A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
A framework for the secure use of portable storage devices : a South African higher education perspective
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
A framework towards effective control in information security governance
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
A model for enhancing presence handling in instant messaging
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
A model for information security control audit for small to mid-sized organisations
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009
Addressing the digital divide through the implementation of a wireless school network
- Authors: Du Preez, Creswell
- Date: 2009
- Subjects: Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9758 , http://hdl.handle.net/10948/1298 , Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Description: Societal trends have changed more in the last decade than they have in the last century. This is particularly prevalent in the education environment. Concepts such as Lifelong Learning (the continued learning/educating of an individual throughout his/her lifetime), New Competencies (technology that is now part of almost every skill in the workplace) and Telecommuting (more people working from home rather than traditional offices) have become common-place today (Twigg, 1996, pp. 1-2). Education delivery needs to provide for these societal changes in order to ensure competent individuals pass on to the next level of education and ultimately to the work force. With key trends in technology such as Digitization, Maturation and Disintermediation becoming common in the workplace, education delivery must address the ―Digital Divide. (Twigg, 1996, pp. 2-3). Historically, schools in South Africa have used traditional teaching methods that have stayed the same for the last century. Educational institutions in South Africa, in particular, the previously disadvantaged schools of the Eastern Cape, face various challenges such as the dwindling ability to collect school fees from parents of scholars and declining financial support from the government. In Chapter Seven of the Draft White Paper on e-Education, which was gazetted on 26 August, 2004, the DoE, as part of its implementation strategies, urged the private sector to respond by implementing ICT initiatives nationwide. Phase 1 of the strategy advocated that ―Institutions are connected, access the internet and communicate electronically. (Department of Education, 2004, pp. 37-40). This dissertation shows that it is feasible to create a communications’ network among South African schools. It is believed that such a network can add great value to the education system in South Africa. The potential for this network to address the gap in the Digital Divide is enormous. This dissertation examines various ICT communications’ technologies and isolates wireless communications’ technology as best suited for this purpose, due to the speeds offered by the technology and the cost structure associated with it. A case study examines a pilot installation of the network and endeavours to prove the concept.
- Full Text:
- Date Issued: 2009
- Authors: Du Preez, Creswell
- Date: 2009
- Subjects: Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9758 , http://hdl.handle.net/10948/1298 , Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Description: Societal trends have changed more in the last decade than they have in the last century. This is particularly prevalent in the education environment. Concepts such as Lifelong Learning (the continued learning/educating of an individual throughout his/her lifetime), New Competencies (technology that is now part of almost every skill in the workplace) and Telecommuting (more people working from home rather than traditional offices) have become common-place today (Twigg, 1996, pp. 1-2). Education delivery needs to provide for these societal changes in order to ensure competent individuals pass on to the next level of education and ultimately to the work force. With key trends in technology such as Digitization, Maturation and Disintermediation becoming common in the workplace, education delivery must address the ―Digital Divide. (Twigg, 1996, pp. 2-3). Historically, schools in South Africa have used traditional teaching methods that have stayed the same for the last century. Educational institutions in South Africa, in particular, the previously disadvantaged schools of the Eastern Cape, face various challenges such as the dwindling ability to collect school fees from parents of scholars and declining financial support from the government. In Chapter Seven of the Draft White Paper on e-Education, which was gazetted on 26 August, 2004, the DoE, as part of its implementation strategies, urged the private sector to respond by implementing ICT initiatives nationwide. Phase 1 of the strategy advocated that ―Institutions are connected, access the internet and communicate electronically. (Department of Education, 2004, pp. 37-40). This dissertation shows that it is feasible to create a communications’ network among South African schools. It is believed that such a network can add great value to the education system in South Africa. The potential for this network to address the gap in the Digital Divide is enormous. This dissertation examines various ICT communications’ technologies and isolates wireless communications’ technology as best suited for this purpose, due to the speeds offered by the technology and the cost structure associated with it. A case study examines a pilot installation of the network and endeavours to prove the concept.
- Full Text:
- Date Issued: 2009
An enterprise information security model for a micro finance company: a case study
- Authors: Owen, Morné
- Date: 2009
- Subjects: Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9763 , http://hdl.handle.net/10948/1151 , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Description: The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that should be taken into account, and the maintenance of the model once implemented to ensure ongoing relevance. A questionnaire conducted at the MFC provided insight into the perceived understanding of information security. The questionnaire results were used to ensure the model solution addressed current information security shortcomings within the MFC. This study found that the information security controls in ISO 27002 should be applicable to any industry. The uniqueness for the MFC is not in the security controls, but rather in the regulations and laws applicable to it.
- Full Text:
- Date Issued: 2009
- Authors: Owen, Morné
- Date: 2009
- Subjects: Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9763 , http://hdl.handle.net/10948/1151 , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Description: The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that should be taken into account, and the maintenance of the model once implemented to ensure ongoing relevance. A questionnaire conducted at the MFC provided insight into the perceived understanding of information security. The questionnaire results were used to ensure the model solution addressed current information security shortcomings within the MFC. This study found that the information security controls in ISO 27002 should be applicable to any industry. The uniqueness for the MFC is not in the security controls, but rather in the regulations and laws applicable to it.
