A comparison of implementation platforms for the visualisation of animal family trees
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kanotangudza, Priviledge
- Date: 2024-04
- Subjects: Business intelligence -- Computer programs , Human-computer interaction , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64105 , vital:73653
- Description: Genealogy is the study of family history. Family trees are used to show ancestry and visualise family history. Animal family trees are different from human family trees as animals have more offspring to represent in a family tree visualisation. Auctioneering organisations, such as Boere Korporasie Beperk (BKB), provide livestock auction catalogues containing pictures of the animal on sale, the animal’s family tree and its breeding and selection data. Modern-day farming has become data-driven and livestock farmers use various online devices and platforms to obtain information, such as real-time milk production, animal health monitoring and to manage farming operations. This study investigated and compared two Business Intelligence (BI) platforms namely Microsoft Power BI and Tableau (Salesforce) and the Python programming language used in the implementation of cattle family tree charts. Animal family tree visualisation requirements were identified from analysing data collected from 23 agriculture users and auction attendees who responded to an online questionnaire. The results of an online survey showed that agriculture users preferred an animal family tree that resembled a human one, which is not currently used in livestock auction catalogues. A conference paper was published based on the survey results. The Design Science Research Methodology (DSRM) was used to aid in creating animal family tree charts using Power BI, Tableau and Python. The author compared the visualisation tools against selected criteria, such as learnability, portability interoperability and security. Usability evaluations using eye tracking were conducted with agriculture users in a usability lab to compare the artefacts developed using Power BI and Python. Tableau was discarded during the implementation process as it did not produce the required family tree visualisation The Technology Acceptance Model (TAM) theory, which seeks to predict the acceptance and use of technology based on users' perception of its usefulness and ease of use, was used to guide the research study in evaluating the artefacts. According to TAM, the adoption of the proposed technology to solve the problem of a static animal family tree in livestock auction catalogues was dependent on the agriculture user’s beliefs. This was based upon that the technology would help them make better buying decisions at livestock auctions effortlessly. The other theory used in this study was the Task Technology Fit (TTF). This theory was used mainly to create the task list to be used in the usability test. The results showed that the author of this work and the agriculture users preferred the artefact produced by Power BI. The learnability and development time was shorter and the User Interface (UI) created was more intuitive. The findings of this study indicated that the present auction catalogue could be supplemented using interactive online animal family tree visualisations created using Power BI. This study recommended that livestock auctioneering organisations should, in addition to providing paper catalogues, provide farmers with an online platform to view the family trees of cattle on auction to enhance purchasing decisions. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A critical analysis of the interpretation of a permanent establishment created where a subsidiary acts as a dependent agent for its parent company
- Authors: Potgieter, Gizelle Kara
- Date: 2024-04
- Subjects: Double taxation , Taxation
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65389 , vital:74112
- Description: In recent years, the need arose to amend the DAPE provisions in the OECD MTC due to the ever-evolving nature of the tax avoidance strategies employed globally. This research study analysed the amendments that were made to the DAPE provisions of Article 5(5) of the 2014 OECD MTC, including the related OECD Commentary thereto and the extent to which the Commentary can be relied on. The relevance of the amended DAPE provisions were discussed by analysing the PE definition in SA’s domestic tax law, SA’s position on the MLI and consequently its position on Article 12 of the MLI which incorporates the amended DAPE provisions into existing DTAs. The scope of the research was limited to the DAPE provisions, and the research did not focus on the PE provisions in general. The focal point of the study was specifically on SA subsidiaries acting as dependent agents for its parent companies located in foreign jurisdictions, thereby creating deemed PEs for the foreign parent companies in SA based on the relevant criteria set out in Article 5(5) of the OECD MTC. The research study further explored specific French court cases that focussed on the interpretation of the DAPE provisions in the relevant DTAs and commented on the appropriateness of the decisions reached in these cases. The primary objective of the research was to determine how the DAPE provisions should be interpreted for purposes of SA’s domestic law, as well as its DTAs concluded with both France and Ireland. The research study therefore concluded with an interpretation of a case study based on a similar set of facts to the foreign court cases explored, where an SA subsidiary acted as a dependent agent on behalf of its foreign parent company. The conclusion reached on the appropriate interpretation for domestic law purposes differed significantly to the interpretation for purposes of the DTAs as a result of the significant amendments that were made to the DAPE provisions in the 2017 MTC. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Potgieter, Gizelle Kara
- Date: 2024-04
- Subjects: Double taxation , Taxation
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65389 , vital:74112
- Description: In recent years, the need arose to amend the DAPE provisions in the OECD MTC due to the ever-evolving nature of the tax avoidance strategies employed globally. This research study analysed the amendments that were made to the DAPE provisions of Article 5(5) of the 2014 OECD MTC, including the related OECD Commentary thereto and the extent to which the Commentary can be relied on. The relevance of the amended DAPE provisions were discussed by analysing the PE definition in SA’s domestic tax law, SA’s position on the MLI and consequently its position on Article 12 of the MLI which incorporates the amended DAPE provisions into existing DTAs. The scope of the research was limited to the DAPE provisions, and the research did not focus on the PE provisions in general. The focal point of the study was specifically on SA subsidiaries acting as dependent agents for its parent companies located in foreign jurisdictions, thereby creating deemed PEs for the foreign parent companies in SA based on the relevant criteria set out in Article 5(5) of the OECD MTC. The research study further explored specific French court cases that focussed on the interpretation of the DAPE provisions in the relevant DTAs and commented on the appropriateness of the decisions reached in these cases. The primary objective of the research was to determine how the DAPE provisions should be interpreted for purposes of SA’s domestic law, as well as its DTAs concluded with both France and Ireland. The research study therefore concluded with an interpretation of a case study based on a similar set of facts to the foreign court cases explored, where an SA subsidiary acted as a dependent agent on behalf of its foreign parent company. The conclusion reached on the appropriate interpretation for domestic law purposes differed significantly to the interpretation for purposes of the DTAs as a result of the significant amendments that were made to the DAPE provisions in the 2017 MTC. , Thesis (MCom) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
A critical evaluation of the state of capital asset management in Nelson Mandela Bay Municipality and its impact on service delivery
- Authors: Ndleleni, Neziwe
- Date: 2024-04
- Subjects: Nelson Mandela Bay Municipality (South Africa) , Asset-liability management , Asset management accounts -- South Africa -- Port Elizabeth
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65285 , vital:74088
- Description: Over the past decades, municipalities have emerged as a significant sphere of government that provides essential services to the general population, thereby improving their standard of living. While the communities have been vocal in their demand for improved service delivery, some municipalities are finding it difficult to provide sustainable services because of their deteriorating infrastructure. As a result,this exhibits a negative impact on the citizens' standard of living. Good capital asset management and efficient use of resources, including suitable amenities to offer services as needed by communities, are required to improve the quality of services. Municipalities must comply with this directive, adhere to the governance requirement, alongside their consequent obligations to follow laws and regulations, execute their duties and deliver promises set within the communities that they serve. The objective of this research was to critically examine the state of capital asset management in NMBM and its influence on service delivery.The research adopted a qualitative method of enquiry. The researcher employed a qualitative methodology to acquire data using an interview schedule. Some basic findings suggest that aspects of capital asset management, including leadership, planning and budgetary concerns, a scarcity of technical staff, managerial dedication and engagement, political support, insufficient or absent capital asset conditions, present a challenge in NMBM. The study recommends that management take steps to enhance the implementation of an asset management policy, at the same time developing strategies and interventions to assist related service delivery directorates and personnel in the application, controlling andmonitoring of capital assets. It is necessary to improve the competence and efficiency of assets as well prioritise the required services and sustainability. The argument reflects that the techniques suggested in conjunction with the findings provide novel perspectives on the problems associated with capital assetmanagement. In the end, putting these recommendations into practice might greatly enhance asset management and service delivery in NMBM. , Thesis (MBA) -- Faculty of Business and Economic Sciences, Business School, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Ndleleni, Neziwe
