A conceptual framework for the e-enabling of automotive supply chanins
- Authors: Cameron, Hilton John
- Date: 2004
- Subjects: Electronic commerce , Business logistics
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10791 , http://hdl.handle.net/10948/209 , Electronic commerce , Business logistics
- Description: Supply chains encompass all of the diverse activities that are associated with the flow and transformation of goods, right from the beginning stage of the raw materials, all the way through to the consumer. Supply chains are broken into three distinct parts, namely upstream activities involving the material and service inputs from suppliers, internal activities involving the manufacture and packaging of the goods, and downstream activities, which involve the distribution and sale of the goods. Since the inception of the automotive industry, buyers and suppliers have been linked in rigid, inflexible relationships. With the advent of the Internet, however, supply chains are becoming less rigid and more efficient. E-enabling an automotive supply chain involves two distinct spheres of interest, namely, the sphere of automotive supply chains and that of e-business. Both spheres are evolving fast and becoming increasingly complex. Due to the increasing complexity, there is a lack of understanding with regard to incorporating e-business principles effectively into automotive supply chains. In order to address this lack of understanding, the dissertation proposes a conceptual framework that can be used to assist in the process of e-enabling an automotive supply chain. Before the dissertation ventures to propose this conceptual framework, a number of challenges that may be encountered when attempting to enable an automotive supply chain are highlighted. The proposed framework, therefore, specifically aims to position activities conceptually in such a way that it can be argued that the identified challenges are considered at the appropriate time in the e-enabling process. The framework therefore, focuses on the entire process, starting at the planning phase and going right through to the implementation phase. As such, the framework consists of various phases, with each phase containing a myriad of activities. The different phases of the framework include developing a strategic business plan, designing an information technology architecture, identifying system and resource requirements, creating a project plan and finally implementing the project. These phases aim to address the entire e-enabling process. The contribution that this dissertation makes is in the form of a conceptual framework which may be followed during the e-enabling process. The framework aims to provide direction and to ensure that the many activities that are involved in the e-enabling process are considered. The dissertation also highlights the many challenges that may be encountered when enabling a supply chain. Lastly a prototype application has been developed using a new Internet technology. The prototype has been developed in order to ascertain the new technologies suitability to the e-enabled supply chain environment.
- Full Text:
- Date Issued: 2004
- Authors: Cameron, Hilton John
- Date: 2004
- Subjects: Electronic commerce , Business logistics
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10791 , http://hdl.handle.net/10948/209 , Electronic commerce , Business logistics
- Description: Supply chains encompass all of the diverse activities that are associated with the flow and transformation of goods, right from the beginning stage of the raw materials, all the way through to the consumer. Supply chains are broken into three distinct parts, namely upstream activities involving the material and service inputs from suppliers, internal activities involving the manufacture and packaging of the goods, and downstream activities, which involve the distribution and sale of the goods. Since the inception of the automotive industry, buyers and suppliers have been linked in rigid, inflexible relationships. With the advent of the Internet, however, supply chains are becoming less rigid and more efficient. E-enabling an automotive supply chain involves two distinct spheres of interest, namely, the sphere of automotive supply chains and that of e-business. Both spheres are evolving fast and becoming increasingly complex. Due to the increasing complexity, there is a lack of understanding with regard to incorporating e-business principles effectively into automotive supply chains. In order to address this lack of understanding, the dissertation proposes a conceptual framework that can be used to assist in the process of e-enabling an automotive supply chain. Before the dissertation ventures to propose this conceptual framework, a number of challenges that may be encountered when attempting to enable an automotive supply chain are highlighted. The proposed framework, therefore, specifically aims to position activities conceptually in such a way that it can be argued that the identified challenges are considered at the appropriate time in the e-enabling process. The framework therefore, focuses on the entire process, starting at the planning phase and going right through to the implementation phase. As such, the framework consists of various phases, with each phase containing a myriad of activities. The different phases of the framework include developing a strategic business plan, designing an information technology architecture, identifying system and resource requirements, creating a project plan and finally implementing the project. These phases aim to address the entire e-enabling process. The contribution that this dissertation makes is in the form of a conceptual framework which may be followed during the e-enabling process. The framework aims to provide direction and to ensure that the many activities that are involved in the e-enabling process are considered. The dissertation also highlights the many challenges that may be encountered when enabling a supply chain. Lastly a prototype application has been developed using a new Internet technology. The prototype has been developed in order to ascertain the new technologies suitability to the e-enabled supply chain environment.
- Full Text:
- Date Issued: 2004
SIDVI: a model for secure distributed data integration
- Authors: Routly, Wayne A
- Date: 2004
- Subjects: Data protection
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10805 , http://hdl.handle.net/10948/261 , Data protection
- Description: The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are the multitude of source databases that store the data. The ability to derive information from these databases is brought about by means of data integration. With the current emphasis on security in all walks of information and communication technology, a renewed interest must be placed in the systems that provide us with information; data integration systems. This dissertation investigates security issues at specific stages in the data integration cycle, with special reference to problems when performing data integration in a peer-topeer environment, as in distributed data integration. In the database environment we are concerned with the database itself and the media used to connect to and from the database. In distributed data integration, the concept of the database is redefined to the source database, from which we extract data and the storage database in which the integrated data is stored. This postulates three distinct areas in which to apply security, the data source, the network medium and the data store. All of these areas encompass data integration and must be considered holistically when implementing security. Data integration is never only one server or one database; it is various geographically dispersed components working together towards a common goal. It is important then that we consider all aspects involved when attempting to provide security for data integration. This dissertation will focus on the areas of security threats and investigates a model to ensure the integrity and security of data during the entire integration process. In order to ensure effective security in a data integration environment, that security, should be present at all stages, it should provide for end-to-end protection.
