Financial inclusion in South Africa
- Authors: Abrahams, Rayghana
- Date: 2017
- Subjects: Financial services industry -- South Africa , Financial institutions -- South Africa Finance -- South Africa South Africa -- Economic conditions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13579 , vital:27240
- Description: The research for this study was guided by the question on whether the financial inclusion improvement strategies of the South African government adequately address the financial inclusion targets, as set out in the National Development Plan. This descriptive non-empirical study was conducted by means of a literature review. The secondary data used for the study were collected from a number of sources, namely: (i) the 2015 Brookings Financial and Digital Inclusion Project report; (ii) the 2014 Global Findex survey; (iii) the InterMedia surveys; (iv) Financial Access surveys; (v) various national FinScope surveys; and (iv) a number of working papers of the World Bank related to financial inclusion. The data revealed that South Africa, with its sophisticated financial sector, was early to adopt policies and initiatives to advance financial inclusion and the country has experienced a noticeable increase in financial inclusion from 61% in 2004 to 87% in 2015. South Africa is 3% away from its National Development Plan goal of 90% financial inclusion by 2030. This indicates that overall, the financial inclusion initiatives adopted by the South African government were successful.
- Full Text:
- Date Issued: 2017
- Authors: Abrahams, Rayghana
- Date: 2017
- Subjects: Financial services industry -- South Africa , Financial institutions -- South Africa Finance -- South Africa South Africa -- Economic conditions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13579 , vital:27240
- Description: The research for this study was guided by the question on whether the financial inclusion improvement strategies of the South African government adequately address the financial inclusion targets, as set out in the National Development Plan. This descriptive non-empirical study was conducted by means of a literature review. The secondary data used for the study were collected from a number of sources, namely: (i) the 2015 Brookings Financial and Digital Inclusion Project report; (ii) the 2014 Global Findex survey; (iii) the InterMedia surveys; (iv) Financial Access surveys; (v) various national FinScope surveys; and (iv) a number of working papers of the World Bank related to financial inclusion. The data revealed that South Africa, with its sophisticated financial sector, was early to adopt policies and initiatives to advance financial inclusion and the country has experienced a noticeable increase in financial inclusion from 61% in 2004 to 87% in 2015. South Africa is 3% away from its National Development Plan goal of 90% financial inclusion by 2030. This indicates that overall, the financial inclusion initiatives adopted by the South African government were successful.
- Full Text:
- Date Issued: 2017
The relationship between opportunity-related aspects and the performance of primary co-operatives in South Africa
- Authors: Bodley, David Cyril
- Date: 2017
- Subjects: Organizational effectiveness -- Measurement Performance , Small business -- Management Success in business
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14653 , vital:27813
- Description: South Africa is a country facing divisive social and economic challenges. It has a history that generated imbalances within the economy and requires urgent solutions to one of the most significant issues the country faces, having too few South Africans in work. Globally, a key solution to creating work has been to make small business the engine-room of economies. Consequently, the South African Government has identified the establishment of small businesses as a priority, which incorporates the development of collaborative forms of businesses in marginalised communities. The co-operative form of business and a strong co-operative movement is, therefore, a critical element of government’s initiative to create work and economic independence for South Africans. Governed by the seven International Labour Organization (ILO) principles, this form of business is often more complex than a typical firm, making the task of establishing and growing these entities particularly challenging. This study analyses the literature to gain an understanding of co-operative movements across the globe. It then looks at the specific challenges the movement faces in South Africa, followed by an analysis of best practice that a business should engage in its establishment and growth. Specifically, the literature examines whether there is a relationship between opportunity-related industry, market and entrepreneurial team aspects and improved business performance of business entities such as co-operatives. The study collates data from co-operatives in the South African economy using two separate methodologies. Firstly, a structured interview was used to acquire information on the opportunity-related aspects. Secondly, business transactions were recorded and basic financial statements were produced for each co-operative, enabling a rating on business performance. The primary data was then analysed within Chapter 6, to investigate the strength of the relationship between opportunity-related aspects and business performance. The findings extracted from the primary data reinforced certain facts within the body of knowledge as it relates to the relationship between opportunity-related aspects and business performance, but there were also some interesting new insights that were extracted from the data. The South African co-operative movement has achieved certain success and momentum as well as experiencing certain failures, and the study clearly highlights both, and makes recommendations to improve the movements and government’s efforts to establish a vibrant and meaningful co-operative sector.
- Full Text:
- Date Issued: 2017
- Authors: Bodley, David Cyril
- Date: 2017
- Subjects: Organizational effectiveness -- Measurement Performance , Small business -- Management Success in business
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14653 , vital:27813
- Description: South Africa is a country facing divisive social and economic challenges. It has a history that generated imbalances within the economy and requires urgent solutions to one of the most significant issues the country faces, having too few South Africans in work. Globally, a key solution to creating work has been to make small business the engine-room of economies. Consequently, the South African Government has identified the establishment of small businesses as a priority, which incorporates the development of collaborative forms of businesses in marginalised communities. The co-operative form of business and a strong co-operative movement is, therefore, a critical element of government’s initiative to create work and economic independence for South Africans. Governed by the seven International Labour Organization (ILO) principles, this form of business is often more complex than a typical firm, making the task of establishing and growing these entities particularly challenging. This study analyses the literature to gain an understanding of co-operative movements across the globe. It then looks at the specific challenges the movement faces in South Africa, followed by an analysis of best practice that a business should engage in its establishment and growth. Specifically, the literature examines whether there is a relationship between opportunity-related industry, market and entrepreneurial team aspects and improved business performance of business entities such as co-operatives. The study collates data from co-operatives in the South African economy using two separate methodologies. Firstly, a structured interview was used to acquire information on the opportunity-related aspects. Secondly, business transactions were recorded and basic financial statements were produced for each co-operative, enabling a rating on business performance. The primary data was then analysed within Chapter 6, to investigate the strength of the relationship between opportunity-related aspects and business performance. The findings extracted from the primary data reinforced certain facts within the body of knowledge as it relates to the relationship between opportunity-related aspects and business performance, but there were also some interesting new insights that were extracted from the data. The South African co-operative movement has achieved certain success and momentum as well as experiencing certain failures, and the study clearly highlights both, and makes recommendations to improve the movements and government’s efforts to establish a vibrant and meaningful co-operative sector.
