A "lean-led-evaluation" of infrastructure development improvement programme in South Africa
- Monyane, Thabiso Godfrey, Emuze, Fidelis
- Authors: Monyane, Thabiso Godfrey , Emuze, Fidelis
- Date: 2019
- Subjects: Construction industry -- Accounting , Construction industry -- South Africa Project management -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/44929 , vital:38189
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
- Authors: Monyane, Thabiso Godfrey , Emuze, Fidelis
- Date: 2019
- Subjects: Construction industry -- Accounting , Construction industry -- South Africa Project management -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/44929 , vital:38189
- Description: A doctoral study was embarked upon with the intentions of addressing cost management problems encountered on Infrastructure Delivery Projects in South Africa. Given that poor cost performance constitute hindrance to the realization of project goals, it is imperative to eliminate it from project delivery. The prevalence of cost overrun in public sector projects is a call to all stakeholders to address cost management issues in the construction industry. The predominance of cost overruns in public sector construction projects in South Africa has been observed. With the decline of the current economic conditions in South Africa, project performance is a great concern that needs attention. In addition, ineffective initiatives to curb the abuse of the procurement processes are directly affecting the outcomes of construction projects, and if these status quo remains, the sector will continue to have a bad image and continued waste of taxpayers’ money will not cease until the public sector remove non-value adding activities in their operations. Study adopted a mixed methods designed that collected both textual and statistical data. Semistructured interviews were undertaken to determine the outcomes of current project management practices in South Africa. In terms of performance of projects, the status quo paints a disconsolate picture. Findings reveal protracted processes, and the use of unqualified and inexperienced contribute to poor performance of public sector projects. Poor performance continues to dominate the construction sector, especially in the public sector. Interviews data were contrasted with evidence from project-related documents. Based on the data, the study produces a vignette of existing cost management frameworks applied to such projects. Encompassing various stages of the project delivery lifecycle, this vignette will enable an identification of the challenges afflicting cost management on projects. Accordingly, this study identified Lean opportunities from existing cost management practices. Such opportunities will enable identification of effective cost management during project delivery. There appears a need for collaborative cost management practices. Lean tools mentioned for improvement include the 5Whys, the big room, target value design, and the integration of design and construction. A collaborative cost management framework was developed through relevant theories to improve the cost management process of public sector projects.
- Full Text:
- Date Issued: 2019
A cybersafety educational framework for primary school learners in South Africa
- Authors: Kucherera, Lean
- Date: 2020
- Subjects: Computer crimes -- Security measures -- South Africa School children -- Crimes against -- South Africa
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49452 , vital:41722
- Description: Information and communication technologies (ICTs) have made life much easier for many people but have also brought many dangers to the world. School learners are amongst the users of ICT who are becoming cyber citizens. This age is good at exploring new things, with a growing number of school learners having access to ICT devices, such as mobile phones, tablets and desktop computers. This is due to the affordability of mobile phones, which they normally receive as gifts from their parents. Due to easy access of ICT, school learners can now access cyberspace which offers them many advantages and benefits. Such advantages and benefits include having a platform to socialise, improved and ease of access to information as well as improving their learning. Despite these benefits, school learners (primary school learners in particular) are prone to falling victim to a range of cyber risks and attacks since cyberspace is an unregulated platform that poses many potential dangers Common cybersafety threats associated with school learners include cyberbullying, sexting/“sextortion”, engaging with strangers, accessing inappropriate content and being exposed to a breach of privacy. Because the cybersafety of children, especially primary school learners, is often compromised, there is a need to protect them from the threats associated with ICT. However, protecting children from the aforementioned cybersafety threats is complicated because access to cyberspace is no longer confined to the home computer, but has extended to mobile phones, which are even more pervasive. Therefore, it is essential for school learners to be educated on how to protect themselves and their information in the virtual computer world. A number of developed countries like Australia, New Zealand, Canada, United States of America (USA) and United Kingdom (UK) have included cybersafety education in their school curricula. Similarly, the rapid growth of the Internet around the world, allowed some countries in Africa to take the initiative to start implementing cybersafety education in schools including Mauritius, Tunisia, Kenya, Ghana, Mozambique, Cameroon, Egypt and Rwanda. Countries like Uganda, Sudan, Morocco and South Africa are still facing challenges in this aspect. This study is focused on the cybersafety of primary school learners in the South African context.
- Full Text:
- Date Issued: 2020
- Authors: Kucherera, Lean
- Date: 2020
- Subjects: Computer crimes -- Security measures -- South Africa School children -- Crimes against -- South Africa
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49452 , vital:41722
- Description: Information and communication technologies (ICTs) have made life much easier for many people but have also brought many dangers to the world. School learners are amongst the users of ICT who are becoming cyber citizens. This age is good at exploring new things, with a growing number of school learners having access to ICT devices, such as mobile phones, tablets and desktop computers. This is due to the affordability of mobile phones, which they normally receive as gifts from their parents. Due to easy access of ICT, school learners can now access cyberspace which offers them many advantages and benefits. Such advantages and benefits include having a platform to socialise, improved and ease of access to information as well as improving their learning. Despite these benefits, school learners (primary school learners in particular) are prone to falling victim to a range of cyber risks and attacks since cyberspace is an unregulated platform that poses many potential dangers Common cybersafety threats associated with school learners include cyberbullying, sexting/“sextortion”, engaging with strangers, accessing inappropriate content and being exposed to a breach of privacy. Because the cybersafety of children, especially primary school learners, is often compromised, there is a need to protect them from the threats associated with ICT. However, protecting children from the aforementioned cybersafety threats is complicated because access to cyberspace is no longer confined to the home computer, but has extended to mobile phones, which are even more pervasive. Therefore, it is essential for school learners to be educated on how to protect themselves and their information in the virtual computer world. A number of developed countries like Australia, New Zealand, Canada, United States of America (USA) and United Kingdom (UK) have included cybersafety education in their school curricula. Similarly, the rapid growth of the Internet around the world, allowed some countries in Africa to take the initiative to start implementing cybersafety education in schools including Mauritius, Tunisia, Kenya, Ghana, Mozambique, Cameroon, Egypt and Rwanda. Countries like Uganda, Sudan, Morocco and South Africa are still facing challenges in this aspect. This study is focused on the cybersafety of primary school learners in the South African context.