- Full Text:
- Date Issued: 2009
An investigation into user interface factors impacting on user experience: Pastel accounting case study
- Authors: Mashapa, Job
- Date: 2009
- Subjects: User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9762 , http://hdl.handle.net/10948/1184 , User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Description: The purpose of this research is to propose metrics to evaluate the user interface factors that impact on the user experience of Software Accounting Applications (SAAs) used to support the accounting business activities in Small Medium and Micro Enterprises (SMMEs) operating in developing countries. The research commences by outlining the conceptual background that introduces the study. In the introductory chapter, the problems together with the objectives that motivate the significance of the study are presented. In the same chapter, the overall research focus and how each of the research questions are treated to accomplish the intended goals are defined. In Chapter 2, the typical accounting business activities for SMMEs operating in developing countries are investigated. Findings from the preliminary survey revealed that Pastel accounting is the commonly used SMME accounting application used in developing countries. Inventory management, cash book processing, preparation of financial statements, customer and supplier documents processing are revealed as the most prevalent SMME accounting activities. This chapter highlights the problems that inhibit the implementation and the delivery of full benefits of using these SAAs. After indentifying the SAA problems, user experience aspects of the SAA are addressed in Chapter 3. User experience (UX) is defined and existing UX evaluation criteria are discussed. The findings form the basis for choosing the applicable criteria for evaluating the User Interface (UI) factors impacting on the UX of Pastel accounting. The proposed user experience evaluation metrics are described in Chapter 4. A discussion on how the metrics are implemented and what UI aspect they measure is presented. The research design and methodology followed is discussed in Chapter 5. The chapter outlines the possible research philosophy, strategy, methods and data collecting methods. A choice is made about the appropriate approach to answer the stated research questions to satisfy the intended overall research objective. A phenomenologist, qualitative inductive approach is adopted in the study. A contextual inquiry case-study strategy is chosen as applicable to this research. Data is collected using expert reviews, user observation and subjective questionnaires. After the choice of the research techniques, the case study results are presented and analysed in Chapter 6. It is found that Pastel UI is attractive and the users are happy with the visual design of the application. The major factors that impact on Pastel accounting are its lack of 4 feedback and its complexity which makes it difficult for first time users to use the application and the paucity of the help function. After the observed findings, the conclusions and recommendations of the research are presented in Chapter 7. It has been concluded that Pastel accounting UI fails to captivate a positive user experience for first-time users; the users do not find the expected help from the Help function and are often left wondering about the status of the system and the outcome of their actions on a task. Recommendations on how designers would make Pastel user interface more helpful, easy to use, and provide adequate feedback are presented in Chapter 7.
- Full Text:
- Date Issued: 2009
- Authors: Mashapa, Job
- Date: 2009
- Subjects: User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9762 , http://hdl.handle.net/10948/1184 , User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Description: The purpose of this research is to propose metrics to evaluate the user interface factors that impact on the user experience of Software Accounting Applications (SAAs) used to support the accounting business activities in Small Medium and Micro Enterprises (SMMEs) operating in developing countries. The research commences by outlining the conceptual background that introduces the study. In the introductory chapter, the problems together with the objectives that motivate the significance of the study are presented. In the same chapter, the overall research focus and how each of the research questions are treated to accomplish the intended goals are defined. In Chapter 2, the typical accounting business activities for SMMEs operating in developing countries are investigated. Findings from the preliminary survey revealed that Pastel accounting is the commonly used SMME accounting application used in developing countries. Inventory management, cash book processing, preparation of financial statements, customer and supplier documents processing are revealed as the most prevalent SMME accounting activities. This chapter highlights the problems that inhibit the implementation and the delivery of full benefits of using these SAAs. After indentifying the SAA problems, user experience aspects of the SAA are addressed in Chapter 3. User experience (UX) is defined and existing UX evaluation criteria are discussed. The findings form the basis for choosing the applicable criteria for evaluating the User Interface (UI) factors impacting on the UX of Pastel accounting. The proposed user experience evaluation metrics are described in Chapter 4. A discussion on how the metrics are implemented and what UI aspect they measure is presented. The research design and methodology followed is discussed in Chapter 5. The chapter outlines the possible research philosophy, strategy, methods and data collecting methods. A choice is made about the appropriate approach to answer the stated research questions to satisfy the intended overall research objective. A phenomenologist, qualitative inductive approach is adopted in the study. A contextual inquiry case-study strategy is chosen as applicable to this research. Data is collected using expert reviews, user observation and subjective questionnaires. After the choice of the research techniques, the case study results are presented and analysed in Chapter 6. It is found that Pastel UI is attractive and the users are happy with the visual design of the application. The major factors that impact on Pastel accounting are its lack of 4 feedback and its complexity which makes it difficult for first time users to use the application and the paucity of the help function. After the observed findings, the conclusions and recommendations of the research are presented in Chapter 7. It has been concluded that Pastel accounting UI fails to captivate a positive user experience for first-time users; the users do not find the expected help from the Help function and are often left wondering about the status of the system and the outcome of their actions on a task. Recommendations on how designers would make Pastel user interface more helpful, easy to use, and provide adequate feedback are presented in Chapter 7.