- Full Text:
- Date Issued: 2017
Experiences of analogue-trained radiographers utilising digital imaging in projection radiography
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
- Authors: Campbell, Sydney
- Date: 2017
- Subjects: Radiography, Medical -- Digital techniques Angiography , Image processing -- Digital techniques Radiography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/14796 , vital:27851
- Description: The professional work of a radiographer encompasses both patient care and the use of technology. The technology employed could either be analogue or digital technology. Since 1973, the analogue imaging system has slowly been replaced by digital radiography imaging systems. Despite the many advantages of digital imaging it does present the radiographer with added responsibilities. Furthermore, analogue-trained radiographers have found adjusting to digital imaging especially challenging. The aim of the study was to explore and describe the experiences of analogue-trained radiographers utilising digital imaging in projection radiography with the intention of developing guidelines to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. The researcher used Schlossberg’s Transition Theory as a lens to look at the experiences of analogue-trained radiographers using digital imaging to produce radiographs. The research study used a qualitative design which was explorative, descriptive and contextual in nature. The target population included all diagnostic radiographers (public and private) in the local municipality who were registered with the Health Professions Council of South Africa. Purposive sampling was employed to select the radiographers that represented all radiographers in the Nelson Mandela Bay Health District. The sample included all radiographers who fulfilled the identified selection criteria. The selected participants were recruited to take part in in-depth, semi-structured individual interviews. The data was analysed using a computer-aided qualitative data analysis software package, ATLAS.ti. The trustworthiness of this study was ensured by applying Guba’s model of trustworthiness that includes credibility, transferability, dependability and confirmability. The ethical principles of respect for persons, beneficence and justice, as espoused by the Belmont Report, were adhered to in order to ensure that the study was conducted in an ethical manner. Two themes emanated from the data, namely the evolution of the radiographer when faced with the advances in technology as well the role that the work environment played in the manner that the participants experienced the change. The experiences of the participants were described using direct quotations from the interviews and a literature control was used to verify the participants’ experiences. Evidence was found of radiographer indifference towards exposure selection, dose optimisation and placement of anatomical side markers when utilising digital imaging. Finally, guidelines were developed to equip radiography managers to assist analogue-trained radiographers to better utilise digital imaging. In addition, the guidelines will assist all other radiographers to better utilise digital imaging.
- Full Text:
- Date Issued: 2017
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
Developing end-user requirements for the design of an eProcurement portal
- Authors: Du Preez, Pedro Gordon
- Date: 2017
- Subjects: End-user computing , Government purchasing -- South Africa Business information services Management information systems Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/33272 , vital:32628
- Description: During the 2015 South African budget speech, the country was made aware of the proposed changes to be introduced to the tendering process. These changes were to be implemented from 1 April 2015 and were to span over two years. The changes were to facilitate the transition of the tendering process from a paper- based system to a completely digital process, where the majority of the processes will take place on an eProcurement portal (www.etenders.gov.za). This means that businesses will be obligated to use the portal, in order to access tender opportunities and ultimately, to submit tenders on this portal, with the phasing out of all paper-based tender processes. If the portal is to succeed it has to be well adopted by its users. If the portal is not adopted or is used incorrectly, businesses might struggle to access tender opportunities for their business. This research searches to address this problem by helping the users of this portal to gain efficient and effective access to tendering opportunities, through finding and developing user requirements for successful adoption from a user experience perspective. The primary objective of this research is to develop end-user requirements for the design of an eProcurement portal. To achieve this, a general understanding of the legal policies in place for tendering is necessary, as well as a first-hand experience of the users. Case study research methodology and a mixed method approach are used to gather both qualitative and quantitative data. The case study is conducted in the Eastern Cape and directed at business within the construction sector that do tender, as this research is only focusing on the end user and their roles within the tendering process and not on the government internal tendering processes. The outcome of this research is to offer a list of user requirements that can be used within the design of the eProcurement portal that will function as valuable material towards the adoption and effectiveness of the eProcurement portal.