- Full Text:
- Date Issued: 2020
A cybersecurity curricular framework for IT undergraduates in South Africa
- Authors: Mbuqe, Apelele Alungile
- Date: 2020
- Subjects: LCSH
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49595 , vital:41739
- Description: Abstract ending in a full stop.
- Full Text:
- Authors: Mbuqe, Apelele Alungile
- Date: 2020
- Subjects: LCSH
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49595 , vital:41739
- Description: Abstract ending in a full stop.
- Full Text:
A framework for digital signature implementations for e-government services
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
A framework for teaching secure coding practices through a blended learning approach
- Mdunyelwa, Vuyolwethu Sizoli
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
A framework to enhance Information and Communication Technology (ICT) readiness for business continuity at the South African Revenue Services (SARS)
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
A framework to guide cybersecurity governance efforts in non-profit organisations
- Authors: le Roux, Wickus
- Date: 2019
- Subjects: Computer security , Information technology Nonprofit organizations -- security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/44918 , vital:38188
- Description: The average non-profit organisation is faced with the same cybersecurity challenges as an international multi-corporation that generates income. However, it may lack the competencies or resources to fully utilise, implement, monitor, or evaluate cybersecurity governance to a satisfactory or acceptable level. A literature review revealed limited publicly accessible documents to guide NPOs in particular in the task of cybersecurity governance. Therefore, the problem addressed by this research is the lack of a framework to guide cybersecurity governance efforts in non-profit organisations. This real-world problem was approached using the design science paradigm. It was important to identify, firstly, factors unique to the general context of non-profit organisations, including the constraints and limitations faced by non-profit organisations. Secondly, the key cyber risks for non-profit organisations and how they can materialise through the use of emails, social media, and BYODs in the NPO context, were identified. As a third step, available cybersecurity governance guidelines were analysed to determine best practices. This investigation also revealed the people, process, and technology elements as the pillars of information security. This resulted in the development of a framework (the PotLer framework) to guide cybersecurity governance efforts in non-profit organisations based on the input of the three points mentioned above. The framework was constructed around four conceptual elements, namely information security governance; people, process, and technology; governance elements; and key risks. The PotLer framework expands the high-level generic constructs beyond the conceptual space and provides implementation guidance in the form of a questionnaire to be completed by NPOs. The questionnaire was developed as an interactive spreadsheet that requires “Yes” or “No” responses from participants and generates a recommendation based on these answers. To evaluate the PotLer framework, the aforementioned questionnaire was completed by four NPOs. An additional questionnaire obtained their input on the utility and comprehensiveness of the framework.
- Full Text:
- Date Issued: 2019
- Authors: le Roux, Wickus
- Date: 2019
- Subjects: Computer security , Information technology Nonprofit organizations -- security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/44918 , vital:38188
- Description: The average non-profit organisation is faced with the same cybersecurity challenges as an international multi-corporation that generates income. However, it may lack the competencies or resources to fully utilise, implement, monitor, or evaluate cybersecurity governance to a satisfactory or acceptable level. A literature review revealed limited publicly accessible documents to guide NPOs in particular in the task of cybersecurity governance. Therefore, the problem addressed by this research is the lack of a framework to guide cybersecurity governance efforts in non-profit organisations. This real-world problem was approached using the design science paradigm. It was important to identify, firstly, factors unique to the general context of non-profit organisations, including the constraints and limitations faced by non-profit organisations. Secondly, the key cyber risks for non-profit organisations and how they can materialise through the use of emails, social media, and BYODs in the NPO context, were identified. As a third step, available cybersecurity governance guidelines were analysed to determine best practices. This investigation also revealed the people, process, and technology elements as the pillars of information security. This resulted in the development of a framework (the PotLer framework) to guide cybersecurity governance efforts in non-profit organisations based on the input of the three points mentioned above. The framework was constructed around four conceptual elements, namely information security governance; people, process, and technology; governance elements; and key risks. The PotLer framework expands the high-level generic constructs beyond the conceptual space and provides implementation guidance in the form of a questionnaire to be completed by NPOs. The questionnaire was developed as an interactive spreadsheet that requires “Yes” or “No” responses from participants and generates a recommendation based on these answers. To evaluate the PotLer framework, the aforementioned questionnaire was completed by four NPOs. An additional questionnaire obtained their input on the utility and comprehensiveness of the framework.
- Full Text:
- Date Issued: 2019
A framework to integrate secure programming principles into undergraduate computing curricula
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
A housing affordability and tenure of choice quantum deliverable model in South Africa
- Authors: Kabundu, Emmanuel Kizito
- Date: 2020
- Subjects: Housing -- Prices -- South Africa Housing -- Economic aspects -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/49606 , vital:41740
- Description: The aim of this research was to develop a model that practically determines the tenure of choice and affordability of households in South Africa, which will thus help towards informed decision making by analysts and housing officials. Presently, there is no clear systematic means (except for simplistic ratios) of determining the degree of the effect of changes in the housing market (such as implemented policies) on the tenure of choice and affordability decisions of households. The research set out to improve upon the usage of ratios by basing its analysis on the theoretical underpinnings of both user costs of occupancy and an assumption of endogeneity between tenure of choice and affordability. The research used the general household survey data from Statistics South Africa for the analysis and validation. Generalized joint binary regression (on assumption of endogeneity between tenure of choice and affordability) was used as a check against the user costs of occupancy modelling. An independent market analysis carried out showed that South Africa has consistently faced increasing problems of acute housing shortages and housing affordability. Never the less, apart from subsidy programs, the option to promote renting, coupled with use of innovative building technologies showed promise of significantly alleviating these problems. More living space is especially more vital than ever, amid the current crisis of COVID-19 pademic. Statistical tests indicated strong evidence suggesting that the developed user costs of occupancy model (dynamic tenure model) is reliable at correctly recovering the tenure statuses of the households, with its recovery rates being better than those of the regression model. Both models provided useful unique, but different insights into the housing market and also correctly predicted the behavioural patterns of South African housing markets, such as significantly worsening affordability, and a market that is biased towards home ownership. The analysis also showed that affordability and tenure of choice were significantly affected by locational factors, household characteristics (such as race and age of household head), and most significantly, the age of the household head (which is a proxy to household income). The research successfully met its goal of model building but also recognized the need to merge these two models (dynamic tenure model and the regression model) into one model for more comprehensive housing related analysis. The research also recognized a need to fully operationalize the optimization, Monte Carlo and parallelization modules in order to improve the practical usefulness and effectiveness of the model. The significance of the study is that it it underpins the basis for proper tenure and affordability analysis, by assuming endogeneity between the two (2), and provides a modelling framework based on these criteria, that are useful for meaningful housing market analysis.
