion, there were still some deficiencies in the system that were impacting negatively on the inclusion of students with visual impairments. The study recommended a framework which shows the different committees and support systems which can be formed at different levels to facilitate the development of a comprehensive policy on inclusion and expedite its implementation. The involvement of students with visual impairments in the different committees was also recommended. This would afford them the chance to exercise their agentic resources and be involved in matters which concern them, rather than rely on decisions made by sighted individuals who might not possess adequate knowledge of what visual impairment entails.
- Full Text:
- Date Issued: 2016
A framework for the integration of skilled / professional self-initiated expatrites into Qatari organisations
- Pieterse, Regan Christopher Ebrahim
- Authors: Pieterse, Regan Christopher Ebrahim
- Date: 2015
- Subjects: Human capital -- Qatar , Cultural relations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/3074 , vital:20396
- Description: The main research problem in this study was to identify a framework that can be utilised for the integration of skilled/professional self-initiated expatriates (SIEs) into Qatari organisations. The main research problem gave rise to six sub-problems that were addressed through the following actions: A literature study was conducted to explore what the existing literature revealed about facilitating successful expatriate integration. In particular, the theoretical guidelines for expatriate recruitment and selection, orientation and cross-cultural integration were presented and discussed. Special attention was given to community embeddedness. Semi-structured interviews were conducted with ten members from the sample group. These were undertaken to obtain their views on the expectations that their organisations had of them upon their arrival in Qatar, as well as on what they felt made it easy or difficult for them to adjust. Subsequently, a structured survey questionnaire was developed using the theoretical guidelines from the literature review and the insights gained from the semi-structured interviews. The survey was conducted in Qatar and administered to 102 skilled/professional self-initiated expatriates from diverse backgrounds and three work sectors, namely: healthcare, education and aviation. The final sample size was 94 due to eight questionnaires not being completed properly. The results from the empirical study revealed a gap between theoretical guidelines/ best practices and the recruitment and selection, orientation and cross-cultural integration practices at the respondents’ organisations. The knowledge gained from the existing literature and from the quantitative and qualitative results of the empirical study were combined and developed into a framework for the integration of skilled/professional self-initiated expatriates into Qatari organisations (refer to Table 5.35). Areas that were identified for improvement related to issues such as the need for Qatari organisations to: provide SIEs with more comprehensive information regarding the role that they will play as knowledge workers with regard to the development/training of Qatari nationals; implement a more comprehensive recruitment, selection and orientation process, and implement a more robust set of strategies to enhance the cross-cultural integration of their expatriate workers. Globalisation has fuelled organisations and countries towards building and/or strengthening knowledge-based economies. However in order to build competitive, knowledge-based economies, organisations and countries require skilled/professional workers. Skilled/professional self-initiated expatriates can provide Qatar with a pipeline of knowledge workers to support the growth of their emerging knowledge-based economy. As such, a framework that will enhance the integration of self-initiated expatriates into Qatari organisations is of paramount importance, specifically with regard to fostering performance excellence, satisfaction and community embeddedness within the Qatari work and cultural system.
