The utilization of contraceptives amongst adolescents at Stutterheim in the Eastern Cape Province
- Authors: Ntengo-Kupula, Visisa
- Date: 2022-04
- Subjects: Contraception , Birth control , Teenage pregnancy
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10353/27082 , vital:66272
- Description: Introduction Contraception has been identified as one way in which women can prevent unwanted pregnancies. Contraceptive utilization has been proved to minimize maternal mortality by lowering the risk of pregnancy and its associated life-threatening problems. Therefore, the researcher conducted a study at Stutterheim about the “utilization of contraceptives amongst adolescents at Stutterheim in Eastern Cape Province” with the intentions to explore perceptions of adolescents on utilization of contraceptives and to determine the factors that influence that contraceptive utilization. Methods This study adopted a quantitative, descriptive cross-sectional design which involved questionnaire tools completed by 436 adolescents between the ages of 14 and 19 years at Stutterheim health facilities and the surrounding schools, regardless of whether they were sexually active or not. After obtaining ethical clearance from the University ethics Committee and permission from the Department of Health the researcher visited the gatekeepers for obtaining informed consent and data collection procedures. The researcher administered the instruments herself to ensure validity and reliability of the instrument through a pilot study. The respondents of the pilot study did not participate in the major study. Any irregularities with the data instruments were corrected accordingly. Data collection took 3 weeks to complete all the sites. The raw data was captured onto an Excel spread sheet and analysed by the researcher with the assistance of a statistician. Results The data suggests that as much as the parents discuss about sex related issues and pregnancy, they are less likely to educate their adolescent girls about contraceptives probably due to the beliefs they have, lack of knowledge and the fear of introducing them into premarital sex. The 34.4percent of participants indicated that they were scared of contraceptive rumours spreading around the community as well as the stigmatization. Conclusion Due to the results of this study the Department of Health should work together with the department of education to put into effect the optimal utilization of contraceptives amongst adolescents by adding sexual, reproductive and contraceptives health education, as a subject in the school curriculum. Department of health must also make use of main media and social media since they are influential and can be the great sources of information for campaigns and more seminars on contraceptive utilization and its benefits to the adolescents, society and the State. , Thesis (MPH) -- Faculty of Health Science, 2022
- Full Text:
- Date Issued: 2022-04
Towards a risk assessment matrix for information security workarounds associated with acceptable use policies
- Authors: Slabbert, Eugene
- Date: 2022-04
- Subjects: Information networks--security measures , Computer security--South africa
- Language: English
- Type: Master's theses
- Identifier: http://hdl.handle.net/10948/55533 , vital:52811
- Description: Acceptable Use Policies (AUPs) are used to influence employees’ information security behaviour. Some employees feel that the AUPs and related procedures interfere with their ability to work efficiently and may, therefore, choose not to comply by utilising information security workarounds associated with the AUP. An AUP workaround is a form of information security non compliance that may result in unnecessary information security risk exposure for an organisation. Some AUP workarounds may be useful as they identify more efficient ways to complete tasks that may not impact the information security of an organisation. However, these efficiencies should only be considered for incorporation into standard procedures when the information security risk exposure of an AUP workaround is known. This leads to the problem statement. Many organisations do not have a formal way in which to assess the information security risks posed by workarounds associated with their Acceptable Use Policies, and related procedures. This study provides a solution to the identified problem through the primary objective, to develop a Risk Assessment Matrix for Information Security Workarounds associated with Acceptable Use Policies, and related procedures. Four secondary research objectives were proposed to achieve the primary research objective. The first secondary objective determines the role of information security risk management and how it relates to information security governance through the utilisation of a literature review. The second secondary objective firstly utilises a literature review to determine the role that the AUP and its related procedures play within an organisation, followed by a content analysis which identifies the key content that should be considered in a comprehensive AUP. The third secondary objective determines the factors that influence the use of AUP workarounds within an organisation through the utilisation of a literature review. Lastly, the fourth secondary objective utilises a literature review to determine the key components required for the development of the risk assessment matrix for information security workarounds. In addition, critical reasoning is used to create the risk assessment matrix for information security workarounds. The solution to this study contributes to the body of knowledge by proposing a risk assessment matrix to assess the information security risk exposure of AUP workarounds and find possible efficiency gains while keeping information security risk exposure to a minimum. , Thesis (MTech) -- Faculty of Engineering, the Built Environment and Information Technology , Information Technology, 2022
