A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A comparative analysis of anti-corruption legislation and anti-corruption agencies in the Eastern Cape and Northern Cape provices : a governance perspective
- Authors: Majila, Victoria Thozama
- Date: 2012
- Subjects: Political corruption -- South Africa , Misconduct in office -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:8179 , http://hdl.handle.net/10948/2117 , Political corruption -- South Africa , Misconduct in office -- South Africa
- Description: This thesis analysed and compared the effectiveness of the anti-corruption legislation and anti-corruption agencies in the Eastern Cape and Northern Cape provinces. The thesis consists of six chapters. This study is based on the assumption that the struggle against corruption is best approached by developing a system of laws, institutions and supporting practices which promote integrity and make corrupt conduct a high-risk activity. It is imperative that a systemic approach is embarked upon in order to address the manner in which the major institutions and processes of the state are conquered and exploited by corrupt individuals and groups. With the magnitude in which hurdles exist that hamper the effectiveness of the country's anti-corruption legislation and anti-corruption agencies; South Africa is incapable of curbing corruption. With the purpose to determine a desired state of affairs, characteristics of effective anti-corruption agencies and anti-corruption legislation were presented. These served as a yardstick in measuring how effective such agencies and legislation are in South Africa. Reasons for failure of agencies and legislation are discussed. After discussing types of anti-corruption agencies, those that perform better than ix others were identified. Through literature review, the status quo concerning anti-corruption initiatives in South Africa was assessed. It was revealed that the level of the success of South African anti-corruption agencies and legislation has been limited. In the case of anti-corruption agencies, weaknesses such as fragmentation; insufficient coordination; poor delineation of responsibility; and assimilation of corruption work into a broader mandate were identified as major causes. Measures that are needed, such as informed citizens; a need to foster and sustain high levels of professional and ethically imbued civil servants; and legislation that supports the transition towards a corruption-free society that are needed to complement implementation of anti-corruption legislation, were also recognised. Ways of addressing such shortcomings that the writers identified are also presented. The methodology and design followed in the study are described. This is followed by the analysis and interpretation of the survey. The research findings are then presented. Based on the findings a number of recommendations that would assist in improving the effectiveness of anticorruption agencies and anti-corruption legislation are made. Flowing from the discussion of effective anti-corruption models that were identified by literature a model that would be ideal for South Africa is recommended.
- Full Text:
- Date Issued: 2012
A comparative analysis of factors affecting the purchasing decisions of cleaning rag buyers in the Eastern Cape
- Authors: Shearer, David Charcles
- Date: 2012
- Subjects: Purchasing -- Decision making , Consumer behavior -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8898 , http://hdl.handle.net/10948/d1020928
- Description: The objectives of this research project were to identify and compare factors that influence the purchasing decisions of Multifibres’ customers active in each channel. Multifibres manufactures and distributes industrial cleaning rags to three channels or client categories, these being industrial resellers, industrial end-users and the walk-in customers. An extensive literature review revealed that purchasing decisions are influenced by, amongst other factors, the buyer’s role, the internal cognitive processes of the buyer, as well as factors present in the buyer’s business and external environment. An empirical study was conducted utilising in-depth interviews. The most prevalent, emergent themes that buyers attached the greatest weight to when purchasing cleaning rags were: price; quality; service; relationships; and, convenience. These factors were probed, analysed and compared, based on each buyer category’s unique set of characteristics. When motivating their purchasing preferences, resellers emphasised the importance of the business relationship and trust as being paramount, while end-users viewed price and service as the most important factors. Walk-in customers valued the combination of price and convenience as the most important reasons influencing their purchasing decisions.
