Characterising the stress-life response of mechanical and laser formed titanium components
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
Guidelines for the adaptation of the TETRA educational programme at Nelson Mandela Metropolitan University to address human behavioural issues
- Authors: Fouche Nico Pieter
- Date: 2012
- Subjects: Nelson Mandela Metropolitan University -- Communication systems , Human behavior
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9801 , http://hdl.handle.net/10948/d1012248 , Nelson Mandela Metropolitan University -- Communication systems , Human behavior
- Description: Information is a vitally important asset to organizations and the information should be protected to sustain the value it provides to the organization. Information is transferred via different mediums in these organizations. An example would be Terrestrial Trunked Radio or TETRA, which is utilized within organizations to provide a technically very secure form of digital radio communication. TETRA is a communications technology that is currently being successfully used throughout the world for secure, reliable and robust critical communication. TETRA is used by Public Safety and Security (PSS) and transportation sectors, amongst others. PSS includes police officers, fire marshals and emergency medical units who require protected and accurate information that could influence decisions that could make difference between life and death. The TETRA educational programme offered by the TETRA Academy at the Nelson Mandela Metropolitan University (NMMU), educates TETRA users in various aspects of the TETRA standard. TETRA is viewed as a technically very secure communication standard, as it utilizes security features such as mutual authentication, air interface encryption, end-to-end encryption, jamming detection and ambience listening, amongst other security techniques to ensure that the information traversing through the network is kept secure. The TETRA educational programme material includes many physical and technical controls to assist TETRA users in protecting information. However, to what extent does the TETRA educational programme address operational controls? Operational controls address what is often referred to as the weakest link in information security – human behavioural issues. Humans can be exploited through human manipulation attacks, which include social engineering and bribery. Therefore, this study argues towards adapting the TETRA educational programme offered at the NMMU to address these human behavioural issues.
- Full Text:
- Date Issued: 2012
- Authors: Fouche Nico Pieter
- Date: 2012
- Subjects: Nelson Mandela Metropolitan University -- Communication systems , Human behavior
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9801 , http://hdl.handle.net/10948/d1012248 , Nelson Mandela Metropolitan University -- Communication systems , Human behavior
- Description: Information is a vitally important asset to organizations and the information should be protected to sustain the value it provides to the organization. Information is transferred via different mediums in these organizations. An example would be Terrestrial Trunked Radio or TETRA, which is utilized within organizations to provide a technically very secure form of digital radio communication. TETRA is a communications technology that is currently being successfully used throughout the world for secure, reliable and robust critical communication. TETRA is used by Public Safety and Security (PSS) and transportation sectors, amongst others. PSS includes police officers, fire marshals and emergency medical units who require protected and accurate information that could influence decisions that could make difference between life and death. The TETRA educational programme offered by the TETRA Academy at the Nelson Mandela Metropolitan University (NMMU), educates TETRA users in various aspects of the TETRA standard. TETRA is viewed as a technically very secure communication standard, as it utilizes security features such as mutual authentication, air interface encryption, end-to-end encryption, jamming detection and ambience listening, amongst other security techniques to ensure that the information traversing through the network is kept secure. The TETRA educational programme material includes many physical and technical controls to assist TETRA users in protecting information. However, to what extent does the TETRA educational programme address operational controls? Operational controls address what is often referred to as the weakest link in information security – human behavioural issues. Humans can be exploited through human manipulation attacks, which include social engineering and bribery. Therefore, this study argues towards adapting the TETRA educational programme offered at the NMMU to address these human behavioural issues.
- Full Text:
- Date Issued: 2012
Electronic communication continuity planning from the perspective of an individual
- Authors: Fouché, Jacques
- Date: 2012
- Subjects: Electronic systems , Internet
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9802 , http://hdl.handle.net/10948/d1012270 , Electronic systems , Internet
- Description: It is beyond doubt that technology has changed the way people in modern society live their daily lives. While a modern society eagerly adopts new technology, the loss of the services provided by these technologies is hardly ever considered. Therefore, this research project will evaluate the importance of communication technology and how critical it is for an individual. Furthermore, this research will provide a framework to improve the availability of current communication technologies from the perspective of the individual.
- Full Text:
- Date Issued: 2012
- Authors: Fouché, Jacques
- Date: 2012
- Subjects: Electronic systems , Internet
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9802 , http://hdl.handle.net/10948/d1012270 , Electronic systems , Internet
- Description: It is beyond doubt that technology has changed the way people in modern society live their daily lives. While a modern society eagerly adopts new technology, the loss of the services provided by these technologies is hardly ever considered. Therefore, this research project will evaluate the importance of communication technology and how critical it is for an individual. Furthermore, this research will provide a framework to improve the availability of current communication technologies from the perspective of the individual.