- Full Text:
- Date Issued: 2020
- Authors: Kabundu, Emmanuel Kizito
- Date: 2020
- Subjects: Housing -- Prices -- South Africa Housing -- Economic aspects -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/49606 , vital:41740
- Description: The aim of this research was to develop a model that practically determines the tenure of choice and affordability of households in South Africa, which will thus help towards informed decision making by analysts and housing officials. Presently, there is no clear systematic means (except for simplistic ratios) of determining the degree of the effect of changes in the housing market (such as implemented policies) on the tenure of choice and affordability decisions of households. The research set out to improve upon the usage of ratios by basing its analysis on the theoretical underpinnings of both user costs of occupancy and an assumption of endogeneity between tenure of choice and affordability. The research used the general household survey data from Statistics South Africa for the analysis and validation. Generalized joint binary regression (on assumption of endogeneity between tenure of choice and affordability) was used as a check against the user costs of occupancy modelling. An independent market analysis carried out showed that South Africa has consistently faced increasing problems of acute housing shortages and housing affordability. Never the less, apart from subsidy programs, the option to promote renting, coupled with use of innovative building technologies showed promise of significantly alleviating these problems. More living space is especially more vital than ever, amid the current crisis of COVID-19 pademic. Statistical tests indicated strong evidence suggesting that the developed user costs of occupancy model (dynamic tenure model) is reliable at correctly recovering the tenure statuses of the households, with its recovery rates being better than those of the regression model. Both models provided useful unique, but different insights into the housing market and also correctly predicted the behavioural patterns of South African housing markets, such as significantly worsening affordability, and a market that is biased towards home ownership. The analysis also showed that affordability and tenure of choice were significantly affected by locational factors, household characteristics (such as race and age of household head), and most significantly, the age of the household head (which is a proxy to household income). The research successfully met its goal of model building but also recognized the need to merge these two models (dynamic tenure model and the regression model) into one model for more comprehensive housing related analysis. The research also recognized a need to fully operationalize the optimization, Monte Carlo and parallelization modules in order to improve the practical usefulness and effectiveness of the model. The significance of the study is that it it underpins the basis for proper tenure and affordability analysis, by assuming endogeneity between the two (2), and provides a modelling framework based on these criteria, that are useful for meaningful housing market analysis.
- Full Text:
- Date Issued: 2020
A lean production approach to materials management in the Nigerian construction industry
- Authors: Albert, Idowu
- Date: 2020
- Subjects: Materials management , Lean manufacturing Construction industry -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46008 , vital:39408
- Description: The Nigerian Construction Industry faces a problem of poor materials management that leads to, among other things, materials waste, poor quality of work, poor materials flow, project delay and cost overrun. Overcoming these challenges, requires the rethinking the current modus operandi of the Nigerian construction industry. One such method that has been espoused as having potential to improve materials management, and associated challenges is ‘lean production’. This research aimed at deciphering the lean approach to production management with a view of extracting its utility in enhancing materials management in the construction industry. The qualitative method of research inquiry that is rooted in the phenomenological paradigm was employed. The research activities included a comprehensive review of the related literature and study of selected cases. Abuja, the Federal capital territory of Nigeria was the selected geographical scope of the research. Ten case studies were purposefully selected for the study. The research instrument was a tick box used for direct observation. The study revealed that poor materials management has a negative effect on the materials management plan. Moreover, mixing of waste at the site, negates the effort for identification of materials waste streams, and makes it difficult to account for materials waste, as well as implementing a materials waste management policy on sites. The research also found that poor materials management has a significant effect (high, moderate or low) on materials waste, quality of work, materials flow, productivity, project delay, project profitability and accounting for materials. The research has developed a conceptual model for a lean production approach to materials management based on the results and informed by the theoretical framework. The study has achieved its aim of establishing an understanding of the lean production approach to materials management in the Nigerian construction industry. The study recommends that construction professionals should be well informed on the effects of poor materials management.
- Full Text:
- Date Issued: 2020
- Authors: Albert, Idowu
- Date: 2020
- Subjects: Materials management , Lean manufacturing Construction industry -- Nigeria
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46008 , vital:39408
- Description: The Nigerian Construction Industry faces a problem of poor materials management that leads to, among other things, materials waste, poor quality of work, poor materials flow, project delay and cost overrun. Overcoming these challenges, requires the rethinking the current modus operandi of the Nigerian construction industry. One such method that has been espoused as having potential to improve materials management, and associated challenges is ‘lean production’. This research aimed at deciphering the lean approach to production management with a view of extracting its utility in enhancing materials management in the construction industry. The qualitative method of research inquiry that is rooted in the phenomenological paradigm was employed. The research activities included a comprehensive review of the related literature and study of selected cases. Abuja, the Federal capital territory of Nigeria was the selected geographical scope of the research. Ten case studies were purposefully selected for the study. The research instrument was a tick box used for direct observation. The study revealed that poor materials management has a negative effect on the materials management plan. Moreover, mixing of waste at the site, negates the effort for identification of materials waste streams, and makes it difficult to account for materials waste, as well as implementing a materials waste management policy on sites. The research also found that poor materials management has a significant effect (high, moderate or low) on materials waste, quality of work, materials flow, productivity, project delay, project profitability and accounting for materials. The research has developed a conceptual model for a lean production approach to materials management based on the results and informed by the theoretical framework. The study has achieved its aim of establishing an understanding of the lean production approach to materials management in the Nigerian construction industry. The study recommends that construction professionals should be well informed on the effects of poor materials management.