- Date: 2024-04
- Subjects: Nelson Mandela Bay Municipality (South Africa) , Asset-liability management , Asset management accounts -- South Africa -- Port Elizabeth
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/65285 , vital:74088
- Description: Over the past decades, municipalities have emerged as a significant sphere of government that provides essential services to the general population, thereby improving their standard of living. While the communities have been vocal in their demand for improved service delivery, some municipalities are finding it difficult to provide sustainable services because of their deteriorating infrastructure. As a result,this exhibits a negative impact on the citizens' standard of living. Good capital asset management and efficient use of resources, including suitable amenities to offer services as needed by communities, are required to improve the quality of services. Municipalities must comply with this directive, adhere to the governance requirement, alongside their consequent obligations to follow laws and regulations, execute their duties and deliver promises set within the communities that they serve. The objective of this research was to critically examine the state of capital asset management in NMBM and its influence on service delivery.The research adopted a qualitative method of enquiry. The researcher employed a qualitative methodology to acquire data using an interview schedule. Some basic findings suggest that aspects of capital asset management, including leadership, planning and budgetary concerns, a scarcity of technical staff, managerial dedication and engagement, political support, insufficient or absent capital asset conditions, present a challenge in NMBM. The study recommends that management take steps to enhance the implementation of an asset management policy, at the same time developing strategies and interventions to assist related service delivery directorates and personnel in the application, controlling andmonitoring of capital assets. It is necessary to improve the competence and efficiency of assets as well prioritise the required services and sustainability. The argument reflects that the techniques suggested in conjunction with the findings provide novel perspectives on the problems associated with capital assetmanagement. In the end, putting these recommendations into practice might greatly enhance asset management and service delivery in NMBM. , Thesis (MBA) -- Faculty of Business and Economic Sciences, Business School, 2024
- Full Text:
- Date Issued: 2024-04
A cyber security strategy to mitigate cloud computing risks within the investment management sector in Cape Town
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Monareng, Glacier Jamela
- Date: 2024-04
- Subjects: Cloud computing , Computer security , Computer science
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64717 , vital:73866
- Description: Adoption of cloud computing has become a transformative force in modern information technology, revolutionizing how organisations procure, manage, and deliver IT resources as well as IT services. This treatise explores the implementation of cloud computing in the investment management sector. It focuses on potential cloud security risks, broader implications for businesses and IT ecosystems, and subsequently the treatise conceptualises a strategy that may help in responding to these security risks. The study began by surveying the motivations behind cloud adoption in the investment sector, emphasising the potential cost savings, scalability, and flexibility cloud services offer. It then delves into the challenges faced during implementation, including security concerns, data privacy, compliance issues, and the intricacies of transitioning legacy systems to cloud environments. In response to these challenges, the treatise outlines strategies for successful cloud implementation within the investment sector, in Cape Town, South Africa. It highlights the significance of selecting appropriate cloud service models (for example, IaaS, PaaS, or SaaS) and deployment options (for example, public, private, hybrid, or multi-cloud) to align with organisational needs and objectives. The study followed a qualitative research study. In collecting data an open-ended online survey was sent to participants. The participants were from an investment company in Cape Town. The study employed the design science research paradigm with the aim of developing an artefact. The methodology used was the Nelson Mandela University-Design Science Strategy Methodology (NMU-DSSM) In conclusion, this treatise conceptualises a strategy that may help companies investing in cloud computing technologies to mitigate cyber security and cloud risks. It recommends practices that underscore cloud computing's transformative potential while acknowledging its complexity and challenges. The strategy may serve as a valuable resource for IT professionals, decision-makers, and organisations embarking on the cloud journey, offering guidance and perspectives to navigate the complexities and to realise the potential benefits of cloud technology. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A discourse analysis study of traditional health practitioners’ role in the treatment of female sexual violence and its mental health sequelae in KwaZulu-Natal
- Authors: Muthwa, Nqobile
- Date: 2024-04
- Subjects: Women -- Violence against -- South Africa , Sex discrimination against women -- South Africa , Physicians -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/63904 , vital:73625
- Description: South Africa is considered the epicentre of rape, leading to its reputation as the ‘rape capital of the world’. As a way of mitigating the risk of re-victimisation to individuals who have experienced rape, hospital-based post-rape centres were developed to offer services and support to rape victims. The uptake of these services remains scant as issues such as rape stigma, limited knowledge on their availability and alternative health systems limits their usage. In South Africa, there exists medical pluralism, which refers to multiple ways of making sense of illness and treatment seeking methods. It is estimated that around 80% of South Africans utilise the services of traditional health practitioners in conjunction with biomedical health practices or as a standalone service to get alternative solutions for their health needs. Victims of rape need to access a wide range of services such as post-exposure prophylaxis (PEP), medical examinations, and emergency contraception. There has been a paucity in research looking into the alternative treatments accessed by rape victims who do not access services in the formal healthcare system. It is against this backdrop that this study explored the construction and treatment formulation of rape by traditional health practitioners. The study focused on the use of language and how it becomes action that influences the services rendered to rape victims. Thematic analysis, discourse and conversational analytical approaches were used to analyse data that emerges from the one-on-one interviews. 15 traditional healers who identified as abathandazi, Izangoma and izinyanga were selected to participate in the present study. The healthworlds framework and social constructionism were used to make sense of how traditional health practitioners construct rape and how the dominant discourses surrounding rape influence how they understand their position as healthcare providers. The main findings of the study illustrated that in the healthworld of traditional healers’ understanding of rape was constructed as ukungcola nobumnyama / impurity and darkness. These discourses spoke to the perception of rape as an aberration as one’s ancestors should prevent traumas and catastrophes from befalling on the individual. When rape occurs, it signalled spiritual problems resulting into a phenomenon where ancestors cannot safeguard the living. Under these discourse rape was also constructed as something that taints, impurifies and contaminates not just the raped individual but their entire bloodline and ancestors. As a result of the discourse surrounding rape, cleansing and purification rituals played a huge role in post-rape care. In addition, traditional health practitioners viewed their role as facilitators in reestablishing the relationship between the raped individual and their ancestors. The study observed that rape victims who share the same healthworld are likely to experience spiritual transgressions following rape which will have long-lasting effects on the psychological health outcomes of victims. The present study recommends a post-rape care model that advocates for collaborative opportunities between biomedical and traditional healthcare practitioners. This model can be integrated into existing post-rape care systems to provide holistic and comprehensive healthcare that addresses biopsychosocial as well as the spiritual and cultural influences of rape. , Thesis (DPhil) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Muthwa, Nqobile
- Date: 2024-04
- Subjects: Women -- Violence against -- South Africa , Sex discrimination against women -- South Africa , Physicians -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/63904 , vital:73625
