A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for parental control of mobile devices in South Africa
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
A framework for personal health records in online social networking
- Van der Westhuizen, Eldridge Werner
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
A model for automated topic spotting in a mobile chat based mathematics tutoring environment
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
A model for enhancing trust in South African automotive supply chains through information technology
- Authors: Piderit, Roxanne
- Date: 2012
- Subjects: Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9793 , http://hdl.handle.net/10948/d1011851 , Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Description: The South African automotive industry is recognised as an important sector for the economy and has thus been prioritised by the South African government. The success of the automotive manufacturers depends on the efficiency and effectiveness of their supply chain. Due to the large number of suppliers involved in these supply chains, enhancing trust in the inter-organisational relationships can ensure the competitiveness of the supply chain. Additionally, insufficient trust can disrupt information sharing between supply chain partners which further impacts on supply chain operations and hence supply chain competitiveness. Thus, both insufficient trust and insufficient information sharing are viewed as contributing factors to the inefficiency and ineffectiveness of a supply chain’s operations. The use of Information Technology to facilitate inter-organisational relationships, in particular in terms of improving information sharing, is an important consideration in this research project. As in the Prisoner’s Dilemma, when supply chain members share information freely, trust levels are increased, hence supply chain effectiveness and efficiency is achieved and therefore the competitiveness of the supply chain is optimised. This study addresses the problem of enhancing trust in automotive supply chains using Information Technology. Previous studies have recognised the importance of trust and information sharing in supply chain relationships. These previous studies have also considered the effect of trust on information sharing, or the effect of information sharing on trust in a single direction. Thus, to address this research problem, a cyclical relationship between trust and information sharing is proposed. In this respect, Information Technology should be used to nurture this cyclical relationship between trust and information sharing. A model for the enhancement of trust in automotive supply chains through Information Technology is proposed to achieve the objectives of this research project. This model includes risk perception; information sharing as a means of enhancing trust; a trust area that consists of both supply chain partner trustworthiness and system trust; the resultant trusting behaviour; and the resultant improved information sharing. As this study is concerned with the use of IT to enhance trust, the inclusion of system trust as a component of the model is a significant contribution of this study which is complementary to the proposed cyclical relationship between trust and information sharing.
- Full Text:
- Date Issued: 2012
A model for enhancing trust in South African automotive supply chains through information technology
- Authors: Piderit, Roxanne
- Date: 2012
- Subjects: Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9793 , http://hdl.handle.net/10948/d1011851 , Automobile supplies industry -- South Africa , Automobiles -- Technological innovations , Business logistics -- South Africa
- Description: The South African automotive industry is recognised as an important sector for the economy and has thus been prioritised by the South African government. The success of the automotive manufacturers depends on the efficiency and effectiveness of their supply chain. Due to the large number of suppliers involved in these supply chains, enhancing trust in the inter-organisational relationships can ensure the competitiveness of the supply chain. Additionally, insufficient trust can disrupt information sharing between supply chain partners which further impacts on supply chain operations and hence supply chain competitiveness. Thus, both insufficient trust and insufficient information sharing are viewed as contributing factors to the inefficiency and ineffectiveness of a supply chain’s operations. The use of Information Technology to facilitate inter-organisational relationships, in particular in terms of improving information sharing, is an important consideration in this research project. As in the Prisoner’s Dilemma, when supply chain members share information freely, trust levels are increased, hence supply chain effectiveness and efficiency is achieved and therefore the competitiveness of the supply chain is optimised. This study addresses the problem of enhancing trust in automotive supply chains using Information Technology. Previous studies have recognised the importance of trust and information sharing in supply chain relationships. These previous studies have also considered the effect of trust on information sharing, or the effect of information sharing on trust in a single direction. Thus, to address this research problem, a cyclical relationship between trust and information sharing is proposed. In this respect, Information Technology should be used to nurture this cyclical relationship between trust and information sharing. A model for the enhancement of trust in automotive supply chains through Information Technology is proposed to achieve the objectives of this research project. This model includes risk perception; information sharing as a means of enhancing trust; a trust area that consists of both supply chain partner trustworthiness and system trust; the resultant trusting behaviour; and the resultant improved information sharing. As this study is concerned with the use of IT to enhance trust, the inclusion of system trust as a component of the model is a significant contribution of this study which is complementary to the proposed cyclical relationship between trust and information sharing.