- Full Text:
- Date Issued: 2022-04
Towards a Risk Assessment Matrix for Information Security Workarounds Associated with Acceptable Use Policies
- Authors: Slabbert, Eugene
- Date: 2022-04
- Subjects: Information technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58473 , vital:59519
- Description: Acceptable Use Policies (AUPs) are used to influence employees’ information security behaviour. Some employees feel that the AUPs and related procedures interfere with their ability to work efficiently and may, therefore, choose not to comply by utilising information security workarounds associated with the AUP. An AUP workaround is a form of information security non-compliance that may result in unnecessary information security risk exposure for an organisation. Some AUP workarounds may be useful as they identify more efficient ways to complete tasks that may not impact the information security of an organisation. However, these efficiencies should only be considered for incorporation into standard procedures when the information security risk exposure of an AUP workaround is known. This leads to the problem statement. Many organisations do not have a formal way in which to assess the information security risks posed by workarounds associated with their Acceptable Use Policies, and related procedures. This study provides a solution to the identified problem through the primary objective, to develop a Risk Assessment Matrix for Information Security Workarounds associated with Acceptable Use Policies, and related procedures. Four secondary research objectives were proposed to achieve the primary research objective. The first secondary objective determines the role of information security risk management and how it relates to information security governance through the utilisation of a literature review. The second secondary objective firstly utilises a literature review to determine the role that the AUP and its related procedures play within an organisation, followed by a content analysis which identifies the key content that should be considered in a comprehensive AUP. The third secondary objective determines the factors that influence the use of AUP workarounds within an organisation through the utilisation of a literature review. Lastly, the fourth secondary objective utilises a literature review to determine the key components required for the development of the risk assessment matrix for information security workarounds. In addition, critical reasoning is used to create the risk assessment matrix for information security workarounds. The solution to this study contributes to the body of knowledge by proposing a risk assessment matrix to assess the information security risk exposure of AUP workarounds and find possible efficiency gains while keeping information security risk exposure to a minimum. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
Transformation in the South African Banking Industry
- Authors: Nokanda, Abongile
- Date: 2022-04
- Subjects: Banks and banking -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58091 , vital:58550
- Description: Transformation is a deliberate plan of action to change historical racial and gender disadvantages. Transformation is also a fundamental necessity in South Africa as it seeks to address the injustices of apartheid while enhancing economic inclusiveness and promoting diversity in the working environment. The progress of transformation remains slow in South Africa, particularly in management and leadership positions in companies within the South African Banking Sector Therefore, it is quite clear that inequality, discrimination and a lack of transformation in South Africa need to be addressed, as the inequality gap has remained the same, even after the abolition of apartheid. However, the Western Cape is a province that is considered to practice and protect apartheid policies that perpetuate racial, gender and spatial disparities. This study, therefore, sought to investigate the transformation of banks in the Western Cape. The study followed a deductive approach and used an online survey as a data collection tool. At the time of study, the population of the study were employees of banks in the Western Cape and who were permanently employed. Additionally, the aim of this research was to investigate the influence of the Employment Equity Act, Skills Gap, Leadership Accountability and Human Resource Development in driving transformation in the banking sector of the Western Cape region in South Africa. The empirical results of the study were obtained from 105 bank employees located in the Western Cape. The Employment Equity Act, Leadership Accountability and Human Resource Development were the strongest independent variables. The Employee Development was an independent variable that emerged from the respondents. The findings of the study indicated that Employment Equity Act, Leadership Accountability, Employee Development and Human Resource Development had a significant, positive relationship with Transformation. The study also revealed the Skills Gap as the only independent variable that had an insignificant impact on Transformation. The recommendations were made to the Western Cape Banks to implement and continue to: drive the implementation of the EE Act; for leaders to be held accountable when it comes to driving transformation; banks to establish and facilitate employee development programs and for human resource to identify, retain and promote talented employees. This will therefore lead to a better performing and transformed banking sector. , Thesis (MA) -- Business and Economic science, 2022
- Full Text:
- Date Issued: 2022-04