- Description: South Africa is considered the epicentre of rape, leading to its reputation as the ‘rape capital of the world’. As a way of mitigating the risk of re-victimisation to individuals who have experienced rape, hospital-based post-rape centres were developed to offer services and support to rape victims. The uptake of these services remains scant as issues such as rape stigma, limited knowledge on their availability and alternative health systems limits their usage. In South Africa, there exists medical pluralism, which refers to multiple ways of making sense of illness and treatment seeking methods. It is estimated that around 80% of South Africans utilise the services of traditional health practitioners in conjunction with biomedical health practices or as a standalone service to get alternative solutions for their health needs. Victims of rape need to access a wide range of services such as post-exposure prophylaxis (PEP), medical examinations, and emergency contraception. There has been a paucity in research looking into the alternative treatments accessed by rape victims who do not access services in the formal healthcare system. It is against this backdrop that this study explored the construction and treatment formulation of rape by traditional health practitioners. The study focused on the use of language and how it becomes action that influences the services rendered to rape victims. Thematic analysis, discourse and conversational analytical approaches were used to analyse data that emerges from the one-on-one interviews. 15 traditional healers who identified as abathandazi, Izangoma and izinyanga were selected to participate in the present study. The healthworlds framework and social constructionism were used to make sense of how traditional health practitioners construct rape and how the dominant discourses surrounding rape influence how they understand their position as healthcare providers. The main findings of the study illustrated that in the healthworld of traditional healers’ understanding of rape was constructed as ukungcola nobumnyama / impurity and darkness. These discourses spoke to the perception of rape as an aberration as one’s ancestors should prevent traumas and catastrophes from befalling on the individual. When rape occurs, it signalled spiritual problems resulting into a phenomenon where ancestors cannot safeguard the living. Under these discourse rape was also constructed as something that taints, impurifies and contaminates not just the raped individual but their entire bloodline and ancestors. As a result of the discourse surrounding rape, cleansing and purification rituals played a huge role in post-rape care. In addition, traditional health practitioners viewed their role as facilitators in reestablishing the relationship between the raped individual and their ancestors. The study observed that rape victims who share the same healthworld are likely to experience spiritual transgressions following rape which will have long-lasting effects on the psychological health outcomes of victims. The present study recommends a post-rape care model that advocates for collaborative opportunities between biomedical and traditional healthcare practitioners. This model can be integrated into existing post-rape care systems to provide holistic and comprehensive healthcare that addresses biopsychosocial as well as the spiritual and cultural influences of rape. , Thesis (DPhil) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
A framework for a cybersecurity policy in South African schools
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mhlaba, Surety Aleta
- Date: 2024-04
- Subjects: Computer security -- Government policy -- South Africa , Computer security -- South Africa , Cyber intelligence (Computer security) , Computer security -- South Africa Educational technology -- Security measures
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64651 , vital:73835
- Description: Today, learners at school grow up within an Information and Communication Technology (ICT) environment and have become technology users. A growing number of learners have access to ICT devices, such as mobile phones, tablets and desktop computers owing to their affordability. Access to ICT devices enables learners to interact in cyberspace which offers them numerous advantages and benefits. Cyberspace enables learners to improve their learning by providing ease of access to information and other learning material. Additionally, it allows them to socialise and to communicate with each without having to be in the same place. Furthermore, it allows them to participate in games, including educational games, to help with their learning. Despite these benefits, learners are prone to falling victim to a range of cyber risks and attacks. These cyber risks and attacks include cyberbullying, accessing inappropriate content and being exposed to sexual grooming. This is due to the fact that cyberspace is an unregulated platform and its complex nature does not make it easy to govern. Thus, there is a need to implement a policy that can govern and educate school learners on how to protect and conduct themselves when accessing cyberspace to avoid and reduce exposure to cyber risks. Countries like the United Kingdom (UK), Australia (AU) and Rwanda (RW) have developed cybersecurity policies to assist schools to develop and implement a cybersecurity policy to create a cybersecurity environment for learners with the support and commitment of the government. These countries continue to implement cybersecurity strategies and advocate for a cybersecurity policy to be implemented in schools to foster a cybersecurity culture. However, this does not seem to be the case for South Africa. The South African education system does not have a standard national cybersecurity policy to be implemented in all schools to handle cyber risks and incidents. The Department of Basic Education (DBE) drafted guidelines to assist schools to implement cybersecurity strategies such as a cybersecurity-related policy; however, these guidelines do not include guidance on how to implement them and they have not been enacted. Because of the lack of commitment from the government to implement a cybersecurity policy at school level, learners continue to be exposed to cyber risks. Hence, it is up to each school to create and implement a cybersecurity policy that is unique to that school to help keep their learners safe. In terms of South African law, schools are ultimately responsible for the safety and well-being of school learners. School Governing Bodies (SGBs) have a legal obligation to ensure that cybersecurity measures are in place to protect learners from cyber risks, especially when schools provide access or expect learners to have and use ICT devices during school hours. However, schools (including SGBs) are ill-equipped to implement cybersecurity initiatives by themselves. They lack knowledge about ICT and are hampered by severe time and financial constraints. This study proposes a framework to assist SGBs in implementing a cybersecurity policy in South African schools. To address this need, the study first performed a literature review to identify the problem area, that schools in South Africa have no cybersecurity policy to guide them and protect school learners from cyber risks. There is a need for cybersecurity policies in schools and the SGBs entrusted with such a responsibility lack the resources and capacity to develop them. Moreover, many schools do not have cybersecurity policies in place to protect school learners if cyber risk incidents occur. This led to identifying research objectives together with research methods to address the problem area. The primary objective is to develop a framework to assist SGBs in implementing a basic cybersecurity policy in South African schools. In order to achieve the primary objective, the study determined cybersecurity policy implementation components and characteristics of cybersecurity policies using the literature review method to obtain the framework design components. Thereafter, cybersecurity-related policies, guidelines and best practices in South Africa and globally were identified and analysed for the school environment through the use of a literature review and qualitative content analysis to obtain cybersecurity policy content suitable for the school environment. Once these actions were performed, the formulation and design of the framework for implementing a basic cybersecurity policy using the relevant policy components and characteristics took place, which resulted in the proposed framework solution. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the integration of 4IR-related topics into IT undergraduate curricula in South Africa
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mjoli, Siliziwe
- Date: 2024-04
- Subjects: Educational technology -- Curricula , Computers -- Study and teaching , Industry 4.0 -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64662 , vital:73836
- Description: The Fourth Industrial Revolution (4IR) has been increasing in relevance since the start of its evolution in 2016. Society has shifted in many ways across different industries and sectors as a result of the digitisation that came with 4IR. This has led to a shortage of skilled individuals since there is a gap in the available and needed 4IR skills demand, causing job displacement. Low-skilled individuals are either left unemployed or must upskill to keep up with the new technologies that come with 4IR. In an effort to mitigate this issue, students can be taught the relevant 4IR-related skills at tertiary level before they enter the industry. However, curricular documents, such as IT2017, and national strategies are often not comprehensive in addressing many 4IR-related topics, nor in recommending which topics are most relevant for integration into IT undergraduate curricula. Therefore, the problem identified in this study is that South African universities offering IT undergraduate qualifications are not prepared adequately to address 4IR-related knowledge and skills demands. To address the gap in the available and needed 4IR skills demand, this research proposes a framework to assist with the integration of 4IR-related topics into IT undergraduate curricula in South Africa. To develop the IT Undergraduate Curricula Framework for 4IR-related Topics, it was important to identify the gap between the 4IR-related skills that are currently integrated in higher education institutions (HEIs) and those that are most relevant in the IT industry. A literature review was conducted to provide an in-depth discussion on 4IR and its impact in different sectors; a content analysis was conducted to determine which 4IR-related topics are currently integrated in South African HEIs that offer an IT diploma qualification; semi-structured interviews were conducted to determine which 4IR-related skills are most relevant in the IT industry in South Africa and globally; modelling was used in the development of the proposed 4IR-related IT undergraduate curricula; and finally, argumentation was used in discussing the relevance of the proposed framework within the School of IT at Nelson Mandela University. The IT Undergraduate Curricula Framework for 4IR-related Topics will assist in the integration of 4IR-related topics in higher education computing departments. This could ensure that computing graduates are equipped with the necessary 4IR-related knowledge and skills, giving them a competitive advantage when they enter the industry. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A framework for the strategic alignment of internal auditing in the public sector
- Authors: Nyenyiso, Sizwe
- Date: 2024-04
- Subjects: Auditing, Internal , Auditing , Accounting
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/65368 , vital:74095