- Full Text:
- Date Issued: 2009
Civil engineering components for a conceptual elevated light rail transit model with reference to Nelson Mandela Bay
- Authors: Zang, Jin
- Date: 2009
- Subjects: Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9593 , http://hdl.handle.net/10948/769 , Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Description: The increase of motor vehicles, especially in cities, cause transport problems of traffic congestion, vehicle accidents, air pollution and a lack of public spaces. The increasing number of motor vehicles consumes huge amounts of finite petrol energy and emits large amounts of gases that are harmful to the atmosphere and the natural environment. Therefore, the current road transport network is not a sustainable form of public transport for the future. In order to seek a suitable transportation mode, the Infrastructure and Engineering Business Unit of the Nelson Mandela Bay Municipality (NMBM) did some feasibility studies about light rail transit (LRT) from 1984 to 1988. The NMBM-report (1988: 8) concluded that a LRT system would provide the most suitable and primary mode to serve Nelson Mandela Bay (NMB). Although LRT was regarded as the most suitable primary mode of transport at that time (1988), further studies that were reported in 2006 recommended an alternative public transportation system. This research refers to these studies done for the NMB area and other studies and reports for other areas, but focus on the identification of the most suitable civil engineering components for a conceptual elevated light rail transit (ELRT) model. Electrical driven LRT systems have advantages over internal-combustion driven vehicles in terms of environmental protection. Traditional LRT systems are at ground level and are integrated with the existing road network. Some successful LRT systems indicate that the success of LRT systems is mainly dependent on integration with the existing road network. However, the integration of road transport systems with LRT systems cause increased congestion and accidents. An ELRT system can solve these problems. Bangkok has already built an ELRT system to solve its severe traffic congestion. 4 In order to develop a conceptual ELRT model, this research aimed to determine the most suitable civil engineering components for a conceptual ELRT model, including: (i) the most suitable type of bridge foundation; (ii) the most suitable type bridge girder; (iii) the most suitable type of sleeper; and (iv) whether the track should be a ballasted or non-ballasted type. The grounded theory approach was adopted to build up sets of data from which the most suitable components could be selected. In addition, design analyses were done of the various types of components to determine their suitability for a conceptual ELRT model. Experienced engineers and experts were also consulted to identify the most suitable components. After analyses and selection of the most suitable components, outstanding experts were approached to evaluate the components that showed up as the most suitable through the research. The research results indicated that bored and cast-in-place piles, a double-cell trapezoidal segmental box girder, and twin-block sleepers on a non-ballasted sleeper bed are the most suitable civil engineering components.
- Full Text:
- Date Issued: 2009
- Authors: Zang, Jin
- Date: 2009
- Subjects: Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9593 , http://hdl.handle.net/10948/769 , Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Description: The increase of motor vehicles, especially in cities, cause transport problems of traffic congestion, vehicle accidents, air pollution and a lack of public spaces. The increasing number of motor vehicles consumes huge amounts of finite petrol energy and emits large amounts of gases that are harmful to the atmosphere and the natural environment. Therefore, the current road transport network is not a sustainable form of public transport for the future. In order to seek a suitable transportation mode, the Infrastructure and Engineering Business Unit of the Nelson Mandela Bay Municipality (NMBM) did some feasibility studies about light rail transit (LRT) from 1984 to 1988. The NMBM-report (1988: 8) concluded that a LRT system would provide the most suitable and primary mode to serve Nelson Mandela Bay (NMB). Although LRT was regarded as the most suitable primary mode of transport at that time (1988), further studies that were reported in 2006 recommended an alternative public transportation system. This research refers to these studies done for the NMB area and other studies and reports for other areas, but focus on the identification of the most suitable civil engineering components for a conceptual elevated light rail transit (ELRT) model. Electrical driven LRT systems have advantages over internal-combustion driven vehicles in terms of environmental protection. Traditional LRT systems are at ground level and are integrated with the existing road network. Some successful LRT systems indicate that the success of LRT systems is mainly dependent on integration with the existing road network. However, the integration of road transport systems with LRT systems cause increased congestion and accidents. An ELRT system can solve these problems. Bangkok has already built an ELRT system to solve its severe traffic congestion. 4 In order to develop a conceptual ELRT model, this research aimed to determine the most suitable civil engineering components for a conceptual ELRT model, including: (i) the most suitable type of bridge foundation; (ii) the most suitable type bridge girder; (iii) the most suitable type of sleeper; and (iv) whether the track should be a ballasted or non-ballasted type. The grounded theory approach was adopted to build up sets of data from which the most suitable components could be selected. In addition, design analyses were done of the various types of components to determine their suitability for a conceptual ELRT model. Experienced engineers and experts were also consulted to identify the most suitable components. After analyses and selection of the most suitable components, outstanding experts were approached to evaluate the components that showed up as the most suitable through the research. The research results indicated that bored and cast-in-place piles, a double-cell trapezoidal segmental box girder, and twin-block sleepers on a non-ballasted sleeper bed are the most suitable civil engineering components.