- Full Text:
- Date Issued: 2012
A model for assessing the anticipated relative financial impact of implementing the tools of lean manufacturing on a manufacturing concern
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
A framework to mitigate phishing threats
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
The possibility of a flexible wireless 3-D measurement in the modern automobile production
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
An investigation into the antimicrobial and anticancer activities of Geranium incanum, Artemisia afra and Artemisia absinthium
- Authors: Freidberg, Ryno
- Date: 2009
- Subjects: Medicinal plants -- South Africa , Cancer -- Alternative treatment -- South Africa , Anti-infective agents
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10122 , http://hdl.handle.net/10948/1045 , Medicinal plants -- South Africa , Cancer -- Alternative treatment -- South Africa , Anti-infective agents
- Description: It has been estimated that between 3000 and 4000 plant species are used for their medicinal properties throughout South Africa, with approximately 27 million South Africans making use of traditional medicines. Of this 27 million, 3 million South Africans rely on traditional medicine as their primary source of health care. Of the 250 000 to 500 000 known plant species, very few have been investigated for their pharmacological qualities, and compounds of significant medicinal value may still remain undiscovered in many plant species. The aims of this study included investigating the antimicrobial properties of Geranium incanum and Artemisia afra, both plants traditionally used for their medicinal properties, and comparing the antimicrobial activity of the latter to that of Artemisia absinthium, as well as investigating the anticancer properties of G. incanum and A. afra, and comparing the anticancer activity of the latter to that of A. absinthium. Infusions, aqueous-, methanol- and acetone extracts of the three plants were prepared and used for anticancer and antimicrobial screening. Plant specimens used to prepare extracts for antimicrobial activity were collected and extracted over three seasons, while extracts used for anticancer screening were prepared from plants collected during the summer only. Considerable variation existed in the percentage crude extract yields obtained when different extractants were used, while the season in which the plants were harvested and extracted also appeared to play a significant role in the amount of extract obtained. The plant extracts were screened for antimicrobial activity against various strains of Candida albicans, Escherichia coli, Pseudomonas aeruginosa, Enterococcus faecalis, Staphylococcus aureus and Bacillus cereus, using an agar dilution method. G. incanum and A. afra possessed activity for C. albicans, while all three plants showed activity for S. aureus and B. cereus. Activity was largely dependent on the extraction method used. iii The 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyl tetrazolium bromide (MTT) assay was used to screen for anticancer activity of the respective extracts, at varying concentrations, against MCF-7 (human breast adenocarcinoma) cells, HT-29 (human colonic adenocarcinoma) cells and HeLa (human cervical cancer) cells. All of the extracts showed cytotoxic activity in all three cell lines to varying extents, depending on the extract used and cell line screened. The acetone extract of A. afra proved to be the most effective inhibitor with the lowest IC50 (2.65 ± 1.05 μg/ml) having been shown in MCF-7 cells. A. afra and A. absinthium showed similar inhibitory patterns, with the methanol- and acetone extracts having been the most potent inhibitors of each of the respective cell lines in general. Fluorescence microscopy employing 4',6-diamidino-2-phenylindole dihydrochloride (DAPI) and propidium iodide (PI) staining indicated that the acetone extract of A. afra induces apoptosis in MCF-7 cells as apposed to necrosis, and the results were comparable to those obtained for cells exposed to cisplatin. Screening of the A. afra acetone extract for toxicity in normal human cells using the CellTiter-Blue® assay indicated the extract to be toxic to peripheral blood mononuclear cells (PBMC’s) at concentrations comparable to that for MCF-7 cells, while cell cycle analysis of MCF-7 cells exposed to the A. afra acetone extract indicated the extract’s ability to induce apoptosis comparable to that of cisplatin, with the extract exerting its activity at a point during or just prior to the S phase of the cell cycle.