- Description: The role of internal auditing has evolved from a control-based function to a strategic partner of strategy formulation and execution. In today’s fast paced business environment, the demand for internal audit (IA) services has increased enormously as management struggles to respond to disruptions. To maximise the IA value and effectively respond to the expectations of stakeholders, the internal audit functions (IAFs) must be properly aligned with the strategic direction of their organisations. Public sector IAFs must align their work with the strategies, objectives and risks of the public sector organisations and promote organisational improvement. Failure to strategically align the IAFs may lead to the non-delivery of their mandate, and thus be unable to assure, advise and provide the insights that inform strategic decision making. It is concerning that the public sector IAFs may not be adequately aligned to the strategic direction of their organisations, and that no mechanism is in place to enable this alignment. Hence the primary objective of this study to develop a framework for aligning public sector IAFs with the strategic direction of the South African public sector organisations. The secondary objectives were to investigate factors that impact on IA alignment with the strategies of the public sector organisations; and how these can be integrated into the IA strategic alignment framework. This qualitative Delphi study used a combination of the Agency Theory and Strategic Alignment Theory (SAT) to better understand the phenomenon of IA strategic alignment. An iterative process of three Delphi rounds was followed to facilitate consensus among participants, who were selected using a purposive sampling method. This culminated in the development of IA strategic alignment framework, encompassing five components: organisational context; IA governance; IA planning approach; IA processes and IA resourcing, as well as 48 factors (35 positive and 13 negative) of IA strategic alignment. The study also found 15 benefits of IA strategic alignment (eight benefits to the organisation and seven to the IAF). , Thesis (PhD) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Nyenyiso, Sizwe
- Date: 2024-04
- Subjects: Auditing, Internal , Auditing , Accounting
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/65368 , vital:74095
- Description: The role of internal auditing has evolved from a control-based function to a strategic partner of strategy formulation and execution. In today’s fast paced business environment, the demand for internal audit (IA) services has increased enormously as management struggles to respond to disruptions. To maximise the IA value and effectively respond to the expectations of stakeholders, the internal audit functions (IAFs) must be properly aligned with the strategic direction of their organisations. Public sector IAFs must align their work with the strategies, objectives and risks of the public sector organisations and promote organisational improvement. Failure to strategically align the IAFs may lead to the non-delivery of their mandate, and thus be unable to assure, advise and provide the insights that inform strategic decision making. It is concerning that the public sector IAFs may not be adequately aligned to the strategic direction of their organisations, and that no mechanism is in place to enable this alignment. Hence the primary objective of this study to develop a framework for aligning public sector IAFs with the strategic direction of the South African public sector organisations. The secondary objectives were to investigate factors that impact on IA alignment with the strategies of the public sector organisations; and how these can be integrated into the IA strategic alignment framework. This qualitative Delphi study used a combination of the Agency Theory and Strategic Alignment Theory (SAT) to better understand the phenomenon of IA strategic alignment. An iterative process of three Delphi rounds was followed to facilitate consensus among participants, who were selected using a purposive sampling method. This culminated in the development of IA strategic alignment framework, encompassing five components: organisational context; IA governance; IA planning approach; IA processes and IA resourcing, as well as 48 factors (35 positive and 13 negative) of IA strategic alignment. The study also found 15 benefits of IA strategic alignment (eight benefits to the organisation and seven to the IAF). , Thesis (PhD) -- Faculty of Business and Economic Sciences, School of Accounting, 2024
- Full Text:
- Date Issued: 2024-04
A leadership model for South Africa’s infrastructure-related State-owned Enterprises
- Authors: Notununu, Fezile
- Date: 2024-04
- Subjects: Government business enterprises -- South Africa , Construction industry , Leadership -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64750 , vital:73885
- Description: The objective of this research was to create a leadership model designed specifically to address the challenges faced by South Africa's infrastructure-related, state-owned enterprises. Both Eskom and Transnet are currently experiencing leadership crises, which might be further exacerbated by the global economic difficulties. Through an initial literature review it became evident that there was a knowledge gap regarding leadership within South Africa's state-owned enterprises. Consequently, it was crucial to conduct an extensive analysis of leadership styles to ensure effective infrastructure management for these state-owned enterprises. The primary aim of this study was to propose a leadership model that would be suitable for South Africa's infrastructure-related, state-owned enterprises. To achieve this objective, the relationship between effective leadership and perceived success in infrastructure development was explored, as well as the relationship between effective planning and perceived success in infrastructure development within these enterprises. Additionally, the connection between leadership training and perceived success in infrastructure development was investigated in the study. Quantitative research methods were employed to address these research objectives. The data for this study were collected through an online survey, with a total of 335 respondents from South Africa. Descriptive statistics and structural equation modelling (SEM) were used for analysis, using SPSS AMOS 29 Software. The findings of the study indicated a significant positive relationship between effective management and perceived success in infrastructure development for state-owned enterprises. However, the results regarding the relationship between effective planning and perceived success were not statistically significant, as the p-value exceeded 0.05. Based on the outcomes of the study, appropriate and meaningful recommendations have been provided regarding the leadership model necessary for effective infrastructure management in South Africa's infrastructure-related, state-owned enterprises. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Notununu, Fezile
- Date: 2024-04
- Subjects: Government business enterprises -- South Africa , Construction industry , Leadership -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64750 , vital:73885
- Description: The objective of this research was to create a leadership model designed specifically to address the challenges faced by South Africa's infrastructure-related, state-owned enterprises. Both Eskom and Transnet are currently experiencing leadership crises, which might be further exacerbated by the global economic difficulties. Through an initial literature review it became evident that there was a knowledge gap regarding leadership within South Africa's state-owned enterprises. Consequently, it was crucial to conduct an extensive analysis of leadership styles to ensure effective infrastructure management for these state-owned enterprises. The primary aim of this study was to propose a leadership model that would be suitable for South Africa's infrastructure-related, state-owned enterprises. To achieve this objective, the relationship between effective leadership and perceived success in infrastructure development was explored, as well as the relationship between effective planning and perceived success in infrastructure development within these enterprises. Additionally, the connection between leadership training and perceived success in infrastructure development was investigated in the study. Quantitative research methods were employed to address these research objectives. The data for this study were collected through an online survey, with a total of 335 respondents from South Africa. Descriptive statistics and structural equation modelling (SEM) were used for analysis, using SPSS AMOS 29 Software. The findings of the study indicated a significant positive relationship between effective management and perceived success in infrastructure development for state-owned enterprises. However, the results regarding the relationship between effective planning and perceived success were not statistically significant, as the p-value exceeded 0.05. Based on the outcomes of the study, appropriate and meaningful recommendations have been provided regarding the leadership model necessary for effective infrastructure management in South Africa's infrastructure-related, state-owned enterprises. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A methodology for modernising legacy web applications: subtitle if needed. If no subtitle follow instructions in manual
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Malgraff, Maxine
- Date: 2024-04
- Subjects: Management information systems , Information technology , Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64148 , vital:73657