- Full Text:
- Date Issued: 2017
- Authors: Du Preez, Pedro Gordon
- Date: 2017
- Subjects: End-user computing , Government purchasing -- South Africa Business information services Management information systems Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/33272 , vital:32628
- Description: During the 2015 South African budget speech, the country was made aware of the proposed changes to be introduced to the tendering process. These changes were to be implemented from 1 April 2015 and were to span over two years. The changes were to facilitate the transition of the tendering process from a paper- based system to a completely digital process, where the majority of the processes will take place on an eProcurement portal (www.etenders.gov.za). This means that businesses will be obligated to use the portal, in order to access tender opportunities and ultimately, to submit tenders on this portal, with the phasing out of all paper-based tender processes. If the portal is to succeed it has to be well adopted by its users. If the portal is not adopted or is used incorrectly, businesses might struggle to access tender opportunities for their business. This research searches to address this problem by helping the users of this portal to gain efficient and effective access to tendering opportunities, through finding and developing user requirements for successful adoption from a user experience perspective. The primary objective of this research is to develop end-user requirements for the design of an eProcurement portal. To achieve this, a general understanding of the legal policies in place for tendering is necessary, as well as a first-hand experience of the users. Case study research methodology and a mixed method approach are used to gather both qualitative and quantitative data. The case study is conducted in the Eastern Cape and directed at business within the construction sector that do tender, as this research is only focusing on the end user and their roles within the tendering process and not on the government internal tendering processes. The outcome of this research is to offer a list of user requirements that can be used within the design of the eProcurement portal that will function as valuable material towards the adoption and effectiveness of the eProcurement portal.
- Full Text:
- Date Issued: 2017
The relationship between authentic leadership and employee engagement
- Authors: Dube, Yonela Oko Likona
- Date: 2017
- Subjects: Leadership Employee motivation , Employees -- Attitudes Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15160 , vital:28170
- Description: Authenticity is a leadership characteristic of exceptional leaders. It is an essential requirement for future leaders, especially in an era when the motives and behaviours of many leaders are questionable. Authentic leaders are genuine and utter words that can be trusted (Smith, 2014.). Followers have voiced a need for leaders who can be trusted and show consistency in their actions. The study focused on the investigation of authentic leadership and the influence that authentic leadership has on the engagement levels of employees. A theoretical study of leadership, with the focus on authentic leadership and employee engagement was conducted to achieve the objectives of the study. The research included a literature study, which highlighted the characteristics and behaviours of authentic leadership. Both a theoretical and practitioner view of authentic leadership is included in the theoretical study. Semi-structured interviews were held with two prominent leadership practitioners, one from the University of the Free State and the other from the University of Stellenbosch, to obtain their views on the nature of authentic leadership and examples of South African leaders who they considered authentic leaders. The insights gained from the literature review and the interviews, were incorporated into a survey questionnaire developed for use in the empirical study which was conducted at Continental Tyre SA. An electronic questionnaire was administered to managers and their direct subordinates in the manufacturing and marketing/sales divisions. The questionnaire probed the respondents’ perceptions regarding the level of authenticity displayed by leaders in the organisation, and specifically the extent to which leaders demonstrated the characteristics and behaviours associated with authentic leadership. The Authentic Leadership Questionnaire (ALQ), as validated by Walumbwa, Avolio, Gardner, Wernsing and Peterson (2008, p. 64), was used as a basis for the development of the survey questionnaire, with adjustments made to include the practitioner’s perspective as postulated by George (2003, p. 12). The section in the questionnaire on engagement focused on engagement as a psychological state, behavioural engagement and the manager’s role in nurturing engagement. Both managers and employees were requested to provide their view of the manager’s characteristics and behaviours, the managers rated themselves, and both groups rated the engagement levels of employees. A correlation was made between the responses received from the manager and employees. The results of the empirical study revealed that both managers and employees agreed mostly that managers in the organisation displayed the characteristics and behaviours of authentic leadership and employees were engaged. It did however, emerge that the managers were reluctant to share personal information about themselves and that employees believed that managers did not seek feedback on their own behaviour. In terms of employee engagement, the results suggested that the managers believed that employees felt supported, accepted and were committed to the Continental Tyre SA brand; but indicated a lack of knowledge of their roles in the organisation and a lack of passion and energy. Further findings revealed that the managers in the marketing/sales division considered their employees more engaged than the managers in the manufacturing division considered their employees to be. Other findings also revealed that self-awareness in leaders is an important predictor of employee engagement. Self-awareness in a leader is an important feature in facilitating social processes in the leader’s relationship with their followers. Transparent leaders create a psychologically secure environment, enabling employees to be confident and to feel encouraged to express themselves freely. The study concluded with several recommendations. Leaders should be more transparent in their interaction with others by sharing personal stories about themselves. Opportunities should be provided through 360° feedback for employees to give feedback to managers regarding their behaviour. The GIVE (Goals, Interests, Values and Emotions) Model should be used in management development initiatives to facilitate the development of self-awareness and self-knowledge. An appreciative inquiry, which focuses on positive affirmation, should be an approach used in organisations to foster the development of genuine relationships and is an implication of authentic leadership, thus encouraging employee engagement.
