The development of a co-ordinated communication campaign to enhance participation in netball: applicable to schools in Port Elizabeth
- Authors: Opperman, Ansu
- Date: 2017
- Subjects: Sports -- Public relations -- South Africa -- Port Elizabeth Communication in sports -- South Africa -- Port Elizabeth , Mass media and sports -- South Africa -- Port Elizabeth School sports -- South Africa -- Port Elizabeth -- Communication
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19828 , vital:28977
- Description: Public relations play an intricate role in communication development strategies within sport, especially netball. The objective of the research is to create a communication campaign incorporated in a public relations programme in aid of the development of netball in Port Elizabeth schools. The significance of the research is to create an understanding of the challenges faced by the learners to participate in netball and to develop the sport. The development of players at a young age is not up to standard when compared to countries where netball is already a professional sport. There is a lack of communication between the different stakeholders, namely the players, coaches and external publics. Qualitative research methods were implemented where primary and secondary data was used to conduct the research. Focus groups were utilised to gather primary data from netball players and coaches. These interviews proved that communication gaps do exist between the different stakeholders of school and netball. An introduction about netball will be discussed. Literature about public relations and communication will be presented. The research methodology will be presenting the research design and research methods used to conduct the research. Characteristics of the schools used in the interviews will be discussed. The research analysis, findings and discussions will present a guideline to be implemented by schools to enhance communication and therefore help develop netball. The research will then be concluded and summarised. Limitations to the study will be discussed as well as recommendations for further study on the topic. Communication plays an important role when trying to build mutual beneficial relationships between the various stakeholders. The results in this research bring to the conclusion that effective communication is needed to enhance and develop netball to ultimately become a professional sport.
- Full Text:
- Date Issued: 2017
- Authors: Opperman, Ansu
- Date: 2017
- Subjects: Sports -- Public relations -- South Africa -- Port Elizabeth Communication in sports -- South Africa -- Port Elizabeth , Mass media and sports -- South Africa -- Port Elizabeth School sports -- South Africa -- Port Elizabeth -- Communication
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19828 , vital:28977
- Description: Public relations play an intricate role in communication development strategies within sport, especially netball. The objective of the research is to create a communication campaign incorporated in a public relations programme in aid of the development of netball in Port Elizabeth schools. The significance of the research is to create an understanding of the challenges faced by the learners to participate in netball and to develop the sport. The development of players at a young age is not up to standard when compared to countries where netball is already a professional sport. There is a lack of communication between the different stakeholders, namely the players, coaches and external publics. Qualitative research methods were implemented where primary and secondary data was used to conduct the research. Focus groups were utilised to gather primary data from netball players and coaches. These interviews proved that communication gaps do exist between the different stakeholders of school and netball. An introduction about netball will be discussed. Literature about public relations and communication will be presented. The research methodology will be presenting the research design and research methods used to conduct the research. Characteristics of the schools used in the interviews will be discussed. The research analysis, findings and discussions will present a guideline to be implemented by schools to enhance communication and therefore help develop netball. The research will then be concluded and summarised. Limitations to the study will be discussed as well as recommendations for further study on the topic. Communication plays an important role when trying to build mutual beneficial relationships between the various stakeholders. The results in this research bring to the conclusion that effective communication is needed to enhance and develop netball to ultimately become a professional sport.
- Full Text:
- Date Issued: 2017
Financial inclusion in South Africa
- Authors: Abrahams, Rayghana
- Date: 2017
- Subjects: Financial services industry -- South Africa , Financial institutions -- South Africa Finance -- South Africa South Africa -- Economic conditions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13579 , vital:27240
- Description: The research for this study was guided by the question on whether the financial inclusion improvement strategies of the South African government adequately address the financial inclusion targets, as set out in the National Development Plan. This descriptive non-empirical study was conducted by means of a literature review. The secondary data used for the study were collected from a number of sources, namely: (i) the 2015 Brookings Financial and Digital Inclusion Project report; (ii) the 2014 Global Findex survey; (iii) the InterMedia surveys; (iv) Financial Access surveys; (v) various national FinScope surveys; and (iv) a number of working papers of the World Bank related to financial inclusion. The data revealed that South Africa, with its sophisticated financial sector, was early to adopt policies and initiatives to advance financial inclusion and the country has experienced a noticeable increase in financial inclusion from 61% in 2004 to 87% in 2015. South Africa is 3% away from its National Development Plan goal of 90% financial inclusion by 2030. This indicates that overall, the financial inclusion initiatives adopted by the South African government were successful.