- Description: One problem faced in the Information Systems domain is that of poorly maintained, poorly documented, and/or unmanageable systems, known as Legacy Information Systems (LISs). As a result of the everchanging web development landscape, web applications have also become susceptible to the challenges faced in keeping up with technological advances, and older applications are starting to display the characteristics of becoming Legacy Web Applications (LWAs). As retaining business process support and meeting business requirements is often necessary, one method of recovering vital LWAs is to modernise them. System modernisation aims to recover business knowledge and provide an enhanced system that overcomes the problems plagued by LISs. When planning to modernise an LWA, guidance and support are essential to ensure that the modernisation exercise is performed efficiently and effectively. Modernisation methodologies can provide this required guidance and support as they provide models, tools and techniques that serve as guiding principles for the modernisation process. Although many modernisation methodologies exist, very few offer a comprehensive approach to modernisation that provides guidelines for each modernisation phase, tools to assist in the modernisation and techniques that can be used throughout. Existing methodologies also do not cater for cases that include both the LWA and migration to modernised web-specific environments. This research study aimed to investigate modernisation methodologies and identify which methodologies, or parts thereof, could be adapted for modernising LWAs. Existing methodologies were analysed and compared using the definition of a methodology, as well as other factors that improve the modernisation process. Modernisation case studies were reviewed to identify lessons learned from these studies so that these could be considered when planning an LWA modernisation. The ARTIST methodology was the most comprehensive modernisation methodology identified from those researched and was selected as the most appropriate methodology for modernising an LWA. ARTIST was modified to the mARTIST methodology to cater for web-based environments.mARTIST was used to modernise an existing LWA, called OldMax, at an automotive manufacturer, anonymously referred to as AutoCo, to determine its ability to support the modernisation of LWAs. Additional tools and evaluation methods were also investigated and used in place of those recommended by ARTIST, where deemed appropriate for the modernisation of OldMax. Limitations set by AutoCo on the hosting and technical environments for the modernised application also required ARTIST to be adapted to better suit the use case. The steps taken during this modernisation were documented and reported on to highlight the effectiveness of mARTIST and the tools used. The result of this modernisation was that the modernised web application, ModMax, was evaluated to determine the success of the modernisation. The modernisation of OldMax to ModMax, using the mARTIST methodology, was found to be successful based on the criteria set by the ARTIST methodology. Based on this, mARTIST can successfully be used for the modernisation of LWAs. To support future modernisations, an evaluation method for determining technical feasibility was developed for LWA, and alternate tools that could be used throughout modernisation exercises were recommended. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for measuring and predicting stress for software developers using vital signs and activities
- Authors: Hibbers, Ilze
- Date: 2024-04
- Subjects: Machine learning , Neural networks (Computer science) , Computer software developers
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63799 , vital:73614
- Description: Occupational stress is a well-recognised issue that affects individuals in various professions and industries. Reducing occupational stress has multiple benefits, such as improving employee's health and performance. This study proposes a model to measure and predict occupational stress using data collected in a real IT office environment. Different data sources, such as questionnaires, application software (RescueTime) and Fitbit smartwatches were used for collecting heart rate (HR), facial emotions, computer interactions, and application usage. The results of the Demand Control Support and Effort and Reward questionnaires indicated that the participants experienced high social support and an average level of workload. Participants also reported their daily perceived stress and workload level using a 5- point score. The perceived stress of the participants was overall neutral. There was no correlation found between HR, interactions, fear, and meetings. K-means and Bernoulli algorithms were applied to the dataset and two well-separated clusters were formed. The centroids indicated that higher heart rates were grouped either with meetings or had a higher difference in the center point values for interactions. Silhouette scores and 5-fold-validation were used to measure the accuracy of the clusters. However, these clusters were unable to predict the daily reported stress levels. Calculations were done on the computer usage data to measure interaction speeds and time spent working, in meetings, or away from the computer. These calculations were used as input into a decision tree with the reported daily stress levels. The results of the tree helped to identify which patterns lead to stressful days. The results indicated that days with high time pressure led to more reported stress. A new, more general tree was developed, which was able to predict 82 per cent of the daily stress reported. The main discovery of the research was that stress does not have a straightforward connection with computer interactions, facial emotions, or meetings. High interactions sometimes lead to stress and other times do not. So, predicting stress involves finding patterns and how data from different data sources interact with each other. Future work will revolve around validating the model in more office environments around South Africa. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A model for speech-driven lesson summary generation in a noisy educational environment
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Blunt, Phillip John
- Date: 2024-04
- Subjects: Automatic speech recognition , Speech processing systems , Educational technology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64500 , vital:73741
- Description: The application of Automatic Speech Recognition (ASR) technology for generating lesson transcripts and closed captions in the classroom has shown to improve the learning experience of people in disadvantaged student groups. This dissertation proposes a concept model for applying ASR technology in the educational environment for lesson transcription or closed captioning. The model aims further to bolster students’ secondary contact with the lesson content using keyword identification and subsequent association to generate a summary of the educator’s key points with reference to known course content material. To reinforce this concept, three core theoretical areas are discussed in this work, namely the existing applications of ASR technology in the classroom, the prominent machine-learning solutions that are capable of performing ASR, either for keyword spotting or for continuous speech recognition, and finally, the speech enhancement techniques used to mitigate the negative effects of environmental noise in the educational space. After a groundwork investigation into these three core theoretical areas, an initial model was created for incorporating an ASR system into the educational environment using the speech of the educator to drive the process of generating the lesson summary. After analysis for prototype development, the feasibility of developing a keyword-spotting system using South African speech data to train a machine-learning model revealed a number of challenges. Hence, it was decided that it would be more appropriate to implement a cloud-based ASR solution to establish proof of concept in a prototype system. In addition, the advent of a cloud-based ASR solution meant that a more reliable lesson transcript could be generated and, as a result, the direction of this work could move towards exploiting the utility provided by lesson transcription to generate a meaningful lesson summary. An initial prototype implementation was then developed based on the initial model using a cloud-based ASR approach. The final model presented in this work makes use of keyword identification in the transcription process, in collaboration with a course content database to identify known, educator-defined keyword terms during a lesson that are tied to relevant course content items for the specified lesson. As the model or prototype was improved and adapted, its counterpart was modified appropriately, ensuring that each reflected both the theoretical and practical aspects of the other. After a series of improvement cycles, a final version of the model was ascertained, supported by a performance evaluation of an acceptable prototype system. Ultimately, the prototype proved capable of generating a lesson summary, presented to students to bolster secondary contact with lesson content. This lesson summary provides students with a lesson transcript, but also helps them to monitor educator-defined keyword terms, their prevalence as communicated in the lesson by the educator, and their associations with educator-defined sections of course content. The prototype was developed with a modular approach so that its speech recognition component was interchangeable between CMU’s Sphinx and Google Cloud’ Speech-to-Text speech recognition systems, both accessed via a cloud-based programming library. In addition to the ASR module, noise injection, cancellation and reduction were also introduced to the prototype as a speech enhancement module to demonstrate the effects of noise on the prototype. The prototype was tested using different configurations of speech recognition- and speech enhancement techniques to demonstrate the change in accuracy of lesson summary generation. Proof of concept was established using the Google Cloud Continuous Speech Recognition System, which prevailed over CMU’s Sphinx and enabled the prototype to achieve 100,00% accuracy in keyword identification and subsequent association on noise-free speech, contrasted with a 96,93% accuracy in keyword identification and subsequent association on noise-polluted speech when applying noise cancellation. , Thesis (MIT) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A model to measure the digital competence of South African citizens
- Authors: Du Preez, Creswell Martin
- Date: 2024-04
- Subjects: Communication of technical information , Digital divide , Information technology -- Social aspects , Information society
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64522 , vital:73746
