Implementing the CoSaWoE models in a commercial workflow product
- Authors: Erwee, Carmen
- Date: 2005
- Subjects: Computers -- Access control , Workflow , Computer security , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9732 , http://hdl.handle.net/10948/169 , Computers -- Access control , Workflow , Computer security , Data protection
- Description: Workflow systems have gained popularity not only as a research topic, but also as a key component of Enterprize Resource Planning packages and e- business. Comprehensive workflow products that automate intra- as well inter-organizational information flow are now available for commercial use. Standardization efforts have centered mostly around the interoperability of these systems, however a standard access control model have yet to be adopted. The research community has developed several models for access control to be included as part of workflow functionality. Commercial systems, however, are still implementing access control functionality in a proprietary manner. This dissertation investigates whether a comprehensive model for gain- ing context-sensitive access control, namely CoSAWoE, can be purposefully implemented in a commercial workflow product. Using methods such as an exploratory prototype, various aspects of the model was implemented to gain an understanding of the di±culties developers face when attempting to map the model to existing proprietary software. Oracle Workflow was chosen as an example of a commercial workflow product. An investigtion of the features of this product, together with the prototype, revealed the ability to affect access control in a similar manner to the model: by specifying access control constraints during administration and design, and then enforcing those constraints dynamically during run-time. However, only certain components within these two aspects of the model directly effected the commercial workflow product. It was argued that the first two requirements of context-sensitive access control, order of events and strict least privilege, addressed by the object design, role engineering and session control components of the model, can be simulated if such capabilities are not pertinently available as part of the product. As such, guidelines were provided for how this can be achieved in Oracle Workflow. However, most of the implementation effort focussed on the last requirement of context-sensitive access control, namely separation of duties. The CoSAWoE model proposes SoD administration steps that includes expressing various business rules through a set of conflicting entities which are maintained outside the scope of the workflow system. This component was implemented easily enough through tables which were created with a relational database. Evaluating these conflicts during run-time to control worklist generation proved more di±cult. First, a thorough understanding of the way in which workflow history is maintained was necessary. A re-usable function was developed to prune user lists according to user involvement in previous tasks in the workflow and the conflicts specified for those users and tasks. However, due to the lack of a central access control service, this re- usable function must be included in the appropriate places in the workflow process model. Furthermore, the dissertation utilized a practical example to develop a prototype. This prototype served a dual purpose: firstly, to aid the author's understanding of the features and principles involved, and secondly, to illustrate and explore the implementation of the model as described in the previous paragraphs. In conclusion the dissertation summarized the CoSAWoE model's compo- nents which were found to be product agnostic, directly or indirectly imple- mentable, or not implemented in the chosen workflow product. The lessons learnt and issues surrounding the implementation effort were also discussed before further research in terms of XML documents as data containers for the workfow process were suggested.
- Full Text:
- Date Issued: 2005
- Authors: Erwee, Carmen
- Date: 2005
- Subjects: Computers -- Access control , Workflow , Computer security , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9732 , http://hdl.handle.net/10948/169 , Computers -- Access control , Workflow , Computer security , Data protection
- Description: Workflow systems have gained popularity not only as a research topic, but also as a key component of Enterprize Resource Planning packages and e- business. Comprehensive workflow products that automate intra- as well inter-organizational information flow are now available for commercial use. Standardization efforts have centered mostly around the interoperability of these systems, however a standard access control model have yet to be adopted. The research community has developed several models for access control to be included as part of workflow functionality. Commercial systems, however, are still implementing access control functionality in a proprietary manner. This dissertation investigates whether a comprehensive model for gain- ing context-sensitive access control, namely CoSAWoE, can be purposefully implemented in a commercial workflow product. Using methods such as an exploratory prototype, various aspects of the model was implemented to gain an understanding of the di±culties developers face when attempting to map the model to existing proprietary software. Oracle Workflow was chosen as an example of a commercial workflow product. An investigtion of the features of this product, together with the prototype, revealed the ability to affect access control in a similar manner to the model: by specifying access control constraints during administration and design, and then enforcing those constraints dynamically during run-time. However, only certain components within these two aspects of the model directly effected the commercial workflow product. It was argued that the first two requirements of context-sensitive access control, order of events and strict least privilege, addressed by the object design, role engineering and session control components of the model, can be simulated if such capabilities are not pertinently available as part of the product. As such, guidelines were provided for how this can be achieved in Oracle Workflow. However, most of the implementation effort focussed on the last requirement of context-sensitive access control, namely separation of duties. The CoSAWoE model proposes SoD administration steps that includes expressing various business rules through a set of conflicting entities which are maintained outside the scope of the workflow system. This component was implemented easily enough through tables which were created with a relational database. Evaluating these conflicts during run-time to control worklist generation proved more di±cult. First, a thorough understanding of the way in which workflow history is maintained was necessary. A re-usable function was developed to prune user lists according to user involvement in previous tasks in the workflow and the conflicts specified for those users and tasks. However, due to the lack of a central access control service, this re- usable function must be included in the appropriate places in the workflow process model. Furthermore, the dissertation utilized a practical example to develop a prototype. This prototype served a dual purpose: firstly, to aid the author's understanding of the features and principles involved, and secondly, to illustrate and explore the implementation of the model as described in the previous paragraphs. In conclusion the dissertation summarized the CoSAWoE model's compo- nents which were found to be product agnostic, directly or indirectly imple- mentable, or not implemented in the chosen workflow product. The lessons learnt and issues surrounding the implementation effort were also discussed before further research in terms of XML documents as data containers for the workfow process were suggested.
- Full Text:
- Date Issued: 2005
Introducing hippocratic log files for personal privacy control
- Authors: Rutherford, Andrew
- Date: 2005
- Subjects: Computer security , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9743 , http://hdl.handle.net/10948/171 , Computer security , Internet -- Security measures
- Description: The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
- Full Text:
- Date Issued: 2005
- Authors: Rutherford, Andrew
- Date: 2005
- Subjects: Computer security , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9743 , http://hdl.handle.net/10948/171 , Computer security , Internet -- Security measures
- Description: The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
- Full Text:
- Date Issued: 2005
Investigation of the effect of selected polypropylene fibres and ultra-fine aggregate on plastic shrinkage cracks on South African roads
- Authors: Kluyts, Grant
- Date: 2005
- Subjects: Concrete roads -- South Africa -- Design and construction , Fiber-reinforced concrete , Reinforced concrete -- Cracking , Concrete -- Expansion and contraction , Polypropylene fibers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9592 , http://hdl.handle.net/10948/174 , Concrete roads -- South Africa -- Design and construction , Fiber-reinforced concrete , Reinforced concrete -- Cracking , Concrete -- Expansion and contraction , Polypropylene fibers
- Description: Plastic shrinkage cracks, although not inherently structurally debilitating, expose the reinforcement in low-volume reinforced concrete roads to deleterious substances, which may reduce its effectiveness leading ultimately to structural failure. In un-reinforced low-volume concrete road these cracks appear unsightly and cause the road user an unpleasant riding experience. Many researchers believe that plastic shrinkage crack development remains a concern to the concrete industry, occurring in particularly large–area pours such as low-volume concrete roads, and therefore requires further research to understand their formation and minimization. This study reports findings on the effectiveness of oxyfluorinated polypropylene fibres to control plastic shrinkage cracks, and the effect the addition of ultra-fine material has on the formation and/or propagation of these cracks. Findings indicate that low volume dosages (2 kg/m³), of oxyfluorinated polypropylene fibre significantly reduced the formation of plastic shrinkage cracks under test conditions. Furthermore, that the addition of ultra-fine material in excess of 63 kg/m³ increased the formation and/or development of plastic shrinkage cracks.