- Full Text:
- Date Issued: 2017
- Authors: Abrahams, Rayghana
- Date: 2017
- Subjects: Financial services industry -- South Africa , Financial institutions -- South Africa Finance -- South Africa South Africa -- Economic conditions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13579 , vital:27240
- Description: The research for this study was guided by the question on whether the financial inclusion improvement strategies of the South African government adequately address the financial inclusion targets, as set out in the National Development Plan. This descriptive non-empirical study was conducted by means of a literature review. The secondary data used for the study were collected from a number of sources, namely: (i) the 2015 Brookings Financial and Digital Inclusion Project report; (ii) the 2014 Global Findex survey; (iii) the InterMedia surveys; (iv) Financial Access surveys; (v) various national FinScope surveys; and (iv) a number of working papers of the World Bank related to financial inclusion. The data revealed that South Africa, with its sophisticated financial sector, was early to adopt policies and initiatives to advance financial inclusion and the country has experienced a noticeable increase in financial inclusion from 61% in 2004 to 87% in 2015. South Africa is 3% away from its National Development Plan goal of 90% financial inclusion by 2030. This indicates that overall, the financial inclusion initiatives adopted by the South African government were successful.
- Full Text:
- Date Issued: 2017
The investigation of chemical variation in the stems and rhizomes of cissampelos capensis l. f. (menispermaceae) the Eastern Cape medicinal plant
- Authors: Latolla, Nehemiah Solomon
- Date: 2017
- Subjects: Plants -- Composition Medicinal plants Endemic plants
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13970 , vital:27362
- Description: Cissampelos capensis L. f. (Menispermaceae) commonly known as “Mayisake” (Xhosa) and “Dawidjieswortel” (Afrikaans) is the most commonly used medicinal plant of the Menispermaceae family in South Africa. The rhizomes of Cissampelos capensis are the most used part of the plant to treat illnesses. This poses a threat to the ongoing conservation of this valuable endemic species. Thus, we studied the chemical variation and subsequently the bioactivity in the stems and rhizomes of Cissampelos capensis, the Eastern Cape medicinal plant, to suggest the possible use of the stems for medicinal purposes. We studied the variation in the chemical composition in the stems and the rhizomes by employing four different extraction methods; the methanolic-, non-polar-, alkaloidal- and Total Tertiary Alkaloidal (TTA) to extract compounds from Cissampelos capensis. Employing various chromatographic techniques, HPLC, NMR and LC/MS to investigate the chemical variation and the in vitro assays for the crude materials of the stems and rhizomes of Cissampelos capensis. We successfully documented a library of the phytochemicals content in Cissampelos capensis from three different regions in the Eastern Cape. We could profile different extraction methods, with the TTA extraction delivering the best comparative profile. Employing LC/MS and HPLC we identified eleven known alkaloidal compounds in the stems and rhizomes. We also isolated a known alkaloid, pronuciferine, from the TTA extract and a crystal structure of proto-quericitol from the methanolic extract, which was isolated for the first time from Cissampelos capensis. Preliminary in vitro results suggested anti-inflammatory activity in the methanolic extracts of the stems and rhizomes, while the TTA extracts showed some cytotoxicity. Finally, through analytical HPLC analysis this study found as high as 31% similarity between the chemical variation of the stems and rhizomes, but key alkaloids were not always present, indicating more work is needed before the stems can be recommended as a replacement for the rhizomes.
- Full Text:
- Date Issued: 2017
- Authors: Latolla, Nehemiah Solomon
- Date: 2017
- Subjects: Plants -- Composition Medicinal plants Endemic plants
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13970 , vital:27362
- Description: Cissampelos capensis L. f. (Menispermaceae) commonly known as “Mayisake” (Xhosa) and “Dawidjieswortel” (Afrikaans) is the most commonly used medicinal plant of the Menispermaceae family in South Africa. The rhizomes of Cissampelos capensis are the most used part of the plant to treat illnesses. This poses a threat to the ongoing conservation of this valuable endemic species. Thus, we studied the chemical variation and subsequently the bioactivity in the stems and rhizomes of Cissampelos capensis, the Eastern Cape medicinal plant, to suggest the possible use of the stems for medicinal purposes. We studied the variation in the chemical composition in the stems and the rhizomes by employing four different extraction methods; the methanolic-, non-polar-, alkaloidal- and Total Tertiary Alkaloidal (TTA) to extract compounds from Cissampelos capensis. Employing various chromatographic techniques, HPLC, NMR and LC/MS to investigate the chemical variation and the in vitro assays for the crude materials of the stems and rhizomes of Cissampelos capensis. We successfully documented a library of the phytochemicals content in Cissampelos capensis from three different regions in the Eastern Cape. We could profile different extraction methods, with the TTA extraction delivering the best comparative profile. Employing LC/MS and HPLC we identified eleven known alkaloidal compounds in the stems and rhizomes. We also isolated a known alkaloid, pronuciferine, from the TTA extract and a crystal structure of proto-quericitol from the methanolic extract, which was isolated for the first time from Cissampelos capensis. Preliminary in vitro results suggested anti-inflammatory activity in the methanolic extracts of the stems and rhizomes, while the TTA extracts showed some cytotoxicity. Finally, through analytical HPLC analysis this study found as high as 31% similarity between the chemical variation of the stems and rhizomes, but key alkaloids were not always present, indicating more work is needed before the stems can be recommended as a replacement for the rhizomes.