- Full Text:
- Date Issued: 2015
- Authors: Pieterse, Regan Christopher Ebrahim
- Date: 2015
- Subjects: Human capital -- Qatar , Cultural relations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/3074 , vital:20396
- Description: The main research problem in this study was to identify a framework that can be utilised for the integration of skilled/professional self-initiated expatriates (SIEs) into Qatari organisations. The main research problem gave rise to six sub-problems that were addressed through the following actions: A literature study was conducted to explore what the existing literature revealed about facilitating successful expatriate integration. In particular, the theoretical guidelines for expatriate recruitment and selection, orientation and cross-cultural integration were presented and discussed. Special attention was given to community embeddedness. Semi-structured interviews were conducted with ten members from the sample group. These were undertaken to obtain their views on the expectations that their organisations had of them upon their arrival in Qatar, as well as on what they felt made it easy or difficult for them to adjust. Subsequently, a structured survey questionnaire was developed using the theoretical guidelines from the literature review and the insights gained from the semi-structured interviews. The survey was conducted in Qatar and administered to 102 skilled/professional self-initiated expatriates from diverse backgrounds and three work sectors, namely: healthcare, education and aviation. The final sample size was 94 due to eight questionnaires not being completed properly. The results from the empirical study revealed a gap between theoretical guidelines/ best practices and the recruitment and selection, orientation and cross-cultural integration practices at the respondents’ organisations. The knowledge gained from the existing literature and from the quantitative and qualitative results of the empirical study were combined and developed into a framework for the integration of skilled/professional self-initiated expatriates into Qatari organisations (refer to Table 5.35). Areas that were identified for improvement related to issues such as the need for Qatari organisations to: provide SIEs with more comprehensive information regarding the role that they will play as knowledge workers with regard to the development/training of Qatari nationals; implement a more comprehensive recruitment, selection and orientation process, and implement a more robust set of strategies to enhance the cross-cultural integration of their expatriate workers. Globalisation has fuelled organisations and countries towards building and/or strengthening knowledge-based economies. However in order to build competitive, knowledge-based economies, organisations and countries require skilled/professional workers. Skilled/professional self-initiated expatriates can provide Qatar with a pipeline of knowledge workers to support the growth of their emerging knowledge-based economy. As such, a framework that will enhance the integration of self-initiated expatriates into Qatari organisations is of paramount importance, specifically with regard to fostering performance excellence, satisfaction and community embeddedness within the Qatari work and cultural system.
- Full Text:
- Date Issued: 2015
A framework for the management of environmental information in Higher Education Institutions
- Authors: Jonamu, Blessing Tapiwa
- Date: 2014
- Subjects: Sustainability , Universities and colleges , Environmental management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10492 , http://hdl.handle.net/10948/d1020620
- Description: Higher Education Institutions (HEIs) are not immune to the global environment problems. An increasing awareness of the environmental responsibilities of HEIs has led researchers to investigate the role of environmental information and Environmental Management Information Systems (EMISs) in HEIs. EMISs play a major role in environmental management and environmental decision making in HEIs. Internationally, an increasing number of HEIs are embracing the concept of ‘sustainable HEIs’ by undertaking green campus initiatives. HEIs often use diverse information systems, some of which are manual systems, proven to be inefficient and this gives rise to redundant and inconsistent databases which result in non-compliance with regulations, confusion and lack of co-ordinated effort. There is therefore need for an integrated, comprehensive software system and framework which can assist with the efficient management of environmental information at South African HEIs. This study fills a gap in the field of environmental sustainability at HEIs as the evaluation of existing sustainability programs has shown common weakness such as: Failure to effectively set baselines, flaws in data acquisition and management and missing documentation. The aim of this study is to propose a framework for Environmental Information Management (EIM) in HEIs. The framework includes guidelines related to the components of the framework which can also be used to perform a gap analysis to facilitate the improved design of effective and efficient EIM processes and data stores. The Design Science Research (DSR) methodology is the research methodology used in the development of the two artifacts of this study namely: The EIM framework for HEIs and an EMIS prototype to serve as proof of concept. Problem identification and motivation was the first activity of the DSR which was done through a rigorous literature review and an investigation and evaluation of extant systems. This resulted in the design of an initial EIM framework for HEIs. Nelson Mandela Metropolitan University (NMMU) was the HEI used as the case study. The EIM framework was applied at NMMU and this enabled the researcher to understand the current As-Is EIM processes at NMMU and this resulted in clear objectives of a solution. The EMIS prototype (data warehouse) was then designed and implemented based on the theoretical framework. Three sets of evaluations were done to determine the acceptance of the EIM framework for HEIs and the performance of the EMIS prototype. The EIM framework was generally positively accepted and minor suggestions were made. An updated version of the EIM framework was proposed and evaluated. The experimental evaluation results showed that the EMIS prototype was efficient and effective. The contribution of this study is an EIM framework for HEIs and an implementation of an EMIS (EnviroDW) at NMMU that could be utilised by other HEIs.