- Full Text:
- Date Issued: 2004
- Authors: Routly, Wayne A
- Date: 2004
- Subjects: Data protection
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10805 , http://hdl.handle.net/10948/261 , Data protection
- Description: The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are the multitude of source databases that store the data. The ability to derive information from these databases is brought about by means of data integration. With the current emphasis on security in all walks of information and communication technology, a renewed interest must be placed in the systems that provide us with information; data integration systems. This dissertation investigates security issues at specific stages in the data integration cycle, with special reference to problems when performing data integration in a peer-topeer environment, as in distributed data integration. In the database environment we are concerned with the database itself and the media used to connect to and from the database. In distributed data integration, the concept of the database is redefined to the source database, from which we extract data and the storage database in which the integrated data is stored. This postulates three distinct areas in which to apply security, the data source, the network medium and the data store. All of these areas encompass data integration and must be considered holistically when implementing security. Data integration is never only one server or one database; it is various geographically dispersed components working together towards a common goal. It is important then that we consider all aspects involved when attempting to provide security for data integration. This dissertation will focus on the areas of security threats and investigates a model to ensure the integrity and security of data during the entire integration process. In order to ensure effective security in a data integration environment, that security, should be present at all stages, it should provide for end-to-end protection.
- Full Text:
- Date Issued: 2004
Towards an extended enterprise through e-Business integration
- Authors: Mostert, Nicolette
- Date: 2004
- Subjects: Enterprise application integration (Computer systems) , Electronic commerce , Business enterprises -- Data processing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10803 , http://hdl.handle.net/10948/268 , Enterprise application integration (Computer systems) , Electronic commerce , Business enterprises -- Data processing
- Description: The focus of this project will be on introducing the concept of an extended enterprise to business leaders, subsequently presenting e- Business Integration and the supporting role that it can play in the establishment of an extended enterprise. Various literature sources will be consolidated to describe the integration approaches and supporting integration technologies and standards that can be employed in establishing integrated communication between the members of the extended enterprise. Finally, a phased approach will be proposed that can be employed in supporting the establishment of an extended enterprise through e-Business Integration.
- Full Text:
- Date Issued: 2004
- Authors: Mostert, Nicolette
- Date: 2004
- Subjects: Enterprise application integration (Computer systems) , Electronic commerce , Business enterprises -- Data processing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10803 , http://hdl.handle.net/10948/268 , Enterprise application integration (Computer systems) , Electronic commerce , Business enterprises -- Data processing
- Description: The focus of this project will be on introducing the concept of an extended enterprise to business leaders, subsequently presenting e- Business Integration and the supporting role that it can play in the establishment of an extended enterprise. Various literature sources will be consolidated to describe the integration approaches and supporting integration technologies and standards that can be employed in establishing integrated communication between the members of the extended enterprise. Finally, a phased approach will be proposed that can be employed in supporting the establishment of an extended enterprise through e-Business Integration.
- Full Text:
- Date Issued: 2004
An analysis of the factors that influence effectiveness in information technology student project teams
- Authors: Patrellis, Yiota
- Date: 2003
- Subjects: Information technology -- Management , Project management , Teams in the workplace , Organizational effectiveness
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10800 , http://hdl.handle.net/10948/199 , Information technology -- Management , Project management , Teams in the workplace , Organizational effectiveness
- Description: More and more organizations are making use of teamwork. Effective teams are also important from an Information Technology (IT) perspective, since teamwork forms an integral part of all software development activities. It is therefore extremely important that IT students are able to work together as an effective team. These statements lead to the following questions – How can IT student project teams be effective and what obstacles need to be overcome in order to ensure effectiveness? This dissertation reports on an exploratory study of second and third year IT project teams and exposes factors that lead to ineffectiveness. Firstly, the problems experienced by the groups seem to have the largest detrimental effect on effective team functioning. Secondly, the project mark is also affected by the priority issue that is associated with the particular task. Thirdly, the issues of time management, communication, conflict management, compromise, social loafing and group cohesion also play an important role in team effectiveness. This dissertation sets out to prove that the key to "effectiveness" lies in empowering the student to deal with all possible dilemmas that may be faced when working in teams in the tertiary team situation. The benefits of these actions will hopefully lead to the realization of “effectiveness” in the tertiary team situation and ultimately, in the student’s work environment.
- Full Text:
- Date Issued: 2003
- Authors: Patrellis, Yiota
- Date: 2003
- Subjects: Information technology -- Management , Project management , Teams in the workplace , Organizational effectiveness
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10800 , http://hdl.handle.net/10948/199 , Information technology -- Management , Project management , Teams in the workplace , Organizational effectiveness
- Description: More and more organizations are making use of teamwork. Effective teams are also important from an Information Technology (IT) perspective, since teamwork forms an integral part of all software development activities. It is therefore extremely important that IT students are able to work together as an effective team. These statements lead to the following questions – How can IT student project teams be effective and what obstacles need to be overcome in order to ensure effectiveness? This dissertation reports on an exploratory study of second and third year IT project teams and exposes factors that lead to ineffectiveness. Firstly, the problems experienced by the groups seem to have the largest detrimental effect on effective team functioning. Secondly, the project mark is also affected by the priority issue that is associated with the particular task. Thirdly, the issues of time management, communication, conflict management, compromise, social loafing and group cohesion also play an important role in team effectiveness. This dissertation sets out to prove that the key to "effectiveness" lies in empowering the student to deal with all possible dilemmas that may be faced when working in teams in the tertiary team situation. The benefits of these actions will hopefully lead to the realization of “effectiveness” in the tertiary team situation and ultimately, in the student’s work environment.
- Full Text:
- Date Issued: 2003
CBiX a model for content-based billing in XML environments
- Authors: De Villiers, Peter
- Date: 2003
- Subjects: XML (Document Markup Language) , Access control , Pricing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10802 , http://hdl.handle.net/10948/208 , XML (Document Markup Language) , Access control , Pricing
- Description: The new global economy is based on knowledge and information. Further- more, the Internet is facilitating new forms of revenue generation of which one recognized potential source is content delivery over the Internet. One aspect that is critical to ensuring a content-based revenue stream is billing. While there are a number of content-based billing systems commercially available, as far as can be determined these products are not based on a common model that can ensure interoperability and communication between the billing sys- tems. This dissertation addresses the need for a content-based billing model by developing the CBiX (Content-based Billing in XML Environments) model. This model, developed in a phased approach as a family of billing models, incorporates three aspects. The rst aspect is access control. The second as- pect is pricing, in the form of document, element and inherited element level pricing for content. The third aspect is XML as the platform for information exchange. The nature of the Internet facilitates information interchange, exible web business models and exible pricing. These facts, coupled with CBiX being concerned with billing for content over the Internet, leads to a number of decisions regarding the model: The CBiX model has to incorporate exible pricing. Therefore pricing is evolved through the development of the family of models from doc- ument level pricing to element level pricing to inherited element level pricing. The CBiX model has to be based on a platform for information inter- change that enables content delivery. XML provides a broad family of standards that is widely supported and creating the next generation Internet. XML is therefore selected as the environment for information exchange for CBiX. The CBiX model requires a form of access control that can provide access to content based on user properties. Credential-based Access Control is therefore selected as the method of access control for CBiX, whereby authorization is granted based on a set of user credentials. Furthermore, this dissertation reports on the development of a prototype. This serves a dual purpose: rstly, to assist the author in understanding the technologies and principles involved; secondly, to illustrate CBiX0 and therefore present a proof-of-concept of at least the base model. The CBiX model provides a base to guide and assist developers with regards to the issues involved with developing a billing system for XML- based environments.