- Full Text:
- Date Issued: 2012
A process model for e-voting in South Africa
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
A systems approach to project implementation within the public sector towards formulating a framework for project evaluation
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
Acoustic monitoring and control system to determine the properties of damping materials
- Authors: Stahlberg, Martin
- Date: 2012
- Subjects: Vibration (Aeronautics) -- Damping , Acoustic emission testing
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9658
- Description: Experience shows that the noise and sound quality in vehicles are often a recurring criticism. The bodies of modern vehicles consist predominantly of thin sheets of metal. It is hard to prevent the excitation of bending vibrations and the subsequent emission of disturbing noise while driving. The noise spectrum in a car that can be heard by the driver is from ”latent roar” to ”chattering” noise of the body and engine. In automotive vehicles damped materials, especially plastics or materials made from sheet metal and surface damping treatments, are used. Those have high internal energy losses and damp sound oscillatory systems found in the body or interior of cars. A further advantage of such treated components is that they are applied to existing components working over wide temperature and frequency ranges. Many companies provide such ”sound-absorbing compounds”. The requirements for these damping materials are high temperature-resistance, water repellence, fuel and oil-resistance and good adhesion to the base material [17]. The acoustic properties, especially the damping of the plate vibrations through rubber are of interest. the question arises how can the damping coeficient of coated metal sheets can be measured and secondly, by how much the road noise is reduced when built-in sheets are coated with a known damped material. With the Oberst Bar Test Method (named after Dr. H. Oberst) the properties are determined of the internal damping materials that can be used to simulate mechanical constructions to determine damping of larger surfaces. This method describes a laboratory test procedure for measuring the mechanical properties of damped materials. A block diagram of the test system consisting of a damped material bonded to a vibrating cantilever steel bar is shown in figure 2.1. This method is useful for testing materials such as metals, enamels, ceramics, rubbers, plastics, reinforced epoxy matrices and wood. In addition to damping measurement, the test allows for the determination of the Young’s modulus E of the material. E is calculated from the resonance frequency of a given mode and from the physical constants of the bar. By associating the damping factor with the Young’s modulus, a complex quantity is defined which is called the Complex Modulus of Elasticity. Measurements of dynamic mechanical properties are also useful in the research on the molecular structure of materials.
- Full Text:
- Date Issued: 2012
- Authors: Stahlberg, Martin
- Date: 2012
- Subjects: Vibration (Aeronautics) -- Damping , Acoustic emission testing
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9658
- Description: Experience shows that the noise and sound quality in vehicles are often a recurring criticism. The bodies of modern vehicles consist predominantly of thin sheets of metal. It is hard to prevent the excitation of bending vibrations and the subsequent emission of disturbing noise while driving. The noise spectrum in a car that can be heard by the driver is from ”latent roar” to ”chattering” noise of the body and engine. In automotive vehicles damped materials, especially plastics or materials made from sheet metal and surface damping treatments, are used. Those have high internal energy losses and damp sound oscillatory systems found in the body or interior of cars. A further advantage of such treated components is that they are applied to existing components working over wide temperature and frequency ranges. Many companies provide such ”sound-absorbing compounds”. The requirements for these damping materials are high temperature-resistance, water repellence, fuel and oil-resistance and good adhesion to the base material [17]. The acoustic properties, especially the damping of the plate vibrations through rubber are of interest. the question arises how can the damping coeficient of coated metal sheets can be measured and secondly, by how much the road noise is reduced when built-in sheets are coated with a known damped material. With the Oberst Bar Test Method (named after Dr. H. Oberst) the properties are determined of the internal damping materials that can be used to simulate mechanical constructions to determine damping of larger surfaces. This method describes a laboratory test procedure for measuring the mechanical properties of damped materials. A block diagram of the test system consisting of a damped material bonded to a vibrating cantilever steel bar is shown in figure 2.1. This method is useful for testing materials such as metals, enamels, ceramics, rubbers, plastics, reinforced epoxy matrices and wood. In addition to damping measurement, the test allows for the determination of the Young’s modulus E of the material. E is calculated from the resonance frequency of a given mode and from the physical constants of the bar. By associating the damping factor with the Young’s modulus, a complex quantity is defined which is called the Complex Modulus of Elasticity. Measurements of dynamic mechanical properties are also useful in the research on the molecular structure of materials.
- Full Text:
- Date Issued: 2012
An integrated management system for quality and information security in healthcare
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control.
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9745 , http://hdl.handle.net/10948/d1006670 , Health services administration -- Quality control.
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control.
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9745 , http://hdl.handle.net/10948/d1006670 , Health services administration -- Quality control.
