"A lean-led-evaluation" of infrastructure development improvement programme in South Africa
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
- Authors: Monyane, Thabiso Godfrey
- Date: 2019
- Subjects: Construction industry -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/44535 , vital:38131
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A case study approach to assess the growth towards world class at EH Walton Packaging (Pty) Ltd
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
A code of practice for practitioners in private healthcare: a privacy perspective
- Authors: Harvey, Brett D
- Date: 2007
- Subjects: Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9735 , http://hdl.handle.net/10948/521 , Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Description: Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
- Full Text:
- Date Issued: 2007
- Authors: Harvey, Brett D
- Date: 2007
- Subjects: Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9735 , http://hdl.handle.net/10948/521 , Information storage and retrieval systems -- Medical care , Medical records -- Data processing , Privacy, Right of Comparative studies
- Description: Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
- Full Text:
- Date Issued: 2007
A comparative study of performance and efficiency of a tube and fin type domestic solar water heat collector
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
- Authors: Kleyn, Gysbert
- Date: 2015
- Subjects: Solar collectors , Solar water heaters -- Testing , Solar heating
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7959 , vital:24329
- Description: The main purpose of this research project was to do a comparative study, by identifying a testing methodology for transient conditions, through which to allow the expression of the relative thermal performance of two DSWH collectors in comparison. The study started off by considering literature about Solar Domestic Water Heaters and National Standards-based test methods, most of which were for Steady State testing conditions. Thereafter establishing a testing methodology and setup, identifying factors to be considered. The results were analyzed and conclusions drawn. The hypothesis was to allow the reduction in the complexity of testing equipment and methods, and by doing transient condition testing and still utilizing the Hottel-Whillier-Bliss relationship as a way of expressing efficiency, the hypothesis was proven.
- Full Text:
- Date Issued: 2015
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A COP optimized control system for a CO₂ based automotive A/C-system
- Authors: Rapp, Tobias
- Date: 2007
- Subjects: Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9624 , http://hdl.handle.net/10948/773 , Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Description: In the last few years carbon dioxide received increasing attention as a possible replacement for fluorocarbon-based refrigerants used within present automotive A/C system technology. R-134a is harmless to the ozone layer but the greenhouse effect is more than 1300 times higher than that of an equivalent amount of CO2. Alternative refrigerants are natural gasses such as propane and butane, however these gasses are considered explosive. With many objections raised it appears if CO2 will be the future refrigrant for automotive use. One concern with R-744 is its high operating pressure and suction/discharge pressure difference when compared to common refrigeration processes. A major problem with the CO2 cycle is the loss of effciency at high ambient temperatures. With a COP optimized control system for the expansion value based on pressure, temperature and mass flow of the refrigerant, an effective A/C system for CO2 could be deleloped. This resrach offers basic knowledge of refrigerant cycles and gives an overall view of the refrigerant change-over problem. With the results obtained from the experimental work a better understanding of the CO2 cycle and a better understanding towards effective A/C systems have been realized.
- Full Text:
- Date Issued: 2007
- Authors: Rapp, Tobias
- Date: 2007
- Subjects: Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9624 , http://hdl.handle.net/10948/773 , Automobiles -- Air conditioning , Motor vehicles -- Automatic control
- Description: In the last few years carbon dioxide received increasing attention as a possible replacement for fluorocarbon-based refrigerants used within present automotive A/C system technology. R-134a is harmless to the ozone layer but the greenhouse effect is more than 1300 times higher than that of an equivalent amount of CO2. Alternative refrigerants are natural gasses such as propane and butane, however these gasses are considered explosive. With many objections raised it appears if CO2 will be the future refrigrant for automotive use. One concern with R-744 is its high operating pressure and suction/discharge pressure difference when compared to common refrigeration processes. A major problem with the CO2 cycle is the loss of effciency at high ambient temperatures. With a COP optimized control system for the expansion value based on pressure, temperature and mass flow of the refrigerant, an effective A/C system for CO2 could be deleloped. This resrach offers basic knowledge of refrigerant cycles and gives an overall view of the refrigerant change-over problem. With the results obtained from the experimental work a better understanding of the CO2 cycle and a better understanding towards effective A/C systems have been realized.
