"A lean-led-evaluation" of infrastructure development improvement programme in South Africa
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
A framework for assuring conformance of cloud-based email at higher education institutions
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
A framework for biometrics for social grants in South Africa
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
A framework to elicit user requirements for information systems: a localised participatory approach from Southern Africa
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
- Authors: Tyukala, Mkhululi
- Date: 2014
- Subjects: Information technology -- Africa, Southern , User-centered system design -- Africa, Southern , Management information systems -- Africa, Southern
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/4546 , vital:20615
- Description: The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
- Full Text:
- Date Issued: 2014
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A framework to evaluate user experience of end user application security features
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
- Authors: Shava, Fungai Bhunu
- Date: 2016
- Subjects: User interfaces (Computer systems) -- Design Web sites -- Design
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12951 , vital:27137
- Description: The use of technology in society moved from satisfying the technical needs of users to giving a lasting user experience while interacting with the technology. The continuous technological advancements have led to a diversity of emerging security concerns. It is necessary to balance security issues with user interaction. As such, designers have adapted to this reality by practising user centred design during product development to cater for the experiential needs of user - product interaction. These User Centred Design best practices and standards ensure that security features are incorporated within End User Programs (EUP). The primary function of EUP is not security, and interaction with security features while performing a program related task does present the end user with an extra burden. Evaluation mechanisms exist to enumerate the performance of the EUP and the user’s experience of the product interaction. Security evaluation standards focus on the program code security as well as on security functionalities of programs designed for security. However, little attention has been paid to evaluating user experience of functionalities offered by embedded security features. A qualitative case study research using problem based and design science research approaches was used to address the lack of criteria to evaluate user experience with embedded security features. User study findings reflect poor user experience with EUP security features, mainly as a result of low awareness of their existence, their location and sometimes even of their importance. From the literature review of the information security and user experience domains and the user study survey findings, four components of the framework were identified, namely: end user characteristics, information security, user experience and end user program security features characteristics. This thesis focuses on developing a framework that can be used to evaluate the user experience of interacting with end user program security features. The framework was designed following the design science research method and was reviewed by peers and experts for its suitability to address the problem. Subject experts in the fields of information security and human computer interaction were engaged, as the research is multidisciplinary. This thesis contributes to the body of knowledge on information security and on user experience elements of human computer interaction security regarding how to evaluate user experience of embedded InfoSec features. The research adds uniquely to the literature in the area of Human Computer Interaction Security evaluation and measurement in general, and is specific to end user program security features. The proposed metrics for evaluating UX of interacting with EUP security features were used to propose intervention to influence UX in an academic setup. The framework, besides presenting UX evaluation strategies for EUP security features, also presents a platform for further academic research on human factors of information security. The impact can be evaluated by assessing security behaviour, and successful security breaches, as well as user experience of interaction with end user programs.
- Full Text:
- Date Issued: 2016
A mathematics rendering model to support chat-based tutoring
- Authors: Haskins, Bertram Peter
- Date: 2014
- Subjects: Intelligent tutoring systems , Educational innovations , Tutors and tutoring
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9822 , http://hdl.handle.net/10948/d1020567
- Description: Dr Math is a math tutoring service implemented on the chat application Mxit. The service allows school learners to use their mobile phones to discuss mathematicsrelated topics with human tutors. Using the broad user-base provided by Mxit, the Dr Math service has grown to consist of tens of thousands of registered school learners. The tutors on the service are all volunteers and the learners far outnumber the available tutors at any given time. School learners on the service use a shorthand language-form called microtext, to phrase their queries. Microtext is an informal form of language which consists of a variety of misspellings and symbolic representations, which emerge spontaneously as a result of the idiosyncrasies of a learner. The specific form of microtext found on the Dr Math service contains mathematical questions and example equations, pertaining to the tutoring process. Deciphering the queries, to discover their embedded mathematical content, slows down the tutoring process. This wastes time that could have been spent addressing more learner queries. The microtext language thus creates an unnecessary burden on the tutors. This study describes the development of an automated process for the translation of Dr Math microtext queries into mathematical equations. Using the design science research paradigm as a guide, three artefacts are developed. These artefacts take the form of a construct, a model and an instantiation. The construct represents the creation of new knowledge as it provides greater insight into the contents and structure of the language found on a mobile mathematics tutoring service. The construct serves as the basis for the creation of a model for the translation of microtext queries into mathematical equations, formatted for display in an electronic medium. No such technique currently exists and therefore, the model contributes new knowledge. To validate the model, an instantiation was created to serve as a proof-of-concept. The instantiation applies various concepts and techniques, such as those related to natural language processing, to the learner queries on the Dr Math service. These techniques are employed in order to translate an input microtext statement into a mathematical equation, structured by using mark-up language. The creation of the instantiation thus constitutes a knowledge contribution, as most of these techniques have never been applied to the problem of translating microtext into mathematical equations. For the automated process to have utility, it should perform on a level comparable to that of a human performing a similar translation task. To determine how closely related the results from the automated process are to those of a human, three human participants were asked to perform coding and translation tasks. The results of the human participants were compared to the results of the automated process, across a variety of metrics, including agreement, correlation, precision, recall and others. The results from the human participants served as the baseline values for comparison. The baseline results from the human participants were compared with those of the automated process. Krippendorff’s α was used to determine the level of agreement and Pearson’s correlation coefficient to determine the level of correlation between the results. The agreement between the human participants and the automated process was calculated at a level deemed satisfactory for exploratory research and the level of correlation was calculated as moderate. These values correspond with the calculations made as the human baseline. Furthermore, the automated process was able to meet or improve on all of the human baseline metrics. These results serve to validate that the automated process is able to perform the translation at a level comparable to that of a human. The automated process is available for integration into any requesting application, by means of a publicly accessible web service.