Usable Security Heuristics for Instant Messaging Application Development
- Authors: Van Niekerk, Craig Michael
- Date: 2022-04
- Subjects: Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58506 , vital:59655
- Description: As instant messaging (IM) applications have become more popular, the privacy and security concerns associated with their usage has become ever more relevant. As with many software programs, IM applications have a history of security vulnerabilities. Although IM application usage is globally increasing, it has been found that currently no generally recognised standards exist to aid IM application developers when developing the usability of the security features they implement. The problem is further exacerbated as research suggests that typical users have neither the requisite understanding of the available IM security features, nor the capacity to make full use of those protection features. The primary objective of this study is to create a set of usable security heuristics to assist developers of instant messaging applications to consider the usability of the security features implemented in these applications. This primary objective is further divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to determine IM security risks and their related implications on users; to identify and investigate existing security and usability heuristics, guidelines, standards and best practices for mobile application development; to map the identified security and usability heuristics, guidelines, standards and best practices to IM applications; and to develop a prototype to demonstrate the applicability of the proposed usable security heuristics to a typical IM application. First, a comprehensive literature study is used to determine and understand the information security threats relevant to IM applications, how IM applications operate, the security features implemented by IM applications and the potential impact the relevant information security threats could have on IM application users. Thereafter, a further literature review and content analysis are used to identify and investigate existing heuristics, guidelines, standards, and best practices for mobile application development. The findings from the content analysis, in combination with the previously identified threats to IM applications, are then mapped to IM applications, and a preliminary set of usable security heuristics for IM application development is established. This preliminary set of usable security heuristics undergoes multiple iterations of refinement to establish the proposed set of usable security heuristics for IM application development. Furthermore, an expert review is conducted to validate the proposed set of usable security heuristics from the perspectives of security, usability, and mobile application development. In addition, the expert review was also used to determine the efficacy, utility, and quality of the proposed usable security heuristics. To further validate the proposed heuristics, a proof-of-concept prototype is used, in addition to the expert review, to demonstrate the applicability of the proposed set of usable security heuristics to a typical IM application. Such a set of usable security heuristics would be useful for IM application developers and would result in the vi improved implementation of usable security, leading to an improvement in the security of IM applications. The proposed set of usable security heuristics therefore adds a further contribution to this research area, providing a solid foundation for future research. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
Using information visualization to support the self-management of type 2 diabetes mellitus
- Authors: Nauder, Meggan Kate
- Date: 2022-04
- Subjects: Information visualization , Diabetics --Treatment --South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/55711 , vital:53409
- Description: The globally increasing number of individuals suffering from Type 2 Diabetes Mellitus (T2DM), a completely preventable incurable disease of the pancreas, highlights the need for an effective tool for users to understand the relationship between their behaviours and the effect that those behaviours can have on their blood glucose levels (BGLs). There are few Information Visualisation (IV) tools available that can be used to reduce the cognition required to understand correlations between behaviour and BGLs. Existing tools require time-consuming, lengthy inputs and provide simple visualisations that do not show correlations. This leads to ineffective self-management of T2DM. Information Visualisation (IV) techniques can be used to support effective self-management of T2DM and reduce the cognition required to interpret DM data. Suitable IV techniques were identified and used to visualize T2DM data to aid in the self-management of the disease. Temporal charts, i.e. The Bar, Pie and Line Chart as well as heat maps, were selected as the most appropriate IV techniques to visualize T2DM data as they support time-series data well. A prototype, MedicMetric was created as an IV tool for visualizing T2DM data. MedicMetric incorporated three designed charts, namely the Change Rate Line View, the Radial Progress View, and the Annotated Line View. The Change Rate Line View and Annotated Line View both used line IV techniques, while the Radial Progress View made use of the bar IV technique. The Change Rate Line View performed the worst overall. A usability evaluation was conducted to compare these techniques and to determine which technique is most suitable for visualizing T2DM data. The results leaned significantly in favour of the Annotated Line View. This view is most similar to the line charts typically used in other IV tools. For this reason, the MedicMetric app was briefly compared to the MySygr and Diabetes:M application. In effectiveness and efficiency, MedicMetric and MySugr obtained almost identical results. However, participants indicated that MedicMetric supported their tasks using the Visual Information Seeking Mantra (VISM) the best overall, with 100% of participants stating that they would prefer to use the MedicMetric application. Several usability problems were identified with the IV techniques and they were addressed shortly after the study was complete. Overall participants were most satisfied with the Annotated Line View. , Thesis (MSc) -- Faculty of Science, Computing Sciences, 2022