- Full Text:
- Date Issued: 2005
- Authors: Kluyts, Grant
- Date: 2005
- Subjects: Concrete roads -- South Africa -- Design and construction , Fiber-reinforced concrete , Reinforced concrete -- Cracking , Concrete -- Expansion and contraction , Polypropylene fibers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9592 , http://hdl.handle.net/10948/174 , Concrete roads -- South Africa -- Design and construction , Fiber-reinforced concrete , Reinforced concrete -- Cracking , Concrete -- Expansion and contraction , Polypropylene fibers
- Description: Plastic shrinkage cracks, although not inherently structurally debilitating, expose the reinforcement in low-volume reinforced concrete roads to deleterious substances, which may reduce its effectiveness leading ultimately to structural failure. In un-reinforced low-volume concrete road these cracks appear unsightly and cause the road user an unpleasant riding experience. Many researchers believe that plastic shrinkage crack development remains a concern to the concrete industry, occurring in particularly large–area pours such as low-volume concrete roads, and therefore requires further research to understand their formation and minimization. This study reports findings on the effectiveness of oxyfluorinated polypropylene fibres to control plastic shrinkage cracks, and the effect the addition of ultra-fine material has on the formation and/or propagation of these cracks. Findings indicate that low volume dosages (2 kg/m³), of oxyfluorinated polypropylene fibre significantly reduced the formation of plastic shrinkage cracks under test conditions. Furthermore, that the addition of ultra-fine material in excess of 63 kg/m³ increased the formation and/or development of plastic shrinkage cracks.
- Full Text:
- Date Issued: 2005
Socio-economic, cultural and policy issues impacting on community forestry development : a case study of Hlabisa district in Kwazulu-Natal
- Authors: Masuku, Sipho Sikhumbuzo
- Date: 2005
- Subjects: Forests and forestry -- South Africa -- KwaZulu-Natal , Forests and forestry -- Economic aspects -- South Africa -- KwaZulu-Natal , Forests and forestry -- Social aspect -- South Africa -- KwaZulu-Natal , Forests and forestry -- Cultural aspect -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10743 , http://hdl.handle.net/10948/818 , Forests and forestry -- South Africa -- KwaZulu-Natal , Forests and forestry -- Economic aspects -- South Africa -- KwaZulu-Natal , Forests and forestry -- Social aspect -- South Africa -- KwaZulu-Natal , Forests and forestry -- Cultural aspect -- South Africa -- KwaZulu-Natal
- Description: South Africa is not well-endowed with indigenous forests and those that remain are known to be degraded and declining at an alarming rate. This constitutes a direct threat to the quality of life of the resource-poor rural households which are directly dependent on the resources indigenous forests offer, as well as to ecological integrity. It is also recognised that the declining tree resources, particularly the indigenous tree species of high value, are increasingly threatened by a number of growing subsistence demands. This emphasises the need to establish, cultivate and conserve high-value tree species. Community forestry is recognised as a viable option for optimising land productivity; reducing pressure on indigenous forests and woodlands; ensuring a sustainable supply of desired tree products and services; and improving the quality of life of the resource-poor rural households. The primary purpose of Community Forestry Development (CFD) in the Hlabisa District is the provision of an information service and of technical support to enhance the livelihoods of rural communities by means of tree-related resources. Community forestry mainly focuses on tree resources that form an integral part of or contribute to rural people’s livelihoods. This includes small-scale growers (woodlots), woodlands and indigenous forests. Community forestry can be defined as tree growing and managed by the people for the people. Community forestry encompasses a wide range of activities which include farm forestry, agroforestry, village planting, woodlots, woodland management and indigenous-forest management by rural people, as well as tree planting in urban and peri-urban areas. Natural forests in South Africa account for less than 1 percent of the total land area. It has been suggested that these natural forests will no longer be able to meet the demand for forest products by 2020. The KwaZulu Department of Agriculture and Forestry embarked on community forestry in 1976 (but only on an ad hoc basis) as a possible solution to this dilemma. Later, the two South African pulp and paper giants, SAPPI and Mondi, started the Project Grow and Khulanathi Schemes respectively. One of the objectives of out-grower schemes was to encourage rural communities to plant trees on their own lands for the economic, social and environmental benefits trees offer. For example, timber could be sold to forestry companies. Financial assistance was offered to these communities to encourage implementation of such schemes. This exercise was aimed at bringing economic activity, capacity- building and community empowerment to the rural areas. The growers would benefit from the financial assistance and the readily available market provided by the company, while the company would be able to satisfy its demand for timber.
- Full Text:
- Date Issued: 2005
- Authors: Masuku, Sipho Sikhumbuzo
- Date: 2005
- Subjects: Forests and forestry -- South Africa -- KwaZulu-Natal , Forests and forestry -- Economic aspects -- South Africa -- KwaZulu-Natal , Forests and forestry -- Social aspect -- South Africa -- KwaZulu-Natal , Forests and forestry -- Cultural aspect -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10743 , http://hdl.handle.net/10948/818 , Forests and forestry -- South Africa -- KwaZulu-Natal , Forests and forestry -- Economic aspects -- South Africa -- KwaZulu-Natal , Forests and forestry -- Social aspect -- South Africa -- KwaZulu-Natal , Forests and forestry -- Cultural aspect -- South Africa -- KwaZulu-Natal
- Description: South Africa is not well-endowed with indigenous forests and those that remain are known to be degraded and declining at an alarming rate. This constitutes a direct threat to the quality of life of the resource-poor rural households which are directly dependent on the resources indigenous forests offer, as well as to ecological integrity. It is also recognised that the declining tree resources, particularly the indigenous tree species of high value, are increasingly threatened by a number of growing subsistence demands. This emphasises the need to establish, cultivate and conserve high-value tree species. Community forestry is recognised as a viable option for optimising land productivity; reducing pressure on indigenous forests and woodlands; ensuring a sustainable supply of desired tree products and services; and improving the quality of life of the resource-poor rural households. The primary purpose of Community Forestry Development (CFD) in the Hlabisa District is the provision of an information service and of technical support to enhance the livelihoods of rural communities by means of tree-related resources. Community forestry mainly focuses on tree resources that form an integral part of or contribute to rural people’s livelihoods. This includes small-scale growers (woodlots), woodlands and indigenous forests. Community forestry can be defined as tree growing and managed by the people for the people. Community forestry encompasses a wide range of activities which include farm forestry, agroforestry, village planting, woodlots, woodland management and indigenous-forest management by rural people, as well as tree planting in urban and peri-urban areas. Natural forests in South Africa account for less than 1 percent of the total land area. It has been suggested that these natural forests will no longer be able to meet the demand for forest products by 2020. The KwaZulu Department of Agriculture and Forestry embarked on community forestry in 1976 (but only on an ad hoc basis) as a possible solution to this dilemma. Later, the two South African pulp and paper giants, SAPPI and Mondi, started the Project Grow and Khulanathi Schemes respectively. One of the objectives of out-grower schemes was to encourage rural communities to plant trees on their own lands for the economic, social and environmental benefits trees offer. For example, timber could be sold to forestry companies. Financial assistance was offered to these communities to encourage implementation of such schemes. This exercise was aimed at bringing economic activity, capacity- building and community empowerment to the rural areas. The growers would benefit from the financial assistance and the readily available market provided by the company, while the company would be able to satisfy its demand for timber.