- Full Text:
- Date Issued: 2014
- Authors: Haskins, Bertram Peter
- Date: 2014
- Subjects: Intelligent tutoring systems , Educational innovations , Tutors and tutoring
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9822 , http://hdl.handle.net/10948/d1020567
- Description: Dr Math is a math tutoring service implemented on the chat application Mxit. The service allows school learners to use their mobile phones to discuss mathematicsrelated topics with human tutors. Using the broad user-base provided by Mxit, the Dr Math service has grown to consist of tens of thousands of registered school learners. The tutors on the service are all volunteers and the learners far outnumber the available tutors at any given time. School learners on the service use a shorthand language-form called microtext, to phrase their queries. Microtext is an informal form of language which consists of a variety of misspellings and symbolic representations, which emerge spontaneously as a result of the idiosyncrasies of a learner. The specific form of microtext found on the Dr Math service contains mathematical questions and example equations, pertaining to the tutoring process. Deciphering the queries, to discover their embedded mathematical content, slows down the tutoring process. This wastes time that could have been spent addressing more learner queries. The microtext language thus creates an unnecessary burden on the tutors. This study describes the development of an automated process for the translation of Dr Math microtext queries into mathematical equations. Using the design science research paradigm as a guide, three artefacts are developed. These artefacts take the form of a construct, a model and an instantiation. The construct represents the creation of new knowledge as it provides greater insight into the contents and structure of the language found on a mobile mathematics tutoring service. The construct serves as the basis for the creation of a model for the translation of microtext queries into mathematical equations, formatted for display in an electronic medium. No such technique currently exists and therefore, the model contributes new knowledge. To validate the model, an instantiation was created to serve as a proof-of-concept. The instantiation applies various concepts and techniques, such as those related to natural language processing, to the learner queries on the Dr Math service. These techniques are employed in order to translate an input microtext statement into a mathematical equation, structured by using mark-up language. The creation of the instantiation thus constitutes a knowledge contribution, as most of these techniques have never been applied to the problem of translating microtext into mathematical equations. For the automated process to have utility, it should perform on a level comparable to that of a human performing a similar translation task. To determine how closely related the results from the automated process are to those of a human, three human participants were asked to perform coding and translation tasks. The results of the human participants were compared to the results of the automated process, across a variety of metrics, including agreement, correlation, precision, recall and others. The results from the human participants served as the baseline values for comparison. The baseline results from the human participants were compared with those of the automated process. Krippendorff’s α was used to determine the level of agreement and Pearson’s correlation coefficient to determine the level of correlation between the results. The agreement between the human participants and the automated process was calculated at a level deemed satisfactory for exploratory research and the level of correlation was calculated as moderate. These values correspond with the calculations made as the human baseline. Furthermore, the automated process was able to meet or improve on all of the human baseline metrics. These results serve to validate that the automated process is able to perform the translation at a level comparable to that of a human. The automated process is available for integration into any requesting application, by means of a publicly accessible web service.
- Full Text:
- Date Issued: 2014
A model for automated topic spotting in a mobile chat based mathematics tutoring environment
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
- Authors: Butgereit, Laura Lee
- Date: 2012
- Subjects: Mobile communication systems in education , Mathematics -- Study and teaching , Tutors and tutoring -- Mathematics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9809 , http://hdl.handle.net/10948/d1013741
- Description: Systems of writing have existed for thousands of years. The history of civilisation and the history of writing are so intertwined that it is hard to separate the one from the other. These systems of writing, however, are not static. They change. One of the latest developments in systems of writing is short electronic messages such as seen on Twitter and in MXit. One novel application which uses these short electronic messages is the Dr Math® project. Dr Math is a mobile online tutoring system where pupils can use MXit on their cell phones and receive help with their mathematics homework from volunteer tutors around the world. These conversations between pupils and tutors are held in MXit lingo or MXit language – this cryptic, abbreviated system 0f ryting w1ch l0ks lyk dis. Project μ (pronounced mu and indicating MXit Understander) investigated how topics could be determined in MXit lingo and Project μ's research outputs spot mathematics topics in conversations between Dr Math tutors and pupils. Once the topics are determined, supporting documentation can be presented to the tutors to assist them in helping pupils with their mathematics homework. Project μ made the following contributions to new knowledge: a statistical and linguistic analysis of MXit lingo provides letter frequencies, word frequencies, message length statistics as well as linguistic bases for new spelling conventions seen in MXit based conversations; a post-stemmer for use with MXit lingo removes suffixes from the ends of words taking into account MXit spelling conventions allowing words such as equashun and equation to be reduced to the same root stem; a list of over ten thousand stop words for MXit lingo appropriate for the domain of mathematics; a misspelling corrector for MXit lingo which corrects words such as acount and equates it to account; and a model for spotting mathematical topics in MXit lingo. The model was instantiated and integrated into the Dr Math tutoring platform. Empirical evidence as to the effectiveness of the μ Topic Spotter and the other contributions is also presented. The empirical evidence includes specific statistical tests with MXit lingo, specific tests of the misspelling corrector, stemmer, and feedback mechanism, and an extensive exercise of content analysis with respect to mathematics topics.