- Full Text:
- Date Issued: 2022-04
Water quality monitoring: a correlation Between the bacteriological quality of drinking water and Diarrhoeal prevalence within the Koukamma local municipality
- Authors: Jacobs, Nathan Elmar
- Date: 2022-04
- Subjects: Water quality monitoring stations -- Koukamma local municipality , Water quality management
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58882 , vital:60244
- Description: Background: Various studies have linked water quality and the prevalence of diarrhoeal cases within developing countries globally. The Emanti water quality monitoring system (eWQMS), representing the Kou-Kamma Local Municipality (Eastern Cape, South Africa), has often yielded non-complaint microbiological drinking water quality results retrospectively. This study investigated the relationship between the bacteriological quality of drinking water and diarrhoeal prevalence in children under five years of age within the Kou-Kamma Local Municipality from 2012 to 2016. Methods: A quantitative, descriptive, and ecological study design was employed retrospectively within the Kou-Kamma Local Municipality. Retrospective data collected from the Emanti Water Quality Monitoring System (eWQMS) represented the bacteriological quality of drinking water within the study area from 2012 to 2016. Concurrently, secondary data from the District Health Information Management System of the Eastern Cape Department of Health: Kouga Local service area was collected. The data represented cases of diarrhoea with dehydration in children under five years of age, reported at public health facilities within the study area retrospectively (from 2012 to 2016). Statistical analyses (Spearman's Rank Correlation) determined the relationship between the bacteriological quality of drinking water and the prevalence of diarrhoea in children under five years as per the retrospective period. Water samples were also collected for 2017 and 2018 to determine the presence of enteric pathogens in the municipal drinking water supply. Results: The study found that the Kou-Kamma Local Municipality had an overall noncompliance rate of 47% for the municipal drinking water supplied to the community from 2012 to 2016 (retrospective period). The difference in failure proportion (noncompliance) of water samples for the four climatic seasons where statistically significant (p=0.004). A significant difference was observed between autumn and winter (p=0.003) and autumn and spring (p=0.025). The failure proportion of water samples for autumn was significantly higher (mean = 0.603231, sd = 0.19528237) compared to winter (mean = 0.316675, sd = 0.19649776) and spring (mean = 0.374495, sd = 0.20626332). No significant difference was observed for the failure proportion of water samples between the various years of the retrospective period xvi (p=0.416). Children under the age of five accounted for n=460 cases of diarrhoea with dehydration at the public health facilities for the retrospective period. The Kareedouw area (n=196) and Joubertina area (n=134) recorded the highest diarrhoeal cases reported for the study period. These two areas both had hospitals that operated 24 hours a day; however, the differences in cases reported between the two areas was not statistically significant (p=0.179). Diarrhoeal case data reported between the various years within the study period were significantly different (p<0.001). The observed differences were between 2012 and 2014 (p=0.008) and 2012 and 2015 (p=0.001). The differences in the cases of diarrhoea with dehydration, in children under five years of age, were not statistically significant for the four climatic seasons (p=0.121). The relationship between the failure proportion of water samples and the prevalence of diarrhoea with dehydration in children under five years of age was statistically significant (p=0.001). The results revealed a moderate positive relationship (rs=0.434) between the bacteriological quality of drinking water and the prevalence of cases of diarrhoea with dehydration. Water samples were collected at various sampling points for July 2017 and November 2018 and analysed for enteric pathogens. Vibrio cholerae, Salmonella sp. and Shigella sp. were detected in such water samples collected. The relationship between the failure proportion of water samples and the presence of enteric pathogens was not statistically significant (rs=0.56723, p=0.240). Conclusion: The overall bacteriological quality of drinking water within the municipality was poor and likely posed a potential health risk to consumers. The study further revealed a steep rise of diarrhoeal with dehydration prevalence in children under five years of age during 2013, which decreased slowly during the years to follow. A moderate, positive relationship existed between the failure proportion of water samples and diarrhoea with dehydration prevalence in children under five years of age (rs=0.434, p=0.001 ). Therefore, municipalities should improve their bulk water infrastructure and drinking water disinfecting methods while realising the need for increased awareness of water-borne disease prevention. , Thesis (MA) -- Faculty of Health Sciences, 2022
- Full Text:
- Date Issued: 2022-04