- Full Text:
- Date Issued: 2009
Corruption and its effects on the development of the construction industry in Malawi
- Chiocha, Charles Injess Martin
- Authors: Chiocha, Charles Injess Martin
- Date: 2009
- Subjects: Contruction industry -- Corrupt practices -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9692 , http://hdl.handle.net/10948/933 , Contruction industry -- Corrupt practices -- Malawi
- Description: The purpose of this study was to investigate corruption and its effects on the development of the construction industry in Malawi. The major causes were identified and probable solutions as well as preventive measures suggested for all stakeholders in the construction industry in Malawi and neighbouring countries to follow in order to combat bribery and corruption. This treatise consisted of a literature review for the causes of bribery, fraud and corruption, effects of corruption on the construction industry, preventive measures, probable solutions to corruption and a descriptive survey involving responses from building and civil engineering contractors, the built environment professionals, home owners, developers, public works officers amongst others from the construction industry in Malawi. According to the literature study, the construction industry is one of the most corrupt industries in the world, which is a huge concern and threat both to governments, investors and humanity at large. This must be addressed by all the official players in the construction industry, from the innovator of a project to the tradesmen employed on that site. The research showed that all players in the construction industry are aware of the impact of corruption on the development of the construction industry in Malawi. Furthermore, there is room for improvement as far as prevention, reduction and elimination of corruption is concerned.
- Full Text:
- Date Issued: 2009
- Authors: Chiocha, Charles Injess Martin
- Date: 2009
- Subjects: Contruction industry -- Corrupt practices -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9692 , http://hdl.handle.net/10948/933 , Contruction industry -- Corrupt practices -- Malawi
- Description: The purpose of this study was to investigate corruption and its effects on the development of the construction industry in Malawi. The major causes were identified and probable solutions as well as preventive measures suggested for all stakeholders in the construction industry in Malawi and neighbouring countries to follow in order to combat bribery and corruption. This treatise consisted of a literature review for the causes of bribery, fraud and corruption, effects of corruption on the construction industry, preventive measures, probable solutions to corruption and a descriptive survey involving responses from building and civil engineering contractors, the built environment professionals, home owners, developers, public works officers amongst others from the construction industry in Malawi. According to the literature study, the construction industry is one of the most corrupt industries in the world, which is a huge concern and threat both to governments, investors and humanity at large. This must be addressed by all the official players in the construction industry, from the innovator of a project to the tradesmen employed on that site. The research showed that all players in the construction industry are aware of the impact of corruption on the development of the construction industry in Malawi. Furthermore, there is room for improvement as far as prevention, reduction and elimination of corruption is concerned.
- Full Text:
- Date Issued: 2009
Cost and reward as motivating factors in distributed collaborative learning assignments : a grounded theory analasis
- Van Niekerk, Johanna Cornelia
- Authors: Van Niekerk, Johanna Cornelia
- Date: 2009
- Subjects: Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9764 , http://hdl.handle.net/10948/1103 , Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Description: The objective of this research study was to obtain a better understanding of the factors that affect lecturer and student participation in distributed collaborative learning assignments (DCLAs). A substantial number of courses worldwide have included DCLAs in their curricula in an attempt to teach students virtual communication and teaming skills, and to allow distributed students to learn course content collaboratively in a virtual environment. The execution and management of these assignments have proven to be more challenging that expected. Several attempts reported on in the literature had to be abandoned when cost exceeded the rewards for both lecturers and students. In a fouryear cyclical action research project carried out at the PETech (Port Elizabeth Technikon, currently part of the Nelson Mandela Metropolitan University, South Africa), ICT students at several of the PETech campuses were required to complete a DCLA in virtual teams. This project also had to be terminated when it was realised that virtual team learning was minimal and the time investment unacceptably high. For the research study reported on in this thesis the data collected during the four “preresearch” cycles and the experiences reported in the literature were analysed. The lessons learnt were applied to a new additional DCLA cycle which formed part of an ICT course, although this execution still showed room for improvement. A second additional cycle was then executed which had a high participation rate and was overwhelmingly labelled by the participating students as a valuable and enjoyable learning experience. Analysis of the factors affecting participation in DCLAs shows that they are numerous and tightly interlinked, and that each factor is able to take on a wide range of values. This complicates descriptive reporting as each of the DCLAs was unique with unique outcomes and would have to be reported as such in order to iii ABSTRACT iv gain an understanding of the factors. Hence, a level of abstraction was needed, which was accomplished by applying the traditional Glaserian grounded theory method to the data collected during the four “preresearch” and the two additional cycles, and from the literature on the topic. The outcome is a perceived costs and rewards (PCR) theory for participation in DCLAs. As participation is crucial for the learning experience of each student as well as his/her team members in an action learning environment, deciding on participation by continually calculating the costs versus rewards became the focal point of the theory. To the best of the author’s knowledge this research study makes a theoretical contribution to the existing body of ICT educational knowledge in the form of a perceived costs and rewards theory for DCLA participation and a practical contribution in that it provides a theory that can be used to explain, understand, interpret and predict participation in DCLAs. This research study provides guidance for future research in both of these areas.