- Full Text:
- Date Issued: 2005
Study of the skincalm filling process at Aspen Pharmacare applying some six sigma principles
- Authors: Marx, Johannes
- Date: 2005
- Subjects: Ointments -- Packaging , Six sigma (Quality control standard)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10369 , http://hdl.handle.net/10948/184 , Ointments -- Packaging , Six sigma (Quality control standard)
- Description: Aspen Pharmacare is listed on the Johannesburg Securities Exchange South Africa (JSE) and is Africa’s largest pharmaceutical manufacturer. The company is a major supplier of branded pharmaceutical and healthcare products to the local and selected international markets. For decades, Aspen has manufactured a basket of affordable, quality, and effective products for the ethical, generic over-the-counter (OTC) and personal care markets. Aspen is also the leading supplier of generic medicines to the public sector, providing comprehensive coverage of the products on the Essential Drug List. Aspen continues to deliver on its commitment toward playing a role in social responsibility diseases such as HIV/AIDS, tuberculosis and malaria. In August 2003 Aspen developed Africa’s first generic anti-retroviral drug, namely Aspen-Stavudine. Aspen’s manufacturing facilities are based in Port Elizabeth (PE) and East London. Aspen has recently completed an Oral Solid Dosage (OSD) manufacturing facility worth approximately R150 million in PE. The Group manufactures approximately 20 tons of product daily and in excess of 400 tons of solid dosage pharmaceuticals, which equates to more than 2 billion tablets. In addition, more than 3 million litres of liquid pharmaceuticals and over 200 tons of pharmaceutical creams and ointments are produced per year [1]. Aspen excels at delivering quality products and services, exceeding customer expectations, complying with international standards in an environment that cultivates technical expertise and innovation. Following this philosophy through to the shop floor areas mean that there are always initiatives in continuous production improvement. One of these improvement projects introduced is called Six Sigma. 8 Ten members of the staff, selected from different expertise fields in the company were trained in Six Sigma. Knowledge gained from the two week training course were applied to different areas in the factory using Six Sigma principles. This dissertation focuses on the study undertaken in one of production areas, namely the filling process of the ointments and creams at the Aspen Port Elizabeth facility.
- Full Text:
- Date Issued: 2005
- Authors: Marx, Johannes
- Date: 2005
- Subjects: Ointments -- Packaging , Six sigma (Quality control standard)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10369 , http://hdl.handle.net/10948/184 , Ointments -- Packaging , Six sigma (Quality control standard)
- Description: Aspen Pharmacare is listed on the Johannesburg Securities Exchange South Africa (JSE) and is Africa’s largest pharmaceutical manufacturer. The company is a major supplier of branded pharmaceutical and healthcare products to the local and selected international markets. For decades, Aspen has manufactured a basket of affordable, quality, and effective products for the ethical, generic over-the-counter (OTC) and personal care markets. Aspen is also the leading supplier of generic medicines to the public sector, providing comprehensive coverage of the products on the Essential Drug List. Aspen continues to deliver on its commitment toward playing a role in social responsibility diseases such as HIV/AIDS, tuberculosis and malaria. In August 2003 Aspen developed Africa’s first generic anti-retroviral drug, namely Aspen-Stavudine. Aspen’s manufacturing facilities are based in Port Elizabeth (PE) and East London. Aspen has recently completed an Oral Solid Dosage (OSD) manufacturing facility worth approximately R150 million in PE. The Group manufactures approximately 20 tons of product daily and in excess of 400 tons of solid dosage pharmaceuticals, which equates to more than 2 billion tablets. In addition, more than 3 million litres of liquid pharmaceuticals and over 200 tons of pharmaceutical creams and ointments are produced per year [1]. Aspen excels at delivering quality products and services, exceeding customer expectations, complying with international standards in an environment that cultivates technical expertise and innovation. Following this philosophy through to the shop floor areas mean that there are always initiatives in continuous production improvement. One of these improvement projects introduced is called Six Sigma. 8 Ten members of the staff, selected from different expertise fields in the company were trained in Six Sigma. Knowledge gained from the two week training course were applied to different areas in the factory using Six Sigma principles. This dissertation focuses on the study undertaken in one of production areas, namely the filling process of the ointments and creams at the Aspen Port Elizabeth facility.
- Full Text:
- Date Issued: 2005
The application of constraint management to a simulated manufacturing environment
- Authors: Van der Merwe, Karl Robert
- Date: 2005
- Subjects: Theory of constraints (Management) , Production management , Manufacturing processes -- Computer simulation , Production engineering -- Computer simulation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9606 , http://hdl.handle.net/10948/409 , Theory of constraints (Management) , Production management , Manufacturing processes -- Computer simulation , Production engineering -- Computer simulation
- Description: South Africa endorsed a world trade accord ratified in Geneva on December 13, 1993. To promote world economic growth, the General Agreement on Tariffs and Trade (GATT) aimed to slash duties on 8000 categories of manufactured goods. Tariff barriers have declined significantly and are now approaching trivial levels (Hill, 1999, p163). Unfortunately, South Africa is ranked near the bottom of the World Competitiveness Report (Cheales, 1995, p8). Increased foreign competition has caused many South African companies to search for techniques that will improve their overall performance. Unless these techniques can be identified and implemented timeously, some companies may fail to remain competitive. This research addresses the lack of awareness in the Eastern Cape (SA) and utilisation of two techniques used successfully in the USA (and elsewhere in developed countries) namely, Constraint Management and simulation. The overall objective was to develop a method of convincing industry management of the benefits of the two techniques. The approach adopted was to use simulation to prove Constraint Management. To achieve this objective a comprehensive literature survey was performed to determine the logic of each technique and the associated benefits. The next step was to determine the levels of awareness among industry practitioners and managers. Managers, engineers and academics were requested to complete questionnaires in order to determine awareness and utilisation of each technique as well as factors that prevented the application of both. The simulation modeling process was examined in order to verify the logic of simulation and a model of a manufacturing system was developed. Constraint Management principles were then applied to the model in a series of experiments. This process was then developed into a manual that could be used to address the lack of awareness and utilisation of both Constraint Management and simulation. The manual was tested on a group of BTech students and industry practitioners in order to establish whether its use would be effective in raising awareness, understanding and utilisation. The outcome was positive and it was established that this technique was effective.
- Full Text:
- Date Issued: 2005
- Authors: Van der Merwe, Karl Robert
- Date: 2005
- Subjects: Theory of constraints (Management) , Production management , Manufacturing processes -- Computer simulation , Production engineering -- Computer simulation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9606 , http://hdl.handle.net/10948/409 , Theory of constraints (Management) , Production management , Manufacturing processes -- Computer simulation , Production engineering -- Computer simulation
- Description: South Africa endorsed a world trade accord ratified in Geneva on December 13, 1993. To promote world economic growth, the General Agreement on Tariffs and Trade (GATT) aimed to slash duties on 8000 categories of manufactured goods. Tariff barriers have declined significantly and are now approaching trivial levels (Hill, 1999, p163). Unfortunately, South Africa is ranked near the bottom of the World Competitiveness Report (Cheales, 1995, p8). Increased foreign competition has caused many South African companies to search for techniques that will improve their overall performance. Unless these techniques can be identified and implemented timeously, some companies may fail to remain competitive. This research addresses the lack of awareness in the Eastern Cape (SA) and utilisation of two techniques used successfully in the USA (and elsewhere in developed countries) namely, Constraint Management and simulation. The overall objective was to develop a method of convincing industry management of the benefits of the two techniques. The approach adopted was to use simulation to prove Constraint Management. To achieve this objective a comprehensive literature survey was performed to determine the logic of each technique and the associated benefits. The next step was to determine the levels of awareness among industry practitioners and managers. Managers, engineers and academics were requested to complete questionnaires in order to determine awareness and utilisation of each technique as well as factors that prevented the application of both. The simulation modeling process was examined in order to verify the logic of simulation and a model of a manufacturing system was developed. Constraint Management principles were then applied to the model in a series of experiments. This process was then developed into a manual that could be used to address the lack of awareness and utilisation of both Constraint Management and simulation. The manual was tested on a group of BTech students and industry practitioners in order to establish whether its use would be effective in raising awareness, understanding and utilisation. The outcome was positive and it was established that this technique was effective.