- Full Text:
- Date Issued: 2020
A management model for human settlements: a case study of Nigeria and South Africa
- Authors: Adeniran, Adeleye Ayoade
- Date: 2020
- Subjects: Human settlements -- Nigeria , Human settlements -- South Africa Sustainable development
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/45985 , vital:39403
- Description: Persistent depreciating human settlements is a global challenge, particularly in developing countries and this challenge contributes to the continuously increasing housing gap, despite several novel policies and programmes. Although there is a dearth of research-based literature on human settlements management, studies show that property management, Facility Management, housing management and urban management impact the sustainability of all these built environment milieus which form part of the human settlements’ sub-components. This research aimed at altering the afore-said challenge by exploring the management of human settlements in Nigeria and in South Africa. Philosophically, the research is pragmatic, and it rests on positivist deductive reasoning. The methods used for data collection include a review of literature, collection of archival records, and empirical studies of purposively selected professionals and stakeholders involved in human settlements’ management in Nigeria and in South Africa. The findings indicate that existing human settlements in the case studies are “good” and “acceptable” with the majority adopting an outsourced method of management. Furthermore, the lack of maintenance records, the deficiency in policy monitoring and the training of management and maintenance personnel were the three highest ranking factors indicated to be affecting human settlements management. Moreover, an inhabitant’s income, the time available for management, professional expertise and technology employed for management are recognised as the critical sustainability sub-factors affecting human settlement management. The factor analysis established ownership, human resource and capital, social, legal, technology, economic, physical and environmental factors as vital and very significant in achieving sustainable management of human settlements. The study recommends the professionalisation of the field of human settlements as well as a formulation of management policy among others. The study developed a management model for human settlements, and it advocates that human settlements managers, owners and organisations should apply the model in this study, to improve their human settlement management practices, so as to achieve sustainability, and in essence, Sustainable Development Goal 11. It is hoped that the suggested management model will influence human settlement policy development and review, the designing of human settlement management programmes including the framework for their ongoing monitoring and evaluation. The study furthermore contributes to the development of housing and human settlement curricula and evolving human settlement research in both developed and developing countries.
- Full Text:
- Date Issued: 2020
- Authors: Adeniran, Adeleye Ayoade
- Date: 2020
- Subjects: Human settlements -- Nigeria , Human settlements -- South Africa Sustainable development
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/45985 , vital:39403
- Description: Persistent depreciating human settlements is a global challenge, particularly in developing countries and this challenge contributes to the continuously increasing housing gap, despite several novel policies and programmes. Although there is a dearth of research-based literature on human settlements management, studies show that property management, Facility Management, housing management and urban management impact the sustainability of all these built environment milieus which form part of the human settlements’ sub-components. This research aimed at altering the afore-said challenge by exploring the management of human settlements in Nigeria and in South Africa. Philosophically, the research is pragmatic, and it rests on positivist deductive reasoning. The methods used for data collection include a review of literature, collection of archival records, and empirical studies of purposively selected professionals and stakeholders involved in human settlements’ management in Nigeria and in South Africa. The findings indicate that existing human settlements in the case studies are “good” and “acceptable” with the majority adopting an outsourced method of management. Furthermore, the lack of maintenance records, the deficiency in policy monitoring and the training of management and maintenance personnel were the three highest ranking factors indicated to be affecting human settlements management. Moreover, an inhabitant’s income, the time available for management, professional expertise and technology employed for management are recognised as the critical sustainability sub-factors affecting human settlement management. The factor analysis established ownership, human resource and capital, social, legal, technology, economic, physical and environmental factors as vital and very significant in achieving sustainable management of human settlements. The study recommends the professionalisation of the field of human settlements as well as a formulation of management policy among others. The study developed a management model for human settlements, and it advocates that human settlements managers, owners and organisations should apply the model in this study, to improve their human settlement management practices, so as to achieve sustainability, and in essence, Sustainable Development Goal 11. It is hoped that the suggested management model will influence human settlement policy development and review, the designing of human settlement management programmes including the framework for their ongoing monitoring and evaluation. The study furthermore contributes to the development of housing and human settlement curricula and evolving human settlement research in both developed and developing countries.
- Full Text:
- Date Issued: 2020
A model for integrating user experience into Agile software development
- Authors: Manakaza, Mpile
- Date: 2023-04
- Subjects: Customer satisfaction , Agile development (Computer science) , South Africa
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60949 , vital:69295
- Description: The Agile software development methodology has progressed over time and has become the most popularly used methodology for many projects owing to its adaptable and advanced nature. Agile is an iterative and incremental method that supports project teams to maintain the growing demands of present-day organisations. In software development, it is imperative to build software that ensures a holistic user experience and meets requirements. Software Developers and User Experience Designers focus on users’ preferences and requirements while navigating an application through an approach called user-centred design (UCD). The purpose of Agile user-experience (UX) methods is to build user-centric software solutions using the Agile methodology. Literature indicates a scarcity of Agile-UX models to integrate user experience design processes effectively within Agile software development. Hence, the motivation for this study was to create a practical model for integrating user experience design processes into Agile software development for implementation by software development teams. Initially, the study defines the problem that formed the basis for the initiation of this research, followed by the research questions and objectives that are the fundamental portion of the development of this study. This study highlights the benefits and challenges of Agile-UX methods through a case study of Agile software development teams in South Africa. Furthermore, additional best practices are recommended. A survey questionnaire was distributed to software development teams to identify the various factors that lead to implementing Agile-UX methods. The distribution of the survey questionnaire supported the theoretical perspective of this study. Furthermore, Agile development (AD) and UCD are not easy to combine as UCD aims to understand users before software product development, and no activities are performed before development starts in AD. Lastly, a significant benefit is that user-centred software systems create and promote team collaboration and communication and, ultimately, successful software projects. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information and Communication Technology, 2022
- Full Text:
- Date Issued: 2023-04
- Authors: Manakaza, Mpile
- Date: 2023-04
- Subjects: Customer satisfaction , Agile development (Computer science) , South Africa