- Full Text:
- Date Issued: 2003
- Authors: De Villiers, Peter
- Date: 2003
- Subjects: XML (Document Markup Language) , Access control , Pricing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10802 , http://hdl.handle.net/10948/208 , XML (Document Markup Language) , Access control , Pricing
- Description: The new global economy is based on knowledge and information. Further- more, the Internet is facilitating new forms of revenue generation of which one recognized potential source is content delivery over the Internet. One aspect that is critical to ensuring a content-based revenue stream is billing. While there are a number of content-based billing systems commercially available, as far as can be determined these products are not based on a common model that can ensure interoperability and communication between the billing sys- tems. This dissertation addresses the need for a content-based billing model by developing the CBiX (Content-based Billing in XML Environments) model. This model, developed in a phased approach as a family of billing models, incorporates three aspects. The rst aspect is access control. The second as- pect is pricing, in the form of document, element and inherited element level pricing for content. The third aspect is XML as the platform for information exchange. The nature of the Internet facilitates information interchange, exible web business models and exible pricing. These facts, coupled with CBiX being concerned with billing for content over the Internet, leads to a number of decisions regarding the model: The CBiX model has to incorporate exible pricing. Therefore pricing is evolved through the development of the family of models from doc- ument level pricing to element level pricing to inherited element level pricing. The CBiX model has to be based on a platform for information inter- change that enables content delivery. XML provides a broad family of standards that is widely supported and creating the next generation Internet. XML is therefore selected as the environment for information exchange for CBiX. The CBiX model requires a form of access control that can provide access to content based on user properties. Credential-based Access Control is therefore selected as the method of access control for CBiX, whereby authorization is granted based on a set of user credentials. Furthermore, this dissertation reports on the development of a prototype. This serves a dual purpose: rstly, to assist the author in understanding the technologies and principles involved; secondly, to illustrate CBiX0 and therefore present a proof-of-concept of at least the base model. The CBiX model provides a base to guide and assist developers with regards to the issues involved with developing a billing system for XML- based environments.
- Full Text:
- Date Issued: 2003
Integrating information security into corporate culture
- Authors: Thomson, Kerry-Lynn
- Date: 2003
- Subjects: Computer security -- Management , Corporate governance , Corporate culture
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10801 , http://hdl.handle.net/10948/132 , Computer security -- Management , Corporate governance , Corporate culture
- Description: Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is concerned with the implementation and support of control measures to protect the confidentiality, integrity and availability of electronically stored information (BS 7799-1, 1999, p 1). Information security is achieved by applying control measures that will lessen the threat, reduce the vulnerability or diminish the impact of losing an information asset. However, as a result of the fact that an increasing number of employees have access to information, the protection of information is no longer only dependent on physical and technical controls, but also, to a large extent, on the actions of employees utilising information resources. All employees have a role to play in safeguarding information and they need guidance in fulfilling these roles (Barnard, 1998, p 12). This guidance should originate from senior management, using good corporate governance practices. The effective leadership resulting from good corporate governance practices is another component in an organisation that contributes to its success (King Report, 2001, p 11). Corporate governance is defined as the exercise of power over and responsibility for corporate entities (Blackwell Publishers, 2000, online). Senior management, as part of its corporate governance duties, should encourage employees to adhere to the behaviour specified by senior management to contribute towards a successful organisation. Senior management should not dictate this behaviour, but encourage it as naturally as possible, resulting in the correct behaviour becoming part of the corporate culture. If the inner workings of organisations are explored it would be found that there are many hidden forces at work that determine how senior management and the employees relate to one another and to customers. These hidden forces are collectively called the culture of the organisation (Hagberg Consulting Group, 2002, online). Cultural assumptions in organisations grow around how people in the organisation relate to each other, but that is only a small part of what corporate culture actually covers (Schein, 1999, p 28). Corporate culture is the outcome of all the collective, taken-for-granted assumptions that a group has learned throughout history. Corporate culture is the residue of success. In other words, it is the set of procedures that senior management and employees of an organisation follow in order to be successful (Schein, 1999, p 29). Cultivating an effective corporate culture, managing an organisation using efficient corporate governance practices and protecting the valuable information assets of an organisation through an effective information security program are, individually, all important components in the success of an organisation. One of the biggest questions with regard to these three fields is the relationship that should exist between information security, corporate governance and corporate culture. In other words, what can the senior management of an organisation, using effective corporate governance practices, do to ensure that information security practices become a subconscious response in the corporate culture?.