- Full Text:
- Date Issued: 2012
A model for managing user experience
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
A model for privacy-aware presence management in mobile communications
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
A national strategy towards cultivating a cybersecurity culture in South Africa
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
- Authors: Gcaza, Noluxolo
- Date: 2017
- Subjects: Computer networks -- Security measures , Cyberspace -- Security measures Computer security -- South Africa Subculture -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/13735 , vital:27303
- Description: In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study sought firstly to confirm from the existing body of knowledge that cybersecurity culture is indeed ill-defined and, secondly, to delineate what constitutes a national cybersecurity culture. Finally, and primarily, it sought to devise a national strategy that would assist SA in fulfilling its objective of cultivating a culture of cybersecurity on a national level.
- Full Text:
- Date Issued: 2017
A systems approach to project implementation within the public sector towards formulating a framework for project evaluation
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
- Authors: Greyling, Een Lange
- Date: 2012
- Subjects: Project management -- South Africa , Corporations, Government -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9721 , http://hdl.handle.net/10948/d1021223
- Description: The procurement process, from the demand formulation to the final delivery of a public building to the end-user, is defined by the government in terms of procedures and policies to be followed, which is based to be ineffective and inefficient where the process as a whole from a client-value perpective, is flawed. Presently, the National Department of Public Works(NDPW) as a governmental administration is deemed to be a controlling institution and cost centre rather than a service provider. This mind-set is reflected by the inability of government project implementing agencies such as the NDPW to deliver projects successfully in terms of cost, time, and quality whilst failing to meet the government's socio economic objectives to create employment opportunities, stimulate economic growth, and transfer skills to the previously disadvantaged through black economic empowerment (BEE) initiatives. Client satisfaction has widely been recognised by researchers as one of the key challenges for quality improvement in the construction industry. It is a vital factor in the development and management of the construction process, as well in the creation of efficient organisation-client relationship. In addition, client satisfaction is deemed to be a catalyst for client retention which is a success strategy for any organisation. This thesis is primarily concerned with project performance and service delivery by the NDPW as a government project implementing agency that involves an integrated approach that considers the entire supply chain of a construction project. The success or failure of a project is is not the effect of a single variable, or factor, but a set of variables interacting with each other to produce the final result. An extensive review of related literature that entails the analysis of publications related to the projectimplementation and construction project management realm was deemed necessary to formulate a clear understanding of the complexities of implementing projjects within the public sector. The use of systems thinking as the nucleus of the multi-methodological approach to this research was to assist in ascertaining the primary causes of the problem situation and to clarify the process of project implementation as a sub-system within the greater system of the construction industry. The success of projects depends as much on the client as it does on the implementing agencies, project managers (PMs), consultants, contractors and the suppliers of materials.
- Full Text:
- Date Issued: 2012
A value framework for information and communication technology governance in South African higher education institutions
- Authors: Johl, Christian Peter
- Date: 2013
- Subjects: Information technology -- South Africa -- Management , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9821 , http://hdl.handle.net/10948/d1020281
- Description: The public higher education sector in South Africa is governed by an act of Parliament which defines the governance organs and mechanisms required within institutions and the sector. This doctoral thesis begins by contextualising ICT governance within the levels of systemic governance in South Africa that have relevance to this study. It then continues by advancing the understanding of the state of Information and Communication Technology (ICT) governance in public higher education institutions in South Africa by investigating the level of pervasiveness, the level of ICT process maturity and the alignment of ICT to the institutional processes within these institutions. Subsequently, this thesis results in the production of a contextually appropriate value framework that contributes towards an understanding of the need for the improvement of ICT governance. A survey of the extant literature on governance, ICT governance, and the frameworks and standards associated with governance indicates that the methodological approach currently favoured in ICT governance research is predominantly interpretive and based on surveys and interviews. This study leans towards a Design Science approach paradigm using surveys for the qualitative data collection process. The empirical research data was gathered from the highest ranking ICT officers at public higher education institutions in South Africa. This study makes contributions on a number of levels – from the first known measurement of ICT pervasiveness within the context of higher education, to the measurement of ICT process maturity and the measurement of the alignment of ICT and institutional processes, to the design of a value framework that breaks down governance into layers indicating which governance organs are appropriate at the relevant layers and which governance mechanisms can be used to address governance at each layer of governance. This study therefore makes a contribution to the ICT domain for development research by demonstrating praxis for the improvement of ICT governance implementation in the public higher education sector in South Africa. This study makes both method design and practical contributions to the ICT body of knowledge at various stages of the research process. These contributions include reflection on and analysis of the data gathering approaches that occur within the public higher education sector and in the complex environment of institutional autonomy and academic freedom; the use of Agency Theory to support the ‗governance intent‘ transfer between the layers of governance in the value framework and the synthesis of the improvement of ICT governance with value creation. The findings of this study further contribute to an understanding of the dynamics and interrelatedness of aspects of governance and management, while making a contribution to theoretical research by extending practical and empirical understanding of the ICT governance environment in the public higher education sector in South Africa.