- Description: The rapid proliferation of disruptive technologies is a paradigm shift fundamentally changing how humanity lives, works, communicates, and relates to each other. Many governments are implementing digital transformation strategies to improve service delivery, citizen participation, and information-sharing mechanisms. South Africa has identified digital skills as a key challenge to becoming a professional and globally competitive knowledge society. However, the 2016 Global IT Report of the World Economic Forum highlights the skills problem in South Africa, ranking it 95th out of 139 countries on the skills pillar. This is due to poor quality of education, particularly in math and science. Furthermore, the COVID-19 pandemic significantly underscored the importance of digital competence in South Africa, highlighting both challenges and opportunities. As the pandemic forced a shift to remote work, education, and digital service delivery, the disparities in digital access and skills became more apparent, especially in under-resourced communities. This situation revealed the urgent need to enhance digital competence across the population to bridge the digital divide. On the other hand, the pandemic also acted as a catalyst for digital transformation in the country. There was an accelerated adoption of digital technologies in various sectors, from education using online platforms to businesses embracing e-commerce. This rapid shift showcased the potential of digital technology to foster resilience against such disruptions. It highlighted citizens’ critical need for comprehensive digital competence to navigate this new digital landscape effectively. A gap exists between current online digital skills training programmes and the ability of citizens to participate in the same. While mega-vendors like Microsoft, Google, and Oracle offer virtual training on specific technologies, it is argued that users need digital competence training before participating in these opportunities. In other words, be able to access online training platforms, create a user account, use secure passwords, and navigate online training systems. This critical component is not holistically addressed across the education system in South Africa. Furthermore, digital competence is a new concept in the South African context and has not been holistically assessed until now. This study sets out to develop a digital competence assessment model to measure the digital competence of South African citizens. Research was conducted to understand digital competence, its characteristics and assessment models and frameworks. A suitable framework was then selected and adapted for the South African context. The adapted framework was used to develop a South African Digital Competence Assessment Model. The model consists of a Digital Competence Assessment Grid, which forms the core of the Digital Competence Assessment Model, as well as an example of how the model can be used to develop an assessment questionnaire. The South African Digital Competence Assessment Grid and the Digital Competence Assessment Example were reviewed by experts as part of an expert review process. The recommendations from the experts were used to refine the Digital Competence Assessment Grid. As the concept of digital competence is new to South Africa, implementation strategies and considerations were discussed for the model. As a starting point, implementation resources were developed on how to use the model in the form of a Digital Competence Assessment Model Guide. The study thus makes an important contribution to advancing digital competence assessment in South Africa, which will inform the nature of the development programs needed and from which the competence profiles for various jobs and job families can be generated. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Du Preez, Creswell Martin
- Date: 2024-04
- Subjects: Communication of technical information , Digital divide , Information technology -- Social aspects , Information society
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/64522 , vital:73746
- Description: The rapid proliferation of disruptive technologies is a paradigm shift fundamentally changing how humanity lives, works, communicates, and relates to each other. Many governments are implementing digital transformation strategies to improve service delivery, citizen participation, and information-sharing mechanisms. South Africa has identified digital skills as a key challenge to becoming a professional and globally competitive knowledge society. However, the 2016 Global IT Report of the World Economic Forum highlights the skills problem in South Africa, ranking it 95th out of 139 countries on the skills pillar. This is due to poor quality of education, particularly in math and science. Furthermore, the COVID-19 pandemic significantly underscored the importance of digital competence in South Africa, highlighting both challenges and opportunities. As the pandemic forced a shift to remote work, education, and digital service delivery, the disparities in digital access and skills became more apparent, especially in under-resourced communities. This situation revealed the urgent need to enhance digital competence across the population to bridge the digital divide. On the other hand, the pandemic also acted as a catalyst for digital transformation in the country. There was an accelerated adoption of digital technologies in various sectors, from education using online platforms to businesses embracing e-commerce. This rapid shift showcased the potential of digital technology to foster resilience against such disruptions. It highlighted citizens’ critical need for comprehensive digital competence to navigate this new digital landscape effectively. A gap exists between current online digital skills training programmes and the ability of citizens to participate in the same. While mega-vendors like Microsoft, Google, and Oracle offer virtual training on specific technologies, it is argued that users need digital competence training before participating in these opportunities. In other words, be able to access online training platforms, create a user account, use secure passwords, and navigate online training systems. This critical component is not holistically addressed across the education system in South Africa. Furthermore, digital competence is a new concept in the South African context and has not been holistically assessed until now. This study sets out to develop a digital competence assessment model to measure the digital competence of South African citizens. Research was conducted to understand digital competence, its characteristics and assessment models and frameworks. A suitable framework was then selected and adapted for the South African context. The adapted framework was used to develop a South African Digital Competence Assessment Model. The model consists of a Digital Competence Assessment Grid, which forms the core of the Digital Competence Assessment Model, as well as an example of how the model can be used to develop an assessment questionnaire. The South African Digital Competence Assessment Grid and the Digital Competence Assessment Example were reviewed by experts as part of an expert review process. The recommendations from the experts were used to refine the Digital Competence Assessment Grid. As the concept of digital competence is new to South Africa, implementation strategies and considerations were discussed for the model. As a starting point, implementation resources were developed on how to use the model in the form of a Digital Competence Assessment Model Guide. The study thus makes an important contribution to advancing digital competence assessment in South Africa, which will inform the nature of the development programs needed and from which the competence profiles for various jobs and job families can be generated. , Thesis (DPhil) -- Faculty of Engineering, the Built Environment, and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A process for integrated fitness and menstrual cycle data visualisations
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Taljaard, Isabelle
- Date: 2024-04
- Subjects: Human-computer interaction , Personal information management , Medical informatics -- Standards
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64379 , vital:73689
- Description: The increase in female participation in sport has led to an increase in research reporting on the relationship between fitness and menstrual cycle (F&M) data. Fitness variables such as VO2 max and heart rate are influenced by menstrual hormones and change with the different phases of a cycle. People frequently track both their F&M data, to understand their long-term activity and their body’s changes during the different cycle phases. Both these data sets are tracked and visualised separately to help people understand their data, however little work has been done to visualise the relationship between the two data sets. A process that guides the creation of an integrated F&M visualisation does not exist. This research aimed to develop and adopt a process that could be used to successfully guide the creation of an integrated F&M visualisation. The study followed the Design Science Research Methodology (DSRM) to create a primary and secondary artefact – the process and instantiation thereof. The DSRM was applied in iterative cycles where the process was developed, instantiations created and evaluated by participants. To develop the process, existing data processing and visualisation processes were reviewed from literature, to assess their successes and shortcomings. The review of existing processes revealed what steps, and factors related to those steps, would need to be considered. The process review highlighted the importance of five process steps: planning, collection, access, integration, and visualisation. Once the conceptual process was designed, it was adapted for the goal of creating an integrated F&M data visualisation. Prior to implementation, the process was first tested in a pilot study to ensure its validity before involving participants in data collection. After the process pilot study, the final implementation of the process took place and participants were recruited. In the first step of the process, the different fitness data types that are influenced by the menstrual cycle, and vice versa, were identified through a literature review. In the second step, devices to be used for data collection were evaluated and tested through exploratory testing and review of user manuals available online. The third and fourth steps, access, and integration were informed by further exploratory testing and review of relevant literature. The fifth step, data visualisation, was guided by relevant studies, Hick’s law, and the Schema Theory. Two Iterations of DSR were conducted in two phases. Phase 1 (P1) was the instantiation of the planning, collection, access, and processing steps. Participants wore smartwatches while going about their daily lives and working out and tracked their menstrual cycle to collect data. P1data was used to create several instantiations of the process. The second phase (P2) was the instantiation the visualisation step. The final visualisations, resulting from the instantiations, were evaluated by participants in P2. The review notes were used to improve both the process and the final visualisations. Both P1 and P2 were repeated (iterated) twice. The recommended process can be used by anyone who wants to create an integrated F&M visualisation and was designed to be modular so that users could choose to follow the whole process or only specific steps. The findings of this research can provide guidance to users, developers and smartwatch manufacturers of what people’s preferences are for these integrated visualisations. It also provides guidance for those who wish to create their own visualisations without needing prior programming experience or knowledge, since easy to use, online visualisation tools are recommended. The process instantiations will assist people, especially women, to better understand their menstrual cycle and how it affects their physical well-being. , Thesis (MCom) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2024