- Full Text:
- Date Issued: 2003
- Authors: Thomson, Kerry-Lynn
- Date: 2003
- Subjects: Computer security -- Management , Corporate governance , Corporate culture
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10801 , http://hdl.handle.net/10948/132 , Computer security -- Management , Corporate governance , Corporate culture
- Description: Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is concerned with the implementation and support of control measures to protect the confidentiality, integrity and availability of electronically stored information (BS 7799-1, 1999, p 1). Information security is achieved by applying control measures that will lessen the threat, reduce the vulnerability or diminish the impact of losing an information asset. However, as a result of the fact that an increasing number of employees have access to information, the protection of information is no longer only dependent on physical and technical controls, but also, to a large extent, on the actions of employees utilising information resources. All employees have a role to play in safeguarding information and they need guidance in fulfilling these roles (Barnard, 1998, p 12). This guidance should originate from senior management, using good corporate governance practices. The effective leadership resulting from good corporate governance practices is another component in an organisation that contributes to its success (King Report, 2001, p 11). Corporate governance is defined as the exercise of power over and responsibility for corporate entities (Blackwell Publishers, 2000, online). Senior management, as part of its corporate governance duties, should encourage employees to adhere to the behaviour specified by senior management to contribute towards a successful organisation. Senior management should not dictate this behaviour, but encourage it as naturally as possible, resulting in the correct behaviour becoming part of the corporate culture. If the inner workings of organisations are explored it would be found that there are many hidden forces at work that determine how senior management and the employees relate to one another and to customers. These hidden forces are collectively called the culture of the organisation (Hagberg Consulting Group, 2002, online). Cultural assumptions in organisations grow around how people in the organisation relate to each other, but that is only a small part of what corporate culture actually covers (Schein, 1999, p 28). Corporate culture is the outcome of all the collective, taken-for-granted assumptions that a group has learned throughout history. Corporate culture is the residue of success. In other words, it is the set of procedures that senior management and employees of an organisation follow in order to be successful (Schein, 1999, p 29). Cultivating an effective corporate culture, managing an organisation using efficient corporate governance practices and protecting the valuable information assets of an organisation through an effective information security program are, individually, all important components in the success of an organisation. One of the biggest questions with regard to these three fields is the relationship that should exist between information security, corporate governance and corporate culture. In other words, what can the senior management of an organisation, using effective corporate governance practices, do to ensure that information security practices become a subconscious response in the corporate culture?.
- Full Text:
- Date Issued: 2003
The development of a model for organising educational resources on an Intranet
- Authors: Sing Min, Yvonne Monica
- Date: 2003
- Subjects: Intranets (Computer networks) , Education -- Computer network resources , Internet in education
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10799 , http://hdl.handle.net/10948/221 , Intranets (Computer networks) , Education -- Computer network resources , Internet in education
- Description: The twenty-first century has found education at the crossroads of change. There are burgeoning challenges facing the modern educator. To rise to the importuning, educators find themselves turning to Information Technology for the answers. The technologies utilised in attempts to overcome the challenges often include the Internet and electronic educational resources. Although the Internet is not unduly called the Information Highway, it is also fraught with misleading and incorrect information. Educators’ arduous searches result in few good and useable resources. Thus, to store, organise and efficiently retrieve the discovered resources is a matter of time-saving. The aim of the study was to develop a method to organise and retrieve educational resources in an efficient and personalised manner. In order to do this, an exploration into pedagogy and educational paradigms was undertaken. The current educational paradigm, constructivism, proposes that each learner is an individual with unique learning and personal needs. To develop a new model, the current models need to be understood. The current solutions for the organising of educational resources are realised as several software packages, also called e-learning packages. A list of criteria that describes the essential requirements for organising educational resources was established. These criteria were based upon the pedagogical principles prescribed by educators and the practical technological frameworks necessary to fulfil the needs of the teaching/learning situation. These criteria were utilised to critique and explore the available solutions. It was found that although the available e-learning packages fulfil a need within their genre, it does not meet with the core requirements of constructivism. The resource base model seeks to address these needs by focussing on the educational aspects of resource delivery over an Intranet. For the purposes of storing, organising and delivering the resources, a database had to be established. This database had to have numerous qualities, including the ability to search and retrieve resources with great efficiency. Retrieving data in an efficient manner is the forte of the star schema, while the storing and organising of data is the strength of a normalised schema. It is not standard practice to utilise both types of schemas within the same database. A star schema is usually reserved for data warehouses because of its data retrieval abilities. It is customary to utilise a normalised schema for operational databases. The resource base model, however, needs both the storage facilities of an operational database and the efficient query facilities of a data warehouse. The resource base model, therefore, melds both schemas into one database with interlinking tables. This database forms the foundation (or the back-end) of the resource base. The resource base model utilises web browsers as its user interface (or front-end). The results of the study on the pedagogy, the current e-learning solutions and the resource base were written up within this dissertation. The contribution that this dissertation makes is the development of a technique to efficiently store, organise and retrieve educational resources in such a manner that both the requirements of constructivism and outcomes-based education are fulfilled. To this end, a list of technological and pedagogical criteria on which to critique a resource delivery technique has been developed. This dissertation also elaborates on the schema designs chosen for the resource base, namely the normalised schema and the star schema. From this schema, a prototype has been developed. The prototype’s function was two-fold. The first function is to determine the feasibility of the technique. Secondly, to determine the success of the technique in fulfilling the needs expressed in the list of criteria
- Full Text:
- Date Issued: 2003
- Authors: Sing Min, Yvonne Monica
- Date: 2003
- Subjects: Intranets (Computer networks) , Education -- Computer network resources , Internet in education
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10799 , http://hdl.handle.net/10948/221 , Intranets (Computer networks) , Education -- Computer network resources , Internet in education
- Description: The twenty-first century has found education at the crossroads of change. There are burgeoning challenges facing the modern educator. To rise to the importuning, educators find themselves turning to Information Technology for the answers. The technologies utilised in attempts to overcome the challenges often include the Internet and electronic educational resources. Although the Internet is not unduly called the Information Highway, it is also fraught with misleading and incorrect information. Educators’ arduous searches result in few good and useable resources. Thus, to store, organise and efficiently retrieve the discovered resources is a matter of time-saving. The aim of the study was to develop a method to organise and retrieve educational resources in an efficient and personalised manner. In order to do this, an exploration into pedagogy and educational paradigms was undertaken. The current educational paradigm, constructivism, proposes that each learner is an individual with unique learning and personal needs. To develop a new model, the current models need to be understood. The current solutions for the organising of educational resources are realised as several software packages, also called e-learning packages. A list of criteria that describes the essential requirements for organising educational resources was established. These criteria were based upon the pedagogical principles prescribed by educators and the practical technological frameworks necessary to fulfil the needs of the teaching/learning situation. These criteria were utilised to critique and explore the available solutions. It was found that although the available e-learning packages fulfil a need within their genre, it does not meet with the core requirements of constructivism. The resource base model seeks to address these needs by focussing on the educational aspects of resource delivery over an Intranet. For the purposes of storing, organising and delivering the resources, a database had to be established. This database had to have numerous qualities, including the ability to search and retrieve resources with