- Full Text:
- Date Issued: 2009
- Authors: Freidberg, Ryno
- Date: 2009
- Subjects: Medicinal plants -- South Africa , Cancer -- Alternative treatment -- South Africa , Anti-infective agents
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10122 , http://hdl.handle.net/10948/1045 , Medicinal plants -- South Africa , Cancer -- Alternative treatment -- South Africa , Anti-infective agents
- Description: It has been estimated that between 3000 and 4000 plant species are used for their medicinal properties throughout South Africa, with approximately 27 million South Africans making use of traditional medicines. Of this 27 million, 3 million South Africans rely on traditional medicine as their primary source of health care. Of the 250 000 to 500 000 known plant species, very few have been investigated for their pharmacological qualities, and compounds of significant medicinal value may still remain undiscovered in many plant species. The aims of this study included investigating the antimicrobial properties of Geranium incanum and Artemisia afra, both plants traditionally used for their medicinal properties, and comparing the antimicrobial activity of the latter to that of Artemisia absinthium, as well as investigating the anticancer properties of G. incanum and A. afra, and comparing the anticancer activity of the latter to that of A. absinthium. Infusions, aqueous-, methanol- and acetone extracts of the three plants were prepared and used for anticancer and antimicrobial screening. Plant specimens used to prepare extracts for antimicrobial activity were collected and extracted over three seasons, while extracts used for anticancer screening were prepared from plants collected during the summer only. Considerable variation existed in the percentage crude extract yields obtained when different extractants were used, while the season in which the plants were harvested and extracted also appeared to play a significant role in the amount of extract obtained. The plant extracts were screened for antimicrobial activity against various strains of Candida albicans, Escherichia coli, Pseudomonas aeruginosa, Enterococcus faecalis, Staphylococcus aureus and Bacillus cereus, using an agar dilution method. G. incanum and A. afra possessed activity for C. albicans, while all three plants showed activity for S. aureus and B. cereus. Activity was largely dependent on the extraction method used. iii The 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyl tetrazolium bromide (MTT) assay was used to screen for anticancer activity of the respective extracts, at varying concentrations, against MCF-7 (human breast adenocarcinoma) cells, HT-29 (human colonic adenocarcinoma) cells and HeLa (human cervical cancer) cells. All of the extracts showed cytotoxic activity in all three cell lines to varying extents, depending on the extract used and cell line screened. The acetone extract of A. afra proved to be the most effective inhibitor with the lowest IC50 (2.65 ± 1.05 μg/ml) having been shown in MCF-7 cells. A. afra and A. absinthium showed similar inhibitory patterns, with the methanol- and acetone extracts having been the most potent inhibitors of each of the respective cell lines in general. Fluorescence microscopy employing 4',6-diamidino-2-phenylindole dihydrochloride (DAPI) and propidium iodide (PI) staining indicated that the acetone extract of A. afra induces apoptosis in MCF-7 cells as apposed to necrosis, and the results were comparable to those obtained for cells exposed to cisplatin. Screening of the A. afra acetone extract for toxicity in normal human cells using the CellTiter-Blue® assay indicated the extract to be toxic to peripheral blood mononuclear cells (PBMC’s) at concentrations comparable to that for MCF-7 cells, while cell cycle analysis of MCF-7 cells exposed to the A. afra acetone extract indicated the extract’s ability to induce apoptosis comparable to that of cisplatin, with the extract exerting its activity at a point during or just prior to the S phase of the cell cycle.
- Full Text:
- Date Issued: 2009
Reviewing medium: paint as flesh
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
A model for integrating information security into the software development life cycle
- Authors: Futcher, Lynn Ann
- Date: 2007
- Subjects: Computer security , Software maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9737 , http://hdl.handle.net/10948/506 , Computer security , Software maintenance
- Description: It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Therefore, information security has become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. However, a common weakness that is inherent in the traditional software development methodologies is the lack of attention given to the security aspects of software development. Most of these methodologies do not explicitly include a standardised method for incorporating information security into their life cycles. Meaningful security can be achieved when information security issues are considered as part of a routine development process, and security safeguards are integrated into the software application throughout its life cycle. This, in turn, will lead to users being more confident to use software applications, and to entrust today's computer systems with their personal information. To build better or more secure software, an improved software development process is required. Security of a software application must be based on the risk associated with the application. In order to understand this risk, the relevant information assets need to be identified together with their threats and vulnerabilities. Therefore, security considerations provide input into every phase of the Software Development Life Cycle (SDLC), from requirements gathering to design, implementation, testing and deployment. This research project presents a Secure Software Development Model (SecSDM) for incorporating information security into all phases of the SDLC, from requirements gathering to systems maintenance. The SecSDM is based on many of the recommendations provided by relevant international standards and best practices, for example, the ISO 7498-2 (1989) standard which addresses the underlying security services and mechanisms that form an integral part of the model.
- Full Text:
- Date Issued: 2007
- Authors: Futcher, Lynn Ann
- Date: 2007
- Subjects: Computer security , Software maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9737 , http://hdl.handle.net/10948/506 , Computer security , Software maintenance
- Description: It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Therefore, information security has become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. However, a common weakness that is inherent in the traditional software development methodologies is the lack of attention given to the security aspects of software development. Most of these methodologies do not explicitly include a standardised method for incorporating information security into their life cycles. Meaningful security can be achieved when information security issues are considered as part of a routine development process, and security safeguards are integrated into the software application throughout its life cycle. This, in turn, will lead to users being more confident to use software applications, and to entrust today's computer systems with their personal information. To build better or more secure software, an improved software development process is required. Security of a software application must be based on the risk associated with the application. In order to understand this risk, the relevant information assets need to be identified together with their threats and vulnerabilities. Therefore, security considerations provide input into every phase of the Software Development Life Cycle (SDLC), from requirements gathering to design, implementation, testing and deployment. This research project presents a Secure Software Development Model (SecSDM) for incorporating information security into all phases of the SDLC, from requirements gathering to systems maintenance. The SecSDM is based on many of the recommendations provided by relevant international standards and best practices, for example, the ISO 7498-2 (1989) standard which addresses the underlying security services and mechanisms that form an integral part of the model.