- Full Text:
- Date Issued: 2017
- Authors: Dube, Yonela Oko Likona
- Date: 2017
- Subjects: Leadership Employee motivation , Employees -- Attitudes Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15160 , vital:28170
- Description: Authenticity is a leadership characteristic of exceptional leaders. It is an essential requirement for future leaders, especially in an era when the motives and behaviours of many leaders are questionable. Authentic leaders are genuine and utter words that can be trusted (Smith, 2014.). Followers have voiced a need for leaders who can be trusted and show consistency in their actions. The study focused on the investigation of authentic leadership and the influence that authentic leadership has on the engagement levels of employees. A theoretical study of leadership, with the focus on authentic leadership and employee engagement was conducted to achieve the objectives of the study. The research included a literature study, which highlighted the characteristics and behaviours of authentic leadership. Both a theoretical and practitioner view of authentic leadership is included in the theoretical study. Semi-structured interviews were held with two prominent leadership practitioners, one from the University of the Free State and the other from the University of Stellenbosch, to obtain their views on the nature of authentic leadership and examples of South African leaders who they considered authentic leaders. The insights gained from the literature review and the interviews, were incorporated into a survey questionnaire developed for use in the empirical study which was conducted at Continental Tyre SA. An electronic questionnaire was administered to managers and their direct subordinates in the manufacturing and marketing/sales divisions. The questionnaire probed the respondents’ perceptions regarding the level of authenticity displayed by leaders in the organisation, and specifically the extent to which leaders demonstrated the characteristics and behaviours associated with authentic leadership. The Authentic Leadership Questionnaire (ALQ), as validated by Walumbwa, Avolio, Gardner, Wernsing and Peterson (2008, p. 64), was used as a basis for the development of the survey questionnaire, with adjustments made to include the practitioner’s perspective as postulated by George (2003, p. 12). The section in the questionnaire on engagement focused on engagement as a psychological state, behavioural engagement and the manager’s role in nurturing engagement. Both managers and employees were requested to provide their view of the manager’s characteristics and behaviours, the managers rated themselves, and both groups rated the engagement levels of employees. A correlation was made between the responses received from the manager and employees. The results of the empirical study revealed that both managers and employees agreed mostly that managers in the organisation displayed the characteristics and behaviours of authentic leadership and employees were engaged. It did however, emerge that the managers were reluctant to share personal information about themselves and that employees believed that managers did not seek feedback on their own behaviour. In terms of employee engagement, the results suggested that the managers believed that employees felt supported, accepted and were committed to the Continental Tyre SA brand; but indicated a lack of knowledge of their roles in the organisation and a lack of passion and energy. Further findings revealed that the managers in the marketing/sales division considered their employees more engaged than the managers in the manufacturing division considered their employees to be. Other findings also revealed that self-awareness in leaders is an important predictor of employee engagement. Self-awareness in a leader is an important feature in facilitating social processes in the leader’s relationship with their followers. Transparent leaders create a psychologically secure environment, enabling employees to be confident and to feel encouraged to express themselves freely. The study concluded with several recommendations. Leaders should be more transparent in their interaction with others by sharing personal stories about themselves. Opportunities should be provided through 360° feedback for employees to give feedback to managers regarding their behaviour. The GIVE (Goals, Interests, Values and Emotions) Model should be used in management development initiatives to facilitate the development of self-awareness and self-knowledge. An appreciative inquiry, which focuses on positive affirmation, should be an approach used in organisations to foster the development of genuine relationships and is an implication of authentic leadership, thus encouraging employee engagement.
- Full Text:
- Date Issued: 2017
Governing information security within the context of "bring your own device" in small, medium and micro enterprises
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
- Authors: Fani, Noluvuyo
- Date: 2017
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7626 , vital:22114
- Description: Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof.
- Full Text:
- Date Issued: 2017
The profitability of commercial state-owned entities
- Authors: Giliana, Tefo Godfrey
- Date: 2017
- Subjects: Government business enterprises -- South Africa Government corporations -- South Africa , Government ownership -- South Africa Profit -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15633 , vital:28278
- Description: The importance of State-owned entities (SOEs) in a developing State has been argued for centuries. SOEs are perceived as the tool that the State can successfully use to implement its developmental agenda. In the Republic of South Africa, SOEs have been used to ensure universal access to electricity, water and logistical infrastructure to support industrial development, as well as basic service delivery. These entities have been expected to fund these initiatives from their own funds, which alleviated the need for commercial SOEs (also known as State-owned companies) to be profitable without continuous financial injections from the RSA government. Generally, commercial SOEs have been performing poorly financially. This research study aims to determine whether political influence might affect the profitability of these commercial SOEs. The poor financial performance plaguing the commercial SOEs hinders their ability to effectively contribute as a collective to the developmental agenda of the State, as espoused in the current strategic plan of the RSA in the form of the National Development Plan (NDP). Due to the poor financial performance and subsequent diversion of financial resources from other national priorities for their bail-out, commercial SOEs have been considered a liability rather than an asset to the RSA. To satisfy the primary and associated research objectives, qualitative primary and secondary research data have been collected. The primary data have been collected by using the semi-structured interview from the CFOs of commercial SOEs from various government departments – given their proximity to the financial performance and the drivers of this performance in commercial SOEs. CFOs are also part of the commercial SOEs senior-executive management of these entities. The general opinion of the participants and the literature review of the research study is that, indeed, political influence has had an adverse effect on the profitability of commercial SOEs, among others, as a consequence of the positioning of SOEs within the governance system of the RSA, the impact of the recruitment process for senior executives and the implications of an unfunded mandate. It is clear that in the RSA, commercial SOEs, and SOEs in general, will continue to play a pivotal role in the implementation of the developmental agendas of the State, as expressed in the NDP. With the RSA government expecting commercial SOEs to fund these activities from their own funds, it is critical that the State should be an enabler rather than a hindrance for commercial SOEs‟ profitability.