- Full Text:
- Date Issued: 2017
Experiences of analogue-trained radiographers utilising digital imaging in projection radiography
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
Guidelines for secure cloud-based personal health records
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
- Authors: Mxoli, Ncedisa Avuya Mercia
- Date: 2017
- Subjects: Cloud computing -- Security measures , Computer security Data mining Medical records -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14134 , vital:27433
- Description: Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
- Full Text:
- Date Issued: 2017
The risk of borrowed capital for commercial, industrial and residential property developments
- Authors: Loock, Morne
- Date: 2017
- Subjects: Commercial buildings -- Finance Industrial sites -- Finance , Real estate developers -- South Africa Financial institutions -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18288 , vital:28615
- Description: Most property development firms who invest in property will need to raise some extra financial support. Unforeseen or unexpected expenses can arise at any point in time during the development process. Calculated decisions should be taken with regards to the financial circumstances for any property development project. Decisions should be taken not only for the present but for the future as well. It is therefore important to understand the market and the current economic conditions before applying for capital to fund a property development project. There several types of finance available to fund property development, these include long term borrowing, short term borrowing, construction loans property development investment trust, second mortgages. There is risk to all of the aforementioned finance available.
- Full Text:
- Date Issued: 2017
- Authors: Loock, Morne
- Date: 2017
- Subjects: Commercial buildings -- Finance Industrial sites -- Finance , Real estate developers -- South Africa Financial institutions -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18288 , vital:28615
- Description: Most property development firms who invest in property will need to raise some extra financial support. Unforeseen or unexpected expenses can arise at any point in time during the development process. Calculated decisions should be taken with regards to the financial circumstances for any property development project. Decisions should be taken not only for the present but for the future as well. It is therefore important to understand the market and the current economic conditions before applying for capital to fund a property development project. There several types of finance available to fund property development, these include long term borrowing, short term borrowing, construction loans property development investment trust, second mortgages. There is risk to all of the aforementioned finance available.
- Full Text:
- Date Issued: 2017
Towards a framework for the integration of information security into undergraduate computing curricula
- Gomana, Lindokuhle Gcina, Thomson, Kerry-Lynn
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
Craftsmanship in contemporary art: an exposition of selected artists’ practical non-involvement
- Van der Walt, Jonathan Petra
- Authors: Van der Walt, Jonathan Petra
- Date: 2017
- Subjects: Art, Modern -- 21st century Sculpture -- South Africa -- Technique , Art and technology -- 21st century
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21285 , vital:29471
- Description: Craftsmanship in contemporary art production is the main area of focus for this visual arts based research. An exploration into the artistic production processes of selected contemporary artists’ work, reveals a tendency of physical non-involvement on the part of the artist, who takes up the role of art director. The research enquiry attempts to provide an answer as to whether credit should be given to the craftsman as well as to the artist in this artist/craftsman relationship. The use of a practice-led research strategy allows the researcher’s art-making practice to become an integral part of the cycles of research, as the development of the researcher’s practical understanding, techniques and execution are crucial in the practical component, but also conceptually as a stance in opposition to the selected artists’ lack of practical involvement. The researcher has identified and analysed the following five factors that have contributed to this current state of art production in contemporary art: Kitsch as an influence on the subject matter and content of art, Marcel Duchamp and his idea of the ‘readymade’ and issues of authorship, Andy Warhol and his ideas on art and business, the Conceptual Art movement and, the act and product of craft being perceived as being inferior to the fine arts In addition, an exploration of the production processes involved in the creation of the artworks of Jeff Koons, Damien Hirst, Maurizio Cattelan and Takashi Murakami highlights the craftspeople, fabricators and foundries that are responsible for these artists’ highly crafted aesthetics. As practice is crucial in developing a new understanding and meaning in visual-arts based research, the practical component describes the researcher’s core practical themes as being the following:the creation of naturalistic figurative small-scale sculptures in resin and bronze, placing the characters explored in the theoretical component as the subject matter.The advantages and disadvantages of the collaborative experience with Sculpture Casting Services (fine art foundry) and eNtsa (a Technology Innovation agency), especially the implementation of 3D technologies in both experiences; and the technical development and understanding in order to improve the researcher’s artistic practice Collaboration is an important underlying theme throughout this research undertaking. It is crucial in the production of most contemporary art, and assists in identifying the artist’s role within the production of his/her work. Finally, it relates to the researcher’s collaborative experience expanded upon in the practical component and its benefits as a production method. In concluding, the researcher finds that craftspeople do receive credit for the work they do in the form of money, business and marketing. They provide a service that a great number of artists generously support. Foundries and fabricators also place a mark on the work they do, much like the artist’s signature, as a symbol of pride and recognition. It is ultimately the artist’s technical abilities, workload and artist identity or brand that will determine the extent to which he or she will contribute to the collaboration, whether that be a simple idea, a sketch, a maquette or a large-scale sculpture ready for installation. However, in a rapidly advancing technological society, it is the idea of the artist as craftsman, both thinker and maker, that demands more respect.