- Full Text:
- Date Issued: 2007
A critical review of the IFIP TC11 Security Conference Series
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
- Authors: Gaadingwe, Tshepo Gaadingwe
- Date: 2007
- Subjects: Database security , Data protection , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9795 , http://hdl.handle.net/10948/507 , Database security , Data protection , Computers -- Access control
- Description: Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
- Full Text:
- Date Issued: 2007
The development of effective promotional strategies to market public FET/Technical Colleges in the Eastern Cape Province
- Authors: Gaika, Nandipha Gloria
- Date: 2002
- Subjects: Universities and colleges -- South Africa -- Business Management , Marketing research -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10940 , http://hdl.handle.net/10948/d1006191 , Universities and colleges -- South Africa -- Business Management , Marketing research -- South Africa
- Description: Education is a powerful and pervasive agent of change. Therefore, it is the key to unlock the doors to development and modernisation. Currently, business and communities knowledge very little about what the FET/Technical College is offering and its importance to the society as whole. Therefore there is a great need to market the technical sector so that the community is knowledgeable about the FET/Technical Colleges. The research conducted focuses on which promotional strategies are effective in marketing the FET Colleges. In order to make technical college students marketable it is necessary to market the institutions effectively so that all the stakeholders can be aware of what technical colleges can offer. Because of high competition in this industry, it is of vital importance not to be out-marketed by competitors by keeping abreast of new trends in promotional strategies. In order to obtain more relevant information about promotional strategies a literature study was conducted to develop a questionnaire to survey the importance of promotional strategies and determine which promotional strategies are being used by the FET Colleges. The East-London, Queenstown and Ezibeleni Public FET Colleges form the respondents. From each college five academic staff, two management members and five students formed the respondents. Community members, business community members, the Department of Education and the Department of Labour representatives were also included in the sample from each of the selected FET Colleges. The findings of the survey revealed the high level of agreement in terms of the importance of the promotional strategies identified in the literature study with the exception of some promotional strategies, which were identified as not compatible with the FET target market. The study recommended that further research be done on a larger sample size focusing on particular stakeholders eg. students of the FET Colleges in a specific area.
- Full Text:
- Date Issued: 2002
- Authors: Gaika, Nandipha Gloria
- Date: 2002
- Subjects: Universities and colleges -- South Africa -- Business Management , Marketing research -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10940 , http://hdl.handle.net/10948/d1006191 , Universities and colleges -- South Africa -- Business Management , Marketing research -- South Africa
- Description: Education is a powerful and pervasive agent of change. Therefore, it is the key to unlock the doors to development and modernisation. Currently, business and communities knowledge very little about what the FET/Technical College is offering and its importance to the society as whole. Therefore there is a great need to market the technical sector so that the community is knowledgeable about the FET/Technical Colleges. The research conducted focuses on which promotional strategies are effective in marketing the FET Colleges. In order to make technical college students marketable it is necessary to market the institutions effectively so that all the stakeholders can be aware of what technical colleges can offer. Because of high competition in this industry, it is of vital importance not to be out-marketed by competitors by keeping abreast of new trends in promotional strategies. In order to obtain more relevant information about promotional strategies a literature study was conducted to develop a questionnaire to survey the importance of promotional strategies and determine which promotional strategies are being used by the FET Colleges. The East-London, Queenstown and Ezibeleni Public FET Colleges form the respondents. From each college five academic staff, two management members and five students formed the respondents. Community members, business community members, the Department of Education and the Department of Labour representatives were also included in the sample from each of the selected FET Colleges. The findings of the survey revealed the high level of agreement in terms of the importance of the promotional strategies identified in the literature study with the exception of some promotional strategies, which were identified as not compatible with the FET target market. The study recommended that further research be done on a larger sample size focusing on particular stakeholders eg. students of the FET Colleges in a specific area.
- Full Text:
- Date Issued: 2002
VoIP : a corporate governance approach to avoid the risk of civil liability
- Authors: Gerber, Tian Johannes
- Date: 2012
- Subjects: Internet telephony -- Security measures , Telecommunication policy -- South Africa , Computer network protocols -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9812 , http://hdl.handle.net/10948/d1016272
- Description: Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementation, an organization should implement the technology with knowledge of the potential risk of civil liability. This is further highlighted by the King III Report which indicates that the Directors of an organization should be ultimately responsible for Corporate Governance and, therefore, IT Governance and Information Security Governance. The report goes further to say that any newly implemented technology, such as VoIP, should comply with all South African legislation and regulations. This responsibility encourages the practice of both due care and due diligence. However, recent trends exercised by Information Security professionals, responsible for drafting Information Security policies and related procedures, often neglect the regulatory requirements and choose to only implement international best practices with no consideration of the risk of civil liability. Although these best practice frameworks may inadvertently comply with existing local legislation, a chance of an oversight is possible. Oversights may not only result in criminal sanctions, but also civil action due to losses or damages suffered. With regard to implementing VoIP, good Corporate Governance could potentially be ensured through the use of both identified regulations and relevant international best practices. This dissertation aims to aid organizations in avoiding or at least mitigating the risk of civil liability to better leverage VoIP’s value, through good Corporate Governance practices. This should aid in the exercise of due care and due diligence when implementing VoIP as a means of conducting business communication.