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
An integrated management system for quality and information security in healthcare
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
Asset management plan for Coega Development Corporation
- Authors: Vabaza, Zolisa
- Date: 2012
- Subjects: Production management , Product life cycle
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9682 , http://hdl.handle.net/10948/2113 , Production management , Product life cycle
- Description: Asset Management, which evolved from maintenance management, is a set of processes, tools and measures that provide a shared understanding of an organisation’s physical assets. The process of asset management involves creation of a register of assets and recording of details of planned work. It also covers scheduling and recording of work done in order to create financial and technical history of assets. The life cycle of an asset consists of the acquisition operation, maintenance and disposal phases. These four aspects of an asset’s life represent the high level framework for asset management. This framework is crucial in development of asset management plans. The plan in turn, creates a road map for asset management excellence. By optimising the performance of asset management practices and processes a positive contribution can be made to the profitability of an organisation. The objective of this study was to develop a plan for the Coega Development Corporation (CDC) that would assist in management, maintenance, tracking and replacement of assets. The research primarily focused on the asset management requirements within the organizational context. The methodology employed in the study included a review of the relevant literature and case study conducted at CDC. The case study approach was very appropriate as it dealt with the current situation at CDC. Primary data was collected through interviews. Secondary data was collected from books, journals and other sources. Data was collected in words instead of numbers. The findings show that the CDC does not have an Asset Management Plan which results into the lack of information in the current asset register, a lack of specialist information systems, a lack of resources and an absence of a planning function in the skills sets of various units within the organisation. The Asset Register should work as a basic system for management of assets. The findings show that asset management can be used to comprehensively address the relevant elements of the organisations’ assets framework.
- Full Text:
- Date Issued: 2012
- Authors: Vabaza, Zolisa
- Date: 2012
- Subjects: Production management , Product life cycle
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9682 , http://hdl.handle.net/10948/2113 , Production management , Product life cycle
- Description: Asset Management, which evolved from maintenance management, is a set of processes, tools and measures that provide a shared understanding of an organisation’s physical assets. The process of asset management involves creation of a register of assets and recording of details of planned work. It also covers scheduling and recording of work done in order to create financial and technical history of assets. The life cycle of an asset consists of the acquisition operation, maintenance and disposal phases. These four aspects of an asset’s life represent the high level framework for asset management. This framework is crucial in development of asset management plans. The plan in turn, creates a road map for asset management excellence. By optimising the performance of asset management practices and processes a positive contribution can be made to the profitability of an organisation. The objective of this study was to develop a plan for the Coega Development Corporation (CDC) that would assist in management, maintenance, tracking and replacement of assets. The research primarily focused on the asset management requirements within the organizational context. The methodology employed in the study included a review of the relevant literature and case study conducted at CDC. The case study approach was very appropriate as it dealt with the current situation at CDC. Primary data was collected through interviews. Secondary data was collected from books, journals and other sources. Data was collected in words instead of numbers. The findings show that the CDC does not have an Asset Management Plan which results into the lack of information in the current asset register, a lack of specialist information systems, a lack of resources and an absence of a planning function in the skills sets of various units within the organisation. The Asset Register should work as a basic system for management of assets. The findings show that asset management can be used to comprehensively address the relevant elements of the organisations’ assets framework.
- Full Text:
- Date Issued: 2012
Characterising the stress-life response of mechanical and laser formed titanium components
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
Characterising the stress-life response of mechanical formed AISI-1008 steel plate components
- Authors: Müller, Ruan
- Date: 2012
- Subjects: Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9616 , http://hdl.handle.net/10948/d1008102 , Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Description: The main purpose of this research project was to determine the fatigue-life behaviour of AISI 1008 sheet steel which has been mechanically formed to a radius of curvature of 120mm and then to correlate the fatigue-life behaviour to that of the parent or “as manufactured” material. During the forming process it was felt important to induce plastic strain through stretch-bending by clamping the sides of a plate sample’s (width) edges in the bending fixture before being bent by a single acting mechanical press. It was determined through actual testing that there was a decrease in fatigue-life when the mechanical formed data was compared to fatigue data of the parent material. Standard fatigue mathematical models were used to relate the actual fatigue data. Due to the material being cold formed to a radius of curvature of 120mm, residual stresses induced during the forming process played an essential role during the fatigue-life prediction calculations. The maximum relieved stress in the parent material was compressive in nature having a magnitude of 11percent of the “as manufactured” yield strength (265 MPa). For the mechanical formed material compressive residual stresses were measured on the outer surface while tensile stresses were measured on the inner surface. The difference between actual number of cycles to failure to that calculated using the standard mathematical models for the parent material, ranged between 48 percent and 18 percent and for the mechanical formed samples between 35 percent and 1percent, depending on the strain amplitude used. An important aspect of this study was to determine the criteria required for mathematical modelling of the parent material as testing occurred between the limit of proportionality and yield point. Although this aspect requires further investigation the mathematical results obtained during this study were considered to be acceptable.