great efficiency. Retrieving data in an efficient manner is the forte of the star schema, while the storing and organising of data is the strength of a normalised schema. It is not standard practice to utilise both types of schemas within the same database. A star schema is usually reserved for data warehouses because of its data retrieval abilities. It is customary to utilise a normalised schema for operational databases. The resource base model, however, needs both the storage facilities of an operational database and the efficient query facilities of a data warehouse. The resource base model, therefore, melds both schemas into one database with interlinking tables. This database forms the foundation (or the back-end) of the resource base. The resource base model utilises web browsers as its user interface (or front-end). The results of the study on the pedagogy, the current e-learning solutions and the resource base were written up within this dissertation. The contribution that this dissertation makes is the development of a technique to efficiently store, organise and retrieve educational resources in such a manner that both the requirements of constructivism and outcomes-based education are fulfilled. To this end, a list of technological and pedagogical criteria on which to critique a resource delivery technique has been developed. This dissertation also elaborates on the schema designs chosen for the resource base, namely the normalised schema and the star schema. From this schema, a prototype has been developed. The prototype’s function was two-fold. The first function is to determine the feasibility of the technique. Secondly, to determine the success of the technique in fulfilling the needs expressed in the list of criteria
- Full Text:
- Date Issued: 2003
WSP3: a web service model for personal privacy protection
- Authors: Ophoff, Jacobus Albertus
- Date: 2003
- Subjects: Data protection , Computer security , Privacy, Right of
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10798 , http://hdl.handle.net/10948/272 , Data protection , Computer security , Privacy, Right of
- Description: The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the use of new technologies to improve the levels of personal privacy. In this regard the WSP3 (Web Service Model for Personal Privacy Protection) model is formulated. This model proposes a privacy protection scheme using Web Services. Having received tremendous industry backing, Web Services is a very topical technology, promising much in the evolution of the Internet. In our society privacy is highly valued and a very important issue. Protecting personal privacy in environments using new technologies is crucial for their future success. These facts, combined with the detail that the WSP3 model focusses on Web Service environments, lead to the following realizations for the model: The WSP3 model provides users with control over their personal information and allows them to express their desired level of privacy. Parties requiring access to a user’s information are explicitly defined by the user, as well as the information available to them. The WSP3 model utilizes a Web Services architecture to provide privacy protection. In addition, it integrates security techniques, such as cryptography, into the architecture as required. The WSP3 model integrates with current standards to maintain their benefits. This allows the implementation of the model in any environment supporting these base technologies. In addition, the research involves the development of a prototype according to the model. This prototype serves to present a proof-of-concept by illustrating the WSP3 model and all the technologies involved. The WSP3 model gives users control over their privacy and allows everyone to decide their own level of protection. By incorporating Web Services, the model also shows how new technologies can be used to offer solutions to existing problem areas.
- Full Text:
- Date Issued: 2003
- Authors: Ophoff, Jacobus Albertus
- Date: 2003
- Subjects: Data protection , Computer security , Privacy, Right of
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10798 , http://hdl.handle.net/10948/272 , Data protection , Computer security , Privacy, Right of
- Description: The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the use of new technologies to improve the levels of personal privacy. In this regard the WSP3 (Web Service Model for Personal Privacy Protection) model is formulated. This model proposes a privacy protection scheme using Web Services. Having received tremendous industry backing, Web Services is a very topical technology, promising much in the evolution of the Internet. In our society privacy is highly valued and a very important issue. Protecting personal privacy in environments using new technologies is crucial for their future success. These facts, combined with the detail that the WSP3 model focusses on Web Service environments, lead to the following realizations for the model: The WSP3 model provides users with control over their personal information and allows them to express their desired level of privacy. Parties requiring access to a user’s information are explicitly defined by the user, as well as the information available to them. The WSP3 model utilizes a Web Services architecture to provide privacy protection. In addition, it integrates security techniques, such as cryptography, into the architecture as required. The WSP3 model integrates with current standards to maintain their benefits. This allows the implementation of the model in any environment supporting these base technologies. In addition, the research involves the development of a prototype according to the model. This prototype serves to present a proof-of-concept by illustrating the WSP3 model and all the technologies involved. The WSP3 model gives users control over their privacy and allows everyone to decide their own level of protection. By incorporating Web Services, the model also shows how new technologies can be used to offer solutions to existing problem areas.
- Full Text:
- Date Issued: 2003
A cyclic approach to business continuity planning
- Authors: Botha, Jacques
- Date: 2002
- Subjects: Data recovery (Computer science) -- Planning , Data protection , Emergency management
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10788 , http://hdl.handle.net/10948/81 , Data recovery (Computer science) -- Planning , Data protection , Emergency management
- Description: The Information Technology (IT) industry has grown and has become an integral part in the world of business today. The importance of information, and IT in particular, will in fact only increase with time (von Solms, 1999). For a large group of organizations computer systems form the basis of their day-to-day functioning (Halliday, Badendorst & von Solms, 1996). These systems evolve at an incredible pace and this brings about a greater need for securing them, as well as the organizational information processed, transmitted and stored. This technological evolution brings about new risks for an organization’s systems and information (Halliday et. al., 1996). If IT fails, it means that the business could fail as well, creating a need for more rigorous IT management (International Business Machines Corporation, 2000). For this reason, executive management must be made aware of the potential consequences that a disaster could have on the organisation (Hawkins,Yen & Chou, 2000). A disaster could be any event that would cause a disruption in the normal day-to-day functioning of an organization. Such an event could range from a natural disaster, like a fire, an earthquake or a flood, to something more trivial, like a virus or system malfunction (Hawkins et. al., 2000). During the 1980’s a discipline known as Disaster Recovery Planning (DRP) emerged to protect an organization’s data centre, which was central to the organisation’s IT based structure, from the effects of disasters. This solution, however, focussed only on the protection of the data centre. During the early 1990’s the focus shifted towards distributed computing and client/server technology. Data centre protection and recovery were no longer enough to ensure survival. Organizations needed to ensure the continuation of their mission critical processes to support their continued goal of operations (IBM Global Services, 1999). Organizations now had to ensure that their mission critical functions could continue while the data centre was recovering from a disaster. A different approach was required. It is for this reason that Business Continuity Planning (BCP) was accepted as a formal discipline (IBM Global Services, 1999). To ensure that business continues as usual, an organization must have a plan in place that will help them ensure both the continuation and recovery of critical business processes and the recovery of the data centre, should a disaster strike (Moore, 1995). Wilson (2000) defines a business continuity plan as “a set of procedures developed for the entire enterprise, outlining the actions to be taken by the IT organization, executive staff, and the various business units in order to quickly resume operations in the event of a service interruption or an outage”. With markets being highly competitive as they are, an organization needs a detailed listing of steps to follow to ensure minimal loss due to downtime. This is very important for maintaining its competitive advantage and public stature (Wilson, 2000). The fact that the company’s reputation is at stake requires executive management to take continuity planning very serious (IBM Global Services, 1999). Ensuring continuity of business processes and recovering the IT services of an organization is not the sole responsibility of the IT department. Therefore management should be aware that they could be held liable for any consequences resulting from a disaster (Kearvell-White, 1996). Having a business continuity plan in place is important to the entire organization, as everyone, from executive management to the employees, stands to benefit from it (IBM Global Services, 1999). Despite this, numerous organizations do not have a business continuity plan in place. Organizations neglecting to develop a plan put themselves at tremendous risk and stand to loose everything (Kearvell-White, 1996).