- Full Text:
- Date Issued: 2012
A comparative analysis of the enforcement of market abuse provisions
- Authors: Chitimira, Howard
- Date: 2012
- Subjects: Corporation law -- South Africa , Insider trading in securities -- South Africa , Securities -- South Africa , Efficient market theory , Securities fraud
- Language: English
- Type: Thesis , Doctoral , LLD
- Identifier: vital:10240 , http://hdl.handle.net/10948/d1015008
- Description: Market abuse practices may directly or indirectly give rise to diverse problems such as inaccurate stock market prices, low public investor confidence, reduced market integrity and poor efficiency in the affected financial markets. This thesis reveals that three major forms of market abuse, namely insider trading, prohibited trading practices (trade-based market manipulation) and the making or publication of false, misleading or deceptive statements, promises and forecasts relating to listed securities (disclosure-based market manipulation) are prohibited in South Africa. However, although South Africa has had market abuse legislation for about 30 years, and must be commended for its great effort to enhance market integrity by combating market abuse practices, the enforcement of such legislation is still problematic. Moreover, in spite of the fact that there is no empirical data or accurate figures quantifying the occurrence and extent of market abuse activities in the South African financial markets, this thesis submits that market abuse practices are still to be completely eradicated. Accordingly, this thesis suggests that the aforementioned problem might have been aggravated by inter alia, various gaps, flaws and/or inconsistent implementation and enforcement of the market abuse legislation in South Africa. To this end, the anti-market abuse enforcement framework under the Securities Services Act 36 of 2004 is analysed to investigate its adequacy. The co-operation and role of the Financial Services Board, the courts, the Directorate of Market Abuse and other relevant stakeholders is also examined and discussed. Moreover, the co-operation between the Financial Services Board and similar international agencies is discussed to gauge its effectiveness in relation to the combating of cross-border market abuse practices. The adequacy of the awareness and preventative measures in place to curb market abuse practices is also investigated to determine whether such measures are robust enough to combat other new challenges that were posed by the 2007 to 2009 global financial crisis. Furthermore, a comparative analysis is undertaken of the enforcement of the market abuse prohibition in other jurisdictions, namely the United States of America, the United Kingdom, the European Union and Australia. This was done to investigate the relevant lessons that can be learnt or adopted from these jurisdictions. The thesis further discusses the adequacy of the recently introduced provisions of the Financial Markets Bill as well as the subsequent market abuse provisions of the Financial Markets Bill 2012. The thesis highlights that the aforementioned Bills are positive attempts by the policy makers to improve the enforcement of the market abuse provisions in South Africa. Nonetheless, the thesis reveals that most of the shortcomings contained in the Securities Services Act 36 of 2004 were duplicated in the Financial Markets Bill and the Financial Markets Bill 2012. In light of this, it remains to be seen whether the market abuse provisions contained in the Financial Markets Bill and/or the Financial Markets Bill 2012 will improve the combating of market abuse practices in South Africa. Consequently, it is hoped that the relevant market abuse provisions of the Securities Services Act 36 of 2004, the Financial Markets Bill and/or the Financial Markets Bill 2012 will be comprehensively reviewed in regard to the recommendations made in this thesis. To this end, the thesis proposes a viable anti-market abuse model and policy framework and sets out both policy objectives and provisions which policy makers could use to strengthen some of the market abuse provisions in South Africa.
- Full Text:
- Date Issued: 2012
A comparative study of masculinity in the Twilight films and selected teen dramas
- Authors: Theodosiou, Stephanie Nicole
- Date: 2012
- Subjects: Masculinity in motion pictures
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8425 , http://hdl.handle.net/10948/d1019976
- Description: This research paper aims to investigate the effect mainstream cinema has on the formulation and practice of the masculine stereotype in society, thus exploring the representations of masculinity being provided to males through mainstream cinema. This paper examines the representation of masculinity with reference to cinematic depictions of male masculinity produced in the film category of Teen Drama in the 90‘s/ 2000‘s and 2010 to determine the image the media enforces, through cinema, to influence what males modeled themselves on in both the past and present. This treatise shows the effect the media had on men in the past and how present day men continue to base their individual identity, which has been dramatically influenced and stereotyped by the high standards of the media, by analyzing the movie phenomenon of the Twilight franchise (1 to 3) with reference to Clueless (Amy Heckerling, 1995), 10 Things I hate About You (Gil Junger, 1999), Bring It On (Peyton Reed, 2000), John Tucker Must Die (Betty Thomas, 2006), Easy A (Will Gluck, 2010) and I am Number Four (D.J. Caruso, 2011) featured in the 90‘s/ 2000‘s and 2010. This was carried out through qualitative semiotic research to determine the overall influence the media, particularly mainstream cinema, has on the ideals of masculinity that heterosexual males seek to attain.