- Full Text:
- Date Issued: 2017
- Authors: Van der Walt, Jonathan Petra
- Date: 2017
- Subjects: Art, Modern -- 21st century Sculpture -- South Africa -- Technique , Art and technology -- 21st century
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/21285 , vital:29471
- Description: Craftsmanship in contemporary art production is the main area of focus for this visual arts based research. An exploration into the artistic production processes of selected contemporary artists’ work, reveals a tendency of physical non-involvement on the part of the artist, who takes up the role of art director. The research enquiry attempts to provide an answer as to whether credit should be given to the craftsman as well as to the artist in this artist/craftsman relationship. The use of a practice-led research strategy allows the researcher’s art-making practice to become an integral part of the cycles of research, as the development of the researcher’s practical understanding, techniques and execution are crucial in the practical component, but also conceptually as a stance in opposition to the selected artists’ lack of practical involvement. The researcher has identified and analysed the following five factors that have contributed to this current state of art production in contemporary art: Kitsch as an influence on the subject matter and content of art, Marcel Duchamp and his idea of the ‘readymade’ and issues of authorship, Andy Warhol and his ideas on art and business, the Conceptual Art movement and, the act and product of craft being perceived as being inferior to the fine arts In addition, an exploration of the production processes involved in the creation of the artworks of Jeff Koons, Damien Hirst, Maurizio Cattelan and Takashi Murakami highlights the craftspeople, fabricators and foundries that are responsible for these artists’ highly crafted aesthetics. As practice is crucial in developing a new understanding and meaning in visual-arts based research, the practical component describes the researcher’s core practical themes as being the following:the creation of naturalistic figurative small-scale sculptures in resin and bronze, placing the characters explored in the theoretical component as the subject matter.The advantages and disadvantages of the collaborative experience with Sculpture Casting Services (fine art foundry) and eNtsa (a Technology Innovation agency), especially the implementation of 3D technologies in both experiences; and the technical development and understanding in order to improve the researcher’s artistic practice Collaboration is an important underlying theme throughout this research undertaking. It is crucial in the production of most contemporary art, and assists in identifying the artist’s role within the production of his/her work. Finally, it relates to the researcher’s collaborative experience expanded upon in the practical component and its benefits as a production method. In concluding, the researcher finds that craftspeople do receive credit for the work they do in the form of money, business and marketing. They provide a service that a great number of artists generously support. Foundries and fabricators also place a mark on the work they do, much like the artist’s signature, as a symbol of pride and recognition. It is ultimately the artist’s technical abilities, workload and artist identity or brand that will determine the extent to which he or she will contribute to the collaboration, whether that be a simple idea, a sketch, a maquette or a large-scale sculpture ready for installation. However, in a rapidly advancing technological society, it is the idea of the artist as craftsman, both thinker and maker, that demands more respect.
- Full Text:
- Date Issued: 2017
A scenario-based ICT risk assessment approach in local government
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
- Authors: Mcube, Unathi Unity
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7598 , vital:21942
- Description: Information Communication Technology (ICT) has become an integral part of conducting business within enterprises including the local government. Local government relies on the use of ICT to ensure that its objectives and goals are accomplished. The effective use of ICT within the context of local government is fundamental for the support, sustainability and growth of municipalities. Benefits associated with the effective use of ICT in local government include but are not limited to accelerated service delivery, efficiency and accountability. While these benefits cannot be disputed, it is important to realise that the use of ICT presents potential risks. Thus, good governance of ICT should be addressed in local government. However, in recent years, the Auditor-General of South Africa (AG) has identified lack of good governance of ICT in local government. Various issues have been identified as emanating from the lack of good governance of ICT and lack of adequate ICT risk assessment is a case in point. In an attempt to address the good governance of ICT local government, various documents have been formulated. However, none of these address how effective management of ICT risks can be achieved. As such, local government lacks the means to effectively address the management of ICT risk which is core to the good governance of ICT. Local government still requires urgent intervention with regard to addressing the activities of managing ICT risks, particularly ICT risk assessment. Moreover, it was revealed that the lack of adequate ICT skills and financial resources in local government elevates this problem. The above-mentioned problem is what has motivated this research study. This dissertation aims to produce an artefact in the form of an approach for ICT risk assessment in local government. It is believed that a customised approach to ICT risk assessment in local government will contribute towards solving the identified problem.