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60949 , vital:69295
- Description: The Agile software development methodology has progressed over time and has become the most popularly used methodology for many projects owing to its adaptable and advanced nature. Agile is an iterative and incremental method that supports project teams to maintain the growing demands of present-day organisations. In software development, it is imperative to build software that ensures a holistic user experience and meets requirements. Software Developers and User Experience Designers focus on users’ preferences and requirements while navigating an application through an approach called user-centred design (UCD). The purpose of Agile user-experience (UX) methods is to build user-centric software solutions using the Agile methodology. Literature indicates a scarcity of Agile-UX models to integrate user experience design processes effectively within Agile software development. Hence, the motivation for this study was to create a practical model for integrating user experience design processes into Agile software development for implementation by software development teams. Initially, the study defines the problem that formed the basis for the initiation of this research, followed by the research questions and objectives that are the fundamental portion of the development of this study. This study highlights the benefits and challenges of Agile-UX methods through a case study of Agile software development teams in South Africa. Furthermore, additional best practices are recommended. A survey questionnaire was distributed to software development teams to identify the various factors that lead to implementing Agile-UX methods. The distribution of the survey questionnaire supported the theoretical perspective of this study. Furthermore, Agile development (AD) and UCD are not easy to combine as UCD aims to understand users before software product development, and no activities are performed before development starts in AD. Lastly, a significant benefit is that user-centred software systems create and promote team collaboration and communication and, ultimately, successful software projects. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information and Communication Technology, 2022
- Full Text:
- Date Issued: 2023-04
A model for the detection of breast cancer using machine learning and thermal images in a mobile environment
- Authors: Lennox, Nicholas
- Date: 2020
- Subjects: Breast -- Cancer -- Imaging , Breast -- Imaging Mobile communication systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46097 , vital:39492
- Description: Breast cancer is the most common cancer amongst women and one of the deadliest. Various modalities exist which image the breasts, all with a focus on early detection; thermography is one such method. It is a non-invasive test, which is safe and can be used for a wide variety of breast densities. It functions by analysing thermal patterns captured via an infrared camera of the surface of the breast. Advances in infrared and mobile technology enable this modality to be mobile based; allowing a high degree of portability at a lower cost. Furthermore, as technology has improved, machine learning has played a larger role in medical practices by offering unbiased, consistent, and timely second opinions. Machine learning algorithms are able to classify medical images automatically if offered in the correct format. This study aims to provide a model, which integrates breast cancer detection, thermal imaging, machine learning, and mobile technology. The conceptual model is theorised from three literature studies regarding: identifiable aspects of breast cancer through thermal imaging, the mobile ecosystem, and classification using machine learning algorithms. The model is implemented and evaluated using an experiment designed to classify automatically thermal breast images of the same quality that mobile attachable thermal cameras are able to capture. The experiment contrasts various combinations of segmentation methods, extracted features, and classification algorithms. Promising results were shown in the experiment with a high degree of accuracy obtained. The successful results obtained from the experimentation process validates the feasibility of the model.
- Full Text:
- Date Issued: 2020
- Authors: Lennox, Nicholas
- Date: 2020
- Subjects: Breast -- Cancer -- Imaging , Breast -- Imaging Mobile communication systems
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46097 , vital:39492
- Description: Breast cancer is the most common cancer amongst women and one of the deadliest. Various modalities exist which image the breasts, all with a focus on early detection; thermography is one such method. It is a non-invasive test, which is safe and can be used for a wide variety of breast densities. It functions by analysing thermal patterns captured via an infrared camera of the surface of the breast. Advances in infrared and mobile technology enable this modality to be mobile based; allowing a high degree of portability at a lower cost. Furthermore, as technology has improved, machine learning has played a larger role in medical practices by offering unbiased, consistent, and timely second opinions. Machine learning algorithms are able to classify medical images automatically if offered in the correct format. This study aims to provide a model, which integrates breast cancer detection, thermal imaging, machine learning, and mobile technology. The conceptual model is theorised from three literature studies regarding: identifiable aspects of breast cancer through thermal imaging, the mobile ecosystem, and classification using machine learning algorithms. The model is implemented and evaluated using an experiment designed to classify automatically thermal breast images of the same quality that mobile attachable thermal cameras are able to capture. The experiment contrasts various combinations of segmentation methods, extracted features, and classification algorithms. Promising results were shown in the experiment with a high degree of accuracy obtained. The successful results obtained from the experimentation process validates the feasibility of the model.
- Full Text:
- Date Issued: 2020
A Protection of Personal Information Act Compliance Framework for the City of Tshwane’s Fresh Produce Market.
- Authors: Malepeng, Pheah Harold
- Date: 2023-04
- Subjects: Personal data protection , Agricultural marketing –- South Africa, City of Tshwane
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/61213 , vital:69804
- Description: The Protection of Personal Information Act of 2013 (POPIA) is a law drafted to regulate the processing of personal information in South Africa. Its provisions include but are not limited to the usage of personal information for marketing purposes. While it was announced that enforcement of the law would commence in July 2021, many organisations are still in the process of reorganising themselves to comply with this important piece of legislation. Although the Information Regulator’s guideline document is available for utilization, organisations are struggling to develop POPIA compliance frameworks tailored to their operational requirements. As stated in section 6.2.1 of the Information Regulator’s guideline document, the act calls for the appointment of the an Information Officer by organisations who is required to develop, implement, monitor and maintain a POPIA compliance, framework. With that stated, this study aims to reports about developing a POPIA compliance framework for the City of Tshwane’s Fresh Produce Market. The study’s primary objective was to develop a POPIA compliance framework for the City of Tshwane’s Fresh Produce Market (TFPM) as a collector and processor of personal information. The study had three sub-objectives which were achieved using three research methods, namely literature review, content analysis and semi-structured interviews. Through a literature review, conditions that should be adhered to in relation to collecting and processing personal information were identified. Shifting the focus to the second sub-objective, a vigorous content analysis was performed to investigate the TFPM’s current method of collecting and processing personal information. The process involved evaluating the TFPM’s SOPs, Service Level Agreement, License Agreement, and the city of Tshwane’s Information Communication Technology Framework using the Nexia POPIA checklist. The evaluation results revealed a huge non-compliance gap with regard iii to POPIA and personal information conditions. Post development of the POPIA framework the study embarked on an expert review process with the top management of the TFPM to assess their view on the developed POPIA compliance framework. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: Malepeng, Pheah Harold