- Full Text:
- Date Issued: 2012
A comparative study of the language, mathematics and science literacy knowledge and skills of grade 9 learners in secondary schools in Port Elizabeth
- Authors: Arnolds, Keith Victor
- Date: 2012
- Subjects: Educational tests and measurements -- South Africa -- Port Elizabeth , Comparative education , Language and languages -- Study and teaching -- South Africa -- Port Elizabeth , Mathematics -- Study and teaching -- South Africa -- Port Elizabeth , Science -- Study and teaching -- South Africa -- Port Elizabeth , Education, Secondary -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Doctoral , DEd
- Identifier: vital:9566 , http://hdl.handle.net/10948/d1016062
- Description: In South Africa, on-going concerns surrounding the development of learners’ literacy, mathematics and science skills are evident and drive various research studies in this field. International studies and assessments, such as the Trends in International Mathematics and Science Study (TIMSS) and the Progress in International Reading Literacy Study (PIRLS) show major differences in the proficiency levels of learners in South Africa in comparison with their international counter parts. To date, however, the more comprehensive international standardised assessment called the Programme for International Student Assessment (PISA), has not been administered in South Africa. The main aim of this research study was to investigate and scientifically explore the real situation in terms of language, mathematics and science literacy knowledge and skills of Grade 9 learners in South Africa and to draw a comparison between Grade 9 learners from secondary schools in the Port Elizabeth district in South Africa and their international counterparts, using the PISA standardised international assessment. In addition, the aim of the study was to determine the actual language, mathematics and science literacy skills and knowledge acquired by participants in this study. Quantitative data collection was done by administering a modified version of the Program for International Student Assessment (PISA) to learners from eight schools in Port Elizabeth, supplemented with questionnaires completed by participating learners and school principals. Findings revealed that the South African learners sampled, ranked in the bottom percentile of participating countries in reading, mathematics and science. The study also exposed the glaring inequalities still prevalent in South African education today, 17 years into democracy. The implications point to a serious investigation into the societal and political factors responsible for the discrepancies in the South African educational system at present.
- Full Text:
- Date Issued: 2012
A comparison between the approaches to unfair discrimination in employment in South Africa and Nigeria
- Authors: Odeyemi, Hannah Olubunmi
- Date: 2012
- Subjects: Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Language: English
- Type: Thesis , Masters , LLM
- Identifier: vital:10270 , http://hdl.handle.net/10948/d1012054 , Discrimination in employment -- Law and legislation -- South Africa , Discrimination in employment -- Law and legislation -- Nigeria , Unfair labor practices -- South Africa , Unfair labor practices -- Nigeria
- Description: Issues concerning employment are some of the most serious issues of our time. But it is in the last two decades or so that these started receiving consideration. For instance, South Africa has experienced changes in the landscape of employment relations in organisations in the last decades. And no area of South Africa law is more critical than the prohibition of unfair discrimination, especially in the workpalce. The enactment of the Constitution brought about the need to eradicate unfair discrimination in the workpalce. Section 9 of the Constitution states that no person may unfairly discriminate directly or indirectly against anyone and that national legislation must be enacted to prevent or prohibit unfair discrimination. To enforce this, certain legislations like the Labour Law Act, Employment Act, Promotion of Equality and Prohibition of Unfair Discrimination Act (Equality Act), were enacted to give effect to the equality provision of the Constitution. In a similar vein, in Nigeria, workplace discrimination which is at the top of human rights violation perpetrated by employers of labour is of paramount concern to legislators and the government. Sex , age, ethinicty, religion, trade union membership and political opinion are some of the grounds upon which workers may not be discriminated against in Nigeria. Section 17 of the Constitution states that the State social order is founded on the ideals of freedom, equality and justice. It goes on to provide that every citizen shall have equality of rights, obligations and opportunities before the law. More specifically, the section stipilates that the State shall ensure that all citizens, without discrimination of any group whatsoever, have the opportunity of livehood as well as adequate opportunity to secure suitable employment and that there is equal pay for equal work without discrimination on account of sex, or any ground. Hence, there are The Nigerian Labour Act, the Federal Character Commission, etc that are saddled with the responsibility of addressing unfair discrimination and giving force to the provision of the Constitution. Despite the anti-discrimination laws and provisions made available in both countries, it is still alarming to see that unfair discrimination in the workplace is still on the increase. This, as will be discussed later, is probably due to factors such as lack of communication, long-stading patterns of educational inequalities that have resulted in inequalities in manpower, differences in drive, motivation, cultural disposition and geographical opportunities, racial difference and ethnicity, domination of one group by the other, etc. This research will briefly focus on the comparison between the approaches to unfair discrimination in employment between South Africa and Nigeria. It will discuss the development of unfair discrimination, grounds on which it is perpetrated, defences relating to unfair discrimination, and anti-discrimination laws put in place by the two jurisdictions to curb discrimination, as well as suggest on how to forestall unfair discrimination.