- Full Text:
- Date Issued: 2002
- Authors: Botha, Jacques
- Date: 2002
- Subjects: Data recovery (Computer science) -- Planning , Data protection , Emergency management
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10788 , http://hdl.handle.net/10948/81 , Data recovery (Computer science) -- Planning , Data protection , Emergency management
- Description: The Information Technology (IT) industry has grown and has become an integral part in the world of business today. The importance of information, and IT in particular, will in fact only increase with time (von Solms, 1999). For a large group of organizations computer systems form the basis of their day-to-day functioning (Halliday, Badendorst & von Solms, 1996). These systems evolve at an incredible pace and this brings about a greater need for securing them, as well as the organizational information processed, transmitted and stored. This technological evolution brings about new risks for an organization’s systems and information (Halliday et. al., 1996). If IT fails, it means that the business could fail as well, creating a need for more rigorous IT management (International Business Machines Corporation, 2000). For this reason, executive management must be made aware of the potential consequences that a disaster could have on the organisation (Hawkins,Yen & Chou, 2000). A disaster could be any event that would cause a disruption in the normal day-to-day functioning of an organization. Such an event could range from a natural disaster, like a fire, an earthquake or a flood, to something more trivial, like a virus or system malfunction (Hawkins et. al., 2000). During the 1980’s a discipline known as Disaster Recovery Planning (DRP) emerged to protect an organization’s data centre, which was central to the organisation’s IT based structure, from the effects of disasters. This solution, however, focussed only on the protection of the data centre. During the early 1990’s the focus shifted towards distributed computing and client/server technology. Data centre protection and recovery were no longer enough to ensure survival. Organizations needed to ensure the continuation of their mission critical processes to support their continued goal of operations (IBM Global Services, 1999). Organizations now had to ensure that their mission critical functions could continue while the data centre was recovering from a disaster. A different approach was required. It is for this reason that Business Continuity Planning (BCP) was accepted as a formal discipline (IBM Global Services, 1999). To ensure that business continues as usual, an organization must have a plan in place that will help them ensure both the continuation and recovery of critical business processes and the recovery of the data centre, should a disaster strike (Moore, 1995). Wilson (2000) defines a business continuity plan as “a set of procedures developed for the entire enterprise, outlining the actions to be taken by the IT organization, executive staff, and the various business units in order to quickly resume operations in the event of a service interruption or an outage”. With markets being highly competitive as they are, an organization needs a detailed listing of steps to follow to ensure minimal loss due to downtime. This is very important for maintaining its competitive advantage and public stature (Wilson, 2000). The fact that the company’s reputation is at stake requires executive management to take continuity planning very serious (IBM Global Services, 1999). Ensuring continuity of business processes and recovering the IT services of an organization is not the sole responsibility of the IT department. Therefore management should be aware that they could be held liable for any consequences resulting from a disaster (Kearvell-White, 1996). Having a business continuity plan in place is important to the entire organization, as everyone, from executive management to the employees, stands to benefit from it (IBM Global Services, 1999). Despite this, numerous organizations do not have a business continuity plan in place. Organizations neglecting to develop a plan put themselves at tremendous risk and stand to loose everything (Kearvell-White, 1996).
- Full Text:
- Date Issued: 2002
A conceptual object-oriented model to support educators in an outcomes-based environment
- Authors: Harmse, Rudi Gerhard
- Date: 2001
- Subjects: Competency-based education -- South Africa , Curriculum-based assessment -- South Africa , Object-oriented databases
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10794 , http://hdl.handle.net/10948/47 , Competency-based education -- South Africa , Curriculum-based assessment -- South Africa , Object-oriented databases
- Description: The introduction of outcomes-based education (OBE) in South Africa has led to a new learner-centred approach with an emphasis on the outcomes that the learners need to achieve. With this learner-centred focus has come a greater need for record keeping. It is now necessary to track each learner’s progress towards the attainment of the learning outcomes. This progress is tracked in relation to assessment standards that are defined for every learning outcome. These assessment standards define the results expected of learners at certain stages in their development. The new OBE system has emphasised accountability and this is expressed in a requirement to keep evidence to justify the assessment results given. The large numbers of learners and the increased managerial demand of OBE cause problems to educators who may find themselves unable to keep track of the learners’ progress under such conditions. This dissertation investigates the structure of the new OBE system as well as its assessment and evidence requirements. From this the features required from a support system for educators in an OBE environment are determined. The supporting processes needed to enable these features to be implemented, as well as the storage requirements of such a system are identified. In addition to OBE, the field of Computer Integrated Learning Environments (CILEs) and Intelligent Tutoring Systems (ITSs) are investigated and useful details identified are added to the requirements for an OBE support system. The dissertation then presents an object-oriented conceptual model of the items that need to be stored in order to allow the features of an OBE support system to be implemented. The relationships between these items are also indicated in this model.