- Date: 2023-04
- Subjects: Personal data protection , Agricultural marketing –- South Africa, City of Tshwane
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/61213 , vital:69804
- Description: The Protection of Personal Information Act of 2013 (POPIA) is a law drafted to regulate the processing of personal information in South Africa. Its provisions include but are not limited to the usage of personal information for marketing purposes. While it was announced that enforcement of the law would commence in July 2021, many organisations are still in the process of reorganising themselves to comply with this important piece of legislation. Although the Information Regulator’s guideline document is available for utilization, organisations are struggling to develop POPIA compliance frameworks tailored to their operational requirements. As stated in section 6.2.1 of the Information Regulator’s guideline document, the act calls for the appointment of the an Information Officer by organisations who is required to develop, implement, monitor and maintain a POPIA compliance, framework. With that stated, this study aims to reports about developing a POPIA compliance framework for the City of Tshwane’s Fresh Produce Market. The study’s primary objective was to develop a POPIA compliance framework for the City of Tshwane’s Fresh Produce Market (TFPM) as a collector and processor of personal information. The study had three sub-objectives which were achieved using three research methods, namely literature review, content analysis and semi-structured interviews. Through a literature review, conditions that should be adhered to in relation to collecting and processing personal information were identified. Shifting the focus to the second sub-objective, a vigorous content analysis was performed to investigate the TFPM’s current method of collecting and processing personal information. The process involved evaluating the TFPM’s SOPs, Service Level Agreement, License Agreement, and the city of Tshwane’s Information Communication Technology Framework using the Nexia POPIA checklist. The evaluation results revealed a huge non-compliance gap with regard iii to POPIA and personal information conditions. Post development of the POPIA framework the study embarked on an expert review process with the top management of the TFPM to assess their view on the developed POPIA compliance framework. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
A strategic approach towards the successful implementation of corporate governance of Information and Communication Technology in the Kwazulu-Natal Department of Social Development
- Authors: Siziba, Makabongwe Johnson
- Date: 2020
- Subjects: Corporate governance -- South Africa -- KwaZulu-Natal -- Management Information technology -- Management -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49617 , vital:41741
- Description: Information is a critical asset in any organisation and its management, including the associated technological channels, requires the attention of decision-makers to ensure that information assets are utilised for the intended purposes. Therefore, decision-makers need to have appropriate governance oversight on technology that produces information and information itself. Over the years, the governance of ICT has been adopted in the public sector given the fact that state funding received from tax collections is utilised to invest in IT solutions with the intention of expediting service delivery and increase productivity. The purpose of this treatise was to identify the root causes of why the department is not implementing Corporate Governance of ICT successfully despite the fact that most good controls do exist. The research revealed that there is insufficient budget to implement ICT projects coupled with inadequate ICT staff to implement ICT strategy. Furthermore, it cited a lack of ICT governance skills with ICT Strategic Committee members who are tasked with pioneering ICT governance. This weakness relates directly to other identified weaknesses such as end-user resistance to adopt ICT projects and a lack of project management function in the department.
- Full Text:
- Date Issued: 2020
- Authors: Siziba, Makabongwe Johnson
- Date: 2020
- Subjects: Corporate governance -- South Africa -- KwaZulu-Natal -- Management Information technology -- Management -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49617 , vital:41741
- Description: Information is a critical asset in any organisation and its management, including the associated technological channels, requires the attention of decision-makers to ensure that information assets are utilised for the intended purposes. Therefore, decision-makers need to have appropriate governance oversight on technology that produces information and information itself. Over the years, the governance of ICT has been adopted in the public sector given the fact that state funding received from tax collections is utilised to invest in IT solutions with the intention of expediting service delivery and increase productivity. The purpose of this treatise was to identify the root causes of why the department is not implementing Corporate Governance of ICT successfully despite the fact that most good controls do exist. The research revealed that there is insufficient budget to implement ICT projects coupled with inadequate ICT staff to implement ICT strategy. Furthermore, it cited a lack of ICT governance skills with ICT Strategic Committee members who are tasked with pioneering ICT governance. This weakness relates directly to other identified weaknesses such as end-user resistance to adopt ICT projects and a lack of project management function in the department.
- Full Text:
- Date Issued: 2020
A Strategy for good IT Governance in South African Municipalities
- Authors: Sibanda, Mbusi
- Date: 2020
- Subjects: Information technology -- Management -- South Africa
- Language: English
- Type: Thesis , Doctoral , DIT
- Identifier: http://hdl.handle.net/10948/49573 , vital:41737
- Description: Information technology (IT) is widely used in South African municipalities as a tool for enabling business processes and therefore its design and implementation are critical to municipalities delivering on their core mandate of delivering services to their communities. The implementation of IT relies on the adoption of sound IT governance practices, whose outcome is to ensure that municipalities derive value from the use of IT and minimise the risk associated with it. However, the implementation of IT governance has proved to be challenging in most municipalities. This research sought to devise a strategic approach to the effective and viable implementation of IT governance in municipalities in South Africa. The research was carried out by adopting a design science research approach, which is increasingly being used for studies in the IT discipline as it assists in solving problems through the design of innovative artefacts, in this case a strategy for the implementation of IT governance. To address the objectives, the research was carried out through case studies of South African municipalities which enabled a detailed investigation of phenomena in its natural context. The data was collected by means of mixed methods consisting of a literature review, a survey and semi-structured interviews. A literature review connected to the research problem was done in order to identify the present state of the issues and how they have been confronted. A survey was sent out to municipalities, institutions and individuals with a mandate to support municipalities, while semi-structured interviews were conducted in five municipalities, government departments and regulatory bodies. A thematic analysis of the data collected was performed which led to a diagnosis of the issues. These include inadequate IT infrastructure; lack of coordinated external support; inadequate IT skills; lack of strong and committed IT leadership; poor IT controls; and fragmented planning. Guiding policies and a set of coherent actions for solving the issues were developed. This culminated in the devising of a strategy for the coordinated implementation of IT governance in municipalities. The primary contribution of this study is the formulation of a strategy for the sound implementation of IT governance in South African municipalities. The research contends that by identifying the strategic issues facing municipalities and implementing the proposed actions, most of which fall outside the municipalities, a new contribution to knowledge has been made. Accordingly, the strategy facilitates the development of plans that address the root causes of the poor implementation of IT in municipalities.