- Full Text:
- Date Issued: 2012
A comparison of harvester productivity and stump volume waste in coppiced and planted eucalyptus grandis pulpwood compartments in the KwaZulu-Natal forestry region of South Africa
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A conflict theory analysis of the 2007 South African public sector strike using a conflict model
- Authors: Knowles, Kelvin David
- Date: 2012
- Subjects: Collective bargaining -- South Africa , Dispute resolution (Law) -- South Africa , Strikes and lockouts -- Law and legislation -- South Africa , Industrial relations -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9407 , http://hdl.handle.net/10948/d1015033
- Description: Conflict is an inherent part of any service relationship, and is one of the important methods of effective organisational functioning. Depending on its management, it has both constructive and negative outcomes. The most extreme outcome of conflict in an industrial relationship is a strike. The South African Public Service strike of 2007 was the most protracted and united strike in the history of South Africa. In order to provide an insight into this strike, this treatise explores the following key aspects: • To present a short background of collective bargaining in the public sector through time. • To provide a short background to the public sector strike in 2007. • To develop a conflict model for analytic purposes based on a literature review and to use the conflict model to analyse the strike. A study of the strike was deemed essential because of its current nature and it being charged with political undertones. Moreover, conflict in the employment relationship has had an important influence on theories of industrial relations. The South African labour relations system is pluralist in nature, with a focus on the formal institutions of industrial relations. The focus should be on the motives and actions of parties in the employment relationship. Hence, one should look beyond conventional explanations in understanding conflict.
- Full Text:
- Date Issued: 2012
A critical analysis of the role of public participation in governance and service delivery with specific reference to the Buffalo City Municipality
- Authors: Maphazi, Nondumiso
- Date: 2012
- Subjects: Local government -- South Africa -- Buffalo City -- Citizen participation , Municipal services -- South Africa -- Buffalo City -- Citizen participation , Sustainable development -- South Africa -- Eastern Cape -- Citizen participation , Municipal services -- Management -- South Africa -- Eastern Cape -- Buffalo City Municipality
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:8257 , http://hdl.handle.net/10948/d1012147 , Local government -- South Africa -- Buffalo City -- Citizen participation , Municipal services -- South Africa -- Buffalo City -- Citizen participation , Sustainable development -- South Africa -- Eastern Cape -- Citizen participation , Municipal services -- Management -- South Africa -- Eastern Cape -- Buffalo City Municipality
- Description: This study undertook a critical analysis of the role of public participation in local governance and service delivery, with specific reference to the Buffalo City Municipality. The main aims of the study were to identify possible deficiencies in public participation processes, the development of strategies to enhance public participation, the development of mechanisms to ensure coordinated, integrated and focused public participation initiatives and the development of a normative model for improved public participation. The triangulation research methodology was employed with emphasis on the quantitative and qualitative methodologies. The sample comprised of councillors, officials and ward committee members. Questionnaires, with open and closed questions, were employed for the councillors and focus group interviews were conducted with ward committee members. Statistical procedures were utilised to interpret and analyse the quantitative data to determine the results using the Statistica package for data analysis. The qualitative data analysis involved thematic content analysis. Findings suggest that the current public participation strategies are inadequate. The correlation of results further reveals that a significant negative relationship exists between the councillors, officials and ward committee members. Despite various legislative prescriptions pertaining to public participation requirements in local government, the results imply that the Buffalo City Municipality has not fully complied with such prescriptions and national policy directives. The thesis proposes specific recommendations on how the Buffalo City Municipality can address the current short comings in terms of its public participation programmes and strategies. Recommendations include the establishment of a centralised Public Participation Unit, the empowerment of ward committee members and ward councillors, adequate resource allocation for ward committees, enhanced coordination between the various community structures, improved interaction with local communities, enhanced public participation initiatives and the need for additional anti-fraud and anti-corruption strategies within the municipality. A normative model, for enhanced public participation in local government, is also proposed in the thesis.