- Full Text:
- Date Issued: 2014
- Authors: Jonamu, Blessing Tapiwa
- Date: 2014
- Subjects: Sustainability , Universities and colleges , Environmental management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10492 , http://hdl.handle.net/10948/d1020620
- Description: Higher Education Institutions (HEIs) are not immune to the global environment problems. An increasing awareness of the environmental responsibilities of HEIs has led researchers to investigate the role of environmental information and Environmental Management Information Systems (EMISs) in HEIs. EMISs play a major role in environmental management and environmental decision making in HEIs. Internationally, an increasing number of HEIs are embracing the concept of ‘sustainable HEIs’ by undertaking green campus initiatives. HEIs often use diverse information systems, some of which are manual systems, proven to be inefficient and this gives rise to redundant and inconsistent databases which result in non-compliance with regulations, confusion and lack of co-ordinated effort. There is therefore need for an integrated, comprehensive software system and framework which can assist with the efficient management of environmental information at South African HEIs. This study fills a gap in the field of environmental sustainability at HEIs as the evaluation of existing sustainability programs has shown common weakness such as: Failure to effectively set baselines, flaws in data acquisition and management and missing documentation. The aim of this study is to propose a framework for Environmental Information Management (EIM) in HEIs. The framework includes guidelines related to the components of the framework which can also be used to perform a gap analysis to facilitate the improved design of effective and efficient EIM processes and data stores. The Design Science Research (DSR) methodology is the research methodology used in the development of the two artifacts of this study namely: The EIM framework for HEIs and an EMIS prototype to serve as proof of concept. Problem identification and motivation was the first activity of the DSR which was done through a rigorous literature review and an investigation and evaluation of extant systems. This resulted in the design of an initial EIM framework for HEIs. Nelson Mandela Metropolitan University (NMMU) was the HEI used as the case study. The EIM framework was applied at NMMU and this enabled the researcher to understand the current As-Is EIM processes at NMMU and this resulted in clear objectives of a solution. The EMIS prototype (data warehouse) was then designed and implemented based on the theoretical framework. Three sets of evaluations were done to determine the acceptance of the EIM framework for HEIs and the performance of the EMIS prototype. The EIM framework was generally positively accepted and minor suggestions were made. An updated version of the EIM framework was proposed and evaluated. The experimental evaluation results showed that the EMIS prototype was efficient and effective. The contribution of this study is an EIM framework for HEIs and an implementation of an EMIS (EnviroDW) at NMMU that could be utilised by other HEIs.
- Full Text:
- Date Issued: 2014
A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
- Authors: Kativu, Tatenda Kevin
- Date: 2017
- Subjects: Mobile computing -- Hospitals -- South Africa Electronic data processing -- Security measures -- South Africa , Wireless communication systems -- Social aspects Medical care -- Technological innovations -- Developing countries
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/18630 , vital:28696
- Description: The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
- Full Text:
- Date Issued: 2017
A framework for the secure use of portable storage devices : a South African higher education perspective
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
A framework proposal for algorithm animation systems
- Authors: Yeh, Chih Lung
- Date: 2006
- Subjects: Computer programming , Computer algorithms , Computer graphics
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10488 , http://hdl.handle.net/10948/d1019680
- Description: The learning and analysis of algorithms and algorithm concepts are challenging to students due to the abstract and conceptual nature of algorithms. Algorithm animation is a form of technological support tool which encourages algorithm comprehension by visualising algorithms in execution. Algorithm animation can potentially be utilised to support students while learning algorithms. Despite widespread acknowledgement for the usefulness of algorithm animation in algorithm courses at tertiary institutions, no recognised framework exists upon which algorithm animation systems can be effectively modelled. This dissertation consequently focuses on the design of an extensible algorithm animation framework to support the generation of interactive algorithm animations. A literature and extant system review forms the basis for the framework design process. The result of the review is a list of requirements for a pedagogically effective algorithm animation system. The proposed framework supports the pedagogic requirements by utilising an independent layer structure to support the generation and display of algorithm animations. The effectiveness of the framework is evaluated through the implementation of a prototype algorithm animation system using sorting algorithms as a case study. This dissertation is successful in proposing a framework to support the development of algorithm animations. The prototype developed will enable the integration of algorithm animations into the Nelson Mandela Metropolitan University’s teaching model, thereby permitting the university to conduct future research relating to the usefulness of algorithm animation in algorithm courses.