- Full Text:
- Date Issued: 2001
- Authors: Harmse, Rudi Gerhard
- Date: 2001
- Subjects: Competency-based education -- South Africa , Curriculum-based assessment -- South Africa , Object-oriented databases
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10794 , http://hdl.handle.net/10948/47 , Competency-based education -- South Africa , Curriculum-based assessment -- South Africa , Object-oriented databases
- Description: The introduction of outcomes-based education (OBE) in South Africa has led to a new learner-centred approach with an emphasis on the outcomes that the learners need to achieve. With this learner-centred focus has come a greater need for record keeping. It is now necessary to track each learner’s progress towards the attainment of the learning outcomes. This progress is tracked in relation to assessment standards that are defined for every learning outcome. These assessment standards define the results expected of learners at certain stages in their development. The new OBE system has emphasised accountability and this is expressed in a requirement to keep evidence to justify the assessment results given. The large numbers of learners and the increased managerial demand of OBE cause problems to educators who may find themselves unable to keep track of the learners’ progress under such conditions. This dissertation investigates the structure of the new OBE system as well as its assessment and evidence requirements. From this the features required from a support system for educators in an OBE environment are determined. The supporting processes needed to enable these features to be implemented, as well as the storage requirements of such a system are identified. In addition to OBE, the field of Computer Integrated Learning Environments (CILEs) and Intelligent Tutoring Systems (ITSs) are investigated and useful details identified are added to the requirements for an OBE support system. The dissertation then presents an object-oriented conceptual model of the items that need to be stored in order to allow the features of an OBE support system to be implemented. The relationships between these items are also indicated in this model.
- Full Text:
- Date Issued: 2001
A model for the enforcement of history-based separation of duty in heterogeneous workflow environments
- Authors: Papenfus, Carl
- Date: 2001
- Subjects: Reengineering (Management) , Industrial management , Workflow
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10797 , http://hdl.handle.net/10948/69 , Reengineering (Management) , Industrial management , Workflow
- Description: The current business world is becoming more and more dependent on electronic business. Many paper documents have been made obsolete by electronic documents, as they are easier to automate and track than paper documents. The increased use of computers within organizations has therefore, lead to an increase in use of workflow software products. The increased use of computer-based workflow has allowed organizations to conduct more types of electronic business. This has lead to electronic business crossing organizational boundaries and subsequently a need for heterogeneous workflow systems. For organizations to use heterogeneous workflow systems they must perform their duties in a seamless and secure manner. It is the author’s belief that History-based Separation of Duty principles can be used to formulate access control strategies that reflect the dynamic nature of heterogeneous workflow systems. History-based Separation of Duties relies on the workflow history of a workflow object to determine the access permissions of a particular user to that workflow object. The required workflow history data must be stored in an easily accessible manner. Although this can be achieved through a centralized approach, it is difficult to achieve in a heterogeneous workflow environment where many unrelated workflow systems are interacting across various computer platforms. The model proposed by this dissertation suggests that the workflow history data of a workflow object travels with it in the form of an electronic document, from one heterogeneous workflow environment to another, as a type of “workflow baggage”. In order for this workflow baggage to be easily accessible to all workflow systems in the heterogeneous workflow environment, it must be stored in a universal format, which is structured to allow it to be easily queried. The Extensible Markup Language (XML) is adopted as an appropriate format for representing workflow baggage. The proposed model hinges on the expression of Separation of Duty requirements in a way that is removed from the application programs. A policy-driven approach is thus adopted. The implementation of the model involves the utilization of four steps: policy expression, baggage evaluation, document processing and baggage collection. The policy expression step is responsible for developing the Separation of Duty constraints to be enforced within the workflow system. During the baggage evaluation step the baggage of the workflow object is evaluated according to the constraints of the Separation of Duty policy. Only users who do not violate any of the Separation of Duty constraints are allowed to process the workflow object. After the workflow object has been processed the information regarding the processing is recorded in the baggage collection step. The proposed model enables heterogeneous workflow systems to share access control information in a flexible and portable way.
- Full Text:
- Date Issued: 2001
- Authors: Papenfus, Carl
- Date: 2001
- Subjects: Reengineering (Management) , Industrial management , Workflow
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10797 , http://hdl.handle.net/10948/69 , Reengineering (Management) , Industrial management , Workflow
- Description: The current business world is becoming more and more dependent on electronic business. Many paper documents have been made obsolete by electronic documents, as they are easier to automate and track than paper documents. The increased use of computers within organizations has therefore, lead to an increase in use of workflow software products. The increased use of computer-based workflow has allowed organizations to conduct more types of electronic business. This has lead to electronic business crossing organizational boundaries and subsequently a need for heterogeneous workflow systems. For organizations to use heterogeneous workflow systems they must perform their duties in a seamless and secure manner. It is the author’s belief that History-based Separation of Duty principles can be used to formulate access control strategies that reflect the dynamic nature of heterogeneous workflow systems. History-based Separation of Duties relies on the workflow history of a workflow object to determine the access permissions of a particular user to that workflow object. The required workflow history data must be stored in an easily accessible manner. Although this can be achieved through a centralized approach, it is difficult to achieve in a heterogeneous workflow environment where many unrelated workflow systems are interacting across various computer platforms. The model proposed by this dissertation suggests that the workflow history data of a workflow object travels with it in the form of an electronic document, from one heterogeneous workflow environment to another, as a type of “workflow baggage”. In order for this workflow baggage to be easily accessible to all workflow systems in the heterogeneous workflow environment, it must be stored in a universal format, which is structured to allow it to be easily queried. The Extensible Markup Language (XML) is adopted as an appropriate format for representing workflow baggage. The proposed model hinges on the expression of Separation of Duty requirements in a way that is removed from the application programs. A policy-driven approach is thus adopted. The implementation of the model involves the utilization of four steps: policy expression, baggage evaluation, document processing and baggage collection. The policy expression step is responsible for developing the Separation of Duty constraints to be enforced within the workflow system. During the baggage evaluation step the baggage of the workflow object is evaluated according to the constraints of the Separation of Duty policy. Only users who do not violate any of the Separation of Duty constraints are allowed to process the workflow object. After the workflow object has been processed the information regarding the processing is recorded in the baggage collection step. The proposed model enables heterogeneous workflow systems to share access control information in a flexible and portable way.