- Full Text:
- Date Issued: 2012
A critical assessment of the quality of community home-based care
- Authors: Morton, David Gerard
- Date: 2012
- Subjects: Home care services -- South Africa -- Eastern Cape , Home nursing -- Equipment and supplies , Caregivers -- South Africa -- Eastern Cape , Community health nursing -- South Africa -- Eastern Cape , Home health aides
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:16133 , http://hdl.handle.net/10948/1606 , Home care services -- South Africa -- Eastern Cape , Home nursing -- Equipment and supplies , Caregivers -- South Africa -- Eastern Cape , Community health nursing -- South Africa -- Eastern Cape , Home health aides
- Description: Volunteer home-based caregivers are critical role players in South Africa‘s health care system and in the South African government‘s strategy to fight HIV and AIDS. In order to achieve the aims that the government seeks to attain, it is important that the care and treatment provided to patients receiving community home-based care (CHBC) be of a high quality. While the need for quality care is supported by government and civil society, research indicates that it is not clear whether quality care is indeed being provided and therefore there is a need for research into the quality of CHBC. The research aimed to undertake a critical assessment of CHBC programmes to determine the quality of care provided by volunteer caregivers using social capital theory as a theoretical framework. The study examined the quality of CHBC by analysing the context of CHBC, by investigating the support that volunteer caregivers and their clients receive and by discussing the support that volunteer caregivers and their clients still need. The study used one-on-one in-depth interviews and focus groups to obtain relevant data. The participants included volunteer caregivers, clients and supervisors who took part in the one-on-one interviews. The focus groups consisted of key informants and supervisors respectively. The quantitative data consisted of descriptive statistics which helped describe the participants. The qualitative data was coded and themes and sub-themes were developed. The data was also analysed by an independent coder. The results showed that poverty, and the related problems of poor living conditions and a lack of food security affects the quality CHBC. In addition, unemployment and the problem of stipends also affect quality CHBC. Certain socio-economic factors were also found to lead people to choose to become volunteer caregivers and unemployment was found to be an important driving force behind the choice to undertake volunteer caregiving. Furthermore, the volunteer caregivers in the sample received organisational support from their supervisors and their fellow caregivers or peers. They also received social support from their families and their communities. Regarding the clients of the volunteer caregivers, it was found that they received a number of types of support including psycho- iv social counselling, spiritual counselling and care of a holistic nature. In addition, the study found that there is a need for standardised quality training of volunteer caregivers, which will equip them with multiple skills. It was also found that volunteer caregivers require mentoring and quality supervision in order to be able to provide quality CHBC to their clients. Government has the ability to put the necessary systems and structures in place, such as a scope of practice for volunteers, standardised training and monitoring and evaluation, to enable CHBC and its relevant role players to operate at optimum levels. It also has the authority to make the changes and to enforce rules. Furthermore, it has the ability to unite CHBC organisations and can create the necessary conditions that can lead to increased social capital. Furthermore, the study recommends that two additional dimensions of quality care be added to existing dimensions of quality in health care. The first is the holistic approach to caregiving and the second is social support systems, namely supervisor/mentor and peer support and family and community support. This second dimension is also closely linked to social capital and the networks that make up CHBC.