- Full Text:
- Date Issued: 2020
- Authors: Sibanda, Mbusi
- Date: 2020
- Subjects: Information technology -- Management -- South Africa
- Language: English
- Type: Thesis , Doctoral , DIT
- Identifier: http://hdl.handle.net/10948/49573 , vital:41737
- Description: Information technology (IT) is widely used in South African municipalities as a tool for enabling business processes and therefore its design and implementation are critical to municipalities delivering on their core mandate of delivering services to their communities. The implementation of IT relies on the adoption of sound IT governance practices, whose outcome is to ensure that municipalities derive value from the use of IT and minimise the risk associated with it. However, the implementation of IT governance has proved to be challenging in most municipalities. This research sought to devise a strategic approach to the effective and viable implementation of IT governance in municipalities in South Africa. The research was carried out by adopting a design science research approach, which is increasingly being used for studies in the IT discipline as it assists in solving problems through the design of innovative artefacts, in this case a strategy for the implementation of IT governance. To address the objectives, the research was carried out through case studies of South African municipalities which enabled a detailed investigation of phenomena in its natural context. The data was collected by means of mixed methods consisting of a literature review, a survey and semi-structured interviews. A literature review connected to the research problem was done in order to identify the present state of the issues and how they have been confronted. A survey was sent out to municipalities, institutions and individuals with a mandate to support municipalities, while semi-structured interviews were conducted in five municipalities, government departments and regulatory bodies. A thematic analysis of the data collected was performed which led to a diagnosis of the issues. These include inadequate IT infrastructure; lack of coordinated external support; inadequate IT skills; lack of strong and committed IT leadership; poor IT controls; and fragmented planning. Guiding policies and a set of coherent actions for solving the issues were developed. This culminated in the devising of a strategy for the coordinated implementation of IT governance in municipalities. The primary contribution of this study is the formulation of a strategy for the sound implementation of IT governance in South African municipalities. The research contends that by identifying the strategic issues facing municipalities and implementing the proposed actions, most of which fall outside the municipalities, a new contribution to knowledge has been made. Accordingly, the strategy facilitates the development of plans that address the root causes of the poor implementation of IT in municipalities.
- Full Text:
- Date Issued: 2020
A strategy to motivate continued instructor usage of learning management systems (LMSS) in higher learning institutions of Zimbabwe
- Authors: Siwela, Ndukuyenkosi
- Date: 2020
- Subjects: Web-based instruction , Computer systems Organizational learning -- Zimbabwe Internet in education
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47259 , vital:39837
- Description: The purpose of this study was to develop a strategy to motivate continued usage of Learning Management Systems in higher learning institutions of Zimbabwe. A related goal was to identify unique challenges experienced by instructors in their use of LMSs. The use of LMSs is now global and has been fairly successful in developed countries even though past research shows that instructors tend to discontinue usage over a period of time. Whereas most LMSs research is carried in the context of the developed world, the candidate demonstrates that Vantankesh's IS Success Model and Davis' Technology Acceptance Model can be successfully replicated into the developing world on condition that local environment is taken into context. The results showed that LMSs in Zimbabwe higher learning institutions hold a promise of success even though challenges exist. The findings have wider implications on the need to invest in neccessary infrustructure and future predictions on learner interests. The study demonstrates that shared success can be achieved if the local conditions are taken into context when developing a strategy to motivate instructor continued LMS usage. The study holds the practical implication that institutions can motivate instructors to continue with usage of LMSs to deliver quality output in their daily duties.
- Full Text:
- Date Issued: 2020
- Authors: Siwela, Ndukuyenkosi
- Date: 2020
- Subjects: Web-based instruction , Computer systems Organizational learning -- Zimbabwe Internet in education
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47259 , vital:39837
- Description: The purpose of this study was to develop a strategy to motivate continued usage of Learning Management Systems in higher learning institutions of Zimbabwe. A related goal was to identify unique challenges experienced by instructors in their use of LMSs. The use of LMSs is now global and has been fairly successful in developed countries even though past research shows that instructors tend to discontinue usage over a period of time. Whereas most LMSs research is carried in the context of the developed world, the candidate demonstrates that Vantankesh's IS Success Model and Davis' Technology Acceptance Model can be successfully replicated into the developing world on condition that local environment is taken into context. The results showed that LMSs in Zimbabwe higher learning institutions hold a promise of success even though challenges exist. The findings have wider implications on the need to invest in neccessary infrustructure and future predictions on learner interests. The study demonstrates that shared success can be achieved if the local conditions are taken into context when developing a strategy to motivate instructor continued LMS usage. The study holds the practical implication that institutions can motivate instructors to continue with usage of LMSs to deliver quality output in their daily duties.
- Full Text:
- Date Issued: 2020
A strategy towards implementing standardised data structures in municipal information systems
- Authors: Koekemoer, Silma Marguerite
- Date: 2020
- Subjects: Data structures (Computer science) , Municipal government -- Data processing Public administration -- Data processing Management information systems
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46064 , vital:39482
- Description: The regulation pertaining to a Standard Chart of Accounts (SCOA) for Municipalities was published in 2014 and is applicable to all 257 municipalities and municipal entities in South Africa. The regulation represents a data classification framework or structure and affects all financial management and internal control systems (FMICS) used by municipalities and municipal entities, and affects key business processes within these organisations. Compliance with the SCOA regulation means that the full municipal accountability cycle should accommodate all seven of the SCOA segments, from the budget through transacting and reporting at the transaction level, with all seven of the segments being embedded in the master data table of the municipal FMICS. While the change to technology and systems may be self-evident, the related business change should not be underestimated. This information technology (IT) driven organisational change across the whole municipal environment represents the research topic and key objective of this research study, namely, a strategy towards implementing standard data structures in municipal IT systems. The study followed a pragmatic philosophy using diagnostic reasoning based on an inductive approach, multiple action research methods and a descriptive case study to derive the proposed implementation strategy. The research subjects, which included 25 pilot municipalities, were studied for the duration of the pilot implementation of the strategy with the objective of identifying and utilising the lessons learnt from their experience to fast track the rollout of the strategy to non-pilot municipalities. The study was limited to the local government environment and to South Africa as a geographic area and involved an accidental sample aligned to the implementation project under investigation. The proposed implementation strategy was, however, of a generic nature and is therefore applicable to any other institution or environment engaged in a similar implementation project. The main contribution of the study is an implementation strategy for standard data structures in municipal financial information systems and which consists of seven diagnostics, 17 guiding policies and 48 coherent actions. The strategy was developed and refined during six cycles of data collection, which were conducted at 25 municipalities actively involved in implementing of the standard data structures. The secondary contributions of the research study include three conference papers and one submission to an academic journal.