- Full Text:
- Date Issued: 2017
- Authors: Giliana, Tefo Godfrey
- Date: 2017
- Subjects: Government business enterprises -- South Africa Government corporations -- South Africa , Government ownership -- South Africa Profit -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15633 , vital:28278
- Description: The importance of State-owned entities (SOEs) in a developing State has been argued for centuries. SOEs are perceived as the tool that the State can successfully use to implement its developmental agenda. In the Republic of South Africa, SOEs have been used to ensure universal access to electricity, water and logistical infrastructure to support industrial development, as well as basic service delivery. These entities have been expected to fund these initiatives from their own funds, which alleviated the need for commercial SOEs (also known as State-owned companies) to be profitable without continuous financial injections from the RSA government. Generally, commercial SOEs have been performing poorly financially. This research study aims to determine whether political influence might affect the profitability of these commercial SOEs. The poor financial performance plaguing the commercial SOEs hinders their ability to effectively contribute as a collective to the developmental agenda of the State, as espoused in the current strategic plan of the RSA in the form of the National Development Plan (NDP). Due to the poor financial performance and subsequent diversion of financial resources from other national priorities for their bail-out, commercial SOEs have been considered a liability rather than an asset to the RSA. To satisfy the primary and associated research objectives, qualitative primary and secondary research data have been collected. The primary data have been collected by using the semi-structured interview from the CFOs of commercial SOEs from various government departments – given their proximity to the financial performance and the drivers of this performance in commercial SOEs. CFOs are also part of the commercial SOEs senior-executive management of these entities. The general opinion of the participants and the literature review of the research study is that, indeed, political influence has had an adverse effect on the profitability of commercial SOEs, among others, as a consequence of the positioning of SOEs within the governance system of the RSA, the impact of the recruitment process for senior executives and the implications of an unfunded mandate. It is clear that in the RSA, commercial SOEs, and SOEs in general, will continue to play a pivotal role in the implementation of the developmental agendas of the State, as expressed in the NDP. With the RSA government expecting commercial SOEs to fund these activities from their own funds, it is critical that the State should be an enabler rather than a hindrance for commercial SOEs‟ profitability.
- Full Text:
- Date Issued: 2017
Towards a framework for the integration of information security into undergraduate computing curricula
- Gomana, Lindokuhle Gcina, Thomson, Kerry-Lynn
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
Farmers’ perception on factors influencing small-scale vegetable production at Tsengiwe village, South Africa
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
User experience guidelines for mobile natural user interfaces: a case study of physically disabled users
- Authors: Jacobs, Gershwin
- Date: 2017
- Subjects: User interfaces (Computer systems) Human-computer interaction , Mobile computing Augmented reality
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17547 , vital:28377
- Description: Motor impaired people are faced with many challenges, one being the of lack integration into certain spheres of society. Access to information is seen as a major issue for the motor impaired since most forms of interaction or interactive devices are not suited to the needs of motor impaired people. People with motor impairments, like the rest of the population, are increasingly using mobile phones. As a result of the current devices and methods used for interaction with content on mobile phones, various factors prohibit a pleasant experience for users with motor impairments. To counter these factors, this study recognizes the need to implement better suited methods of interaction and navigation to improve accessibility, usability and user experience for motor impaired users. The objective of the study was to gain an understanding of the nature of motor impairments and the challenges that this group of people face when using mobile phones. Once this was determined, a solution to address this problem was found in the form of natural user interfaces. In order to gain a better understanding of this technology, various forms of NUIs and the benefits thereof were studied by the researcher in order to determine how this technology can be implemented to meet the needs of motor impaired people. To test theory, the Samsung Galaxy s5 was selected as the NUI device for the study. It must be noted that this study started in the year 2013 and the Galaxy S5 was the latest device claiming to improve interaction for disabled people at the time. This device was used in a case study that made use of various data collection methods, including participant interviews. Various motor impaired participants were requested to perform predefined tasks on the device, along with the completion of a set of user experience questionnaires. Based on the results of the study, it was found that interaction with mobile phones is an issue for people with motor impairments and that alternative methods of interaction need to be implemented. These results contributed to the final output of this study, namely a set of user experience guidelines for the design of mobile human computer interaction for motor impaired users.
- Full Text:
- Date Issued: 2017
- Authors: Jacobs, Gershwin
- Date: 2017
- Subjects: User interfaces (Computer systems) Human-computer interaction , Mobile computing Augmented reality
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17547 , vital:28377
- Description: Motor impaired people are faced with many challenges, one being the of lack integration into certain spheres of society. Access to information is seen as a major issue for the motor impaired since most forms of interaction or interactive devices are not suited to the needs of motor impaired people. People with motor impairments, like the rest of the population, are increasingly using mobile phones. As a result of the current devices and methods used for interaction with content on mobile phones, various factors prohibit a pleasant experience for users with motor impairments. To counter these factors, this study recognizes the need to implement better suited methods of interaction and navigation to improve accessibility, usability and user experience for motor impaired users. The objective of the study was to gain an understanding of the nature of motor impairments and the challenges that this group of people face when using mobile phones. Once this was determined, a solution to address this problem was found in the form of natural user interfaces. In order to gain a better understanding of this technology, various forms of NUIs and the benefits thereof were studied by the researcher in order to determine how this technology can be implemented to meet the needs of motor impaired people. To test theory, the Samsung Galaxy s5 was selected as the NUI device for the study. It must be noted that this study started in the year 2013 and the Galaxy S5 was the latest device claiming to improve interaction for disabled people at the time. This device was used in a case study that made use of various data collection methods, including participant interviews. Various motor impaired participants were requested to perform predefined tasks on the device, along with the completion of a set of user experience questionnaires. Based on the results of the study, it was found that interaction with mobile phones is an issue for people with motor impairments and that alternative methods of interaction need to be implemented. These results contributed to the final output of this study, namely a set of user experience guidelines for the design of mobile human computer interaction for motor impaired users.