- Full Text:
- Date Issued: 2006
- Authors: Yeh, Chih Lung
- Date: 2006
- Subjects: Computer programming , Computer algorithms , Computer graphics
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10488 , http://hdl.handle.net/10948/d1019680
- Description: The learning and analysis of algorithms and algorithm concepts are challenging to students due to the abstract and conceptual nature of algorithms. Algorithm animation is a form of technological support tool which encourages algorithm comprehension by visualising algorithms in execution. Algorithm animation can potentially be utilised to support students while learning algorithms. Despite widespread acknowledgement for the usefulness of algorithm animation in algorithm courses at tertiary institutions, no recognised framework exists upon which algorithm animation systems can be effectively modelled. This dissertation consequently focuses on the design of an extensible algorithm animation framework to support the generation of interactive algorithm animations. A literature and extant system review forms the basis for the framework design process. The result of the review is a list of requirements for a pedagogically effective algorithm animation system. The proposed framework supports the pedagogic requirements by utilising an independent layer structure to support the generation and display of algorithm animations. The effectiveness of the framework is evaluated through the implementation of a prototype algorithm animation system using sorting algorithms as a case study. This dissertation is successful in proposing a framework to support the development of algorithm animations. The prototype developed will enable the integration of algorithm animations into the Nelson Mandela Metropolitan University’s teaching model, thereby permitting the university to conduct future research relating to the usefulness of algorithm animation in algorithm courses.
- Full Text:
- Date Issued: 2006
A framework to elicit user requirements for information systems: a localised participatory approach from Southern Africa
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
A framework to enhance Information and Communication Technology (ICT) readiness for business continuity at the South African Revenue Services (SARS)
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A framework to evaluate user experience of end user application security features
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
A framework to implement social entrepreneurship activities in higher education institutions
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
- Authors: Tai Hing, Paul
- Date: 2017
- Subjects: Social entrepreneurship -- Education (Higher) -- South Africa Business enterprises -- Education (Higher) -- South Africa , Social responsibility of business -- Education (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/15923 , vital:28291
- Description: The development of social enterprises are recognised by the broader community as an effective tool for addressing social problems. As a result, the development and emergence of social enterprise sectors have taken various paths in different geographic regions in the world. For the African context, the withdrawal of funding from the state as a result of external conditions imposed by foreign actors as well as the institutional support provided by foreign aid organisations were the key drivers behind the emergence of the social enterprise sector in Africa. Within the South African context, job creation and poverty alleviation are pressing priorities, both politically and economically, so providing an environment that is conducive for the development of social enterprises or social entrepreneurship. Implementing social entrepreneurship activities in higher education is important as universities are under increasing pressure to become responsive to student needs, and there is a growing scrutiny of their engagement, supportive, and economic role in local communities. By supporting local communities, institutions can broaden the student experience and create an economic impact. In addition, as the student experience entails more than curricular learning opportunities, social entrepreneurship practices are an important dimension for higher learning. This study used a series of case studies of social entrepreneurship projects that were implemented in the classroom of the first and second year Management students on the 2nd Avenue Campus of the Nelson Mandela Metropolitan University (NMMU). These case studies highlighted the possibilities of how classroom space and students can be utilised to set-up social enterprises to improve the conditions of the many disadvantaged and disenfranchised communities within which the university functions. At the same time, learning takes place through the practical application of the theory taught in the classroom. From the seven case studies highlighted in the study, a framework was developed to implement social entrepreneurship activities in the context of higher education. This framework includes five steps, namely, motivation and inspiration to develop social enterprises in the classroom, student involvement in creating and developing a product for sale, use of appropriate teaching strategies to provide the learning experience, provision of adequate mentoring and control of the social enterprises and, finally, assessment of the social enterprises. With the funds generated from the projects, communities benefited, for example, the upgrading of community facilities. Educators in higher education institutions are responsible for developing future business leaders. Given the increasing importance of social issues, especially poverty, this educational experience ensured that the students were made aware of the importance of using the powers yielded by business to solve some of these social issues, and thus contribute to the improvement of the South African economy. As a result, social entrepreneurship has a role to play in addressing social and economic issues. For example, the entrepreneurship part of the business will help to alleviate the unemployment strain placed upon the South African economy, whereas, the social part of the business will assist in alleviating poverty. Regarding the implementation of social entrepreneurship activities within the environment of higher education, it is evident from the case studies that successful social enterprises can be established within the classroom and sufficient funds generated to effect positive change within disadvantaged communities. Other higher education institutions in South Africa may find the implementation of social entrepreneurship activities more problematic as they might not possess a similar university culture as the NMMU.