- Full Text:
- Date Issued: 2012
- Authors: Müller, Ruan
- Date: 2012
- Subjects: Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9616 , http://hdl.handle.net/10948/d1008102 , Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Description: The main purpose of this research project was to determine the fatigue-life behaviour of AISI 1008 sheet steel which has been mechanically formed to a radius of curvature of 120mm and then to correlate the fatigue-life behaviour to that of the parent or “as manufactured” material. During the forming process it was felt important to induce plastic strain through stretch-bending by clamping the sides of a plate sample’s (width) edges in the bending fixture before being bent by a single acting mechanical press. It was determined through actual testing that there was a decrease in fatigue-life when the mechanical formed data was compared to fatigue data of the parent material. Standard fatigue mathematical models were used to relate the actual fatigue data. Due to the material being cold formed to a radius of curvature of 120mm, residual stresses induced during the forming process played an essential role during the fatigue-life prediction calculations. The maximum relieved stress in the parent material was compressive in nature having a magnitude of 11percent of the “as manufactured” yield strength (265 MPa). For the mechanical formed material compressive residual stresses were measured on the outer surface while tensile stresses were measured on the inner surface. The difference between actual number of cycles to failure to that calculated using the standard mathematical models for the parent material, ranged between 48 percent and 18 percent and for the mechanical formed samples between 35 percent and 1percent, depending on the strain amplitude used. An important aspect of this study was to determine the criteria required for mathematical modelling of the parent material as testing occurred between the limit of proportionality and yield point. Although this aspect requires further investigation the mathematical results obtained during this study were considered to be acceptable.
- Full Text:
- Date Issued: 2012
Characterising the structural integrity of mechanical formed low carbon steel
- Authors: Victor, Ngea Njoume
- Date: 2012
- Subjects: Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9627 , http://hdl.handle.net/10948/d1012089 , Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Description: The contribution of the clamping force in the technique used in this study to stretch-bend low carbon steel samples was investigated to support the subsequent changes in the microstructure and properties of the formed material with regard to parent material. Although plastic deformation by cold working is known to induce texture or preferred orientation to the grains of a formed material while decreasing its ductility and increasing the strength, as well as inducing residual stress, it is not known how the different directions (rolling, transverse and oblique/45°) of the sheet steel will respond to this stretch bending technique. The first part of the research work involved a thorough literature review on sheet metal forming processes and their effect on the formed material with interest on the above mentioned directions of the sheet. It became clear from the literature overview that cold working of a material will induce strain-hardening which varies with the magnitude of cold work, resulting in changes in the strength and ductility of the material. Besides, when plastic deformation is not uniform (e.g., tensile and compressive) throughout the entire cross section of the formed part, residual stresses remain in the material with the grains been elongated along the direction of the maximum strain. The main parameters that were considered and controlled in this study are as follows: strain experienced / stress induced into the form sample, the sample direction, the stroke length and the clamping torque, the generated radius of curvature. The chapters that follow the literature review, deal with the set-up of the different equipment used in this study, the specimen preparation as well as the recording, the calculation and interpretation of the results. It was found that the stress magnitude that generated the different radii of curvature (120 mm, 150 mm and 185 mm) was between 1 percent & 13 percent higher than the parent material’s yield strength with the lower stress been associated to the smaller radius of curvature and the higher stress to the higher radius. The stress induced into the sample during forming was not only proportional to the stroke length but also to the distance between the punch’s tip and the sample and the sample to the die’s nadir. The clamping torque adopted was restricted to the manual capacity of the operator who used a preset torque wrench to fasten the plate sample into the jig. Plate samples of low carbon steel were cut to angles of 0°, 45°, and 90° to the rolling direction of the sheet material and stretch-bent on a single-action mechanical press to 120 mm, 150 mm, and 185 mm radii of curvature. The preliminary results indicate that stretch-bent samples had increased hardness to the parent plate, in particular below the surface layers up to around 1.1 mm depth. Since there is a well established relationship between hardness, yield and tensile strengths for steel, the yield and tensile strengths of the formed material were estimated using the Nobre et al [34] incremental relation, which relates the linearity between relative increments of hardness and yield strength. Changes were not noticeable at the microstructural level of the formed samples. Meanwhile, samples from which higher plastic deformation stress values were calculated were not those absorbing higher impact energy when Charpy specimen cut from plate and stretch-bent samples were tested. The maximum relieved residual stress in the parent material was predominantly compressive and represents in magnitude approximately 12 percent (average for the three directions) of its original yield strength. In the stretch-bent samples, the relieved residual stress was compressive in the outer curved section with a magnitude about 50 percent of the parent material yield strength and tensile in the inner curved section with a magnitude approximately 25 percent of the parent material yield strength.