- Full Text:
- Date Issued: 2017
Social networking services in support of patient centred care: a South African perspective
- Mentoor, Allisson Catherine Ebony
- Authors: Mentoor, Allisson Catherine Ebony
- Date: 2017
- Subjects: Online social networks -- Research -- South Africa , Medical care -- Technological innovations -- South Africa , Patient-centered health care -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7334 , vital:21321
- Description: In an effort to improve the South African healthcare system, the Department of Health in South Africa is investing in National Health Insurance to support and deliver access to quality healthcare services within affordable boundaries. Enhanced delivery and quality of care to patients is supplemented through an increased emphasis on the adoption of eHealth technologies and systems. Within the context of efforts to improve access to quality and affordable healthcare services, there is also increasing awareness of the need to adopt a patient centred care approach as a means of caring for the patient, rather than only caring for the disease. Patient centred care emphasises the need for patients to be actively involved in the decision making process with regards to their needs and treatment. Social networking is viewed as a useful tool to support patient centred care and to improve on healthcare delivery. The use of social networking services beyond the healthcare context has increased exponentially. This has lead to increased interest in the application of social networking in healthcare. This leads to the problem statement of this research, which is the proliferation of social networking services and the lack of understanding of the prospect of social networking services for patient centred care in South Africa. In order to address this problem, the research investigates three areas of focus, namely patient centred care, the South African healthcare sector and social networking services. This generates an understanding of the meaning of patient centred care in general, and also in this study; the status quo in South African healthcare and the incorporation of patient centred care within selected strategic healthcare directives; social networking services in general as well as its application in healthcare; and the factors affecting the use of social networking services for patient centred care in the South African healthcare context. The factors are analysed to explore the prospects of social networking services for patient centred care in South African healthcare. The outcome of this analysis represents a useful input for healthcare providers and administrators in government.
- Full Text:
- Date Issued: 2017
- Authors: Mentoor, Allisson Catherine Ebony
- Date: 2017
- Subjects: Online social networks -- Research -- South Africa , Medical care -- Technological innovations -- South Africa , Patient-centered health care -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7334 , vital:21321
- Description: In an effort to improve the South African healthcare system, the Department of Health in South Africa is investing in National Health Insurance to support and deliver access to quality healthcare services within affordable boundaries. Enhanced delivery and quality of care to patients is supplemented through an increased emphasis on the adoption of eHealth technologies and systems. Within the context of efforts to improve access to quality and affordable healthcare services, there is also increasing awareness of the need to adopt a patient centred care approach as a means of caring for the patient, rather than only caring for the disease. Patient centred care emphasises the need for patients to be actively involved in the decision making process with regards to their needs and treatment. Social networking is viewed as a useful tool to support patient centred care and to improve on healthcare delivery. The use of social networking services beyond the healthcare context has increased exponentially. This has lead to increased interest in the application of social networking in healthcare. This leads to the problem statement of this research, which is the proliferation of social networking services and the lack of understanding of the prospect of social networking services for patient centred care in South Africa. In order to address this problem, the research investigates three areas of focus, namely patient centred care, the South African healthcare sector and social networking services. This generates an understanding of the meaning of patient centred care in general, and also in this study; the status quo in South African healthcare and the incorporation of patient centred care within selected strategic healthcare directives; social networking services in general as well as its application in healthcare; and the factors affecting the use of social networking services for patient centred care in the South African healthcare context. The factors are analysed to explore the prospects of social networking services for patient centred care in South African healthcare. The outcome of this analysis represents a useful input for healthcare providers and administrators in government.
- Full Text:
- Date Issued: 2017
ICT readiness for business continuity in local government
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
Analysis of factors affecting performance of a low-temperature Organic Rankine Cycle heat engine
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
A profile of selected enterprises and their adopted cost allocation systems in Nelson Mandela Bay
- Authors: Vellem, Masixole
- Date: 2017
- Subjects: Cost accounting , Budget Business enterprises
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13568 , vital:27239
- Description: Activity-based costing is a cost allocation method which appears to have many benefits when compared to traditional costing systems. However, there is limited academic research demonstrating this superiority. There is thus a need to investigate and profile the characteristics of selected enterprises and their adopted cost allocation systems. The main objective of this study was to profile and compare the characteristics of companies in Nelson Mandela Bay that use the activity-based costing system, versus those using traditional costing methods. The research methodology used for this research study is descriptive and quantitative, using various techniques for data analysis. An electronic internet based questionnaire was distributed to companies and the response automatically recorded for analysis with the help of Nelson Mandela University statistics department. The findings of the empirical study revealed that most (38%) of the respondents use a combination of both activity-based costing and traditional costing methods, followed by traditional costing methods (35%), and purely activity-based costing (27%). Data analysis revealed that companies in construction and manufacturing seemed to prefer activity-based costing over traditional costing methods. The findings raise the question as to whether the preference in cost allocation methods is based solely on the benefits of cost allocation, lack of new knowledge, adaptability within companies, or cost of change versus the benefit.