- Full Text:
- Date Issued: 2013
- Authors: Johl, Christian Peter
- Date: 2013
- Subjects: Information technology -- South Africa -- Management , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9821 , http://hdl.handle.net/10948/d1020281
- Description: The public higher education sector in South Africa is governed by an act of Parliament which defines the governance organs and mechanisms required within institutions and the sector. This doctoral thesis begins by contextualising ICT governance within the levels of systemic governance in South Africa that have relevance to this study. It then continues by advancing the understanding of the state of Information and Communication Technology (ICT) governance in public higher education institutions in South Africa by investigating the level of pervasiveness, the level of ICT process maturity and the alignment of ICT to the institutional processes within these institutions. Subsequently, this thesis results in the production of a contextually appropriate value framework that contributes towards an understanding of the need for the improvement of ICT governance. A survey of the extant literature on governance, ICT governance, and the frameworks and standards associated with governance indicates that the methodological approach currently favoured in ICT governance research is predominantly interpretive and based on surveys and interviews. This study leans towards a Design Science approach paradigm using surveys for the qualitative data collection process. The empirical research data was gathered from the highest ranking ICT officers at public higher education institutions in South Africa. This study makes contributions on a number of levels – from the first known measurement of ICT pervasiveness within the context of higher education, to the measurement of ICT process maturity and the measurement of the alignment of ICT and institutional processes, to the design of a value framework that breaks down governance into layers indicating which governance organs are appropriate at the relevant layers and which governance mechanisms can be used to address governance at each layer of governance. This study therefore makes a contribution to the ICT domain for development research by demonstrating praxis for the improvement of ICT governance implementation in the public higher education sector in South Africa. This study makes both method design and practical contributions to the ICT body of knowledge at various stages of the research process. These contributions include reflection on and analysis of the data gathering approaches that occur within the public higher education sector and in the complex environment of institutional autonomy and academic freedom; the use of Agency Theory to support the ‗governance intent‘ transfer between the layers of governance in the value framework and the synthesis of the improvement of ICT governance with value creation. The findings of this study further contribute to an understanding of the dynamics and interrelatedness of aspects of governance and management, while making a contribution to theoretical research by extending practical and empirical understanding of the ICT governance environment in the public higher education sector in South Africa.
- Full Text:
- Date Issued: 2013
An ICT strategy to support a patient-centred approach to diabetes care
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
- Authors: Petratos, Anastasia
- Date: 2017
- Subjects: Medical care -- Technological innovations -- Developing countries Health services administration -- Developing countries -- Data processing , Telecommunication in medicine Diabetes -- Treatment
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/14466 , vital:27650
- Description: Factors such as poverty, ethnicity, socio-economic status, poor infrastructure and governance, etc., are some of the reasons that effective and proven prevention and treatment interventions for most of the major causes of mortality and morbidity in the developing world continue to fail. Chronic diseases require complex interventions that these countries simply cannot maintain. Diabetes mellitus (DM) is a chronic disease that is on the rise worldwide. This disease is a lifestyle disease, which means, that it is brought on by poor health habits. Statistics show that 285 million (6.4%) people aged between 20 and 79 years will be affected by Diabetes in 2010 and a staggering 439 million (7.7%) by 2030. This is a projected growth of 69% in developing countries and 20% in developed countries. The findings from studies conducted from 1993 to 2003 in Sub-Saharan Africa, particularly in South Africa, around the health care services for diabetes highlights many challenges. Sadly, the challenges 10 years after that study, are very similar. The conditions of people with Diabetes can be improved through regular monitoring of patients, improvement and monitoring of health care provided, education on healthy lifestyle, as well as education on the importance of adherence to treatment plans for the successful management of the condition. The diabetes endemic in South Africa is exacerbated by the manual functions that are performed in all aspects of monitoring and management of the disease. With the advancements that have been made in ICT and the many apps that already exist for healthcare, it is sensible to state that ICT can assist in the monitoring and management of diabetes. Another factor that is considered is that of patient-centred care. The huge number of people who need acute care and treatment in hospitals and clinics have forced a previously caring environment, to turn into a cold, almost production line affair. The sick wait in long queues and are ushered in and out of the consulting rooms as fast as possible without even as much as a “hallo”. This has left a void in the healthcare delivery to South Africans which should never have been removed in the first place, namely patient-centred care. This means that the patient is at the centre of the treatment and fully involved in the decisions about his/her health. Every patient deserves to be recognised as a human-being and treated with dignity and respect. Treatment plans for long term chronic care patients such as diabetics, should be thoroughly discussed with the patient and they should believe and comit themselves to the treatment plan. These plans are life-long and require dedication and as it is vital that patients are part of decision making and understand fully what they are expected to do. Bearing this in mind, this study has investigated the needs and care plans for people with diabetes. Specialist in the field of diabetes were interviewed and recognised care plans for diabetes such as those from WHO, IDF and SEMSDA were studied. This study also established, that by practising a patient-centred approach the adherence to a treatment plan is likely to be higher. The strategy developed involves the person with diabetes, the healthcare worker and the support structure in the care plan of the diabetic. The use of ICT as part of the solution must consider the patient-centred requirements for using IT so that the people using the strategy are comfortable and not intimidated by the technology. The need to incorporate e-health into governments’ healthcare plans has been growing over the last decade. The GSMA conducted research into mobile health opportunities in South Africa and found that SA now has a penetration of 98% and that this is the ideal medium to address the inaccessibility and inequality of healthcare in SA. The causes identified as playing a major role in the rise in diabetes were identified and it was determined that through the implementation of an ICT strategy for diabetes care, many of these can be addressed. These include the use of technology for, improved monitoring and management, increased diabetes awareness and education, and promotion of healthy lifestyle. The study focuses on the self-management aspect of diabetes and produces a strategy that incorporates various ICT solutions that would assist in the daily aspects of diabetes care, as well as follow a patient-centred approach to diabetes care. This strategy developed in this study does not need any intervention from government as it is driven by the people who have diabetes and their healthcare workers, with the aid of the technology that they currently have on hand.