- Full Text:
- Date Issued: 2009
- Authors: Van Niekerk, Johanna Cornelia
- Date: 2009
- Subjects: Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9764 , http://hdl.handle.net/10948/1103 , Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Description: The objective of this research study was to obtain a better understanding of the factors that affect lecturer and student participation in distributed collaborative learning assignments (DCLAs). A substantial number of courses worldwide have included DCLAs in their curricula in an attempt to teach students virtual communication and teaming skills, and to allow distributed students to learn course content collaboratively in a virtual environment. The execution and management of these assignments have proven to be more challenging that expected. Several attempts reported on in the literature had to be abandoned when cost exceeded the rewards for both lecturers and students. In a fouryear cyclical action research project carried out at the PETech (Port Elizabeth Technikon, currently part of the Nelson Mandela Metropolitan University, South Africa), ICT students at several of the PETech campuses were required to complete a DCLA in virtual teams. This project also had to be terminated when it was realised that virtual team learning was minimal and the time investment unacceptably high. For the research study reported on in this thesis the data collected during the four “preresearch” cycles and the experiences reported in the literature were analysed. The lessons learnt were applied to a new additional DCLA cycle which formed part of an ICT course, although this execution still showed room for improvement. A second additional cycle was then executed which had a high participation rate and was overwhelmingly labelled by the participating students as a valuable and enjoyable learning experience. Analysis of the factors affecting participation in DCLAs shows that they are numerous and tightly interlinked, and that each factor is able to take on a wide range of values. This complicates descriptive reporting as each of the DCLAs was unique with unique outcomes and would have to be reported as such in order to iii ABSTRACT iv gain an understanding of the factors. Hence, a level of abstraction was needed, which was accomplished by applying the traditional Glaserian grounded theory method to the data collected during the four “preresearch” and the two additional cycles, and from the literature on the topic. The outcome is a perceived costs and rewards (PCR) theory for participation in DCLAs. As participation is crucial for the learning experience of each student as well as his/her team members in an action learning environment, deciding on participation by continually calculating the costs versus rewards became the focal point of the theory. To the best of the author’s knowledge this research study makes a theoretical contribution to the existing body of ICT educational knowledge in the form of a perceived costs and rewards theory for DCLA participation and a practical contribution in that it provides a theory that can be used to explain, understand, interpret and predict participation in DCLAs. This research study provides guidance for future research in both of these areas.
- Full Text:
- Date Issued: 2009
Development of flexible automotive measurement adaptors for the PQ25 VWSA platform
- Authors: Pretorius, Shaun
- Date: 2009
- Subjects: Automobiles -- Measurement , Optical measurements
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9626 , http://hdl.handle.net/10948/1632 , http://hdl.handle.net/10948/d1011725 , Automobiles -- Measurement , Optical measurements
- Description: The following work describes all knowledge required in the creation of new automotive optical Photogrammetrical adaptors, which allow the user thereof to measure a fully assembled vehicle in its natural position, i.e. on its wheels for the PQ25 platform at Volkswagen of South Africa. The system is the only method available to the manufacturing plant to measure a fully assembled vehicle in this manner. The FlexMess system allows for a quick portable measurement of a vehicle at all stages of Vehicle manufacturing, aligned via the Volkswagen RPS standards. In the first part of the work, the problem of establishing a system capable of measuring the PQ25 platform is achieved by redesigning the PQ24 platform (previous generation Polo) to the new PQ25 vehicle platform. Once the system was redesigned a prototype adaptor system was created. In the second part of the work, the redesigned adaptor system is checked for its accuracy and repeatability. In a statistical analysis of the adaptors ability to measure the reference points needed for alignment of a vehicle, the system is compared to a CMM and verified that the limits fall within the limits of the original FlexMesśs certified accuracy limits. The last part of the work looks at addressing some of the problems of the FlexMess system by creating concepts for an ideal future FlexMess adaptor system.
- Full Text:
- Date Issued: 2009
- Authors: Pretorius, Shaun
- Date: 2009
- Subjects: Automobiles -- Measurement , Optical measurements
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9626 , http://hdl.handle.net/10948/1632 , http://hdl.handle.net/10948/d1011725 , Automobiles -- Measurement , Optical measurements
- Description: The following work describes all knowledge required in the creation of new automotive optical Photogrammetrical adaptors, which allow the user thereof to measure a fully assembled vehicle in its natural position, i.e. on its wheels for the PQ25 platform at Volkswagen of South Africa. The system is the only method available to the manufacturing plant to measure a fully assembled vehicle in this manner. The FlexMess system allows for a quick portable measurement of a vehicle at all stages of Vehicle manufacturing, aligned via the Volkswagen RPS standards. In the first part of the work, the problem of establishing a system capable of measuring the PQ25 platform is achieved by redesigning the PQ24 platform (previous generation Polo) to the new PQ25 vehicle platform. Once the system was redesigned a prototype adaptor system was created. In the second part of the work, the redesigned adaptor system is checked for its accuracy and repeatability. In a statistical analysis of the adaptors ability to measure the reference points needed for alignment of a vehicle, the system is compared to a CMM and verified that the limits fall within the limits of the original FlexMesśs certified accuracy limits. The last part of the work looks at addressing some of the problems of the FlexMess system by creating concepts for an ideal future FlexMess adaptor system.