- Full Text:
- Date Issued: 2007
A critical review of the IFIP TC11 Security Conference Series
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
A cyber security awareness and education framework for South Africa
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
- Authors: Kortjan, Noloxolo
- Date: 2013
- Subjects: Computer networks -- Security measures , Computer crimes -- Prevention , Computer security
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9811 , http://hdl.handle.net/10948/d1014829
- Description: The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
- Full Text:
- Date Issued: 2013
A facilities management transformation strategy for the public sector
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
- Authors: Tonono, Erol
- Date: 2008
- Subjects: Facility management -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9666 , http://hdl.handle.net/10948/767 , Facility management -- South Africa
- Description: Facilities Management (FM) has become one of the fastest growing disciplines in the built environment. Factors such as information technology, expectations of employees, the cost of mistakes in building, the cost of building space and global competition have influenced the growth of the discipline. These factors have forced facilities management to move from the basement to the boardroom; from a hidden function entrusted to the sleepy, slow and steady to one performed by increasingly bright-eyed and dynamic facilities managers. The objectives of this research focus on the need for a transformation strategy for FM in the public sector. However, before any transformation is considered, it is essential to understand the perceptions and attitudes of people dealing with FM in this sector. The National Department of Public Works (NDPW) became the focus of the study because it has the largest property portfolio in the southern hemisphere. It should be the leader in FM. The collected primary data (being quantitative) and secondary information provided the necessary basis to understand the application of FM in the NDPW. The study revealed shortcomings which are contributing to the problems outlined: namely, that no senior manager has been appointed to manage the portfolio and assist top management in decision-making; that neither a policy nor a FM framework are in place to guide the FM portfolio; that there is a lack of knowledge about the discipline, particularly by management and that there is no computer-aided FM in the entire department, let alone a FM helpdesk. FM is the coordination of workplace, people, physical infrastructure, processes and technology in order for an organization to meet its objectives. It is a wide field encompassing models that tend to differ considerably from one organization to another as it has to respond to the particular needs of each organization. It recognizes that a workplace’s configuration can have either a positive or negative impact on productivity, depending on the competency of the FM structures in place.
- Full Text:
- Date Issued: 2008
A flexible vehicle measurement system for modern automobile production
- Authors: Lichtenberg, Thilo
- Subjects: Automobile industry and trade -- Quality control -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9632 , http://hdl.handle.net/10948/546 , Automobile industry and trade -- Quality control -- South Africa
- Description: To stay competitive and to be able to sell high-class products in the modern automobile production it is absolutely necessary to check the quality standard of a manufactured vehicle. The normal measurement strategy to check the quality standard of a completely assembled car is through a complex measurement strategy whilst the vehicle is in the actual series production. This is an immensely time and money consuming process. Furthermore, measurement systems are fixed within a certain position and the flexible measurement of a produced vehicle is very difficult to realize. This project presents a measurement system compliant to all quality guidelines, with which it is possible to measure any mounted component from a completely assembled vehicle wherever and whenever required. For the first time it is possible to measure the vehicle quality and dimensional standard from the first body in white prototype assembled in production up to the completely assembled vehicle delivered to the customer. The result of this project is a measurement system that consists of a hardware tool and a specially programmed software add-on. The complete system could easily be carried to the vehicle that must be analysed. This gives a lot of advantages. Furthermore it is possible to use this developed technology for the whole Volkswagen Company including the other brands like Audi, Skoda and Seat.
- Full Text:
- Authors: Lichtenberg, Thilo
- Subjects: Automobile industry and trade -- Quality control -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9632 , http://hdl.handle.net/10948/546 , Automobile industry and trade -- Quality control -- South Africa
- Description: To stay competitive and to be able to sell high-class products in the modern automobile production it is absolutely necessary to check the quality standard of a manufactured vehicle. The normal measurement strategy to check the quality standard of a completely assembled car is through a complex measurement strategy whilst the vehicle is in the actual series production. This is an immensely time and money consuming process. Furthermore, measurement systems are fixed within a certain position and the flexible measurement of a produced vehicle is very difficult to realize. This project presents a measurement system compliant to all quality guidelines, with which it is possible to measure any mounted component from a completely assembled vehicle wherever and whenever required. For the first time it is possible to measure the vehicle quality and dimensional standard from the first body in white prototype assembled in production up to the completely assembled vehicle delivered to the customer. The result of this project is a measurement system that consists of a hardware tool and a specially programmed software add-on. The complete system could easily be carried to the vehicle that must be analysed. This gives a lot of advantages. Furthermore it is possible to use this developed technology for the whole Volkswagen Company including the other brands like Audi, Skoda and Seat.