- Full Text:
- Date Issued: 2024-04
A qualitative exploration of the role of LO teachers and LO subject advisors in the design and formulation of sexuality and HIV curriculum
- Authors: Jacobs, Elfean Randall
- Date: 2024-04
- Subjects: HIV (Viruses) -- Study and teaching -- South Africa -- Port Elizabeth , Life skills -- Study and teaching (Secondary) -- South Africa , Curriculum planning -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/63956 , vital:73632
- Description: This research study investigated the role of LO teachers and LO subject advisors in designing and formulating a sexuality and HIV curriculum. The Life Orientation subject aims to equip learners with the necessary skills, knowledge, values, and attitudes to live a successful and healthy life in society. Some of LO's prescribed programmes, such as the sexuality and HIV curriculum, have operated for many years in the South African school curriculum. These programmes still do not address the social illnesses that destroy the lives of young people in our communities. There is a need for the transformation of these programmes. The research was conducted in the Blue Crane region in Somerset East and the Dr Beyers Naude region in Graaff-Reinet in the Eastern Cape Province of South Africa. Qualitative data generation methods were employed, which consisted of field notes and individual interviews with six (6) LO teachers at three (3) of the identified secondary schools and two (2) LO subject advisors from the district office. The main research question for this study was: What is the role of LO teachers and LO subject advisors in the design and formulation of sexuality and HIV curriculum in the life orientation subject? What are the pedagogical contributions of LO teachers and LO subject advisors on the content of the sexuality and HIV curriculum in their schools? What do LO teachers and LO subject advisors perceive as relevant in the teaching methodology of the sexuality and HIV curriculum in the schools? What do LO teachers and LO subject advisors perceive as the relevant content for a sexuality and HIV curriculum? The data generated from the individual interviews was analysed using thematic analysis. The analysed data was further broken down into seven (7) themes and subthemes. The interpretation of the themes and subthemes are discussed in detail. To ensure whether the analysed data was accurate and correct, the researcher utilised quality criteria to measure the trustworthiness of the study as well as the credibility, dependability, transferability, and confirmability. , Thesis (D.Phil) -- Faculty of Education, School of Postgraduate education, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Jacobs, Elfean Randall
- Date: 2024-04
- Subjects: HIV (Viruses) -- Study and teaching -- South Africa -- Port Elizabeth , Life skills -- Study and teaching (Secondary) -- South Africa , Curriculum planning -- South Africa
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10948/63956 , vital:73632
- Description: This research study investigated the role of LO teachers and LO subject advisors in designing and formulating a sexuality and HIV curriculum. The Life Orientation subject aims to equip learners with the necessary skills, knowledge, values, and attitudes to live a successful and healthy life in society. Some of LO's prescribed programmes, such as the sexuality and HIV curriculum, have operated for many years in the South African school curriculum. These programmes still do not address the social illnesses that destroy the lives of young people in our communities. There is a need for the transformation of these programmes. The research was conducted in the Blue Crane region in Somerset East and the Dr Beyers Naude region in Graaff-Reinet in the Eastern Cape Province of South Africa. Qualitative data generation methods were employed, which consisted of field notes and individual interviews with six (6) LO teachers at three (3) of the identified secondary schools and two (2) LO subject advisors from the district office. The main research question for this study was: What is the role of LO teachers and LO subject advisors in the design and formulation of sexuality and HIV curriculum in the life orientation subject? What are the pedagogical contributions of LO teachers and LO subject advisors on the content of the sexuality and HIV curriculum in their schools? What do LO teachers and LO subject advisors perceive as relevant in the teaching methodology of the sexuality and HIV curriculum in the schools? What do LO teachers and LO subject advisors perceive as the relevant content for a sexuality and HIV curriculum? The data generated from the individual interviews was analysed using thematic analysis. The analysed data was further broken down into seven (7) themes and subthemes. The interpretation of the themes and subthemes are discussed in detail. To ensure whether the analysed data was accurate and correct, the researcher utilised quality criteria to measure the trustworthiness of the study as well as the credibility, dependability, transferability, and confirmability. , Thesis (D.Phil) -- Faculty of Education, School of Postgraduate education, 2024
- Full Text:
- Date Issued: 2024-04
A qualitative review on the manner in which psychologists address language barriers in psychological testing with isiXhosa speaking clients
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Fouche, Nicoleen Leonie
- Date: 2024-04
- Subjects: Language and languages -- Psychological aspects , Psychological tests -- South Africa -- Eastern Cape , Counseling psychology
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63835 , vital:73618
- Description: A racially segregated culture historically influenced the growth of psychological testing and evaluation in South Africa. Thus, South Africa's multicultural and multilingual community poses difficulties for psychologists in their daily work. Most of the psychological tests used by psychologists are predominantly normed in either or only English/Afrikaans. Given the economic and professional resources required to develop new standardised tests for the broader South African population, the current status quo is set to continue for the foreseeable future. Consequently, language barriers pose a challenge when psychometric standardised tests are administered in a language that is different from that of the client, and as a result, psychologists must develop ways to enhance the fairness of these measures for their client base. The avenue of research that was explored is how psychologists overcome the language boundary when assessing clients who speak an indigenous first language, particularly isiXhosa. As such, this study explored this question through qualitative methods. Through purposive sampling, nine psychologists were invited to share their practical expertise on this topic, using semi-structured online interviews. The findings of this study suggested several core themes providing useful methods for other psychologists facing the same challenge, including the challenges with administering psychological tests with isiXhosa clients, the availability of standardised tests in the South African context, and the importance of determining the client’s language proficiency. Five themes with several sub-themes emerged from the study. The study contributes to the currently limited existing body of knowledge, and subsequently to the research area that this study explores - thus further providing guidelines that practitioners can employ when working with clients who are isiXhosa speaking. , Thesis (MA) -- Faculty of Health Science, School of Behavioural & Lifestyle Sciences, 2024
- Full Text:
- Date Issued: 2024-04
A review of the quality of the covid-19 terminology that has been translated into isiXhosa
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Kamtein, Khanyisa
- Date: 2024-04
- Subjects: African languages -- Translating , Communication -- Language , Communication in medicine
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/63080 , vital:73185
- Description: The outbreak of the Covid-19 pandemic affected the whole world. Consequently, countries were forced to lock down and citizens had to be quarantined to control the spread of the virus. Accordingly, the World Health Organization (WHO) came up with safety measures to try and mitigate the spread of the virus. These measures included Covid-19 health communication, and this communication was transmitted mostly through the media. However, this crucial health communication was mostly conveyed in English. The cascading of the Covid-19 health communication in English proved to be problematic worldwide especially for linguistically diverse countries like South Africa. As a result, the South African government had to put measures in place to ensure that the health communication regarding Covid-19 could reach every citizen in the country by commissioning translation services to urgently translate terms relating to Covid-19 into all the South African indigenous languages including isiXhosa. Hence the South African government and City of Tshwane decided to enlist the services of the South African Centre for Digital Language Resources (SaDiLaR) and the Pan South African Language Board (PanSALB) to translate the Covid-19 terminology into all the indigenous languages spoken in the country. This study therefore aims to examine the quality and the accuracy of the translated Covid-19 terms into isiXhosa especially since the translation of these terms had to be done urgently. The study will follow a qualitative method approach and use the skopos theory as the lens of the study. Skopos refers to purpose, intention, and aim. The theory is known as a purpose for action and the reader in this theory is important in determining the purpose of the translation at hand. In evaluating the terminology that has been translated the theory will be applied to determine whether the purpose and the aim of the terminology was adequately carried out to the intended audience. The English terms and isiXhosa terms collected in this research which will be analysed are sourced from the material that was developed and compiled by SaDiLaR and PanSALB and subsequently cascaded to the public during the Covid-19 pandemic. The study will analyse only the (75) translated isiXhosa terms. , Thesis (MA) -- Faculty of Humanities, School of Language, Media and Communication, 2024