- Full Text:
- Date Issued: 2017
An incentive motivational approach to enhance successful delivery of construction projects
- Authors: Ndihokubwayo, Ruben
- Date: 2014
- Subjects: Employee motivation , Construction industry -- Management , Project management , Construction industry -- Public relations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9727 , http://hdl.handle.net/10948/d1020649
- Description: The South African construction industry is faced with challenges which impede on successful project delivery. While incentives have been recognised as motivational tools for individual employees to achieve certain goals, the South African construction industry has not fully exploited the various avenues to initiate motivational approaches aligned with project objectives to enhance successful delivery of construction projects. This study is therefore aimed at exploring which monetary and non-monetary incentives would compel construction and consultant team members to improve successful project delivery. The study adopted a deductive approach whereby hypotheses were formulated based on motivation theories and applied them in construction project team situations. In this regard, the extensive literature related to motivation theories such as the hierarchy of needs, incentives, organisational commitment, and teamwork environment were reviewed. A web survey was adopted for the empirical data gathering by means of a questionnaire e-mailed to nationwide selected construction and consultant firms. Data analysis was done by means of ranking, paired sample test, T-Test, ANOVA test, Mann- Whitney, Kruskal-Wallis test of association, and the Principal Component Analysis (PCA). The reliability test was done using Cronbach’s alpha coefficient of reliability. In total, 164 respondents participated in the study. It was revealed that there was a statistically significant difference between mean rankings of motivational factors, and organisational commitment was perceived as the most important motivational factor that compelled construction and consultant team members to achieve project success. There was no statistically significant difference between various demographics (gender, qualification, and experience) pertaining to self-development needs, organisational commitment, and teamwork environment motivational factors, except age groups, which displayed a statistically significant difference in self-development needs and teamwork environment. There was a statistically significant difference between mean rankings of monetary and non-monetary incentives, and non-monetary incentives were preferred to monetary incentives in achieving higher performance. There was no statistically significant difference between various demographics (gender, age, qualification, and experience in the construction industry) of construction and consultant team members pertaining to monetary and non-monetary incentives. There was no statistically significant difference between mean rankings of primary project objectives aligned with monetary incentives, where time was perceived as the most important. There was no statistically significant difference between various demographics (gender, qualification, and experience in the construction industry) of construction and consultant team members pertaining to project objectives aligned with incentives, except age groups which displayed a statistically significant difference in project objectives aligned with monetary and non-monetary incentives. Two models have been developed based on the PCA results of project objectives aligned with monetary and non-monetary incentives. Each model consisted of four parts, namely project objectives, demographic information, short-run project-based interventions, and long-run interventions. The PCA results showed monetary incentives could be a useful project-based intervention mechanism in the short-run to achieve secondary project objectives, such as the provision of work opportunities to SMMEs. In the long-run, this confirms the usefulness of the CIDB initiative consisting of the provision of work opportunities to SMMEs through the National Contractor Development Programme (NCDP) guidelines. The PCA results showed non-monetary incentives could be a useful project-based intervention mechanism in the short-run to achieve primary project objectives, such as quality. In the long-run, a continuous improvement mechanism by various construction industry stakeholders is deemed necessary to maintain project delivery standards.
- Full Text:
- Date Issued: 2014
- Authors: Ndihokubwayo, Ruben
- Date: 2014
- Subjects: Employee motivation , Construction industry -- Management , Project management , Construction industry -- Public relations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9727 , http://hdl.handle.net/10948/d1020649
- Description: The South African construction industry is faced with challenges which impede on successful project delivery. While incentives have been recognised as motivational tools for individual employees to achieve certain goals, the South African construction industry has not fully exploited the various avenues to initiate motivational approaches aligned with project objectives to enhance successful delivery of construction projects. This study is therefore aimed at exploring which monetary and non-monetary incentives would compel construction and consultant team members to improve successful project delivery. The study adopted a deductive approach whereby hypotheses were formulated based on motivation theories and applied them in construction project team situations. In this regard, the extensive literature related to motivation theories such as the hierarchy of needs, incentives, organisational commitment, and teamwork environment were reviewed. A web survey was adopted for the empirical data gathering by means of a questionnaire e-mailed to nationwide selected construction and consultant firms. Data analysis was done by means of ranking, paired sample test, T-Test, ANOVA test, Mann- Whitney, Kruskal-Wallis test of association, and the Principal Component Analysis (PCA). The reliability test was done using Cronbach’s alpha coefficient of reliability. In total, 164 respondents participated in the study. It was revealed that there was a statistically significant difference between mean rankings of motivational factors, and organisational commitment was perceived as the most important motivational factor that compelled construction and consultant team members to achieve project success. There was no statistically significant difference between various demographics (gender, qualification, and experience) pertaining to self-development needs, organisational commitment, and teamwork environment motivational factors, except age groups, which displayed a statistically significant difference in self-development needs and teamwork environment. There was a statistically significant difference between mean rankings of monetary and non-monetary incentives, and non-monetary incentives were preferred to monetary incentives in achieving higher performance. There was no statistically significant difference between various demographics (gender, age, qualification, and experience in the construction industry) of construction and consultant team members pertaining to monetary and non-monetary incentives. There was no statistically significant difference between mean rankings of primary project objectives aligned with monetary incentives, where time was perceived as the most important. There was no statistically significant difference between various demographics (gender, qualification, and experience in the construction industry) of construction and consultant team members pertaining to project objectives aligned with incentives, except age groups which displayed a statistically significant difference in project objectives aligned with monetary and non-monetary incentives. Two models have been developed based on the PCA results of project objectives aligned with monetary and non-monetary incentives. Each model consisted of four parts, namely project objectives, demographic information, short-run project-based interventions, and long-run interventions. The PCA results showed monetary incentives could be a useful project-based intervention mechanism in the short-run to achieve secondary project objectives, such as the provision of work opportunities to SMMEs. In the long-run, this confirms the usefulness of the CIDB initiative consisting of the provision of work opportunities to SMMEs through the National Contractor Development Programme (NCDP) guidelines. The PCA results showed non-monetary incentives could be a useful project-based intervention mechanism in the short-run to achieve primary project objectives, such as quality. In the long-run, a continuous improvement mechanism by various construction industry stakeholders is deemed necessary to maintain project delivery standards.