- Full Text:
- Date Issued: 2017
Analysis of factors affecting performance of a low-temperature Organic Rankine Cycle heat engine
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
- Authors: Kalua, Tisaye Bertram
- Date: 2017
- Subjects: Rankine cycle Heat engineering , Cogeneration of electric power and heat
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17844 , vital:28460
- Description: Organic Rankine Cycle (ORC) heat engines convert low-grade heat to other forms of energy such as electrical and mechanical energy. They achieve this by vaporizing and expanding the organic fluid at high pressure, turning the turbine which can be employed to run an alternator or any other mechanism as desired. Conventional Rankine Cycles operate with steam at temperatures above 400 ℃. The broad aspect of the research focussed on the generation of electricity to cater for household needs. Solar energy would be used to heat air which would in turn heat rocks in an insulated vessel. This would act as an energy storage in form of heat from which a heat transfer fluid would collect heat to supply the ORC heat engine for the generation of electricity. The objective of the research was to optimize power output of the ORC heat engine operating at temperatures between 25℃ at the condenser and 90 to 150℃ at the heat source. This was achieved by analysis of thermal energy, mechanical power, electrical power and physical parameters in connection with flow rate of working fluid and heat transfer fluids.
- Full Text:
- Date Issued: 2017
Synergistic interactions of selected medicinal plants traditionally used to treat meningitis
- Kamwamba, Thokozani Edson, Zondie, Leyli
- Authors: Kamwamba, Thokozani Edson , Zondie, Leyli
- Date: 2017
- Subjects: Medicinal plants -- Biotechnology Meningitis -- Treatment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18816 , vital:28729
- Description: The antibacterial and antifungal activities of aqueous, methanol and acetone extracts of the leaves of Geranium incanum, Mangifera indica, Bidens pilosa, Ricinus communis, Carica papaya and fruit pulp of Adansonia digitata as well as activity of their combined preparation were evaluated against selected meningitis causing pathogens. The microorganisms under study were methicillin and oxacillin resistant Staphylococcus aureus (ATCC 43300), Pseudomonas aeruginosa (ATCC 27853), Salmonella typhimurium (ATCC 49416), Escherichia coli (ATCC 35218), Candida albicans (ATCC 10231) and Cryptococcus neoformans (clinical strain). The screening of antimicrobial activities were assessed using an agar well diffusion technique for the different plant extractions. The individual and combined plant extracts that demonstrated antimicrobial effects were further studied using the INT microtitre plate technique to determine the minimum inhibitory concentration. The sum of fractional inhibitory concentration indices were calculated and used to assess the type of antimicrobial interaction. The medicinal plants exerted antimicrobial effects independently and in combination on the bacterial and fungal organisms under study. The antimicrobial activities depended on the test organism and extracting solvents used. In the combination studies, the medicinal plants under study were combined in the ratio of 1:1. Antimicrobial interactions ranging from synergistic to antagonistic effects were noted. Methanol extracts of combinations B. pilosa: M. indica, R. communins: M. indica and C. papaya: M. indica had synergistic effects against P. aeruginosa. On the other hand, aqueous extracts of a mixture of C. papaya: B. pilosa exerted synergistic effects on E. coli and S. typhimurium. Acetone extracts of a mixture of A. digitata: G. incanum, G. incanum: M. indica as well as methanol extract of the combination of C. papaya: G. incanum exhibited synergistic effects against C. albicans. The aqueous extract combination of G. incanum: M. indica displayed the most noteworthy synergistic activity against C. neoformans. In addition, aqueous extracts of the combinations of A. digitata: B. pilosa and R. communis: G. incanum exhibited synergistic effects against C. neoformans. The results validate the traditional healing practices which utilise combinations of different species of plants for treatment of predisposing factors of meningitis.
- Full Text:
- Date Issued: 2017
- Authors: Kamwamba, Thokozani Edson , Zondie, Leyli
- Date: 2017
- Subjects: Medicinal plants -- Biotechnology Meningitis -- Treatment
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18816 , vital:28729
- Description: The antibacterial and antifungal activities of aqueous, methanol and acetone extracts of the leaves of Geranium incanum, Mangifera indica, Bidens pilosa, Ricinus communis, Carica papaya and fruit pulp of Adansonia digitata as well as activity of their combined preparation were evaluated against selected meningitis causing pathogens. The microorganisms under study were methicillin and oxacillin resistant Staphylococcus aureus (ATCC 43300), Pseudomonas aeruginosa (ATCC 27853), Salmonella typhimurium (ATCC 49416), Escherichia coli (ATCC 35218), Candida albicans (ATCC 10231) and Cryptococcus neoformans (clinical strain). The screening of antimicrobial activities were assessed using an agar well diffusion technique for the different plant extractions. The individual and combined plant extracts that demonstrated antimicrobial effects were further studied using the INT microtitre plate technique to determine the minimum inhibitory concentration. The sum of fractional inhibitory concentration indices were calculated and used to assess the type of antimicrobial interaction. The medicinal plants exerted antimicrobial effects independently and in combination on the bacterial and fungal organisms under study. The antimicrobial activities depended on the test organism and extracting solvents used. In the combination studies, the medicinal plants under study were combined in the ratio of 1:1. Antimicrobial interactions ranging from synergistic to antagonistic effects were noted. Methanol extracts of combinations B. pilosa: M. indica, R. communins: M. indica and C. papaya: M. indica had synergistic effects against P. aeruginosa. On the other hand, aqueous extracts of a mixture of C. papaya: B. pilosa exerted synergistic effects on E. coli and S. typhimurium. Acetone extracts of a mixture of A. digitata: G. incanum, G. incanum: M. indica as well as methanol extract of the combination of C. papaya: G. incanum exhibited synergistic effects against C. albicans. The aqueous extract combination of G. incanum: M. indica displayed the most noteworthy synergistic activity against C. neoformans. In addition, aqueous extracts of the combinations of A. digitata: B. pilosa and R. communis: G. incanum exhibited synergistic effects against C. neoformans. The results validate the traditional healing practices which utilise combinations of different species of plants for treatment of predisposing factors of meningitis.