- Full Text:
- Date Issued: 2005
A framework for secure mobility in wireless overlay networks
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
A fuzzy logic control system for a friction stir welding process
- Authors: Majara, Khotso Ernest
- Date: 2006
- Subjects: Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9594 , http://hdl.handle.net/10948/405 , Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Description: FSW is a welding technique invented and patented by The Welding Institute in 1991. This welding technique utilises the benefits of solid-state welding to materials regarded as difficult to weld by fusion processes. The productivity of the process was not optimised as the real-time dynamics of the material and tool changes were not considered. Furthermore, the process has a plastic weld region where no traditional modelling describing the interaction between the tool and work piece is available. Fuzzy logic technology is one of the artificial intelligent strategies used to improve the control of the dynamics of industrial processes. Fuzzy control was proposed as a viable solution to improve the productivity of the FSW process. The simulations indicated that FLC can use feed rate and welding speed to adaptively regulate the feed force and tool temperature respectively, irrespective of varying tool and material change. The simulations presented fuzzy logic technology to be robust enough to regulate FSW process in the absence of accurate mathematical models.
- Full Text:
- Date Issued: 2006
- Authors: Majara, Khotso Ernest
- Date: 2006
- Subjects: Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9594 , http://hdl.handle.net/10948/405 , Friction welding , Fuzzy logic , Automatic control , Fuzzy systems
- Description: FSW is a welding technique invented and patented by The Welding Institute in 1991. This welding technique utilises the benefits of solid-state welding to materials regarded as difficult to weld by fusion processes. The productivity of the process was not optimised as the real-time dynamics of the material and tool changes were not considered. Furthermore, the process has a plastic weld region where no traditional modelling describing the interaction between the tool and work piece is available. Fuzzy logic technology is one of the artificial intelligent strategies used to improve the control of the dynamics of industrial processes. Fuzzy control was proposed as a viable solution to improve the productivity of the FSW process. The simulations indicated that FLC can use feed rate and welding speed to adaptively regulate the feed force and tool temperature respectively, irrespective of varying tool and material change. The simulations presented fuzzy logic technology to be robust enough to regulate FSW process in the absence of accurate mathematical models.
- Full Text:
- Date Issued: 2006
A holistic approach to network security in OGSA-based grid systems
- Authors: Loutsios, Demetrios
- Date: 2006
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9736 , http://hdl.handle.net/10948/550 , Computer networks -- Security measures
- Description: Grid computing technologies facilitate complex scientific collaborations between globally dispersed parties, which make use of heterogeneous technologies and computing systems. However, in recent years the commercial sector has developed a growing interest in Grid technologies. Prominent Grid researchers have predicted Grids will grow into the commercial mainstream, even though its origins were in scientific research. This is much the same way as the Internet started as a vehicle for research collaboration between universities and government institutions, and grew into a technology with large commercial applications. Grids facilitate complex trust relationships between globally dispersed business partners, research groups, and non-profit organizations. Almost any dispersed “virtual organization” willing to share computing resources can make use of Grid technologies. Grid computing facilitates the networking of shared services; the inter-connection of a potentially unlimited number of computing resources within a “Grid” is possible. Grid technologies leverage a range of open standards and technologies to provide interoperability between heterogeneous computing systems. Newer Grids build on key capabilities of Web-Service technologies to provide easy and dynamic publishing and discovery of Grid resources. Due to the inter-organisational nature of Grid systems, there is a need to provide adequate security to Grid users and to Grid resources. This research proposes a framework, using a specific brokered pattern, which addresses several common Grid security challenges, which include: Providing secure and consistent cross-site Authentication and Authorization; Single-sign on capabilities to Grid users; Abstract iii; Underlying platform and runtime security, and; Grid network communications and messaging security. These Grid security challenges can be viewed as comprising two (proposed) logical layers of a Grid. These layers are: a Common Grid Layer (higher level Grid interactions), and a Local Resource Layer (Lower level technology security concerns). This research is concerned with providing a generic and holistic security framework to secure both layers. This research makes extensive use of STRIDE - an acronym for Microsoft approach to addressing security threats - as part of a holistic Grid security framework. STRIDE and key Grid related standards, such as Open Grid Service Architecture (OGSA), Web-Service Resource Framework (WS-RF), and the Globus Toolkit are used to formulate the proposed framework.
- Full Text:
- Date Issued: 2006
- Authors: Loutsios, Demetrios
- Date: 2006
- Subjects: Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9736 , http://hdl.handle.net/10948/550 , Computer networks -- Security measures
- Description: Grid computing technologies facilitate complex scientific collaborations between globally dispersed parties, which make use of heterogeneous technologies and computing systems. However, in recent years the commercial sector has developed a growing interest in Grid technologies. Prominent Grid researchers have predicted Grids will grow into the commercial mainstream, even though its origins were in scientific research. This is much the same way as the Internet started as a vehicle for research collaboration between universities and government institutions, and grew into a technology with large commercial applications. Grids facilitate complex trust relationships between globally dispersed business partners, research groups, and non-profit organizations. Almost any dispersed “virtual organization” willing to share computing resources can make use of Grid technologies. Grid computing facilitates the networking of shared services; the inter-connection of a potentially unlimited number of computing resources within a “Grid” is possible. Grid technologies leverage a range of open standards and technologies to provide interoperability between heterogeneous computing systems. Newer Grids build on key capabilities of Web-Service technologies to provide easy and dynamic publishing and discovery of Grid resources. Due to the inter-organisational nature of Grid systems, there is a need to provide adequate security to Grid users and to Grid resources. This research proposes a framework, using a specific brokered pattern, which addresses several common Grid security challenges, which include: Providing secure and consistent cross-site Authentication and Authorization; Single-sign on capabilities to Grid users; Abstract iii; Underlying platform and runtime security, and; Grid network communications and messaging security. These Grid security challenges can be viewed as comprising two (proposed) logical layers of a Grid. These layers are: a Common Grid Layer (higher level Grid interactions), and a Local Resource Layer (Lower level technology security concerns). This research is concerned with providing a generic and holistic security framework to secure both layers. This research makes extensive use of STRIDE - an acronym for Microsoft approach to addressing security threats - as part of a holistic Grid security framework. STRIDE and key Grid related standards, such as Open Grid Service Architecture (OGSA), Web-Service Resource Framework (WS-RF), and the Globus Toolkit are used to formulate the proposed framework.