- Full Text:
- Date Issued: 2012
- Authors: Gerber, Tian Johannes
- Date: 2012
- Subjects: Internet telephony -- Security measures , Telecommunication policy -- South Africa , Computer network protocols -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9812 , http://hdl.handle.net/10948/d1016272
- Description: Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementation, an organization should implement the technology with knowledge of the potential risk of civil liability. This is further highlighted by the King III Report which indicates that the Directors of an organization should be ultimately responsible for Corporate Governance and, therefore, IT Governance and Information Security Governance. The report goes further to say that any newly implemented technology, such as VoIP, should comply with all South African legislation and regulations. This responsibility encourages the practice of both due care and due diligence. However, recent trends exercised by Information Security professionals, responsible for drafting Information Security policies and related procedures, often neglect the regulatory requirements and choose to only implement international best practices with no consideration of the risk of civil liability. Although these best practice frameworks may inadvertently comply with existing local legislation, a chance of an oversight is possible. Oversights may not only result in criminal sanctions, but also civil action due to losses or damages suffered. With regard to implementing VoIP, good Corporate Governance could potentially be ensured through the use of both identified regulations and relevant international best practices. This dissertation aims to aid organizations in avoiding or at least mitigating the risk of civil liability to better leverage VoIP’s value, through good Corporate Governance practices. This should aid in the exercise of due care and due diligence when implementing VoIP as a means of conducting business communication.
- Full Text:
- Date Issued: 2012
The evaluation of potential improvements of barton pot oxides for lead acid batteries
- Authors: Geyer, Laurence Thomas
- Date: 2003
- Subjects: Lead oxides -- South Africa , Lead acid batteries -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10982 , http://hdl.handle.net/10948/233 , Lead oxides -- South Africa , Lead acid batteries -- South Africa
- Description: Lead Oxide (PbO) is the main material used for the preparation of the active material for the positive and negative electrodes in the lead acid battery where the electrochemical reaction that provides the electrical energy of the battery takes place. The particle size distribution and surface area characteristics of the lead oxide play a major role in the electrical performance of the completed battery. The two most commonly used processes to manufacture PbO in the lead acid battery industry are the Barton pot and the Ball mill processes. These two processes produce oxides that differ in particle size distribution, particle shape and surface area. It is generally accepted that the Ball mill process produces an oxide with a smaller mean particle size with a higher surface area and better initial electrical performance than the Barton pot process to the detriment of an initial higher capital and running cost. The study showed that it is possible to improve the surface area and particle size distribution characteristics of Barton pot oxide, by subsequently hammer milling the oxide particles before the paste manufacturing process. The results showed that there was an initial reduction in the particle size with an increase in the surface area. This increased the electrochemical performance in terms of the high rate discharge. However, further hammering of the oxide reduced the average particle size only slightly with little change in the surface area and a reduction in the electrochemical performance. The study showed that an improvement in Barton pot oxide can be achieved with a hammering of the oxide in order to obtain a uniform particle size with improved surface area and an improved high rate performance of the electrochemical cells made with such an oxide. As a comparison, the particle size and surface area characteristics of Ball mill lead oxide subjected to the hammer milling process was also studied. The results showed a similar effect to the Barton pot oxide on the particle size distribution. However, there was no appreciable change in the surface area due to the hammer milling process.
- Full Text:
- Date Issued: 2003
- Authors: Geyer, Laurence Thomas
- Date: 2003
- Subjects: Lead oxides -- South Africa , Lead acid batteries -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10982 , http://hdl.handle.net/10948/233 , Lead oxides -- South Africa , Lead acid batteries -- South Africa
- Description: Lead Oxide (PbO) is the main material used for the preparation of the active material for the positive and negative electrodes in the lead acid battery where the electrochemical reaction that provides the electrical energy of the battery takes place. The particle size distribution and surface area characteristics of the lead oxide play a major role in the electrical performance of the completed battery. The two most commonly used processes to manufacture PbO in the lead acid battery industry are the Barton pot and the Ball mill processes. These two processes produce oxides that differ in particle size distribution, particle shape and surface area. It is generally accepted that the Ball mill process produces an oxide with a smaller mean particle size with a higher surface area and better initial electrical performance than the Barton pot process to the detriment of an initial higher capital and running cost. The study showed that it is possible to improve the surface area and particle size distribution characteristics of Barton pot oxide, by subsequently hammer milling the oxide particles before the paste manufacturing process. The results showed that there was an initial reduction in the particle size with an increase in the surface area. This increased the electrochemical performance in terms of the high rate discharge. However, further hammering of the oxide reduced the average particle size only slightly with little change in the surface area and a reduction in the electrochemical performance. The study showed that an improvement in Barton pot oxide can be achieved with a hammering of the oxide in order to obtain a uniform particle size with improved surface area and an improved high rate performance of the electrochemical cells made with such an oxide. As a comparison, the particle size and surface area characteristics of Ball mill lead oxide subjected to the hammer milling process was also studied. The results showed a similar effect to the Barton pot oxide on the particle size distribution. However, there was no appreciable change in the surface area due to the hammer milling process.