- Full Text:
- Date Issued: 2012
- Authors: Victor, Ngea Njoume
- Date: 2012
- Subjects: Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9627 , http://hdl.handle.net/10948/d1012089 , Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Description: The contribution of the clamping force in the technique used in this study to stretch-bend low carbon steel samples was investigated to support the subsequent changes in the microstructure and properties of the formed material with regard to parent material. Although plastic deformation by cold working is known to induce texture or preferred orientation to the grains of a formed material while decreasing its ductility and increasing the strength, as well as inducing residual stress, it is not known how the different directions (rolling, transverse and oblique/45°) of the sheet steel will respond to this stretch bending technique. The first part of the research work involved a thorough literature review on sheet metal forming processes and their effect on the formed material with interest on the above mentioned directions of the sheet. It became clear from the literature overview that cold working of a material will induce strain-hardening which varies with the magnitude of cold work, resulting in changes in the strength and ductility of the material. Besides, when plastic deformation is not uniform (e.g., tensile and compressive) throughout the entire cross section of the formed part, residual stresses remain in the material with the grains been elongated along the direction of the maximum strain. The main parameters that were considered and controlled in this study are as follows: strain experienced / stress induced into the form sample, the sample direction, the stroke length and the clamping torque, the generated radius of curvature. The chapters that follow the literature review, deal with the set-up of the different equipment used in this study, the specimen preparation as well as the recording, the calculation and interpretation of the results. It was found that the stress magnitude that generated the different radii of curvature (120 mm, 150 mm and 185 mm) was between 1 percent & 13 percent higher than the parent material’s yield strength with the lower stress been associated to the smaller radius of curvature and the higher stress to the higher radius. The stress induced into the sample during forming was not only proportional to the stroke length but also to the distance between the punch’s tip and the sample and the sample to the die’s nadir. The clamping torque adopted was restricted to the manual capacity of the operator who used a preset torque wrench to fasten the plate sample into the jig. Plate samples of low carbon steel were cut to angles of 0°, 45°, and 90° to the rolling direction of the sheet material and stretch-bent on a single-action mechanical press to 120 mm, 150 mm, and 185 mm radii of curvature. The preliminary results indicate that stretch-bent samples had increased hardness to the parent plate, in particular below the surface layers up to around 1.1 mm depth. Since there is a well established relationship between hardness, yield and tensile strengths for steel, the yield and tensile strengths of the formed material were estimated using the Nobre et al [34] incremental relation, which relates the linearity between relative increments of hardness and yield strength. Changes were not noticeable at the microstructural level of the formed samples. Meanwhile, samples from which higher plastic deformation stress values were calculated were not those absorbing higher impact energy when Charpy specimen cut from plate and stretch-bent samples were tested. The maximum relieved residual stress in the parent material was predominantly compressive and represents in magnitude approximately 12 percent (average for the three directions) of its original yield strength. In the stretch-bent samples, the relieved residual stress was compressive in the outer curved section with a magnitude about 50 percent of the parent material yield strength and tensile in the inner curved section with a magnitude approximately 25 percent of the parent material yield strength.