- Full Text:
- Date Issued: 2006
A study of the development of partner relationships associated with the chinese travel trade to South Africa
- Lin, Bin
- Authors: Lin, Bin
- Date: 2006
- Subjects: Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9336 , http://hdl.handle.net/10948/414 , Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Description: The Chinese inbound tourism market to SA has been acknowledged as an emerging market. However, South African tour operators experience difficulties in establishing and developing viable partner relationships with Chinese travel agents. Recognizing the size, importance and complexity of this market, the major purpose of this research is to explore and investigate the crucial process of developing Sino-South African partnership relationships in the tourism industry, to facilitate the establishment of business relationships with Chinese travel agents. This study is draws on applied marketing, management and cross-cultural theories on networking to explore the process of developing partnership relationships in the Chinese inbound tourism market to SA. The literature on networking, the development of networking relationships, and the effect of guanxi (connection), a key feature of Chinese business networking on partnership relations are reviewed. Given the limited research conducted on this topic and its cross-country nature, a quantitative research method was adopted for this study. Specifically, this study utilized e-mail survey techniques to explore the relationships between South African inbound tour operators and Chinese travel agents. This study identifies that the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators is culturally embedded. They are giving rise to communication problems that affect partnership relationships. A new stage model of the development of partnership relationships between South African inbound tour operators and Chinese travel agents is therefore developed. In particular, the study identifies important factors in the process of developing business relationships. For example, mutual commitment, the pricing issue, word-of-mouth, and quality of services are all considered crucial in attaining long-term stable partnership relationships. Guanxi plays a significant, but not decisive role in the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators. However, guanxi relationships can provide added value to the partnership relationships.
- Full Text:
- Date Issued: 2006
- Authors: Lin, Bin
- Date: 2006
- Subjects: Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9336 , http://hdl.handle.net/10948/414 , Travel agents -- South Africa , Tourism -- China , Travel agents -- China , Tourism -- South Africa , Relationship marketing
- Description: The Chinese inbound tourism market to SA has been acknowledged as an emerging market. However, South African tour operators experience difficulties in establishing and developing viable partner relationships with Chinese travel agents. Recognizing the size, importance and complexity of this market, the major purpose of this research is to explore and investigate the crucial process of developing Sino-South African partnership relationships in the tourism industry, to facilitate the establishment of business relationships with Chinese travel agents. This study is draws on applied marketing, management and cross-cultural theories on networking to explore the process of developing partnership relationships in the Chinese inbound tourism market to SA. The literature on networking, the development of networking relationships, and the effect of guanxi (connection), a key feature of Chinese business networking on partnership relations are reviewed. Given the limited research conducted on this topic and its cross-country nature, a quantitative research method was adopted for this study. Specifically, this study utilized e-mail survey techniques to explore the relationships between South African inbound tour operators and Chinese travel agents. This study identifies that the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators is culturally embedded. They are giving rise to communication problems that affect partnership relationships. A new stage model of the development of partnership relationships between South African inbound tour operators and Chinese travel agents is therefore developed. In particular, the study identifies important factors in the process of developing business relationships. For example, mutual commitment, the pricing issue, word-of-mouth, and quality of services are all considered crucial in attaining long-term stable partnership relationships. Guanxi plays a significant, but not decisive role in the process of developing partnership relationships between Chinese travel agents and South African inbound tour operators. However, guanxi relationships can provide added value to the partnership relationships.
- Full Text:
- Date Issued: 2006
An empirical study of capital budgeting evaluation techniques used in firms in the Nelson Mandela Metropole
- Authors: Bester, Lizel
- Date: 2006
- Subjects: Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8978 , http://hdl.handle.net/10948/475 , Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Description: The first research objective of this dissertation is an empirical study of the capital budgeting process to determine what capital budgeting evaluation techniques are used by firms in the Nelson Mandela Metropole. The second research objective of this dissertation is how the size of the firm impacts on the type of capital budgeting evaluation techniques used. The size of the firm is measured by magnitude of turnover, assets and the number of employees.
- Full Text:
- Date Issued: 2006
- Authors: Bester, Lizel
- Date: 2006
- Subjects: Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8978 , http://hdl.handle.net/10948/475 , Capital budget -- South Africa -- Port Elizabeth , Capital budget -- Firms -- Evaluation techniques -- South Africa -- Port Elizabeth
- Description: The first research objective of this dissertation is an empirical study of the capital budgeting process to determine what capital budgeting evaluation techniques are used by firms in the Nelson Mandela Metropole. The second research objective of this dissertation is how the size of the firm impacts on the type of capital budgeting evaluation techniques used. The size of the firm is measured by magnitude of turnover, assets and the number of employees.
- Full Text:
- Date Issued: 2006
An investigation into employee empowerment strategies for Small, Medium, and Micro Enterprises (SMMEs)
- Authors: Pandle, Nolubabalo Leeanne
- Date: 2006
- Subjects: Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9344 , http://hdl.handle.net/10948/d1012138 , Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Description: Employee empowerment is a strategy that small business managers can deploy to add value to the business. This strategy is aimed at cultivating the power and ability of employees in their jobs. A business is a business by people working in it though they differ in many ways their contribution to the success of the organization is very important. However, these people are not often recognized as value contributors in the success of the business and for this reason they do not intend to add value to the business and they become demotivated to do their jobs properly. People are the business storehouse of knowledge and they are central to the organization's competitive advantage. Well educated, coached, and highly motivated people are critical to the development and execution of strategies, especially in today's fast-paced market, where top management can no longer assure the business competitiveness in isolation. In the business world, almost all businesses are doing the same, small businesses should strive to do things differently, and the only way that they can achieve that uniqueness is through instilling frankness and liberty to employees so that they act as if the business also belongs to them. The reason behind this success is the strategy the business is using to get into the heart of its customers, and this strategy is “employee empowerment”. People are the business's most underutilized resource; involvement in an organization is no longer a one-way road. In today's corporate environment a manager must work towards engaging the organization forcefully enough to achieve its objectives. New knowledge-based enterprises are characterized by flat hierarchical structures and a multi-skilled workforce. Managers assume more leadership and coaching tasks and work hard to provide employees with resources and working conditions they need to accomplish the goals they have agreed to. In brief, managers work for their staff, and not the reverse and this makes employees feel valued. Small business owners should tap into a new dimension of utilizing employee empowerment strategies in their businesses as these are proficient and are not costly. This paper investigates employee empowerment strategies that can be used by small, medium and micro enterprises (SMME's). An important reason for this investigation is that small businesses have incompetent skilled labour force due to the fact that they operate under a limited budget from which it would be difficult to get skilled workers who will demand higher salaries, as a result they need to put their energies rather on equipping and educating their employees through empowerment, which could at the end make them feel valued and part of the business. It is imperative to firstly assess the current situation of small business commitment to employee empowerment strategies; to what extent do they use employee empowerment strategies in their businesses In terms of the empirical study it was determined that small businesses were not aware of the concept of employee empowerment, but are in actual fact practicing employee empowerment strategies that have been theoretically revealed, according to the researcher’s observation, they were not aware of the impact of employee empowerment in the organization and that they can be implemented into the business. Therefore, by introducing the concept of employee empowerment and the strategies that can be used in small businesses, SMME's can enhance their services to customers, increase productivity and contribute to the welfare of employees to add value to the individual, the business and the country.