- Full Text:
- Date Issued: 2003
The profitability of commercial state-owned entities
- Authors: Giliana, Tefo Godfrey
- Date: 2017
- Subjects: Government business enterprises -- South Africa Government corporations -- South Africa , Government ownership -- South Africa Profit -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15633 , vital:28278
- Description: The importance of State-owned entities (SOEs) in a developing State has been argued for centuries. SOEs are perceived as the tool that the State can successfully use to implement its developmental agenda. In the Republic of South Africa, SOEs have been used to ensure universal access to electricity, water and logistical infrastructure to support industrial development, as well as basic service delivery. These entities have been expected to fund these initiatives from their own funds, which alleviated the need for commercial SOEs (also known as State-owned companies) to be profitable without continuous financial injections from the RSA government. Generally, commercial SOEs have been performing poorly financially. This research study aims to determine whether political influence might affect the profitability of these commercial SOEs. The poor financial performance plaguing the commercial SOEs hinders their ability to effectively contribute as a collective to the developmental agenda of the State, as espoused in the current strategic plan of the RSA in the form of the National Development Plan (NDP). Due to the poor financial performance and subsequent diversion of financial resources from other national priorities for their bail-out, commercial SOEs have been considered a liability rather than an asset to the RSA. To satisfy the primary and associated research objectives, qualitative primary and secondary research data have been collected. The primary data have been collected by using the semi-structured interview from the CFOs of commercial SOEs from various government departments – given their proximity to the financial performance and the drivers of this performance in commercial SOEs. CFOs are also part of the commercial SOEs senior-executive management of these entities. The general opinion of the participants and the literature review of the research study is that, indeed, political influence has had an adverse effect on the profitability of commercial SOEs, among others, as a consequence of the positioning of SOEs within the governance system of the RSA, the impact of the recruitment process for senior executives and the implications of an unfunded mandate. It is clear that in the RSA, commercial SOEs, and SOEs in general, will continue to play a pivotal role in the implementation of the developmental agendas of the State, as expressed in the NDP. With the RSA government expecting commercial SOEs to fund these activities from their own funds, it is critical that the State should be an enabler rather than a hindrance for commercial SOEs‟ profitability.
- Full Text:
- Date Issued: 2017
- Authors: Giliana, Tefo Godfrey
- Date: 2017
- Subjects: Government business enterprises -- South Africa Government corporations -- South Africa , Government ownership -- South Africa Profit -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15633 , vital:28278
- Description: The importance of State-owned entities (SOEs) in a developing State has been argued for centuries. SOEs are perceived as the tool that the State can successfully use to implement its developmental agenda. In the Republic of South Africa, SOEs have been used to ensure universal access to electricity, water and logistical infrastructure to support industrial development, as well as basic service delivery. These entities have been expected to fund these initiatives from their own funds, which alleviated the need for commercial SOEs (also known as State-owned companies) to be profitable without continuous financial injections from the RSA government. Generally, commercial SOEs have been performing poorly financially. This research study aims to determine whether political influence might affect the profitability of these commercial SOEs. The poor financial performance plaguing the commercial SOEs hinders their ability to effectively contribute as a collective to the developmental agenda of the State, as espoused in the current strategic plan of the RSA in the form of the National Development Plan (NDP). Due to the poor financial performance and subsequent diversion of financial resources from other national priorities for their bail-out, commercial SOEs have been considered a liability rather than an asset to the RSA. To satisfy the primary and associated research objectives, qualitative primary and secondary research data have been collected. The primary data have been collected by using the semi-structured interview from the CFOs of commercial SOEs from various government departments – given their proximity to the financial performance and the drivers of this performance in commercial SOEs. CFOs are also part of the commercial SOEs senior-executive management of these entities. The general opinion of the participants and the literature review of the research study is that, indeed, political influence has had an adverse effect on the profitability of commercial SOEs, among others, as a consequence of the positioning of SOEs within the governance system of the RSA, the impact of the recruitment process for senior executives and the implications of an unfunded mandate. It is clear that in the RSA, commercial SOEs, and SOEs in general, will continue to play a pivotal role in the implementation of the developmental agendas of the State, as expressed in the NDP. With the RSA government expecting commercial SOEs to fund these activities from their own funds, it is critical that the State should be an enabler rather than a hindrance for commercial SOEs‟ profitability.