- Full Text:
- Date Issued: 2009
Enabling e-learning 2.0 in information security education: a semantic web approach
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
Investigating the use of the ITIL framework towards IT services delivery at the NMMU
- Authors: Lubambo, Nontobeko
- Date: 2009
- Subjects: Information technology -- Management , Management information systems , Computer industry -- Customer services -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9767 , http://hdl.handle.net/10948/1001 , http://hdl.handle.net/10948/d1009657 , Information technology -- Management , Management information systems , Computer industry -- Customer services -- Management
- Description: The purpose of this research was to investigate what is involved in IT Service Management and how the NMMU can implement it to improve the quality of IT service support and service delivery. The IT Service Management approach was investigated but the main focus was on the Service Support and Service Delivery in the ITIL framework. Higher Education was analyzed to try and measure the maturity level of the ITIL process implementation to see where Higher Education in South Africa is and to determine the gaps. Findings from the empirical study will be presented and recommendations highlighted to Top management and the IT department in order to promote and improve the quality of the IT service being delivered to users and customers. The data was collected and administered by means of a structured questionnaire based on the ITIL Service Capacity Maturity Model and Rick Leopoldi’s alternative Maturity Assessment method. An Association of South African University Directors of Information Technology (ASAUDIT) questionnaire on Service Management was also used to supplement the questionnaire. It was discovered that the implementation of ITIL in most organizations brought about improvements and benefits in the quality of the IT service being delivered.
- Full Text:
- Date Issued: 2009
- Authors: Lubambo, Nontobeko
- Date: 2009
- Subjects: Information technology -- Management , Management information systems , Computer industry -- Customer services -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9767 , http://hdl.handle.net/10948/1001 , http://hdl.handle.net/10948/d1009657 , Information technology -- Management , Management information systems , Computer industry -- Customer services -- Management
- Description: The purpose of this research was to investigate what is involved in IT Service Management and how the NMMU can implement it to improve the quality of IT service support and service delivery. The IT Service Management approach was investigated but the main focus was on the Service Support and Service Delivery in the ITIL framework. Higher Education was analyzed to try and measure the maturity level of the ITIL process implementation to see where Higher Education in South Africa is and to determine the gaps. Findings from the empirical study will be presented and recommendations highlighted to Top management and the IT department in order to promote and improve the quality of the IT service being delivered to users and customers. The data was collected and administered by means of a structured questionnaire based on the ITIL Service Capacity Maturity Model and Rick Leopoldi’s alternative Maturity Assessment method. An Association of South African University Directors of Information Technology (ASAUDIT) questionnaire on Service Management was also used to supplement the questionnaire. It was discovered that the implementation of ITIL in most organizations brought about improvements and benefits in the quality of the IT service being delivered.
- Full Text:
- Date Issued: 2009
Investigation and prediction of autoignition during hot start conditions
- Authors: Wodausch, Jens
- Date: 2009
- Subjects: Automobiles -- Ignition
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9621 , http://hdl.handle.net/10948/991 , Automobiles -- Ignition
- Description: This Master’s thesis discusses the investigation of autoignition (knock) of air-fuel mixtures in internal combustion engines (type EA 827; 1.6 and 1.4 l) under hot start conditions. Chapter Three comprehensively reviews literature on fuel characteristics; specifically boiling point, chemistry and the difference between the Research and Motor Octane Number (RON and MON). Furthermore different types of autoignition are discussed with regards to their detection and assessment in the chapter. The subsection on engine management looks at possible methods of altering and eliminating autoignition. Chapter Four details the equipment used to obtain data and measurements, as well as the signal conditioning of the spark and injector signal. Chapter Five discusses the actual results obtained during summer testing of the different methods of altering and eliminating autoignition in an internal combustion engine, as derived from the theories presented in Chapter Three. The summer tests finally verified the new application level and showed that only a reduction in the quantity of fuel injected can eliminate autoignition. However, a slight decrease in heat release does cause an increase in start time. In Chapter Six, based on the test results, a simulation model which calculates the probability of autoignition in a 1.4 l (Econo) engine during hot start conditions in Matlab/Simulink was developed. This simulation model satisfactorily verified test results.
- Full Text:
- Date Issued: 2009
- Authors: Wodausch, Jens
- Date: 2009
- Subjects: Automobiles -- Ignition
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9621 , http://hdl.handle.net/10948/991 , Automobiles -- Ignition
- Description: This Master’s thesis discusses the investigation of autoignition (knock) of air-fuel mixtures in internal combustion engines (type EA 827; 1.6 and 1.4 l) under hot start conditions. Chapter Three comprehensively reviews literature on fuel characteristics; specifically boiling point, chemistry and the difference between the Research and Motor Octane Number (RON and MON). Furthermore different types of autoignition are discussed with regards to their detection and assessment in the chapter. The subsection on engine management looks at possible methods of altering and eliminating autoignition. Chapter Four details the equipment used to obtain data and measurements, as well as the signal conditioning of the spark and injector signal. Chapter Five discusses the actual results obtained during summer testing of the different methods of altering and eliminating autoignition in an internal combustion engine, as derived from the theories presented in Chapter Three. The summer tests finally verified the new application level and showed that only a reduction in the quantity of fuel injected can eliminate autoignition. However, a slight decrease in heat release does cause an increase in start time. In Chapter Six, based on the test results, a simulation model which calculates the probability of autoignition in a 1.4 l (Econo) engine during hot start conditions in Matlab/Simulink was developed. This simulation model satisfactorily verified test results.