- Full Text:
- Date Issued: 2020
- Authors: Koekemoer, Silma Marguerite
- Date: 2020
- Subjects: Data structures (Computer science) , Municipal government -- Data processing Public administration -- Data processing Management information systems
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46064 , vital:39482
- Description: The regulation pertaining to a Standard Chart of Accounts (SCOA) for Municipalities was published in 2014 and is applicable to all 257 municipalities and municipal entities in South Africa. The regulation represents a data classification framework or structure and affects all financial management and internal control systems (FMICS) used by municipalities and municipal entities, and affects key business processes within these organisations. Compliance with the SCOA regulation means that the full municipal accountability cycle should accommodate all seven of the SCOA segments, from the budget through transacting and reporting at the transaction level, with all seven of the segments being embedded in the master data table of the municipal FMICS. While the change to technology and systems may be self-evident, the related business change should not be underestimated. This information technology (IT) driven organisational change across the whole municipal environment represents the research topic and key objective of this research study, namely, a strategy towards implementing standard data structures in municipal IT systems. The study followed a pragmatic philosophy using diagnostic reasoning based on an inductive approach, multiple action research methods and a descriptive case study to derive the proposed implementation strategy. The research subjects, which included 25 pilot municipalities, were studied for the duration of the pilot implementation of the strategy with the objective of identifying and utilising the lessons learnt from their experience to fast track the rollout of the strategy to non-pilot municipalities. The study was limited to the local government environment and to South Africa as a geographic area and involved an accidental sample aligned to the implementation project under investigation. The proposed implementation strategy was, however, of a generic nature and is therefore applicable to any other institution or environment engaged in a similar implementation project. The main contribution of the study is an implementation strategy for standard data structures in municipal financial information systems and which consists of seven diagnostics, 17 guiding policies and 48 coherent actions. The strategy was developed and refined during six cycles of data collection, which were conducted at 25 municipalities actively involved in implementing of the standard data structures. The secondary contributions of the research study include three conference papers and one submission to an academic journal.
- Full Text:
- Date Issued: 2020
A transportation management framework for the Polokwane local municipality during Zion Christian Church (ZCC) Easter weekend pilgrimage
- Authors: Mathebula, Andrew Mabila
- Date: 2020
- Subjects: Transportation -- Management , Urban transportation -- Planning Urban transportation -- Management Christian pilgrims and pilgrimages
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46152 , vital:39509
- Description: The study investigated the impact of the high volume of vehicular traffic on pilgrims and the community during the Zion Christian Church (ZCC) Easter weekend pilgrimage. The researcher adopted an interpretivist research philosophy, and thus attempted to understand policy, planning, and management of the ZCC Easter pilgrimage through meanings that municipal officials assign to them. The study employed the action research approach by collaborating with the Polokwane Local Municipality (PLM) with a view to evolving lasting solutions to traffic congestion during the Easter weekend. The researchers used the seven-step model proposed by Van Tonder and Dietrichsen (Van Tonder and Dietrichsen, 2008). The justification of the model is that it is aligned with the action research model of Organisational Development (OD). It requires that a diagnosis process should be collaborative and participative towards offering solutions to organisational challenges as opposed to imposing a unilateral theoretical generated solution. This model also fits the ontological stance of the researchers which assumes that reality is co-constructed through engagement with other stakeholders. The researcher conducted semi-structured individual and focus groups discussion (FGD) using openended guides. The data from the informants were collected until a point of saturation. In addition to facilitation FGD discussion, the researcher made his own personal reflection of the participatory action research (PAR). A content analysis method was used to synthesise the qualitative data. The contents were extracted from transcribed interviews. The researcher carefully reviewed the notes several times and coded the notes independently. After that, the researcher coded the codes with each other for any potential contradiction. These codes were converted into themes and sub-themes. The qualitative content analysis process, led by the researcher, was both inductive and deductive. Prior to the inductive process, the researcher listened carefully to the audio recordings transcriptions to get a general understanding of participants’ experiences. The findings indicate that the South African transportation planning approach is ossified and divorced from reality. There is a lacuna to address peak traffic challenges during the Easter weekend and the festive season. It is notable that the government-led seasonal road safety campaigns such as ‘Arrive Alive’ are curiously inadequate to address peak traffic and road accidents challenges in South Africa during the ZCC Easter pilgrimage. The transportation management framework for the PLM as well as a peak traffic standard were developed as part of the study recommendations. These recommendations augur a shift to transport planning in South Africa.
- Full Text:
- Date Issued: 2020
- Authors: Mathebula, Andrew Mabila
- Date: 2020
- Subjects: Transportation -- Management , Urban transportation -- Planning Urban transportation -- Management Christian pilgrims and pilgrimages
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/46152 , vital:39509
- Description: The study investigated the impact of the high volume of vehicular traffic on pilgrims and the community during the Zion Christian Church (ZCC) Easter weekend pilgrimage. The researcher adopted an interpretivist research philosophy, and thus attempted to understand policy, planning, and management of the ZCC Easter pilgrimage through meanings that municipal officials assign to them. The study employed the action research approach by collaborating with the Polokwane Local Municipality (PLM) with a view to evolving lasting solutions to traffic congestion during the Easter weekend. The researchers used the seven-step model proposed by Van Tonder and Dietrichsen (Van Tonder and Dietrichsen, 2008). The justification of the model is that it is aligned with the action research model of Organisational Development (OD). It requires that a diagnosis process should be collaborative and participative towards offering solutions to organisational challenges as opposed to imposing a unilateral theoretical generated solution. This model also fits the ontological stance of the researchers which assumes that reality is co-constructed through engagement with other stakeholders. The researcher conducted semi-structured individual and focus groups discussion (FGD) using openended guides. The data from the informants were collected until a point of saturation. In addition to facilitation FGD discussion, the researcher made his own personal reflection of the participatory action research (PAR). A content analysis method was used to synthesise the qualitative data. The contents were extracted from transcribed interviews. The researcher carefully reviewed the notes several times and coded the notes independently. After that, the researcher coded the codes with each other for any potential contradiction. These codes were converted into themes and sub-themes. The qualitative content analysis process, led by the researcher, was both inductive and deductive. Prior to the inductive process, the researcher listened carefully to the audio recordings transcriptions to get a general understanding of participants’ experiences. The findings indicate that the South African transportation planning approach is ossified and divorced from reality. There is a lacuna to address peak traffic challenges during the Easter weekend and the festive season. It is notable that the government-led seasonal road safety campaigns such as ‘Arrive Alive’ are curiously inadequate to address peak traffic and road accidents challenges in South Africa during the ZCC Easter pilgrimage. The transportation management framework for the PLM as well as a peak traffic standard were developed as part of the study recommendations. These recommendations augur a shift to transport planning in South Africa.
- Full Text:
- Date Issued: 2020