- Full Text:
- Date Issued: 2017
A framework to incorporate sustainability into South African consumer protection policy
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
- Authors: Best, Laura Anne
- Date: 2017
- Subjects: Consumer protection -- Law and legislation -- South Africa Corporate governance -- Law and legislation , Business ethics Sustainability -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14565 , vital:27766
- Description: Consumer protection policy measures can enable consumer behaviour shifts in favour of more sustainable choices. Whilst government is responsible for developing consumer protection policy in a particular country, business is central in the implementation of such policy. In South Africa, there is disassociation in consumer protection policy and environmental policy where consumer protection policy is the responsibility of the Department of Trade and Industry, whilst sustainability is located under the Department of Environmental Affairs. As a result, South African consumer protection policy does not holistically incorporate sustainability. A six-step qualitative research process was adopted to develop a framework to implement sustainability into consumer protection policies. First, a theoretical framework for incorporating sustainability into consumer protection policy was developed to structure the qualitative research. Four dimensions for incorporating sustainability into consumer protection were then identified. Qualitative data was collected using an open-ended questionnaire and also content analysis of existing data. Two sets of experts further reviewed and critiqued the proposed framework. The results of the qualitative enquiry, in particular, showed that for all the countries examined, some at least had sustainability consideration elements in their policies, but this was evident to a lesser extent in African countries, particularly those with less-developed economies. On the other hand, policy mechanisms that promoted sustainability were more evident in the policies and laws of developed countries. In the case of most African countries, basic needs were foregrounded as the primary concerns of consumers, ahead of sustainability concerns. Further, poverty limited consumer choices, particularly if more sustainably produced and eco-efficient goods came at a higher price. The research also underscored the importance and centrality of consumer education and stakeholder engagement for achieving sustainability policy intentions. It further confirmed that the basic needs of poor consumers in South Africa, and the impact of poverty on sustainability policy intentions must underpin the proposed framework. Factors that created an enabling environment for the implementation of the framework were identified as policy harmonisation within government policy domains, joined-up government, good corporate governance and shared value that considered the needs of future generations and consumer education. These factors would create an enabling environment for policy implementation. Consumer policy could play a key role in the choices that consumers make and, if well-designed and implemented, could direct consumer spending in support of the goal of sustainability and sustainable consumption. The proposed framework provides a foundation on which to futher refine and develop consumer protection policy that incorporates the well-being of consumers and social justice. Using consumer spending to drive sustainability requires a deliberate intention on the part of policy makers to move away from the more conventional framing of consumer policy, which has tended to focus on the economic interests of consumers, such as price, quality, choice and redress. However, modern business is shifting towards a more holistic conceptualisation of sustainability, as a value that needs to be deliberately and consciously built into the design and essence of a business. Doing so is not only good corporate citizenship, but offers a competitive advantage, which could drive product demand and attract consumers.
- Full Text:
- Date Issued: 2017
A framework to investigate risk management in commercial banks
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
A framework to measure employee engagement at Stefanutti Stocks RPM Business Unit
- Authors: Maher, Theresa
- Date: 2021-04
- Subjects: Port Elizabeth (South Africa) , Eastern Cape (South Africa) , South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/53315 , vital:45142
- Description: Work gratification and expectancies are of the utmost importance to the skilled workforce in the South African construction industry. The price paid for a demotivated workforce in this industry is very high and it leads to friction in the workplace, displeasing work outcomes and time delays. Furthermore it leads to increased incidences of theft,absenteeism and outputs that arebelow standard in terms of productivityand thequality of the work.In order to motivate the workforce in the construction industry,a day-by-day, step-by-step,hands-on approachmust be used. The aforesaid aids site managers to manage effectively and this in turn leads to an increase in production by way of enhanced productivity. Research shows that a correlationbetweenmotivation, excelling at work, improved productivity and fulfilment and expectancyexist. The reason why individuals act in a specific manner and choose not to act in a certain way can be directly linked totheirmotivation and engagement.As a member ofthe construction industry in South Africa, Stefanutti Stocks isseen as one of the leading construction groups. Employing more than 12 000 workers it has the ability to provide a wide variety of different scale projects for a host of clients in varied markets. The division concentrated on in this study is the Roads, Pipelines and Mining Services (RPM)Business Unit. The MD of the RPM Business Unit when starting at the company a few years ago came to the conclusion that in order for the RPM Business Unit to function optimally certain business inconsistencies regarding employee engagement needed to be addressed. Based on this he decided to use a consulting firm, AIM,to establish what the exact concernswere and what interventions wererequired to deal with them. ivInterventions facilitatedby AIM includedManagement Training Programmes and Workshops as well as one-on-one coaching sessions with selected individuals.The methodology used in this study was to measurethe current level of employee engagement subsequent toengagement interventionsconcludedby AIM.The approach used was the use of surveys distributed through AIM in conjunction with the RPM Business Unit’sHR Department. The surveys were distributed via Survey Monkey Software owned by the RPM Business Unit of Stefanutti Stocks. , Thesis (MBA) -- Faculty of Business and Economic Sciences, NMMU Business School, 2021