- Full Text:
- Date Issued: 2017
- Authors: Vellem, Masixole
- Date: 2017
- Subjects: Cost accounting , Budget Business enterprises
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13568 , vital:27239
- Description: Activity-based costing is a cost allocation method which appears to have many benefits when compared to traditional costing systems. However, there is limited academic research demonstrating this superiority. There is thus a need to investigate and profile the characteristics of selected enterprises and their adopted cost allocation systems. The main objective of this study was to profile and compare the characteristics of companies in Nelson Mandela Bay that use the activity-based costing system, versus those using traditional costing methods. The research methodology used for this research study is descriptive and quantitative, using various techniques for data analysis. An electronic internet based questionnaire was distributed to companies and the response automatically recorded for analysis with the help of Nelson Mandela University statistics department. The findings of the empirical study revealed that most (38%) of the respondents use a combination of both activity-based costing and traditional costing methods, followed by traditional costing methods (35%), and purely activity-based costing (27%). Data analysis revealed that companies in construction and manufacturing seemed to prefer activity-based costing over traditional costing methods. The findings raise the question as to whether the preference in cost allocation methods is based solely on the benefits of cost allocation, lack of new knowledge, adaptability within companies, or cost of change versus the benefit.
- Full Text:
- Date Issued: 2017
A study of procurement and administration in the Department of Health in the Eastern Cape
- Authors: Xatula, Meyisi Sigqibo
- Date: 2017
- Subjects: Government purchasing -- South Africa -- Eastern Cape , Public administration -- South Africa -- Eastern Cape Management -- Procurement
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13458 , vital:27205
- Description: The study investigated issues concerning procurement and administration in the Department of Health (DoH) in the Eastern Cape and has further investigated the role of the implementation of the Public Finance Management Act (PFMA), Act 1 of 1999 in the department. That included issues associated with the administration and procurement in relation to service providers from the private sector. The DoH in the Eastern Cape Province delivers:“ … a quality health service to the people of the Eastern Cape Province promoting a better life for all and ensures accessible, comprehensive, and integrated services in the province, emphasising the primary health care approach, as well as utilising and developing all resources to enable present and future generations to enjoy good health and quality of life” (Department of Health [DoH], Eastern Cape, Departmental Annual Performance Plan, 2013:3). Various researchers have investigated the implementation of the PFM Act 1 of 1999 and have identified gaps and made recommendations regarding the identified gaps. The study is based on the following reports from various authors: According to Pillay (2013), since 1994 every public sector department has lost approximately R385 billion to fraud, corruption and maladministration. Government employees have accepted kickbacks in exchange for rigging tenders, including focusing on high levels of corruption (Albert, 2011:1). The fraud and corruption in the Eastern Cape DoH, which involves nepotism, corruption and fraud amounting to a million rand in the audit report of 2013, have prompted calls by the opposition for interventions (PricewaterhouseCoopers [PWC], 2013:9). Departmental Annual Performance Plan for 2013/2014. Impact of accountability and ethics on public service delivery: a South African perspective which involves accountability stating that all government departments have to be efficient to ensure value for public funds including the qualitative and value-laden expectations of the society (Raga & Taylor, 2008:1). EC (2010:9), Audit Report: Health Department, Eastern Cape. King III Report (2009) – Corporate Governance. The study has built on previous research conducted by other researchers who have conducted research on the issue of the implementation of the Public Finance Management Act 1 (PFM Act 1) of 1999, and had identify further gaps not previously identified by other researchers or in the audits. In addition, this study aims to also identify shortcomings that have been described in the recent audits 2013/2014 of the DoH, Eastern Cape. Together with the new gaps identified in the PFM Act 1 of 1999, the researcher aims to make a number of recommendations to improve the effectiveness of the implementation of the PFM Act 1 of 1999. The PFM Act 1 of 1999 was promulgated by the South African government in 1999. The Act promotes the objective of good financial management in order to maximise service delivery through effective and efficient use of available limited resources as well as credible interaction with private sector service providers. A key objective of this Act is to put in place a more effective financial accountability system over public entities. The objectives of the Act are to: Modernise the system of financial management, Enable public sector managers to manage, while at the same time being accountable, Ensure timely provision of quality information, To eliminate waste and corruption in the use of public assets.