- Full Text:
- Date Issued: 2006
- Authors: Pandle, Nolubabalo Leeanne
- Date: 2006
- Subjects: Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9344 , http://hdl.handle.net/10948/d1012138 , Employee empowerment , Business enterprises , Small business -- Management , Affirmative action programs
- Description: Employee empowerment is a strategy that small business managers can deploy to add value to the business. This strategy is aimed at cultivating the power and ability of employees in their jobs. A business is a business by people working in it though they differ in many ways their contribution to the success of the organization is very important. However, these people are not often recognized as value contributors in the success of the business and for this reason they do not intend to add value to the business and they become demotivated to do their jobs properly. People are the business storehouse of knowledge and they are central to the organization's competitive advantage. Well educated, coached, and highly motivated people are critical to the development and execution of strategies, especially in today's fast-paced market, where top management can no longer assure the business competitiveness in isolation. In the business world, almost all businesses are doing the same, small businesses should strive to do things differently, and the only way that they can achieve that uniqueness is through instilling frankness and liberty to employees so that they act as if the business also belongs to them. The reason behind this success is the strategy the business is using to get into the heart of its customers, and this strategy is “employee empowerment”. People are the business's most underutilized resource; involvement in an organization is no longer a one-way road. In today's corporate environment a manager must work towards engaging the organization forcefully enough to achieve its objectives. New knowledge-based enterprises are characterized by flat hierarchical structures and a multi-skilled workforce. Managers assume more leadership and coaching tasks and work hard to provide employees with resources and working conditions they need to accomplish the goals they have agreed to. In brief, managers work for their staff, and not the reverse and this makes employees feel valued. Small business owners should tap into a new dimension of utilizing employee empowerment strategies in their businesses as these are proficient and are not costly. This paper investigates employee empowerment strategies that can be used by small, medium and micro enterprises (SMME's). An important reason for this investigation is that small businesses have incompetent skilled labour force due to the fact that they operate under a limited budget from which it would be difficult to get skilled workers who will demand higher salaries, as a result they need to put their energies rather on equipping and educating their employees through empowerment, which could at the end make them feel valued and part of the business. It is imperative to firstly assess the current situation of small business commitment to employee empowerment strategies; to what extent do they use employee empowerment strategies in their businesses In terms of the empirical study it was determined that small businesses were not aware of the concept of employee empowerment, but are in actual fact practicing employee empowerment strategies that have been theoretically revealed, according to the researcher’s observation, they were not aware of the impact of employee empowerment in the organization and that they can be implemented into the business. Therefore, by introducing the concept of employee empowerment and the strategies that can be used in small businesses, SMME's can enhance their services to customers, increase productivity and contribute to the welfare of employees to add value to the individual, the business and the country.
- Full Text:
- Date Issued: 2006
An investigation into the family life cycle within a South African context
- Authors: Koekemoer, Evan
- Date: 2006
- Subjects: Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9352 , http://hdl.handle.net/10948/191 , Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Description: Each individual/household progresses through the family life cycle (FLC). This progression, which is characterized by various stages and varying consumption portfolios, can be traditional or non-traditional in nature. In the general marketing sense, the FLC concept has great value. The concept is utilized in a variety of marketing activities, particularly in segmentation, and is also applied in consumer behaviour. The lack of research regarding the FLC in South Africa and the need to investigate the concept’s applicability to different environments motivated this research. The aim of the study was to determine how the FLC within a South African context compared to the theoretical depiction of the concept. The evaluation of literature revealed five distinct traditional stages and an array of non-traditional stages, determined by a combination of life stage determining variables. Regarding the empirical approach, self-administered questionnaires were distributed to a convenience sample consisting of 225 students and staff members of the then Port Elizabeth Technikon. The empirical findings revealed the following. {u100083} Non-traditional stages were more prevalent than traditional stages. ii {u100083} Marital status, the presence/absence of children and living arrangement appear to be sufficient life stage determining variables for both current and prospective life stage classifications. {u100083} The consumption portfolios of individuals in the traditional FLC were similar to theory. The research provided insight into the consumption portfolios of individuals in the non-traditional FLC. {u100083} Based on the intentions of certain individuals regarding marriage, having children and living arrangements, it appears as though the future FLC will include an integration of traditional and non-traditional progressions.
- Full Text:
- Date Issued: 2006
- Authors: Koekemoer, Evan
- Date: 2006
- Subjects: Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9352 , http://hdl.handle.net/10948/191 , Consumer behavior -- South Africa , Market segmentation , Consumers -- South Africa
- Description: Each individual/household progresses through the family life cycle (FLC). This progression, which is characterized by various stages and varying consumption portfolios, can be traditional or non-traditional in nature. In the general marketing sense, the FLC concept has great value. The concept is utilized in a variety of marketing activities, particularly in segmentation, and is also applied in consumer behaviour. The lack of research regarding the FLC in South Africa and the need to investigate the concept’s applicability to different environments motivated this research. The aim of the study was to determine how the FLC within a South African context compared to the theoretical depiction of the concept. The evaluation of literature revealed five distinct traditional stages and an array of non-traditional stages, determined by a combination of life stage determining variables. Regarding the empirical approach, self-administered questionnaires were distributed to a convenience sample consisting of 225 students and staff members of the then Port Elizabeth Technikon. The empirical findings revealed the following. {u100083} Non-traditional stages were more prevalent than traditional stages. ii {u100083} Marital status, the presence/absence of children and living arrangement appear to be sufficient life stage determining variables for both current and prospective life stage classifications. {u100083} The consumption portfolios of individuals in the traditional FLC were similar to theory. The research provided insight into the consumption portfolios of individuals in the non-traditional FLC. {u100083} Based on the intentions of certain individuals regarding marriage, having children and living arrangements, it appears as though the future FLC will include an integration of traditional and non-traditional progressions.
- Full Text:
- Date Issued: 2006
Comparitive study of automation strategies at VW Germany and South Africa
- Authors: Wessel, Oliver
- Date: 2006
- Subjects: Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9607 , http://hdl.handle.net/10948/823 , Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Description: This master thesis analyses the Volkswagen assembly lines of the Golf A5 manufacture in the mother plant in Wolfsburg, the Touran manufacture in the Auto 5000 GmbH in Wolfsburg as well as the Golf A5 manufacture in Uitenhage in South Africa - all with regard to the level of automation. The target of the analysis is the determination of the optimal level of automation in the three production sites and therefore, the investigation of the potential to automate, or rather to deautomate in particular sections of the assembly in the prevailing production locations. The three production sites are to be investigated with regard to costs, quality and quantity.
- Full Text:
- Date Issued: 2006
- Authors: Wessel, Oliver
- Date: 2006
- Subjects: Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9607 , http://hdl.handle.net/10948/823 , Volkswagen (Firm) , Motor vehicle industry -- Automation Comparative studies
- Description: This master thesis analyses the Volkswagen assembly lines of the Golf A5 manufacture in the mother plant in Wolfsburg, the Touran manufacture in the Auto 5000 GmbH in Wolfsburg as well as the Golf A5 manufacture in Uitenhage in South Africa - all with regard to the level of automation. The target of the analysis is the determination of the optimal level of automation in the three production sites and therefore, the investigation of the potential to automate, or rather to deautomate in particular sections of the assembly in the prevailing production locations. The three production sites are to be investigated with regard to costs, quality and quantity.
- Full Text:
- Date Issued: 2006
Corporate information risk : an information security governance framework
- Authors: Posthumus, Shaun Murray
- Date: 2006
- Subjects: Computer security , Business enterprises -- Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9776 , http://hdl.handle.net/10948/814 , Computer security , Business enterprises -- Computer networks -- Security measures
- Description: Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues.
- Full Text:
- Date Issued: 2006
- Authors: Posthumus, Shaun Murray
- Date: 2006
- Subjects: Computer security , Business enterprises -- Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9776 , http://hdl.handle.net/10948/814 , Computer security , Business enterprises -- Computer networks -- Security measures
- Description: Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues.