- Full Text:
- Date Issued: 2021-04
- Authors: Maher, Theresa
- Date: 2021-04
- Subjects: Port Elizabeth (South Africa) , Eastern Cape (South Africa) , South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/53315 , vital:45142
- Description: Work gratification and expectancies are of the utmost importance to the skilled workforce in the South African construction industry. The price paid for a demotivated workforce in this industry is very high and it leads to friction in the workplace, displeasing work outcomes and time delays. Furthermore it leads to increased incidences of theft,absenteeism and outputs that arebelow standard in terms of productivityand thequality of the work.In order to motivate the workforce in the construction industry,a day-by-day, step-by-step,hands-on approachmust be used. The aforesaid aids site managers to manage effectively and this in turn leads to an increase in production by way of enhanced productivity. Research shows that a correlationbetweenmotivation, excelling at work, improved productivity and fulfilment and expectancyexist. The reason why individuals act in a specific manner and choose not to act in a certain way can be directly linked totheirmotivation and engagement.As a member ofthe construction industry in South Africa, Stefanutti Stocks isseen as one of the leading construction groups. Employing more than 12 000 workers it has the ability to provide a wide variety of different scale projects for a host of clients in varied markets. The division concentrated on in this study is the Roads, Pipelines and Mining Services (RPM)Business Unit. The MD of the RPM Business Unit when starting at the company a few years ago came to the conclusion that in order for the RPM Business Unit to function optimally certain business inconsistencies regarding employee engagement needed to be addressed. Based on this he decided to use a consulting firm, AIM,to establish what the exact concernswere and what interventions wererequired to deal with them. ivInterventions facilitatedby AIM includedManagement Training Programmes and Workshops as well as one-on-one coaching sessions with selected individuals.The methodology used in this study was to measurethe current level of employee engagement subsequent toengagement interventionsconcludedby AIM.The approach used was the use of surveys distributed through AIM in conjunction with the RPM Business Unit’sHR Department. The surveys were distributed via Survey Monkey Software owned by the RPM Business Unit of Stefanutti Stocks. , Thesis (MBA) -- Faculty of Business and Economic Sciences, NMMU Business School, 2021
- Full Text:
- Date Issued: 2021-04
A framework to measure supply chain management efficacy in humanitarian supply environments
- Authors: Linford, Pierre
- Date: 2015
- Subjects: Humanitarian intervention , Business logistics
- Language: English
- Type: Thesis , Doctoral , DBA
- Identifier: http://hdl.handle.net/10948/8155 , vital:25131
- Description: Supply chain management in the for-profit commercial environment is a broad, far-reaching field of study, impacting on a society’s standard of living. Commercial supply chain management is the science of balancing customer service levels with least total costs. In other words, the for-profit supply chain management practitioner is concerned with customer service levels, consumer value, shareholder value, total cost optimisation and ultimately maximising long term sustainable return on investment. Commercial supply chain management differs from military supply chain management in that the latter also focuses on service delivery, but the cost is almost irrelevant. In military operations, successful results (winning the battle) far surpass the total cost parameter or the return on investment. One of the major differentiating factors between commercial supply chain management (CSCM) in the for-profit theatre and humanitarian supply chain management (HSCM) in the not-for-profit supply environments hinges on strategic intent and how to measure success. In CSCM, return on investment (ROI) is key and in HSCM, the ability to create impact becomes paramount. Regarding spend, both CSCM and HSCM are concerned with optimising operational spend, optimal utilisation of capital goods and infrastructure as well as minimising the cost of goods, works and services. Commercial supply chain managers want to spend as little as possible on operational expenses similarly to their humanitarian counterparts but humanitarian supply chain managers are also concerned about underspending of donor funded programming. Humanitarian programming often happens under difficult and dangerous circumstances. This requires a special cadre of professionals who are willing to serve the most vulnerable without exploitation and are able to deliver value often with limited or even broken infrastructure, unreliable supply and under insecure conditions. Humanitarian supply chain management leadership requires a DBA thesis balanced approach between long term strategic views whilst managing the short term outcomes. Also, humanitarian leadership needs to balance decision-making between long term strategic interventions and the ability, maturity and cost structures at functional and executional levels. This conundrum is the