- Full Text:
- Date Issued: 2014
Application of the theory of critical distance technique to predict fracture toughness in friction stir welded Ti-6Al-4V sheet
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
- Authors: Rall, William Henry
- Date: 2017
- Subjects: Friction stir welding Fracture mechanics
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/20351 , vital:29266
- Description: With modern day socioeconomic pressures to deliver more cost effective, higher performance and energy efficient mechanisms and structures, light weight design is coming more to the forefront of design methodologies. These methodologies need to apply lightweight materials in unison with a defect tolerant design strategy. Titanium is certainly not a new material and was used in large quantities in the 1960’s and ‘70s, but mostly in military applications. The main drawback of this material was cost, however due to current design needs as mentioned the consumption of the material is rising rapidly. Friction stir welding is by no means a new technique anymore, however, relatively speaking it is still in its infancy when compared to other traditional welding techniques. It has been applied mostly to low melting temperature metals, more specifically aluminium; however, its application to higher melting temperatures has started to enjoy more attention over the last few years. The lower temperatures at which the weld occurs, when compared to conventional processes, is the main reason for applying this technique to materials melting at a higher temperature such as titanium. Fracture mechanics allows modern-day designers and maintenance engineers to operate structures with an inherent flaw. These flaws may be due to geometric features of the design; fabrication defects or defects such as cracks that have developed over time within an operational structure. Fracture mechanics has evolved significantly since Griffith first proposed it in the early 20th century. The application of the method is often complex and determining the material properties for fracture resistance can be problematic and costly. Many techniques have been proposed over time to simplify the application of this method and one of these techniques would be the theory of critical distance. Since the technique is relatively new and has mostly been applied to more brittle materials, this study aimed not only to apply this technique to a more ductile material but additionally to one that is classified as a sheet material. The initial tests of this study investigated if a common convergent point could be determined by using three notches varying in size. The technique does not have a standard that governs its application. The initial tests did not yield a common intersecting point thus a second study was applied to see if sample width would influence the results. The results from the study indicated that wider samples seemed to yield similar apparent fracture toughness results, however a common convergence point could still not be established. This prompted a more in-depth study which involved various sample widths coupled with varying notch depths. Sharper notches were also applied and samples with controlled cracks were also tested. The results clearly showed that as the plastic zone size increases in relation to the ligament length of the sample, the critical distance becomes larger. The results also suggested that it would perhaps be best to use sample sizes with notches which allow fracture of the sample before the nett section stress reaches the material’s yield strength. The final tests involved testing the friction stir welded material. Various other studies were also done to corroborate the fracture toughness results. The stress relieved samples showed a reduction in the fracture toughness due to possible precipitation hardening during the stress relieving heat treatment process. The welded material showed an increase in the apparent fracture toughness when compared to the parent plate. The results indicate that residual stresses have an influence on the fracture toughness. In terms of the critical distance, it would appear that the value stays unchanged from the parent plate to the welded material; however, what is significant was that the value seemed to stay more or less constant as long as the nett section stress of the notched samples stayed below the yield stress of the material.
- Full Text:
- Date Issued: 2017
Building Information Modelling as a catalyst for an Integrated Construction Project Delivery culture in South Africa
- Authors: Froise, Timothy
- Date: 2014
- Subjects: Construction industry -- South Africa , Construction projects -- South Africa , Acculturation -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9716 , http://hdl.handle.net/10948/d1020872
- Description: The importance of technology in construction partnering agreements has been recognised as a vital part of integrated project delivery (IPD) philosophy. Building information modelling (BIM) is increasingly being used by consultants in South Africa during the design phase of construction projects. However, its use is generally not aimed at an integrated project delivery approach, but rather as a tool to generate documentation, as BIM is generally more efficient than traditional computer aided design (CAD) software. For the full benefits of BIM to be realised, a greater degree of acculturation is required between construction project organisations (CPOs). The current cultures of CPOs are separationist in nature and tend to inhibit acculturation within the industry. BIM provides a central source of information that can improve communications between CPOs and foster a collaborative culture. The research examines IPD and BIM in the South African context and investigates how BIM can contribute to IPD. A survey was conducted among registered contractors from the three top grades and architecture practices from two regions in South Africa. The survey was placed in context by a case study that analysed the use of BIM and the resulting communication network seen in a public works project using typical procurement methods. The associated problems with the current accepted paradigm are illuminated by the research.