- Full Text:
A framework for assuring conformance of cloud-based email at higher education institutions
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
A framework for biometrics for social grants in South Africa
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
A framework for enhancing trust for improved participation in electronic marketplaces accessed from mobile platforms
- Isabirye, Naomi Nabirye, Von Solms, R
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
- Authors: Isabirye, Naomi Nabirye , Von Solms, R
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa Agricultural innovations -- South Africa Agricultural systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/20019 , vital:29053
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text:
- Date Issued: 2016
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for improving construction workers’ health and safety practices in Lagos, Nigeria
- Authors: Kukoyi, Patricia Omega
- Date: 2018
- Subjects: Construction industry -- Health aspects -- Lagos -- Nigeria , Industrial safety -- Lagos -- Nigeria Sustainable construction -- Lagos -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/30962 , vital:31235
- Description: The construction sector is known for its poor health and safety (H&S) record. This situation contributes to the poor performance of construction projects and poor worker productivity. In view of this, the research was undertaken to improve workers’ H&S practices. This study determined how the systems thinking approach will mitigate unhealthy and unsafe construction practices in Lagos, Nigeria by developing interventions, and proposing a model for improved H&S practices. The study utilised a mixed research method approach. Both quantitative and qualitative methods were used specifically the concurrent embedded method to obtain and analyse the data. The sample size for the quantitative study was 375 respondents and a total of 40 respondents were engaged in the qualitative study. The sample consisted of designers, contractors, clients, quantity surveyors, project managers, construction managers, supervisors, and construction workers (masons, carpenters, painters, roofers, electricians) based in Lagos, Nigeria. The findings reveal that there is inadequate consideration for H&S during the procurement of construction projects. Furthermore, the absence of H&S regulations relating to the construction sector was observed. Unsafe practices at construction sites in Nigeria can be attributed to this discovery. The study reveals that the regulatory system, the organisation, the individual and the work environment all have an impact on H&S work practices. Although the contractors are mainly responsible for H&S at construction sites, other construction stakeholders (such as clients, consultants, etc.) influence H&S practices. The findings highlight the need for the adoption of a holistic approach to facilitate improvement in H&S practices on construction sites. The research has contributed to the body of knowledge by developing a framework for improving workers’ H&S performance on construction sites.
- Full Text:
- Date Issued: 2018
- Authors: Kukoyi, Patricia Omega
- Date: 2018
- Subjects: Construction industry -- Health aspects -- Lagos -- Nigeria , Industrial safety -- Lagos -- Nigeria Sustainable construction -- Lagos -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/30962 , vital:31235
- Description: The construction sector is known for its poor health and safety (H&S) record. This situation contributes to the poor performance of construction projects and poor worker productivity. In view of this, the research was undertaken to improve workers’ H&S practices. This study determined how the systems thinking approach will mitigate unhealthy and unsafe construction practices in Lagos, Nigeria by developing interventions, and proposing a model for improved H&S practices. The study utilised a mixed research method approach. Both quantitative and qualitative methods were used specifically the concurrent embedded method to obtain and analyse the data. The sample size for the quantitative study was 375 respondents and a total of 40 respondents were engaged in the qualitative study. The sample consisted of designers, contractors, clients, quantity surveyors, project managers, construction managers, supervisors, and construction workers (masons, carpenters, painters, roofers, electricians) based in Lagos, Nigeria. The findings reveal that there is inadequate consideration for H&S during the procurement of construction projects. Furthermore, the absence of H&S regulations relating to the construction sector was observed. Unsafe practices at construction sites in Nigeria can be attributed to this discovery. The study reveals that the regulatory system, the organisation, the individual and the work environment all have an impact on H&S work practices. Although the contractors are mainly responsible for H&S at construction sites, other construction stakeholders (such as clients, consultants, etc.) influence H&S practices. The findings highlight the need for the adoption of a holistic approach to facilitate improvement in H&S practices on construction sites. The research has contributed to the body of knowledge by developing a framework for improving workers’ H&S performance on construction sites.
- Full Text:
- Date Issued: 2018
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009