- Full Text:
- Date Issued: 2017
The contribution of management accounting practices to the success of a manufacturing business: a case study of Namibia Breweries limited
- Kapulwa, Aina Tulipunye Ndahekelekwa
- Authors: Kapulwa, Aina Tulipunye Ndahekelekwa
- Date: 2017
- Subjects: Managerial accounting -- Namibia Cost accounting -- Namibia , Breweries -- Namibia -- Finance Namibia Breweries Limited -- Finance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17777 , vital:28453
- Description: Manufacturing plays a significant role in the economy of Namibia, and yet is not performing as anticipated. In this study, the role management accounting plays in the success of a manufacturing business is explored. The research study was guided by the question of whether management accounting practices have an impact on the success of a manufacturing business through decision-making, business strategy formulation and implementation processes, as well as business performance as a whole. The research methodology used for this study is a qualitative case study of the manufacturer, Namibia Breweries Limited. This study used the insight of managers involved in the business strategy formulation and implementation, as well as in the decision-making process. The interviews focused on three themes: the contribution of management accounting practices through the business strategy and decision-making process, the influence of management accounting on business performance, and finally, the management accounting systems used in a manufacturing business. The findings of the study demonstrate that there needs to be greater awareness regarding the influence of management accounting practices on the success of a manufacturing business. Also, periodic appraisals on financial performance, quality of products and personnel performance, as well as a thorough understanding of the costing system, can be essential to the success of a manufacturing business.
- Full Text:
- Date Issued: 2017
- Authors: Kapulwa, Aina Tulipunye Ndahekelekwa
- Date: 2017
- Subjects: Managerial accounting -- Namibia Cost accounting -- Namibia , Breweries -- Namibia -- Finance Namibia Breweries Limited -- Finance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/17777 , vital:28453
- Description: Manufacturing plays a significant role in the economy of Namibia, and yet is not performing as anticipated. In this study, the role management accounting plays in the success of a manufacturing business is explored. The research study was guided by the question of whether management accounting practices have an impact on the success of a manufacturing business through decision-making, business strategy formulation and implementation processes, as well as business performance as a whole. The research methodology used for this study is a qualitative case study of the manufacturer, Namibia Breweries Limited. This study used the insight of managers involved in the business strategy formulation and implementation, as well as in the decision-making process. The interviews focused on three themes: the contribution of management accounting practices through the business strategy and decision-making process, the influence of management accounting on business performance, and finally, the management accounting systems used in a manufacturing business. The findings of the study demonstrate that there needs to be greater awareness regarding the influence of management accounting practices on the success of a manufacturing business. Also, periodic appraisals on financial performance, quality of products and personnel performance, as well as a thorough understanding of the costing system, can be essential to the success of a manufacturing business.
- Full Text:
- Date Issued: 2017
ICT readiness for business continuity in local government
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
- Authors: Koen, Ruan
- Date: 2017
- Subjects: Internet in public administration -- South Africa , Electronic commerce -- Government policy , Municipal services -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7025 , vital:21192
- Description: Information and Communication Technology (ICT) has evolved into a pervasive commodity in modern enterprises. ICT enables enterprises, regardless of sector, to achieve their strategic objectives. Similarly, ICT is regarded as a critical enabler in South African municipalities to reach their objectives and ultimately deliver sustainable services to their communities. This dependence on ICT, therefore, necessitates a resilient ICT environment where minimal disruption to ICT is a primary goal. Unfortunately, as reported by the Auditor-General of South Africa, the majority of South African municipalities are neglecting to address the continuity of their ICT services. Failing to implement adequate ICT continuity controls restrict these municipalities from achieving their strategic goals and, as a result, fulfilling their constitutional mandate of service delivery. It is, therefore, the objective of this study to devise a method, consisting of a theoretical foundation and a supporting tool-set, to assist municipalities in addressing a real-world ICT continuity problem. This method aims to be scalable and usable within different municipalities, and be simplistic and comprehensible enough to implement. The theoretical foundation will introduce the concept of ICT Readiness for Business Continuity, based on the recommendations of international best practices and standards, for example, the ISO 27031 (2011) standard. Furthermore, by considering various challenges within local government, the tool-set will ultimately help municipalities to help themselves in this regard.