- Full Text:
- Date Issued: 2001
SoDA : a model for the administration of separation of duty requirements in workflow systems
- Authors: Perelson, Stephen
- Date: 2001
- Subjects: Electronic data processing departments -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10796 , http://hdl.handle.net/10948/68 , Electronic data processing departments -- Security measures , Computers -- Access control
- Description: The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security administrators. Separation of duties is one of the principles cited as a criterion when setting up these policy-based mechanisms. Different types of separation of duty policies exist. They can be categorised into policies that can be enforced at administration time, viz. static separation of duty requirements and policies that can be enforced only at execution time, viz. dynamic separation of duty requirements. This dissertation deals with the specification of both static separation of duty requirements and dynamic separation of duty requirements in role-based workflow environments. It proposes a model for the specification of separation of duty requirements, the expressions of which are based on set theory. The model focuses, furthermore, on the enforcement of static separation of duty. The enforcement of static separation of duty requirements is modelled in terms of invariant conditions. The invariant conditions specify restrictions upon the elements allowed in the sets representing access control requirements. The sets are themselves expressed as database tables within a relational database management system. Algorithms that stipulate how to verify the additions or deletions of elements within these sets can then be performed within the database management system. A prototype was developed in order to demonstrate the concepts of this model. This prototype helps demonstrate how the proposed model could function and flaunts its effectiveness.
- Full Text:
- Date Issued: 2001
- Authors: Perelson, Stephen
- Date: 2001
- Subjects: Electronic data processing departments -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10796 , http://hdl.handle.net/10948/68 , Electronic data processing departments -- Security measures , Computers -- Access control
- Description: The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security administrators. Separation of duties is one of the principles cited as a criterion when setting up these policy-based mechanisms. Different types of separation of duty policies exist. They can be categorised into policies that can be enforced at administration time, viz. static separation of duty requirements and policies that can be enforced only at execution time, viz. dynamic separation of duty requirements. This dissertation deals with the specification of both static separation of duty requirements and dynamic separation of duty requirements in role-based workflow environments. It proposes a model for the specification of separation of duty requirements, the expressions of which are based on set theory. The model focuses, furthermore, on the enforcement of static separation of duty. The enforcement of static separation of duty requirements is modelled in terms of invariant conditions. The invariant conditions specify restrictions upon the elements allowed in the sets representing access control requirements. The sets are themselves expressed as database tables within a relational database management system. Algorithms that stipulate how to verify the additions or deletions of elements within these sets can then be performed within the database management system. A prototype was developed in order to demonstrate the concepts of this model. This prototype helps demonstrate how the proposed model could function and flaunts its effectiveness.
- Full Text:
- Date Issued: 2001
The development of a model to effectively utilise computer mediated communication to support assessment in a virtual learning environment
- Authors: Pullen, Grant
- Date: 2001
- Subjects: Computer-assisted instruction , Students -- Rating of , Communication in education -- Data processing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10795 , http://hdl.handle.net/10948/54 , Computer-assisted instruction , Students -- Rating of , Communication in education -- Data processing
- Description: Programming lecturers are faced with logistical problems associated with evaluating students’ assignments. This dissertation will discuss the problems associated with paper- and electronic-based submission and evaluation systems. Managing student assignments is thus an important issue and this dissertation investigates how the computer can be used to help in both the management of programming assignments and giving of feedback for those assignments. Computer Mediated Communication (CMC) technologies offer a technical solution for the submission of assignments. CMC technologies are therefore studied and their use in the educational sphere discussed. Information Security is another important feature that is needed when using CMC for assignment management. A guideline showing the different features that an assignment management and feedback system would need was developed. Current systems that offer some assignment management features were studied and evaluated according to the guideline. A model was developed for the management of programming assignments. The model addresses the problems of paper-based and previous electronic submission systems and includes the assessment of the assignments. The viability of the model was determined by building and testing a prototype based on the model’s specifications. The prototype was evaluated within a second year Visual Basic programming class. The evaluation determined that there were areas that needed improvement, however the feedback was generally positive.
- Full Text:
- Date Issued: 2001
- Authors: Pullen, Grant
- Date: 2001
- Subjects: Computer-assisted instruction , Students -- Rating of , Communication in education -- Data processing
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10795 , http://hdl.handle.net/10948/54 , Computer-assisted instruction , Students -- Rating of , Communication in education -- Data processing
- Description: Programming lecturers are faced with logistical problems associated with evaluating students’ assignments. This dissertation will discuss the problems associated with paper- and electronic-based submission and evaluation systems. Managing student assignments is thus an important issue and this dissertation investigates how the computer can be used to help in both the management of programming assignments and giving of feedback for those assignments. Computer Mediated Communication (CMC) technologies offer a technical solution for the submission of assignments. CMC technologies are therefore studied and their use in the educational sphere discussed. Information Security is another important feature that is needed when using CMC for assignment management. A guideline showing the different features that an assignment management and feedback system would need was developed. Current systems that offer some assignment management features were studied and evaluated according to the guideline. A model was developed for the management of programming assignments. The model addresses the problems of paper-based and previous electronic submission systems and includes the assessment of the assignments. The viability of the model was determined by building and testing a prototype based on the model’s specifications. The prototype was evaluated within a second year Visual Basic programming class. The evaluation determined that there were areas that needed improvement, however the feedback was generally positive.
- Full Text:
- Date Issued: 2001
The development of a technique to establish the security requirements of an organization
- Authors: Gerber, Mariana
- Date: 2001
- Subjects: Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10789 , http://hdl.handle.net/10948/89 , Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Description: To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
- Full Text:
- Date Issued: 2001
- Authors: Gerber, Mariana
- Date: 2001
- Subjects: Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10789 , http://hdl.handle.net/10948/89 , Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Description: To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
- Full Text:
- Date Issued: 2001
- «
- ‹
- 1
- ›
- »