- Full Text:
- Date Issued: 2017
Hydrogen economy : MEA manufacturing for PEM electrolysers
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
Towards a framework for the integration of information security into undergraduate computing curricula
- Gomana, Lindokuhle Gcina, Thomson, Kerry-Lynn
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
- Authors: Gomana, Lindokuhle Gcina , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Study and teaching , Computer security -- Study and teaching Educational technology Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13691 , vital:27296
- Description: Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the “weakest link” in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisation’s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the “weakest link” in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on “how” computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that “currently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curricula”. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educators’ perspectives on information security education in a South African context. Various research methods were used to achieve this study’s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educators’ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets.
- Full Text:
- Date Issued: 2017
The effective combating of intrusion attacks through fuzzy logic and neural networks
- Authors: Goss, Robert Melvin
- Date: 2007
- Subjects: Computer security , Fuzzy logic , Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9794 , http://hdl.handle.net/10948/512 , http://hdl.handle.net/10948/d1011917 , Computer security , Fuzzy logic , Neural networks (Computer science)
- Description: The importance of properly securing an organization’s information and computing resources has become paramount in modern business. Since the advent of the Internet, securing this organizational information has become increasingly difficult. Organizations deploy many security mechanisms in the protection of their data, intrusion detection systems in particular have an increasingly valuable role to play, and as networks grow, administrators need better ways to monitor their systems. Currently, many intrusion detection systems lack the means to accurately monitor and report on wireless segments within the corporate network. This dissertation proposes an extension to the NeGPAIM model, known as NeGPAIM-W, which allows for the accurate detection of attacks originating on wireless network segments. The NeGPAIM-W model is able to detect both wired and wireless based attacks, and with the extensions to the original model mentioned previously, also provide for correlation of intrusion attacks sourced on both wired and wireless network segments. This provides for a holistic detection strategy for an organization. This has been accomplished with the use of Fuzzy logic and neural networks utilized in the detection of attacks. The model works on the assumption that each user has, and leaves, a unique footprint on a computer system. Thus, all intrusive behaviour on the system and networks which support it, can be traced back to the user account which was used to perform the intrusive behavior.
- Full Text:
- Date Issued: 2007
- Authors: Goss, Robert Melvin
- Date: 2007
- Subjects: Computer security , Fuzzy logic , Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9794 , http://hdl.handle.net/10948/512 , http://hdl.handle.net/10948/d1011917 , Computer security , Fuzzy logic , Neural networks (Computer science)
- Description: The importance of properly securing an organization’s information and computing resources has become paramount in modern business. Since the advent of the Internet, securing this organizational information has become increasingly difficult. Organizations deploy many security mechanisms in the protection of their data, intrusion detection systems in particular have an increasingly valuable role to play, and as networks grow, administrators need better ways to monitor their systems. Currently, many intrusion detection systems lack the means to accurately monitor and report on wireless segments within the corporate network. This dissertation proposes an extension to the NeGPAIM model, known as NeGPAIM-W, which allows for the accurate detection of attacks originating on wireless network segments. The NeGPAIM-W model is able to detect both wired and wireless based attacks, and with the extensions to the original model mentioned previously, also provide for correlation of intrusion attacks sourced on both wired and wireless network segments. This provides for a holistic detection strategy for an organization. This has been accomplished with the use of Fuzzy logic and neural networks utilized in the detection of attacks. The model works on the assumption that each user has, and leaves, a unique footprint on a computer system. Thus, all intrusive behaviour on the system and networks which support it, can be traced back to the user account which was used to perform the intrusive behavior.
- Full Text:
- Date Issued: 2007
Enabling e-learning 2.0 in information security education: a semantic web approach
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
Farmers’ perception on factors influencing small-scale vegetable production at Tsengiwe village, South Africa
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
- Authors: Gqibityala, Akhona
- Date: 2017
- Subjects: Farmers -- South Africa -- Eastern Cape Farms, Small -- South Africa -- Eastern Cape , Vegetable gardening -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/15281 , vital:28210
- Description: Food security and self-sufficiency in the rural areas has been and remains a major concern for the South African government. The study aimed to investigate farmer’s perception of factors influencing small-scale vegetable production in Tsengiwe village in the Eastern Cape. The research focus was on the following aspects that may have an influence on small-scale vegetable production: socio-economic factors, production and resource deficiencies and the impact of indigenous leafy vegetables. The researcher conducted several demonstration workshops during the field work. The pilot studies and community engagements were essential to extract knowledge systems embedded in the cultural traditions of indigenous or local communities. The action research was part of the reflective process of broadminded problem solving led by researcher and community. The research approach used a triangulation research method to extract information, whereby both quantitative and qualitative research was used to ensure greater accuracy. The main data collection was obtained from interviews with small-scale farming households in the Tsengiwe area. The study revealed that households were dependent on elderly female pensioners to source food and water. These women received most of their income from social grants and were mainly responsible for all farming activities in the households. Most households attempted to produce vegetables, although food security and self-sufficiency through own production was rarely achieved.Other perceived farming challenges included: lack of market accessibility, irrigation infrastructure, drought, financial limitations and soil degradation. Indigenous leafy vegetables were found to play a nutritional role in times of food shortage and not as much for their medicinal value. The study recommended the following interventions: Support for the elderly women in development and production practices, interventions to address factors affecting vegetable production, improving soil structure, working towards food self-sufficiency, moving away from dependence on mechanisation in rural farming.