- Full Text:
- Date Issued: 2017
The investigation of chemical variation in the stems and rhizomes of cissampelos capensis l. f. (menispermaceae) the Eastern Cape medicinal plant
- Authors: Latolla, Nehemiah Solomon
- Date: 2017
- Subjects: Plants -- Composition Medicinal plants Endemic plants
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13970 , vital:27362
- Description: Cissampelos capensis L. f. (Menispermaceae) commonly known as “Mayisake” (Xhosa) and “Dawidjieswortel” (Afrikaans) is the most commonly used medicinal plant of the Menispermaceae family in South Africa. The rhizomes of Cissampelos capensis are the most used part of the plant to treat illnesses. This poses a threat to the ongoing conservation of this valuable endemic species. Thus, we studied the chemical variation and subsequently the bioactivity in the stems and rhizomes of Cissampelos capensis, the Eastern Cape medicinal plant, to suggest the possible use of the stems for medicinal purposes. We studied the variation in the chemical composition in the stems and the rhizomes by employing four different extraction methods; the methanolic-, non-polar-, alkaloidal- and Total Tertiary Alkaloidal (TTA) to extract compounds from Cissampelos capensis. Employing various chromatographic techniques, HPLC, NMR and LC/MS to investigate the chemical variation and the in vitro assays for the crude materials of the stems and rhizomes of Cissampelos capensis. We successfully documented a library of the phytochemicals content in Cissampelos capensis from three different regions in the Eastern Cape. We could profile different extraction methods, with the TTA extraction delivering the best comparative profile. Employing LC/MS and HPLC we identified eleven known alkaloidal compounds in the stems and rhizomes. We also isolated a known alkaloid, pronuciferine, from the TTA extract and a crystal structure of proto-quericitol from the methanolic extract, which was isolated for the first time from Cissampelos capensis. Preliminary in vitro results suggested anti-inflammatory activity in the methanolic extracts of the stems and rhizomes, while the TTA extracts showed some cytotoxicity. Finally, through analytical HPLC analysis this study found as high as 31% similarity between the chemical variation of the stems and rhizomes, but key alkaloids were not always present, indicating more work is needed before the stems can be recommended as a replacement for the rhizomes.
- Full Text:
- Date Issued: 2017
- Authors: Latolla, Nehemiah Solomon
- Date: 2017
- Subjects: Plants -- Composition Medicinal plants Endemic plants
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13970 , vital:27362
- Description: Cissampelos capensis L. f. (Menispermaceae) commonly known as “Mayisake” (Xhosa) and “Dawidjieswortel” (Afrikaans) is the most commonly used medicinal plant of the Menispermaceae family in South Africa. The rhizomes of Cissampelos capensis are the most used part of the plant to treat illnesses. This poses a threat to the ongoing conservation of this valuable endemic species. Thus, we studied the chemical variation and subsequently the bioactivity in the stems and rhizomes of Cissampelos capensis, the Eastern Cape medicinal plant, to suggest the possible use of the stems for medicinal purposes. We studied the variation in the chemical composition in the stems and the rhizomes by employing four different extraction methods; the methanolic-, non-polar-, alkaloidal- and Total Tertiary Alkaloidal (TTA) to extract compounds from Cissampelos capensis. Employing various chromatographic techniques, HPLC, NMR and LC/MS to investigate the chemical variation and the in vitro assays for the crude materials of the stems and rhizomes of Cissampelos capensis. We successfully documented a library of the phytochemicals content in Cissampelos capensis from three different regions in the Eastern Cape. We could profile different extraction methods, with the TTA extraction delivering the best comparative profile. Employing LC/MS and HPLC we identified eleven known alkaloidal compounds in the stems and rhizomes. We also isolated a known alkaloid, pronuciferine, from the TTA extract and a crystal structure of proto-quericitol from the methanolic extract, which was isolated for the first time from Cissampelos capensis. Preliminary in vitro results suggested anti-inflammatory activity in the methanolic extracts of the stems and rhizomes, while the TTA extracts showed some cytotoxicity. Finally, through analytical HPLC analysis this study found as high as 31% similarity between the chemical variation of the stems and rhizomes, but key alkaloids were not always present, indicating more work is needed before the stems can be recommended as a replacement for the rhizomes.
- Full Text:
- Date Issued: 2017
The risk of borrowed capital for commercial, industrial and residential property developments
- Authors: Loock, Morne
- Date: 2017
- Subjects: Commercial buildings -- Finance Industrial sites -- Finance , Real estate developers -- South Africa Financial institutions -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18288 , vital:28615
- Description: Most property development firms who invest in property will need to raise some extra financial support. Unforeseen or unexpected expenses can arise at any point in time during the development process. Calculated decisions should be taken with regards to the financial circumstances for any property development project. Decisions should be taken not only for the present but for the future as well. It is therefore important to understand the market and the current economic conditions before applying for capital to fund a property development project. There several types of finance available to fund property development, these include long term borrowing, short term borrowing, construction loans property development investment trust, second mortgages. There is risk to all of the aforementioned finance available.
- Full Text:
- Date Issued: 2017
- Authors: Loock, Morne
- Date: 2017
- Subjects: Commercial buildings -- Finance Industrial sites -- Finance , Real estate developers -- South Africa Financial institutions -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/18288 , vital:28615
- Description: Most property development firms who invest in property will need to raise some extra financial support. Unforeseen or unexpected expenses can arise at any point in time during the development process. Calculated decisions should be taken with regards to the financial circumstances for any property development project. Decisions should be taken not only for the present but for the future as well. It is therefore important to understand the market and the current economic conditions before applying for capital to fund a property development project. There several types of finance available to fund property development, these include long term borrowing, short term borrowing, construction loans property development investment trust, second mortgages. There is risk to all of the aforementioned finance available.
- Full Text:
- Date Issued: 2017