fundamental difference between commercial supply chain management and humanitarian supply chain management. Once one understands and respects these nuances, one can measure performance and reward appropriate corrective behaviour. Zig Ziglar once said: “If you aim at nothing, you will hit it every time”. The question that has been asked for so long has been “how to measure supply chain management efficacy in humanitarian supply environments?” This study addresses this question of developing a framework to measure supply chain efficacy in humanitarian supply environments with the view to create an enabling environment within which service levels could enhance the impact of donor funding whilst the needs of intended beneficiaries are better served. During field research, ten key focus areas and sixty-five supply chain management elements were identified. These sixty-five elements were tested via two surveys making use of the Delphi technique. Four of the sixty-five SCM elements were eliminated following the second survey due to high disagreement between the respondents, and a further two were eliminated based on expert opinion feedback from the respondents leaving fifty-nine elements being significantly important for inclusion in the framework. Three additional elements were identified by the respondents but not empirically verified and therefore not included in the proposed frameworks but could be included in future research. Fifty-seven of the sixty-five elements can be directly controlled by the SCM function. However, four of these fifty-seven elements were eliminated during the second survey and a further two were eliminated reviewing the feedback from respondents leaving fifty-one elements under the direct control of the SCM function.
- Full Text:
- Date Issued: 2015
- Authors: Linford, Pierre
- Date: 2015
- Subjects: Humanitarian intervention , Business logistics
- Language: English
- Type: Thesis , Doctoral , DBA
- Identifier: http://hdl.handle.net/10948/8155 , vital:25131
- Description: Supply chain management in the for-profit commercial environment is a broad, far-reaching field of study, impacting on a society’s standard of living. Commercial supply chain management is the science of balancing customer service levels with least total costs. In other words, the for-profit supply chain management practitioner is concerned with customer service levels, consumer value, shareholder value, total cost optimisation and ultimately maximising long term sustainable return on investment. Commercial supply chain management differs from military supply chain management in that the latter also focuses on service delivery, but the cost is almost irrelevant. In military operations, successful results (winning the battle) far surpass the total cost parameter or the return on investment. One of the major differentiating factors between commercial supply chain management (CSCM) in the for-profit theatre and humanitarian supply chain management (HSCM) in the not-for-profit supply environments hinges on strategic intent and how to measure success. In CSCM, return on investment (ROI) is key and in HSCM, the ability to create impact becomes paramount. Regarding spend, both CSCM and HSCM are concerned with optimising operational spend, optimal utilisation of capital goods and infrastructure as well as minimising the cost of goods, works and services. Commercial supply chain managers want to spend as little as possible on operational expenses similarly to their humanitarian counterparts but humanitarian supply chain managers are also concerned about underspending of donor funded programming. Humanitarian programming often happens under difficult and dangerous circumstances. This requires a special cadre of professionals who are willing to serve the most vulnerable without exploitation and are able to deliver value often with limited or even broken infrastructure, unreliable supply and under insecure conditions. Humanitarian supply chain management leadership requires a DBA thesis balanced approach between long term strategic views whilst managing the short term outcomes. Also, humanitarian leadership needs to balance decision-making between long term strategic interventions and the ability, maturity and cost structures at functional and executional levels. This conundrum is the fundamental difference between commercial supply chain management and humanitarian supply chain management. Once one understands and respects these nuances, one can measure performance and reward appropriate corrective behaviour. Zig Ziglar once said: “If you aim at nothing, you will hit it every time”. The question that has been asked for so long has been “how to measure supply chain management efficacy in humanitarian supply environments?” This study addresses this question of developing a framework to measure supply chain efficacy in humanitarian supply environments with the view to create an enabling environment within which service levels could enhance the impact of donor funding whilst the needs of intended beneficiaries are better served. During field research, ten key focus areas and sixty-five supply chain management elements were identified. These sixty-five elements were tested via two surveys making use of the Delphi technique. Four of the sixty-five SCM elements were eliminated following the second survey due to high disagreement between the respondents, and a further two were eliminated based on expert opinion feedback from the respondents leaving fifty-nine elements being significantly important for inclusion in the framework. Three additional elements were identified by the respondents but not empirically verified and therefore not included in the proposed frameworks but could be included in future research. Fifty-seven of the sixty-five elements can be directly controlled by the SCM function. However, four of these fifty-seven elements were eliminated during the second survey and a further two were eliminated reviewing the feedback from respondents leaving fifty-one elements under the direct control of the SCM function.