- Full Text:
- Date Issued: 2012
Defect in the South African construction industry
- Authors: Le Roux, Martyn
- Date: 2012
- Subjects: Construction industry -- South Africa , Buildings -- Defects -- South Africa , Quality assurance -- Standards -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9711 , http://hdl.handle.net/10948/d1020320
- Description: Lack of quality in the South African construction industry is causing various problems for different stakeholders. The causes of this lack in quality are due to various different attributes. Corruption has become one of the leading causes with regards to lack of quality. Quality assurance can mitigate or eliminate defects through the implementation of a quality management system. Defects manifest primarily through cracking, dampness, detachment, and water leaks. Defects are categorized as structural, subsidence, acoustic and thermal. In terms of time, defects are either patent or latent, and can be discovered through observation, inspection and various tests. The causes of defects are ultimately due to error or omission, either during design or during the construction phases. Defects may also result due to procurement related factors, such as appointment of incompetent contractors. The result of defects is customer dissatisfaction, rework and disputes. Non-conformance to requirements results in rework and this in turn contributes to time and cost overruns. The aim of this research was to investigate the greatest cause that leads to defects in houses; the most common type of defect; and why projects fail in term of project management terms (due to defects). Results of quantitative research amongst professionals within the construction industry in the Western and Eastern Cape of South Africa as well as literature that has been reviewed form the basis of this study. Architectural practices, consulting engineering practices, and general building contractors were selected on a random sample basis, and surveyed using an online questionnaire. The study revealed that inadequate artisan skills is the biggest cause leading to defects in houses, and that cracks are the most frequent type of defect occurring. Projects fail in project management terms because of defects as the construction time of the projects are increased. The study revealed that construction related causes of defects dominate over design related causes. This study should be of value to both construction industry professionals as well as their clients.
- Full Text:
- Date Issued: 2012
- Authors: Le Roux, Martyn
- Date: 2012
- Subjects: Construction industry -- South Africa , Buildings -- Defects -- South Africa , Quality assurance -- Standards -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9711 , http://hdl.handle.net/10948/d1020320
- Description: Lack of quality in the South African construction industry is causing various problems for different stakeholders. The causes of this lack in quality are due to various different attributes. Corruption has become one of the leading causes with regards to lack of quality. Quality assurance can mitigate or eliminate defects through the implementation of a quality management system. Defects manifest primarily through cracking, dampness, detachment, and water leaks. Defects are categorized as structural, subsidence, acoustic and thermal. In terms of time, defects are either patent or latent, and can be discovered through observation, inspection and various tests. The causes of defects are ultimately due to error or omission, either during design or during the construction phases. Defects may also result due to procurement related factors, such as appointment of incompetent contractors. The result of defects is customer dissatisfaction, rework and disputes. Non-conformance to requirements results in rework and this in turn contributes to time and cost overruns. The aim of this research was to investigate the greatest cause that leads to defects in houses; the most common type of defect; and why projects fail in term of project management terms (due to defects). Results of quantitative research amongst professionals within the construction industry in the Western and Eastern Cape of South Africa as well as literature that has been reviewed form the basis of this study. Architectural practices, consulting engineering practices, and general building contractors were selected on a random sample basis, and surveyed using an online questionnaire. The study revealed that inadequate artisan skills is the biggest cause leading to defects in houses, and that cracks are the most frequent type of defect occurring. Projects fail in project management terms because of defects as the construction time of the projects are increased. The study revealed that construction related causes of defects dominate over design related causes. This study should be of value to both construction industry professionals as well as their clients.
- Full Text:
- Date Issued: 2012
Development of a navigation system for an autonomous guided vehicle using android technology
- Authors: Snyman, Christo Johannes
- Date: 2012
- Subjects: Mechatronics , Engeering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9654 , http://hdl.handle.net/10948/d1020025
- Full Text:
- Date Issued: 2012
- Authors: Snyman, Christo Johannes
- Date: 2012
- Subjects: Mechatronics , Engeering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9654 , http://hdl.handle.net/10948/d1020025
- Full Text:
- Date Issued: 2012
Electronic communication continuity planning from the perspective of an individual
- Authors: Fouché, Jacques
- Date: 2012
- Subjects: Electronic systems , Internet
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9802 , http://hdl.handle.net/10948/d1012270 , Electronic systems , Internet
- Description: It is beyond doubt that technology has changed the way people in modern society live their daily lives. While a modern society eagerly adopts new technology, the loss of the services provided by these technologies is hardly ever considered. Therefore, this research project will evaluate the importance of communication technology and how critical it is for an individual. Furthermore, this research will provide a framework to improve the availability of current communication technologies from the perspective of the individual.
- Full Text:
- Date Issued: 2012
- Authors: Fouché, Jacques
- Date: 2012
- Subjects: Electronic systems , Internet
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9802 , http://hdl.handle.net/10948/d1012270 , Electronic systems , Internet
- Description: It is beyond doubt that technology has changed the way people in modern society live their daily lives. While a modern society eagerly adopts new technology, the loss of the services provided by these technologies is hardly ever considered. Therefore, this research project will evaluate the importance of communication technology and how critical it is for an individual. Furthermore, this research will provide a framework to improve the availability of current communication technologies from the perspective of the individual.
- Full Text:
- Date Issued: 2012