- Full Text:
- Date Issued: 2006
Epirismm: an enterprise information risk management model
- Authors: Lategan, Neil
- Date: 2006
- Subjects: Risk management , Small business , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9734 , http://hdl.handle.net/10948/541 , Risk management , Small business , Information technology -- Security measures
- Description: Today, information is considered a commodity and no enterprise can operate without it. Indeed, the information and the supporting technology are pivotal in all enterprises. However, a major problem being experienced in the business environment is that enterprise risk cannot be managed effectively because business and information-related risk are not congruently aligned with risk management terminology and practices. The business environment and information technology are bound together by information. For this reason, it is imperative that risk management is synergised in the business, ICT (Information and Communication Technology) and information environments. A thorough, all inclusive, risk analysis exercise needs to be conducted in business and supporting environments in order to develop an effective internal control system. Such an internal control system should reduce the exposure of risk and aid the safeguarding of assets. Indeed, in today’s so-called information age, where business processes integrate the business and ICT environments, it is imperative that a unary internal control system be established, based on a holistic risk management exercise. To ensure that the enterprise, information and ICT environments operate free of the risks that threaten them, the risks should be properly governed. A model, EPiRISMM (Enterprise Information Risk Management Model) is proposed that offers to combine risk management practices from an ICT, information, governance, and enterprise perspective because there are so many overlapping aspects inherent in them. EPiRISMM combines various well-known standards and frameworks into one coherent model. By employing EPiRISMM, an enterprise will be able to eliminate the traditional segmented approach of the ICT department and thus eliminate any previous discontinuity in risk management practices.
- Full Text:
- Date Issued: 2006
- Authors: Lategan, Neil
- Date: 2006
- Subjects: Risk management , Small business , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9734 , http://hdl.handle.net/10948/541 , Risk management , Small business , Information technology -- Security measures
- Description: Today, information is considered a commodity and no enterprise can operate without it. Indeed, the information and the supporting technology are pivotal in all enterprises. However, a major problem being experienced in the business environment is that enterprise risk cannot be managed effectively because business and information-related risk are not congruently aligned with risk management terminology and practices. The business environment and information technology are bound together by information. For this reason, it is imperative that risk management is synergised in the business, ICT (Information and Communication Technology) and information environments. A thorough, all inclusive, risk analysis exercise needs to be conducted in business and supporting environments in order to develop an effective internal control system. Such an internal control system should reduce the exposure of risk and aid the safeguarding of assets. Indeed, in today’s so-called information age, where business processes integrate the business and ICT environments, it is imperative that a unary internal control system be established, based on a holistic risk management exercise. To ensure that the enterprise, information and ICT environments operate free of the risks that threaten them, the risks should be properly governed. A model, EPiRISMM (Enterprise Information Risk Management Model) is proposed that offers to combine risk management practices from an ICT, information, governance, and enterprise perspective because there are so many overlapping aspects inherent in them. EPiRISMM combines various well-known standards and frameworks into one coherent model. By employing EPiRISMM, an enterprise will be able to eliminate the traditional segmented approach of the ICT department and thus eliminate any previous discontinuity in risk management practices.
- Full Text:
- Date Issued: 2006
Evaluating the extent to which Nelson Mandela Metropolitan University (NMMU) libraries meet student expectations
- Authors: Zhibing, Mu
- Date: 2006
- Subjects: Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9351 , http://hdl.handle.net/10948/648 , Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Description: The failure to evaluate the service quality by comparing service expectations and service perceptions of students requires that the management of NMMU libraries identify the service expectations and service perceptions of students and measure the gaps between these service expectations and service perceptions of students. A literature review was conducted to explore the service expectations and service perceptions of students. An effective method (using the LibQUAL model) to evaluate the service quality of NMMU libraries based on the service expectations of students was described. Thereafter, a LibQUAL survey was used to collect the required empirical data from a convenience sample of 2 047 students enrolled at NMMU. The empirical findings showed that gaps existed between the service expectations and service perceptions of students at different campuses of NMMU. At different campuses of NMMU, the service expectations of students were not met in term of the service perceptions of the four dimensions (affect of service, library as place, information access and personal control) of the LibQUAL model. ii The study identified the gaps between the service expectations and service perceptions of students at different NMMU campuses and conclusions and recommendations based on these gaps were formulated. The management of the NMMU libraries needs to choose appropriate strategies to improve the quality of NMMU library services based on the service expectations of students.
- Full Text:
- Date Issued: 2006
- Authors: Zhibing, Mu
- Date: 2006
- Subjects: Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9351 , http://hdl.handle.net/10948/648 , Nelson Mandela Metropoliotan University. Library , Academic libraries -- South Africa -- Port Elizabeth -- Evaluation
- Description: The failure to evaluate the service quality by comparing service expectations and service perceptions of students requires that the management of NMMU libraries identify the service expectations and service perceptions of students and measure the gaps between these service expectations and service perceptions of students. A literature review was conducted to explore the service expectations and service perceptions of students. An effective method (using the LibQUAL model) to evaluate the service quality of NMMU libraries based on the service expectations of students was described. Thereafter, a LibQUAL survey was used to collect the required empirical data from a convenience sample of 2 047 students enrolled at NMMU. The empirical findings showed that gaps existed between the service expectations and service perceptions of students at different campuses of NMMU. At different campuses of NMMU, the service expectations of students were not met in term of the service perceptions of the four dimensions (affect of service, library as place, information access and personal control) of the LibQUAL model. ii The study identified the gaps between the service expectations and service perceptions of students at different NMMU campuses and conclusions and recommendations based on these gaps were formulated. The management of the NMMU libraries needs to choose appropriate strategies to improve the quality of NMMU library services based on the service expectations of students.
- Full Text:
- Date Issued: 2006
Factors influencing species richness, cover and composition of vegetation on Namaqualand quartz fields
- Authors: Van Tonder, Carlo
- Date: 2006
- Subjects: Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10752 , http://hdl.handle.net/10948/630 , Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Description: Quartz fields contribute significantly to plant diversity in the Succulent Karoo biome. They are distinctly different from surrounding habitats and have high levels of plant endemism. Biological soil crusts are features of quartz field soils and fulfill a vital function in that they stabilize soils. It is important for managers of nature reserves and agricultural rangelands to know what factors influence quartz field soils and vegetation. Both stakeholders could benefit from new information that would allow for informed decision-making regarding land-use on quartz fields. The present study took place in the Namaqua National Park that contains a significant proportion of the Riethuis-Wallekraal quartz fields phytochorion. The first part of the study aimed to understand whether certain land-use activities potentially destabilize quartz field soils, which might have possible ramifications for associated biological soil crusts and vegetation. It was followed by relating variation in soil stability with species richness, cover and species composition of quartz field vegetation. Overall, positions assumed to be impacted by land-use activities had less stable soils compared to positions assumed not be impacted. Soil stability had a significant influence on species richness and cover but to a lesser degree on species composition. Quartz field vegetation was significantly influenced by soil physical and chemical properties as well as location in the quartz fields landscape. The second part of the study aimed at understanding how species richness of isolated quartz outcrops is related to their size compared to that of a mainland body of quartz outcrops. No clear species-area relationships emerged from the study. There were significant differences between isolated outcrops and mainland outcrops in substrate and vegetation composition. Findings are discussed in relation to Island Biogeography Theory.
- Full Text:
- Date Issued: 2006
- Authors: Van Tonder, Carlo
- Date: 2006
- Subjects: Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10752 , http://hdl.handle.net/10948/630 , Plant diversity -- South Africa -- Namaqualand , Soil biology -- South Africa -- Namaqualand
- Description: Quartz fields contribute significantly to plant diversity in the Succulent Karoo biome. They are distinctly different from surrounding habitats and have high levels of plant endemism. Biological soil crusts are features of quartz field soils and fulfill a vital function in that they stabilize soils. It is important for managers of nature reserves and agricultural rangelands to know what factors influence quartz field soils and vegetation. Both stakeholders could benefit from new information that would allow for informed decision-making regarding land-use on quartz fields. The present study took place in the Namaqua National Park that contains a significant proportion of the Riethuis-Wallekraal quartz fields phytochorion. The first part of the study aimed to understand whether certain land-use activities potentially destabilize quartz field soils, which might have possible ramifications for associated biological soil crusts and vegetation. It was followed by relating variation in soil stability with species richness, cover and species composition of quartz field vegetation. Overall, positions assumed to be impacted by land-use activities had less stable soils compared to positions assumed not be impacted. Soil stability had a significant influence on species richness and cover but to a lesser degree on species composition. Quartz field vegetation was significantly influenced by soil physical and chemical properties as well as location in the quartz fields landscape. The second part of the study aimed at understanding how species richness of isolated quartz outcrops is related to their size compared to that of a mainland body of quartz outcrops. No clear species-area relationships emerged from the study. There were significant differences between isolated outcrops and mainland outcrops in substrate and vegetation composition. Findings are discussed in relation to Island Biogeography Theory.