- Full Text:
- Date Issued: 2015
A framework to mitigate phishing threats
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
A framework to support inexperienced postgraduate research supervisors
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
- Authors: Mapasa, Tobeka Eugié
- Date: 2017
- Subjects: Graduate students -- Supervision of Universities and colleges -- Graduate work -- Supervision , Supervision Research -- Study and teaching -- Supervision
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: http://hdl.handle.net/10948/18529 , vital:28657
- Description: It has been taken for granted that being able to lecture presupposes being able to supervise research students, and completing a Master’s or doctoral degree successfully meant that an academic could assume the research supervisor role. However, findings on research into graduate students’ experiences of the research process indicate that in most cases, postgraduate students are dissatisfied with the guidance they receive from their supervisors. In an effort to contribute to finding ways and to continuing the debate on the improvement of postgraduate research supervision, in this study, I aimed to develop a framework that could be used to support postgraduate research supervisors within faculties. To achieve this aim, I conducted a literature review in order to understand what it means to supervise at postgraduate level effectively and also to identify existing support programmes for postgraduate research supervisors. I adopted a phenomenological research design within an interpretive tradition. The technique used to select the sample was purposeful criterion. The sample size was determined by means of data saturation. It consisted of four faculty postgraduate studies committee chairpersons, seven inexperienced and four experienced postgraduate research supervisors. Meetings and semi-structured interviews were employed to generate data. The findings revealed that attempts by faculties to support postgraduate research supervisors have not been systematically documented as they were done, to a large extent, informally. The size of the faculty, lack of resources, heavy workload and timing emerged as factors that impacted positively and/or negatively on the provision of support to postgraduate research supervisors within faculties. Thematic analysis of the semi-structured interviews revealed that both the experienced and the inexperienced postgraduate research supervisors view good postgraduate research supervision as a relationship of human beings involving critical engagement between the postgraduate students and their supervisors. A need to mentor postgraduate research students was also highlighted. The findings also indicated that the participants viewed good postgraduate research supervision as a developmental process of co-learning and mutual growth culminating from joint effort by both the student and the research supervisor. Striking the balance between backing off and taking over was highlighted as important linked to the roles of the student and that of the supervisor in the research supervision process. The inexperienced and the experienced supervisors had mixed feelings about the usefulness of the existing support initiatives by faculties that they have been exposed to, citing the duration, the level at which some of them were pitched and the presentation styles of the facilitators as cause for concern. The support needs that were common to both the inexperienced and the experienced supervisors were designated mentors, manageable workload and time. The inexperienced postgraduate supervisors expressed the need for focussed support, briefing sessions, online resources for easy access, good timing, and an extended co-supervision period. The experienced supervisors expressed the need for support that will be at their level, group supervision, time and/or money to buy the time and better prepared postgraduate students. This study contributed the proposed framework informed by the integration of the insights from the literature on postgraduate research supervision, professional development and the findings from this study. The principles of the Transformative Learning Theory are appropriate to guide the implementation of the proposed framework in future applications.
- Full Text:
- Date Issued: 2017
A framework towards effective control in information security governance
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009