- Full Text:
- Date Issued: 2014
- Authors: Froise, Timothy
- Date: 2014
- Subjects: Construction industry -- South Africa , Construction projects -- South Africa , Acculturation -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9716 , http://hdl.handle.net/10948/d1020872
- Description: The importance of technology in construction partnering agreements has been recognised as a vital part of integrated project delivery (IPD) philosophy. Building information modelling (BIM) is increasingly being used by consultants in South Africa during the design phase of construction projects. However, its use is generally not aimed at an integrated project delivery approach, but rather as a tool to generate documentation, as BIM is generally more efficient than traditional computer aided design (CAD) software. For the full benefits of BIM to be realised, a greater degree of acculturation is required between construction project organisations (CPOs). The current cultures of CPOs are separationist in nature and tend to inhibit acculturation within the industry. BIM provides a central source of information that can improve communications between CPOs and foster a collaborative culture. The research examines IPD and BIM in the South African context and investigates how BIM can contribute to IPD. A survey was conducted among registered contractors from the three top grades and architecture practices from two regions in South Africa. The survey was placed in context by a case study that analysed the use of BIM and the resulting communication network seen in a public works project using typical procurement methods. The associated problems with the current accepted paradigm are illuminated by the research.
- Full Text:
- Date Issued: 2014
Characterization of friction hydro pillar process weld properties as applied to 10CrMo910 creep resistant steel for application in the power generation Industry
- Authors: Bulbring, Daniel Louis Hans
- Subjects: Materials -- Creep , Friction welding
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9636 , http://hdl.handle.net/10948/d1020586
- Description: Creep degradation of steam carrying vessels in the power generation industry is a concern that needs to be constantly monitored. The Weldcore® process has been earmarked as a potential method of creep sampling which will allow for thick-walled sections to be analysed. A component of the process involves plugging the resultant hole after removing a creep sample using a novel welding technique called friction hydro pillar processing. At the commencement of this study, insufficient data was available to warrant safe industrial application of the process. This research was conducted to evaluate the performance of 10CrMo910 friction hydro pillar process welds. The effects of downward force, stud taper angle, hole taper angle and hole base diameter on process response, defect population, static properties and dynamic performance were evaluated. The variation of downward force showed that higher forces produce significantly smaller defects and higher fatigue life. The occurrence of defects was linked to process parameters and geometry thereby identifying the correct parameters for safe use in the power generation industry. Flash formation was identified as an early indicator of weld defects and can assist with quality control in industrial applications. Methods of standardising the plunge depth and forge force were developed to identify the correct magnitudes for different geometries, without the need for testing. Defects were shown to populate specific regions of the weld and produce variations in fatigue life. Crack initiation sites were detected which will aid in identifying areas of focus in further research and development. Temperature measurements were linked to the occurrence of defects and crack initiation sites and have been identified as a method of identifying defective welds. The effects of process parameters and stud and hole taper angles on energy inputs and near interface temperatures were statistically evaluated. Downward force was shown to have the largest effect on energy input rates, total energy input and temperatures at the 11.5mm and 20.5mm positions. Smaller hole and stud taper angles produced lower energy inputs and were identified as more energy efficient than the larger taper angles. A regression model was also developed to predict the fatigue life of welds and can assist with critical process related decision making. A range of hole base diameters were identified which produced welds with low defect populations and fatigue performance similar to that of the parent plate. Larger hole base diameters were shown to produce significant defects along the hole bottom fillet, in the weld nugget and along the bond line. Temperature measurements of the larger diameter welds showed a delay in response and are attributed to a delayed contact of plasticised stud material with the sidewall. Welds with hole base diameters larger than 11mm produced unrepeatable and defective welds, and also required higher energy inputs making smaller diameters more desirable. Analysis of all welds in this study revealed that clearance and interfacial pressures characterise the quality of friction hydro pillar process welds, therefore models were developed to aid in critical decision making with respect to downward force and geometry. This study has successfully evaluated the effects of process parameters and geometry on the properties of friction hydro pillar process welds and thereby has increased understanding of the process.
- Full Text:
- Authors: Bulbring, Daniel Louis Hans
- Subjects: Materials -- Creep , Friction welding
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9636 , http://hdl.handle.net/10948/d1020586
- Description: Creep degradation of steam carrying vessels in the power generation industry is a concern that needs to be constantly monitored. The Weldcore® process has been earmarked as a potential method of creep sampling which will allow for thick-walled sections to be analysed. A component of the process involves plugging the resultant hole after removing a creep sample using a novel welding technique called friction hydro pillar processing. At the commencement of this study, insufficient data was available to warrant safe industrial application of the process. This research was conducted to evaluate the performance of 10CrMo910 friction hydro pillar process welds. The effects of downward force, stud taper angle, hole taper angle and hole base diameter on process response, defect population, static properties and dynamic performance were evaluated. The variation of downward force showed that higher forces produce significantly smaller defects and higher fatigue life. The occurrence of defects was linked to process parameters and geometry thereby identifying the correct parameters for safe use in the power generation industry. Flash formation was identified as an early indicator of weld defects and can assist with quality control in industrial applications. Methods of standardising the plunge depth and forge force were developed to identify the correct magnitudes for different geometries, without the need for testing. Defects were shown to populate specific regions of the weld and produce variations in fatigue life. Crack initiation sites were detected which will aid in identifying areas of focus in further research and development. Temperature measurements were linked to the occurrence of defects and crack initiation sites and have been identified as a method of identifying defective welds. The effects of process parameters and stud and hole taper angles on energy inputs and near interface temperatures were statistically evaluated. Downward force was shown to have the largest effect on energy input rates, total energy input and temperatures at the 11.5mm and 20.5mm positions. Smaller hole and stud taper angles produced lower energy inputs and were identified as more energy efficient than the larger taper angles. A regression model was also developed to predict the fatigue life of welds and can assist with critical process related decision making. A range of hole base diameters were identified which produced welds with low defect populations and fatigue performance similar to that of the parent plate. Larger hole base diameters were shown to produce significant defects along the hole bottom fillet, in the weld nugget and along the bond line. Temperature measurements of the larger diameter welds showed a delay in response and are attributed to a delayed contact of plasticised stud material with the sidewall. Welds with hole base diameters larger than 11mm produced unrepeatable and defective welds, and also required higher energy inputs making smaller diameters more desirable. Analysis of all welds in this study revealed that clearance and interfacial pressures characterise the quality of friction hydro pillar process welds, therefore models were developed to aid in critical decision making with respect to downward force and geometry. This study has successfully evaluated the effects of process parameters and geometry on the properties of friction hydro pillar process welds and thereby has increased understanding of the process.