- Full Text:
- Date Issued: 2006
Strategies for Chinese companies to enter the Port Elizabeth sports-shoe market
- Guo, Zhi
- Authors: Guo, Zhi
- Date: 2006
- Subjects: Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9005 , http://hdl.handle.net/10948/516 , http://hdl.handle.net/10948/d1011691 , Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Description: This research addressed the study of entry strategies by Chinese sports-shoe manufacturers into the South African sports-shoe market. The goal of this research is to investigate what are the appropriate entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. A Chinese sports-shoe company, Li Ning Limited, was used as a case study to illustrate the methods to explore appropriate entry strategies. The research methodology included: {u10007A} A literature study to explore the popular entry strategies used to enter the South African and also global markets was conducted. In addition, the South African and Chinese market environments were investigated. {u10007A} An empirical study, a survey of sports-shoe customers and sports-shoe shops owners, was done in order to explore the advisable entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. According to the literature study as well as the empirical study, the research explored some advisable entry strategies for Chinese sports-shoe companies into the South African domain.
- Full Text:
- Date Issued: 2006
- Authors: Guo, Zhi
- Date: 2006
- Subjects: Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9005 , http://hdl.handle.net/10948/516 , http://hdl.handle.net/10948/d1011691 , Shoe industry -- South Africa -- Port Elizabeth , Business enterprises, Foreign -- South Africa -- Port Elizabeth , Entrepreneurship -- South Africa -- Port Elizabeth
- Description: This research addressed the study of entry strategies by Chinese sports-shoe manufacturers into the South African sports-shoe market. The goal of this research is to investigate what are the appropriate entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. A Chinese sports-shoe company, Li Ning Limited, was used as a case study to illustrate the methods to explore appropriate entry strategies. The research methodology included: {u10007A} A literature study to explore the popular entry strategies used to enter the South African and also global markets was conducted. In addition, the South African and Chinese market environments were investigated. {u10007A} An empirical study, a survey of sports-shoe customers and sports-shoe shops owners, was done in order to explore the advisable entry strategies for Chinese sports-shoe companies to enter the South African sports-shoe market. According to the literature study as well as the empirical study, the research explored some advisable entry strategies for Chinese sports-shoe companies into the South African domain.
- Full Text:
- Date Issued: 2006
The cost of free instant messaging: an attack modelling perspective
- Authors: Du Preez, Riekert
- Date: 2006
- Subjects: Computer security , Instant messaging , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9797 , http://hdl.handle.net/10948/499 , http://hdl.handle.net/10948/d1011921 , Computer security , Instant messaging , Data protection
- Description: Instant Messaging (IM) has grown tremendously over the last few years. Even though IM was originally developed as a social chat system, it has found a place in many companies, where it is being used as an essential business tool. However, many businesses rely on free IM and have not implemented a secure corporate IM solution. Most free IM clients were never intended for use in the workplace and, therefore, lack strong security features and administrative control. Consequently, free IM clients can provide attackers with an entry point for malicious code in an organization’s network that can ultimately lead to a company’s information assets being compromised. Therefore, even though free IM allows for better collaboration in the workplace, it comes at a cost, as the title of this dissertation suggests. This dissertation sets out to answer the question of how free IM can facilitate an attack on a company’s information assets. To answer the research question, the dissertation defines an IM attack model that models the ways in which an information system can be attacked when free IM is used within an organization. The IM attack model was created by categorising IM threats using the STRIDE threat classification scheme. The attacks that realize the categorised threats were then modelled using attack trees as the chosen attack modelling tool. Attack trees were chosen because of their ability to model the sequence of attacker actions during an attack. The author defined an enhanced graphical notation that was adopted for the attack trees used to create the IM attack model. The enhanced attack tree notation extends traditional attack trees to allow nodes in the trees to be of different classes and, therefore, allows attack trees to convey more information. During the process of defining the IM attack model, a number of experiments were conducted where IM vulnerabilities were exploited. Thereafter, a case study was constructed to document a simulated attack on an information system that involves the exploitation of IM vulnerabilities. The case study demonstrates how an attacker’s attack path relates to the IM attack model in a practical scenario. The IM attack model provides insight into how IM can facilitate an attack on a company’s information assets. The creation of the attack model for free IM lead to several realizations. The IM attack model revealed that even though the use of free IM clients may seem harmless, such IM clients can facilitate an attack on a company’s information assets. Furthermore, certain IM vulnerabilities may not pose a great risk by themselves, but when combined with the exploitation of other vulnerabilities, a much greater threat can be realized. These realizations hold true to what French playwright Jean Anouilh once said: “What you get free costs too much”.
- Full Text:
- Date Issued: 2006
- Authors: Du Preez, Riekert
- Date: 2006
- Subjects: Computer security , Instant messaging , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9797 , http://hdl.handle.net/10948/499 , http://hdl.handle.net/10948/d1011921 , Computer security , Instant messaging , Data protection
- Description: Instant Messaging (IM) has grown tremendously over the last few years. Even though IM was originally developed as a social chat system, it has found a place in many companies, where it is being used as an essential business tool. However, many businesses rely on free IM and have not implemented a secure corporate IM solution. Most free IM clients were never intended for use in the workplace and, therefore, lack strong security features and administrative control. Consequently, free IM clients can provide attackers with an entry point for malicious code in an organization’s network that can ultimately lead to a company’s information assets being compromised. Therefore, even though free IM allows for better collaboration in the workplace, it comes at a cost, as the title of this dissertation suggests. This dissertation sets out to answer the question of how free IM can facilitate an attack on a company’s information assets. To answer the research question, the dissertation defines an IM attack model that models the ways in which an information system can be attacked when free IM is used within an organization. The IM attack model was created by categorising IM threats using the STRIDE threat classification scheme. The attacks that realize the categorised threats were then modelled using attack trees as the chosen attack modelling tool. Attack trees were chosen because of their ability to model the sequence of attacker actions during an attack. The author defined an enhanced graphical notation that was adopted for the attack trees used to create the IM attack model. The enhanced attack tree notation extends traditional attack trees to allow nodes in the trees to be of different classes and, therefore, allows attack trees to convey more information. During the process of defining the IM attack model, a number of experiments were conducted where IM vulnerabilities were exploited. Thereafter, a case study was constructed to document a simulated attack on an information system that involves the exploitation of IM vulnerabilities. The case study demonstrates how an attacker’s attack path relates to the IM attack model in a practical scenario. The IM attack model provides insight into how IM can facilitate an attack on a company’s information assets. The creation of the attack model for free IM lead to several realizations. The IM attack model revealed that even though the use of free IM clients may seem harmless, such IM clients can facilitate an attack on a company’s information assets. Furthermore, certain IM vulnerabilities may not pose a great risk by themselves, but when combined with the exploitation of other vulnerabilities, a much greater threat can be realized. These realizations hold true to what French playwright Jean Anouilh once said: “What you get free costs too much”.
- Full Text:
- Date Issued: 2006