- Full Text:
- Date Issued: 2017
- Authors: Xatula, Meyisi Sigqibo
- Date: 2017
- Subjects: Government purchasing -- South Africa -- Eastern Cape , Public administration -- South Africa -- Eastern Cape Management -- Procurement
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13458 , vital:27205
- Description: The study investigated issues concerning procurement and administration in the Department of Health (DoH) in the Eastern Cape and has further investigated the role of the implementation of the Public Finance Management Act (PFMA), Act 1 of 1999 in the department. That included issues associated with the administration and procurement in relation to service providers from the private sector. The DoH in the Eastern Cape Province delivers:“ … a quality health service to the people of the Eastern Cape Province promoting a better life for all and ensures accessible, comprehensive, and integrated services in the province, emphasising the primary health care approach, as well as utilising and developing all resources to enable present and future generations to enjoy good health and quality of life” (Department of Health [DoH], Eastern Cape, Departmental Annual Performance Plan, 2013:3). Various researchers have investigated the implementation of the PFM Act 1 of 1999 and have identified gaps and made recommendations regarding the identified gaps. The study is based on the following reports from various authors: According to Pillay (2013), since 1994 every public sector department has lost approximately R385 billion to fraud, corruption and maladministration. Government employees have accepted kickbacks in exchange for rigging tenders, including focusing on high levels of corruption (Albert, 2011:1). The fraud and corruption in the Eastern Cape DoH, which involves nepotism, corruption and fraud amounting to a million rand in the audit report of 2013, have prompted calls by the opposition for interventions (PricewaterhouseCoopers [PWC], 2013:9). Departmental Annual Performance Plan for 2013/2014. Impact of accountability and ethics on public service delivery: a South African perspective which involves accountability stating that all government departments have to be efficient to ensure value for public funds including the qualitative and value-laden expectations of the society (Raga & Taylor, 2008:1). EC (2010:9), Audit Report: Health Department, Eastern Cape. King III Report (2009) – Corporate Governance. The study has built on previous research conducted by other researchers who have conducted research on the issue of the implementation of the Public Finance Management Act 1 (PFM Act 1) of 1999, and had identify further gaps not previously identified by other researchers or in the audits. In addition, this study aims to also identify shortcomings that have been described in the recent audits 2013/2014 of the DoH, Eastern Cape. Together with the new gaps identified in the PFM Act 1 of 1999, the researcher aims to make a number of recommendations to improve the effectiveness of the implementation of the PFM Act 1 of 1999. The PFM Act 1 of 1999 was promulgated by the South African government in 1999. The Act promotes the objective of good financial management in order to maximise service delivery through effective and efficient use of available limited resources as well as credible interaction with private sector service providers. A key objective of this Act is to put in place a more effective financial accountability system over public entities. The objectives of the Act are to: Modernise the system of financial management, Enable public sector managers to manage, while at the same time being accountable, Ensure timely provision of quality information, To eliminate waste and corruption in the use of public assets.
- Full Text:
- Date Issued: 2017
Concrete work decision analysis in Bloemfontein
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
- Authors: Mollo, Lesiba George
- Date: 2017
- Subjects: Concrete construction -- South Africa -- Bloemfontein -- Decision making Concrete construction industry -- South Africa -- Bloemfontein -- Decision making , Construction projects -- South Africa -- Bloemfontein Building -- Estimates -- South Africa -- Bloemfontein
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/19190 , vital:28783
- Description: The purpose of this study was to evolve how to reduce the manifestation of poor decisions that always produce defects and rework. The purpose of the study is predicated on the fact that good decision-making is a fundamental element of improved project delivery in the construction industry. Such decisions determine the accomplishment of performance parameters in each project. However, suboptimal performance, which is pervasive in the construction industry, is often linked to team decisions. To remedy decision-making pitfalls, the concept of Choosing by Advantages (CBA) is promoted by lean construction researchers. CBA is a decision-making system that assists project parties in deciding a course of action among competing alternatives. Case study research design was used for this project to discover the decision-making process adopted by project teams. The results from the study achieved through cross-case analysis shows that concrete defects and rework is often caused by the project team’s decision-making process, which is influenced by the members of the project team because of lack of experience, poor working conditions, and lack of education. The results also show that the decision-making mechanism of the project teams is influenced by the construction method, specification, cost, quality and time. The outcome of the project team’s decision-making process when choosing a concrete type often causes the concrete defects and rework, which can be eliminated through the application of CBA when choosing a concrete type. The application of CBA when choosing concrete type from two alternatives, ready mixed concrete and site batched concrete is driven by the project team. It was discovered from all three cases that ready-mixed concrete had a better score than site-batched concrete when using CBA to compare these two alternatives. The results show that ready-mixed concrete had less chances of causing concrete defects and rework when used or applied per the correct specifications or methods which are detailed in the engineering drawings of the structure. The study proposes that the project team should adopt CBA to improve their decision-making process on site especially when working with concrete.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Mabece, Thandolwethu, Thomson, Kerry-Lynn
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control
- Zata, Ngonidzashe Munyaradzi, Fernandes, John Manuel
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017
- Authors: Zata, Ngonidzashe Munyaradzi , Fernandes, John Manuel
- Date: 2017
- Subjects: Mechatronics -- Students Engineering students User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13349 , vital:27177
- Description: Simulation and visualization platform integrated under hardware control systems for a reconfigurable process control.