- Full Text:
- Date Issued: 2012
A critical study of voice teaching method, with specific reference to solo singing, choral singing and vocal health for the teenage singer
- Authors: Olivier, Madelie Charlotte
- Date: 2012
- Subjects: Singing -- Instruction and study , Voice culture -- Exercises , Singing -- Methods
- Language: English
- Type: Thesis , Masters , MMus
- Identifier: vital:8523 , http://hdl.handle.net/10948/d1019926
- Description: This dissertation presents a critical study of voice teaching method as this pertains to the high school learner studying voice within the South African educational environment, with learning outcomes determined for subject music within the GET (General Education and Training) and FET (Further Education and Training) bands of the Department of Basic Education at each school grade level, as well as by external examining bodies such as Unisa (University of South Africa), Trinity Guildhall and ABRSM (Amalgamated Board of the Royal Schools of Music). Emphasis is placed on the methodological principles applicable in the case of the Western classical music solo vocal repertoire, but reference is also made to the applicability of this method in other vocal genres and, in particular, in the case of choral music participation. Special attention is given to the subject of the vocal health of the developing teenage voice, which includes an overview of vocal disorders and suggestions for rehabilitation and remedial programmes where necessary. Triangulation of research results is achieved in this study through inclusion of: - A thorough survey of selected pertinent bibliographic sources - Description of and engagement with the researcher’s own numerous phenomenological encounters in this field - Interviews conducted in Port Elizabeth with Jill Nock, voice teacher, on the subject of voice teaching method, and with John Black, Ear, Nose and Throat Specialist, on the subject of vocal health. The researcher concludes that there is a need for continued education and training of music educators in the South African high school environment, many of whom are not trained voice specialists, in order to cater for the growing number of high school music learners who choose to specialise in voice. Although educator networking can go a long way towards creating an informal support system to address this need, it is ultimately the responsibility of the Department of Basic Education to address this in a formal and all-encompassing fashion.
- Full Text:
- Date Issued: 2012
A data warehouse structure design methodology to support the efficient and effective analysis of online resource usage data
- Authors: Ferreira, Cornél
- Date: 2012
- Subjects: Data warehousing , Electronic information resources
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10486 , http://hdl.handle.net/10948/d1016072
- Description: The use of electronic services results in the generation of vast amounts of Online Resource Usage (ORU) data. ORU data typically consists of user login, printing and executed process information. The structure of this type of data restricts the ability of decision makers to effectively and efficiently analyse ORU data. A data warehouse (DW) structure is required which satisfies an organisation’s information requirements. In order to design a DW structure a methodology is needed to provide a design template according to acknowledged practices. The aim of this research was to primarily propose a methodology specifically for the design of a DW structure to support the efficient and effective analysis of ORU data. A variety of relevant DW structure design methodologies were investigated and a number of limitations were identified. These methodologies do not provide methodological support for metadata documentation, physical design and implementation. The most comprehensive methodology identified in the investigation was modified and the Adapted Triple-Driven DW Structure Design Methodology (ATDM) was proposed. The ATDM was successfully applied to the information and communication technology services (ICTS) department of the Nelson Mandela Metropolitan University as the case study for this research. The proposed ATDM consists of different phases which include a requirements analysis phase that was adapted from the identified comprehensive methodology. A physical design and an implementation phase were included in the ATDM. The ATDM was successfully applied to the ICTS case study as a proof of concept. The application of the ATDM to ICTS resulted in the generation and documentation of semantic and technical metadata which describes the DW structure derived from the application of the ATDM at a logical and physical level respectively. The implementation phase was applied using the Microsoft SQL Server integrated tool to obtain an implemented DW structure for ICTS that is described by technical metadata at an implementation level. This research has shown that the ATDM can be successfully applied to obtain an effective and efficient DW structure for analysing ORU data. The ATDM provides guidelines to develop a DW structure for ORU data and future research includes the generalisation of the ATDM to accommodate various domains and different data types.
- Full Text:
- Date Issued: 2012
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for parental control of mobile devices in South Africa
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
A framework for personal health records in online social networking
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
A framework for the governance of social media in the workplace
- Authors: Scharneck, Justin William
- Date: 2012
- Subjects: Social media -- Law and legislation , Social media -- Economic aspects , Work environment , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8861 , http://hdl.handle.net/10948/d1020180
- Description: Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
- Full Text:
- Date Issued: 2012
A framework to investigate risk management in commercial banks
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012