- Full Text:
- Date Issued: 2024-04
A skills development framework for the built environment
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Sibanda, Cynthia , Els, Deon
- Date: 2024-04
- Subjects: Construction industry -- Management -- Study and teaching (Higher) -- South Africa , Employees -- Training of -- South Africa , Occupational training -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64808 , vital:73916
- Description: The built environment is one of the largest sources of employment and makes a significant contribution to the gross domestic product of many countries around the world. The built environment is a significant contributor to socio-economic development in every nation irrespective of the geographical difference between countries. Therefore, it is imperative that new graduates of the built environment identify key indicators of competitiveness in order to survive and ensure their success in a constantly changing market. The study was conducted by means of a review of the related literature and by conducting an empirical study. The empirical study was conducted using a quantitative statistical approach by distributing research questionnaires to members falling within the sample population. The primary objective of the study was to develop a performance framework for perceived success of skills development within the built environment. A descriptive survey was conducted among past and present Infrastructure Skills Development Grant programme graduates from the following built environment disciplines: Electrical Engineering, Construction Project Management, Architectures, Town and Regional Planners, Environmental Scientists, Chemical Scientists, Quantity Surveyors and Civil Engineering as well as past built-environment graduates of Nelson Mandela University (NMU) in South Africa. The findings of the study suggested that the following variables had a positive influence on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. In addition, the following variables in the empirical framework were identified as having an effect on the perceived success of skills development within the built environment: Education; Transformational Decolonisation in Education; Accelerated Advanced Training; Emotional Intelligence; Self-Empowerment Skills; Research; Corporate Governance; Transformation in the industry and Project Management. , Thesis (MSc) -- Faculty of Engineering, the Built Environment, and Technology, School of Built Environment and Civil Engineering, 2024
- Full Text:
- Date Issued: 2024-04
A strategic approach for handling information security incidents in higher education
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Khamali, Rethabile
- Date: 2024-04
- Subjects: Computer security -- Management , Computer security , Information resources management , Corporate governance -- South Africa
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64588 , vital:73769
- Description: Information Security Management System (ISMS) is a set of processes to protect institution information assets and information and to preserve confidentiality, integrity, and availability of institutional information. In the world of computers, it is known that there is no silver bullet when it comes to protecting an IT infrastructure. At some point, an organisation will face a security breach, and how it deals with the information security incident depending on the robustness of its processes and the strategy for handling incidents. In today’s world, information communication and technology (ICT) is integral in automating manual tasks that can take hours and even days to execute. The more institutions depend on technology, the more they become vulnerable to cyber threats. This could result in an institution losing its competitive edge, facing legal issues, loss of reputation, customer confidence and productivity, and lastly, financial loss. Various information security standards, frameworks, and methodologies can be applied to protect information assets. Many of these best practices define the ‘what’ and not the ‘how’ making it even more complex for institutions such as Higher Education to implement ISMS. The study aims is to develop a strategy for handling information security incidents that Higher Education Institutions can follow to improve how incidents, cyber threats and breaches are handled. The primary research objective is addressed through several secondary research objectives, namely, to investigate current strategies that Higher Education Institutions can utilise for the handling of information security incidents, to understand various challenges that Higher Education Institutions encounter when handling information security incidents, to assess the current capacity of relevant personnel in handling information security incidents through semi-structured interviews. A detailed literature review was undertaken to delve into existing various information security standards, frameworks, and methodologies. In addition, an investigation was conducted on ISMS adoption and implementation by institutions and Higher Education Institutions in general and how modern best practices such as ISO2700x, COBIT, ITIL, NIST, etc, relate to ISMS. Furthermore, semi-structured interviews were conducted to determine information security incidents at South African Higher Education Institutions. Expert interviews are utilised to evaluate the proposed strategy and provide input. The literature review findings, together with results obtained from semi-structured and expert interviews, are used to develop a strategy evaluated for its robustness, effectiveness, and suitability for the purpose. The developed strategy can be considered a beneficial tool for Higher Education Institutions in South Africa for handling information security incidents. This study’s findings significantly contribute to ISMS research in Higher Education Institutions in South Africa. In conclusion, findings of the study can be summarized as follows. The first chapter, which is also an introduction, sets out the scene for the entire research study undertaken by first highlighting information technology as an integral part of any business nowadays. Higher education institutions collect, process and store sensitive information of current and prospective students and employees, which might be of value to hackers. An information security management system (ISMS) can minimise damage by ensuring information assets are protected from a wide range of threats and business resilience in case of a breach or an incident. Chapter 2 reviews the existing literature for these frameworks, standards, and methods. In addition, various ISMS challenges and limitations within Higher Education Institutions were explored. The third chapter outlines the research design process and an emphasises that it must be based on real-world or tangible challenges. The fourth chapter presented and discussed results that were obtained from semi-structured interviews. The study’s analysis and findings vividly show that there is a need to implement a strategy to handle information security incidents for South African higher education institutions. The strategic management approach used to formulate a strategy to address the identified real problem is discussed in detail in chapter 5. The strategy is developed based on the information gathered from the literature review and semi-structured interviews. The results of the assessment of the proposed strategy carried out by the experts are presented in Chapter 6.The chapter also includes recommendations made by the experts to improve the proposedstrategy. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
A strategy for the implementation of IT shared services at the Nelson Mandela University
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04
- Authors: Mahlathini, Mkhosomhle
- Date: 2024-04
- Subjects: Information technology -- Management , Computer science -- Study and teaching , Education, Higher -- South Africa -- Data processing
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/64610 , vital:73771
- Description: Effectively managing information technology (IT) resources has become a significant concern for organizations, both large and small, as they conduct their business operations. IT governance, characterized as the decision-making process ensuring alignment with business strategy, optimal utilization of IT assets, and the effective management of risk and organizational value, plays a crucial role in addressing this concern. Within this landscape, an IT shared services model emerges as a strategic approach to develop, maintain, and deliver innovative services, thereby enhancing effective and efficient service delivery. This model is perceived to not only innovate services but also to liberate other departments, enabling them to focus on their core competencies. This study positions IT governance as a comprehensive umbrella process that guides the implementation of IT shared services. A well-guided implementation of IT shared services is anticipated to contribute significantly to the success of IT projects, ultimately benefiting all activities supported by these services. The implementation of shared IT services in academic tertiary institutions is not well documented or discussed. This study thus is done in such an academic context. This study focuses on developing a strategic framework for the implementation of IT Shared Services at tertiary education providers. The specific case study used for the development of the strategy is Nelson Mandela University. The scope of the project focuses on the development, proposal, and expert review of a strategy for implementing IT shared services effectively in alignment with Governance Practices. The practical implementation of the strategy falls beyond the scope of this study. , Thesis (MPhil) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2024
- Full Text:
- Date Issued: 2024-04