- Full Text:
- Date Issued: 2017
Work-readiness of university graduates: a professional accounting educational expectation gap in South Africa
- Authors: Schoeman, Lynn Antoinette
- Date: 2017
- Subjects: Accountants -- Employment -- South Africa -- Students , College graduates -- Employment -- South Africa School-to-work transition -- South Africa Employability -- South Africa -- Students
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/20455 , vital:29288
- Description: The constant change in the business environment versus the curriculum content of accounting educational programmes result in a possible gap between the competencies gained by students who complete their degree qualifications compared to the expectations of employers of these entering trainee accountants. However, the universities do endeavour to teach students the syllabus that will provide them with sufficient information and skills to be able to complete the tasks expected from them without much learning following university. Universities face increasing pressure to ensure graduates are equipped with the right employability skills (Osmani, Weerakkody & Hindi, 2017) yet literature show that graduates entering the workforce are not sufficiently equipped with all the necessary non-technical skills required by the accounting profession (Fouché, 2013). The research for this study was guided by the question whether universities sufficiently prepare entering trainee accountants with regards to work-readiness skills and whether a gap exists between the level of work-readiness skills expected by employers in professional accounting practice, and the actual level of capability of these skills transferred through the formal professional accounting educational programmes offered by universities in South Africa. Published literature reviewed on the work-readiness of graduates showed that an educational gap could exist between the skills required by employees and the skills that entering trainee accountants possess. Semi-structured interviews were conducted to gather data from supervisors and/or coordinators from Accredited Training Centres (ATCs) in the Nelson Mandela Bay Region of the South African Institute of Professional Accountants (SAIPA) on their perception of the level of capability expected of entering trainee accountants. The findings of this study showed that the universities provide entering trainee accountants with sufficient knowledge insofar as their technical abilities are concerned. However, employers perceive entering trainee accountants‟ capabilities in terms of their work-readiness skills, as insufficient.
- Full Text:
- Date Issued: 2017
- Authors: Schoeman, Lynn Antoinette
- Date: 2017
- Subjects: Accountants -- Employment -- South Africa -- Students , College graduates -- Employment -- South Africa School-to-work transition -- South Africa Employability -- South Africa -- Students
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/20455 , vital:29288
- Description: The constant change in the business environment versus the curriculum content of accounting educational programmes result in a possible gap between the competencies gained by students who complete their degree qualifications compared to the expectations of employers of these entering trainee accountants. However, the universities do endeavour to teach students the syllabus that will provide them with sufficient information and skills to be able to complete the tasks expected from them without much learning following university. Universities face increasing pressure to ensure graduates are equipped with the right employability skills (Osmani, Weerakkody & Hindi, 2017) yet literature show that graduates entering the workforce are not sufficiently equipped with all the necessary non-technical skills required by the accounting profession (Fouché, 2013). The research for this study was guided by the question whether universities sufficiently prepare entering trainee accountants with regards to work-readiness skills and whether a gap exists between the level of work-readiness skills expected by employers in professional accounting practice, and the actual level of capability of these skills transferred through the formal professional accounting educational programmes offered by universities in South Africa. Published literature reviewed on the work-readiness of graduates showed that an educational gap could exist between the skills required by employees and the skills that entering trainee accountants possess. Semi-structured interviews were conducted to gather data from supervisors and/or coordinators from Accredited Training Centres (ATCs) in the Nelson Mandela Bay Region of the South African Institute of Professional Accountants (SAIPA) on their perception of the level of capability expected of entering trainee accountants. The findings of this study showed that the universities provide entering trainee accountants with sufficient knowledge insofar as their technical abilities are concerned. However, employers perceive entering trainee accountants‟ capabilities in terms of their work-readiness skills, as insufficient.
- Full Text:
- Date Issued: 2017
A case study of the cost and causes of the Tongaat mall accident in Durban
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017
- Authors: Van Eeden, Leonarda
- Date: 2017
- Subjects: Construction industry -- Accidents -- South Africa -- Durban Construction industry -- Safety regulations -- South Africa -- KwaZulu-Natal , Building sites -- Risk assessment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/45464 , vital:38619
- Description: The literature shows that building collapses occur due to either management or operational failure. This Dissertation presents the causes of building collapse linked to management and operational lapses. A case study research on the Tongaat mall collapse in November 2013 forms the basis for the research. Through data collection that entails content analysis of official inquiry into the collapse and subsequent semi-structured face-to-face interviews among the participants in the collapsed building, major failures were identified. Salient findings show that the regulatory functions on the building project were compromised, and the inability to ensure that the project fulfils all enforcement and compliance requirements significantly enhances the existence of a work environment that led to two fatalities and 29 injuries. This study corroborates past findings that have flagged implementation as the weak link of H&S management in terms of construction regulations in South Africa. In other words, the benefits of adequate policies on paper can only emerge through applications on construction sites.
- Full Text:
- Date Issued: 2017