- Full Text:
- Date Issued: 2009
Modelling and intelligent control of vehicle climatronic systems
- Sun, Jie
- Authors: Sun, Jie
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9600 , http://hdl.handle.net/10948/1118 , Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Description: The modelling and control method of a vehicle climatronic system, based on MATLAB/SIMULINK, is presented. In order to achieve high modelling accuracy, a developed simulation model library is introduced. The modelling approach is described and the developed models are validated with some of experimental data obtained. The models are nonlinear, independent of fluid type and based on thermo-dynamic principles. Analysis of the cooling circuit modelling and empirical real-time control models are created by using Fuzzy logic controller and Stateflow. Both of control input and output are implemented essentially at original vehicle CAN-Bus system. Feasible digital automatic control strategy basic to fuzzy theory, hardware and software solution are given. The simulation experiment is achieved with the Hardware-in-Loop technology. This control methodology is easily operated and worth applying for any further studies or methods.
- Full Text:
- Date Issued: 2009
- Authors: Sun, Jie
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9600 , http://hdl.handle.net/10948/1118 , Automobiles -- Air conditioning , Automobiles -- Motors -- Cooling systems , Automobiles -- Heating and ventilation
- Description: The modelling and control method of a vehicle climatronic system, based on MATLAB/SIMULINK, is presented. In order to achieve high modelling accuracy, a developed simulation model library is introduced. The modelling approach is described and the developed models are validated with some of experimental data obtained. The models are nonlinear, independent of fluid type and based on thermo-dynamic principles. Analysis of the cooling circuit modelling and empirical real-time control models are created by using Fuzzy logic controller and Stateflow. Both of control input and output are implemented essentially at original vehicle CAN-Bus system. Feasible digital automatic control strategy basic to fuzzy theory, hardware and software solution are given. The simulation experiment is achieved with the Hardware-in-Loop technology. This control methodology is easily operated and worth applying for any further studies or methods.
- Full Text:
- Date Issued: 2009
Precooling strategies for passenger vehicles
- Wachsmuth, Carsten Ulrich Harro
- Authors: Wachsmuth, Carsten Ulrich Harro
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9643 , http://hdl.handle.net/10948/930 , Automobiles -- Air conditioning , Air conditioning
- Description: By ventilating the vehicle’s interior during a soak, the peak cooling load is reduced and therefore the air-conditioning needs less power. This in turn translates to a smaller air-conditioning unit which would consume less power, be lighter and more compact. This solar driven ventilation of the vehicle’s interior during a soak is defined as precooling. During this project the best precooling strategy for passenger vehicles was found by investigating and testing different precooling strategies and evaluating them according to their thermodynamic performance, their potential implementation and their influence on the required cooling performance of the airconditioning cycle. The best performances were achieved by strategies with a high air flow rate and a relatively low air inlet temperature. Two categories of precooling strategies were examined: natural convection and forced convection strategies. Openings in the vehicle’s body that fit to all strategies had to be found; with a big potential concerning their thermodynamic performance and other aspects like prevention against water penetration. The best investigated precooling strategies proved to be the one which used the design outlet as an inlet and the opening of the HVAC as an outlet. With these openings a good air flow through the whole cabin can be guaranteed. In addition to that the strategy only uses existing openings of the body which prevent against water penetration. The required installation space for this strategy already exists and can be considered for the package of next generation vehicles.
- Full Text:
- Date Issued: 2009
- Authors: Wachsmuth, Carsten Ulrich Harro
- Date: 2009
- Subjects: Automobiles -- Air conditioning , Air conditioning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9643 , http://hdl.handle.net/10948/930 , Automobiles -- Air conditioning , Air conditioning
- Description: By ventilating the vehicle’s interior during a soak, the peak cooling load is reduced and therefore the air-conditioning needs less power. This in turn translates to a smaller air-conditioning unit which would consume less power, be lighter and more compact. This solar driven ventilation of the vehicle’s interior during a soak is defined as precooling. During this project the best precooling strategy for passenger vehicles was found by investigating and testing different precooling strategies and evaluating them according to their thermodynamic performance, their potential implementation and their influence on the required cooling performance of the airconditioning cycle. The best performances were achieved by strategies with a high air flow rate and a relatively low air inlet temperature. Two categories of precooling strategies were examined: natural convection and forced convection strategies. Openings in the vehicle’s body that fit to all strategies had to be found; with a big potential concerning their thermodynamic performance and other aspects like prevention against water penetration. The best investigated precooling strategies proved to be the one which used the design outlet as an inlet and the opening of the HVAC as an outlet. With these openings a good air flow through the whole cabin can be guaranteed. In addition to that the strategy only uses existing openings of the body which prevent against water penetration. The required installation space for this strategy already exists and can be considered for the package of next generation vehicles.