- Full Text:
Clients' views on construction and design team competencies
- Authors: Crafford, Gerrit Jacobus
- Date: 2007
- Subjects: Construction industry -- Employees , Core competencies
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9679 , http://hdl.handle.net/10948/490 , Construction industry -- Employees , Core competencies
- Description: The effectiveness of the design and construction team in meeting clients’ requirements entirely depends on the competency proficiency of the design and construction teams. This research presents a model of the important competencies required by the design and construction teams in order to provide a competent service as seen by the client. A review of related literature followed by interviews by selected practitioners yielded 29 architectural competencies, 31 civil engineering competencies, 32 construction management competencies, 31 project management competencies, and 33 quantity surveying competencies that were presented in a structured questionnaire. The questionnaire was completed by 52 developers from a census of developers and municipality managers in South Africa. Respondents were asked to rank or rate: the level of importance of each competency for a career in that specific discipline; how evident that competency is in the specific discipline in South Africa; the level of importance of the performance parameters to clients, and the extent to which the various disciplines realise client satisfaction relative to the various performance parameters. The techniques of re-scaling, principal component analysis, content analysis, ranking and quadrant analysis were applied to the data. Results showed a high degree of consistency among respondents in all disciplines, regardless of the demographic differences in the importance of the competencies. A factor solution was obtained for every discipline using principal component analysis on the important competencies of each discipline. The various factor solutions were in turn used to formulate a simplified model. The model shows that the factors are interdependent and interacting. The model indicates that primary competencies for each profession are supported by mostly secondary competencies. These factors v are in turn influenced by the inter-relationships between the practitioners, continued professional development/ research and universities, which are then in turn, influenced the governing bodies. The local and global environment then ultimately influences the governing bodies. An Importance-Evidence quadrant analysis was undertaken in order to integrate the rankings of the current importance levels and current proficiency levels for each discipline’s competencies, which helped to identify areas in which education and training is immediately needed. Respondents ranked all nine performance parameters above average which indicates that there are more than the traditional performance parameters of cost, quality, and time involved in satisfying clients. The research concluded that vital feedback from clients regarding the competencies required by the respective professionals in the design and construction team was obtained.
- Full Text:
- Date Issued: 2007
- Authors: Crafford, Gerrit Jacobus
- Date: 2007
- Subjects: Construction industry -- Employees , Core competencies
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9679 , http://hdl.handle.net/10948/490 , Construction industry -- Employees , Core competencies
- Description: The effectiveness of the design and construction team in meeting clients’ requirements entirely depends on the competency proficiency of the design and construction teams. This research presents a model of the important competencies required by the design and construction teams in order to provide a competent service as seen by the client. A review of related literature followed by interviews by selected practitioners yielded 29 architectural competencies, 31 civil engineering competencies, 32 construction management competencies, 31 project management competencies, and 33 quantity surveying competencies that were presented in a structured questionnaire. The questionnaire was completed by 52 developers from a census of developers and municipality managers in South Africa. Respondents were asked to rank or rate: the level of importance of each competency for a career in that specific discipline; how evident that competency is in the specific discipline in South Africa; the level of importance of the performance parameters to clients, and the extent to which the various disciplines realise client satisfaction relative to the various performance parameters. The techniques of re-scaling, principal component analysis, content analysis, ranking and quadrant analysis were applied to the data. Results showed a high degree of consistency among respondents in all disciplines, regardless of the demographic differences in the importance of the competencies. A factor solution was obtained for every discipline using principal component analysis on the important competencies of each discipline. The various factor solutions were in turn used to formulate a simplified model. The model shows that the factors are interdependent and interacting. The model indicates that primary competencies for each profession are supported by mostly secondary competencies. These factors v are in turn influenced by the inter-relationships between the practitioners, continued professional development/ research and universities, which are then in turn, influenced the governing bodies. The local and global environment then ultimately influences the governing bodies. An Importance-Evidence quadrant analysis was undertaken in order to integrate the rankings of the current importance levels and current proficiency levels for each discipline’s competencies, which helped to identify areas in which education and training is immediately needed. Respondents ranked all nine performance parameters above average which indicates that there are more than the traditional performance parameters of cost, quality, and time involved in satisfying clients. The research concluded that vital feedback from clients regarding the competencies required by the respective professionals in the design and construction team was obtained.
- Full Text:
- Date Issued: 2007