- Full Text:
- Date Issued: 2017
Retention strategies for gold-collar employees in an institution of higher education
- Authors: Grobler, Elaine Maria
- Date: 2014
- Subjects: Employee retention , Universities and colleges -- Employees
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/6126 , vital:21041
- Description: Gold-collar employees are defined as key employees who have a discernible influence on the realisation of an organisation’s strategic goals and vision. These employees’ competitive advantage lies in their conceptual skills and specifically in their knowledge and creativity. However, because of their unique competencies, they are high in demand and it is more difficult for organisations to attract and retain them. The main research problem in this study was to investigate the concept of a gold-collar employee, the needs and expectations of these employees, as well as retention strategies that can be used to retain them, with specific focus on academics in an institution of higher education. To address the main and identified sub-problems, a literature study was conducted on gold-collar employees, the dilemma of retaining these employees, their needs and expectations and retention strategies. Interviews were conducted with selected senior level employees from various disciplines that had extensive experience in research, teaching and academic management, to establish how they perceived a gold-collar employee in the context of the university and what in their experience they considered as factors that enhanced the retention of these employees. An HTML survey questionnaire was administered to a target group of academics ranging from associate lecturer, lecturer, senior lecturer and associate professor to professor, including academic managers. The survey focused on their level of teaching and research experience, needs and expectations and their perceptions of the retention strategies used at the university. The results from the empirical study revealed that respondents were experienced in teaching development and practices, but not recognised on an internal, national and international level. Flexible working conditions were regarded as most important along with opportunities for self-fulfilment. Employees with more experience in teaching had a greater need and expectation for empowerment while those with more research experience needed and expected more remuneration, rewards and recognition. The respondents also deemed being located in a city or town that allowed for a high quality of living as important. Retention of highly skilled employees is important especially in a knowledge environment as they contribute strategically to the vision and competitive advantage of the organisation. Their skills and knowledge are costly and not easy to replace. Therefore it is important to put strategies in place to retain these gold-collar employees.
- Full Text:
- Date Issued: 2014
- Authors: Grobler, Elaine Maria
- Date: 2014
- Subjects: Employee retention , Universities and colleges -- Employees
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/6126 , vital:21041
- Description: Gold-collar employees are defined as key employees who have a discernible influence on the realisation of an organisation’s strategic goals and vision. These employees’ competitive advantage lies in their conceptual skills and specifically in their knowledge and creativity. However, because of their unique competencies, they are high in demand and it is more difficult for organisations to attract and retain them. The main research problem in this study was to investigate the concept of a gold-collar employee, the needs and expectations of these employees, as well as retention strategies that can be used to retain them, with specific focus on academics in an institution of higher education. To address the main and identified sub-problems, a literature study was conducted on gold-collar employees, the dilemma of retaining these employees, their needs and expectations and retention strategies. Interviews were conducted with selected senior level employees from various disciplines that had extensive experience in research, teaching and academic management, to establish how they perceived a gold-collar employee in the context of the university and what in their experience they considered as factors that enhanced the retention of these employees. An HTML survey questionnaire was administered to a target group of academics ranging from associate lecturer, lecturer, senior lecturer and associate professor to professor, including academic managers. The survey focused on their level of teaching and research experience, needs and expectations and their perceptions of the retention strategies used at the university. The results from the empirical study revealed that respondents were experienced in teaching development and practices, but not recognised on an internal, national and international level. Flexible working conditions were regarded as most important along with opportunities for self-fulfilment. Employees with more experience in teaching had a greater need and expectation for empowerment while those with more research experience needed and expected more remuneration, rewards and recognition. The respondents also deemed being located in a city or town that allowed for a high quality of living as important. Retention of highly skilled employees is important especially in a knowledge environment as they contribute strategically to the vision and competitive advantage of the organisation. Their skills and knowledge are costly and not easy to replace. Therefore it is important to put strategies in place to retain these gold-collar employees.
- Full Text:
- Date Issued: 2014