- Full Text:
- Date Issued: 2009
The capacity of emerging civil engineering construction contractors
- Ramokolo, Bruce Sabelo Mpumelelo
- Authors: Ramokolo, Bruce Sabelo Mpumelelo
- Date: 2009
- Subjects: Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9693 , http://hdl.handle.net/10948/873 , Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Description: Construction management competencies are essential to realise sound practices among and to realise optimum performance by, inter alia, emerging civil engineering contractors. Such competencies enable a clear focus on the business of construction and the management of projects, with increased efficiency and reduced costs as a benefit. The objective of the MSc (Built Environment) treatise study were to determine the current practices and performance of emerging civil engineering construction contractors operating in the Nelson Mandela Bay Metropole. The descriptive method was adopted in the empirical study. The salient findings of the study are: most of the emerging civil engineering construction contracting organisations lack construction management competencies; construction resources are inappropriately managed leading to construction failures; most of the emerging civil engineering construction contracting organisations lack adequate supervision resulting to poor workmanship; there is a shortage of skilled labour amongst emerging civil engineering construction contractors; procurement processes are inappropriate leading to under capacitated emerging civil engineering construction contracting organisations being awarded contracts; most emerging civil engineering construction contracting organisations lack the requisite aptitude for construction; there is a lack of capacity at all management levels of emerging civil engineering construction organisations in managing the business of construction and that of projects; the nine functions of organisations are not comprehensively represented, and self-ratings indicate inadequacy relative to the management function of control, and relative to certain activities of the organising function. Conclusions include that emerging civil engineering construction contracting organisations need to be comprised of technical teams that possess adequate competencies and that use the construction technology to its full use enabling their organisations to stay abreast of their competitors. Recommendations that can contribute towards improving the status quo include: formal civil engineering and construction management education, resources must be present and training should be promoted throughout the industry at all levels of management to ensure proper supervision and correct use of adequately trained labour, skilled or semi-skilled, incapacitated emerging civil engineering construction contractors should be awarded contracts through appropriately and structured procurement procedures, adequate aptitude in construction should be promoted and enhanced in order to realise conceptualisation and visualisation capabilities, comply with legislation, maintain records and communicate using state of the art technology, optimally manage the finances, have the requisite resources and undertake the work efficiently, interact with the respective publics, and market the organisation to ensure sustainability thereof.
- Full Text:
- Date Issued: 2009
- Authors: Ramokolo, Bruce Sabelo Mpumelelo
- Date: 2009
- Subjects: Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9693 , http://hdl.handle.net/10948/873 , Civil engineering -- Contracts -- South Africa -- Port Elizabeth , Construction industry -- South Africa -- Port Elizabeth -- Management , Construction contracts -- South Africa -- Port Elizabeth
- Description: Construction management competencies are essential to realise sound practices among and to realise optimum performance by, inter alia, emerging civil engineering contractors. Such competencies enable a clear focus on the business of construction and the management of projects, with increased efficiency and reduced costs as a benefit. The objective of the MSc (Built Environment) treatise study were to determine the current practices and performance of emerging civil engineering construction contractors operating in the Nelson Mandela Bay Metropole. The descriptive method was adopted in the empirical study. The salient findings of the study are: most of the emerging civil engineering construction contracting organisations lack construction management competencies; construction resources are inappropriately managed leading to construction failures; most of the emerging civil engineering construction contracting organisations lack adequate supervision resulting to poor workmanship; there is a shortage of skilled labour amongst emerging civil engineering construction contractors; procurement processes are inappropriate leading to under capacitated emerging civil engineering construction contracting organisations being awarded contracts; most emerging civil engineering construction contracting organisations lack the requisite aptitude for construction; there is a lack of capacity at all management levels of emerging civil engineering construction organisations in managing the business of construction and that of projects; the nine functions of organisations are not comprehensively represented, and self-ratings indicate inadequacy relative to the management function of control, and relative to certain activities of the organising function. Conclusions include that emerging civil engineering construction contracting organisations need to be comprised of technical teams that possess adequate competencies and that use the construction technology to its full use enabling their organisations to stay abreast of their competitors. Recommendations that can contribute towards improving the status quo include: formal civil engineering and construction management education, resources must be present and training should be promoted throughout the industry at all levels of management to ensure proper supervision and correct use of adequately trained labour, skilled or semi-skilled, incapacitated emerging civil engineering construction contractors should be awarded contracts through appropriately and structured procurement procedures, adequate aptitude in construction should be promoted and enhanced in order to realise conceptualisation and visualisation capabilities, comply with legislation, maintain records and communicate using state of the art technology, optimally manage the finances, have the requisite resources and undertake the work efficiently, interact with the respective publics, and market the organisation to ensure sustainability thereof.
- Full Text:
- Date Issued: 2009
The impact of construction supply chain management on value on projects
- Authors: Emuze, Fidelis Abumere
- Date: 2009
- Subjects: Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9677 , http://hdl.handle.net/10948/1209 , Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Description: Much research work has assessed the construction process and discovered that the process is ineffective and besieged with problems. Analysis of these problems has shown that a major part of them are related to the state and workings of the supply chains. Prior research justifies that waste and problems in construction supply chains are extensively present and persistent. This anomaly may be ascribed to the nature of the industry. Horizontal integration that is common place in the construction industry tends to fragment the supply chain, resulting in an unstable production environment occasioned by high unpredictability, much rework, low profits and eventual low level of value creation in the process. Therefore, an increased level of integration of interfaces and processes has been canvassed. The purpose of supply chain management is to achieve the expected increased level of integration of the whole supply chain. Supply chain management is a concept that has flourished in the manufacturing industry through Just in Time production and logistics. Supply chain management represents an autonomous managerial tool, though still largely dominated by logistics. Supply chain management has long been advocated as a means of improving the performance of supply chains in construction. This research study reports on an investigation into the impact of supply chain management on value creation in the South African construction industry. The research discovered that collaborative working is already in the industry and contractors consider supply chain management important for project success. Here construction supply chains were approached from the relationship view point. All issues are encouraged to be viewed and resolved in the supply chain from the relationship perspective.
- Full Text:
- Date Issued: 2009
- Authors: Emuze, Fidelis Abumere
- Date: 2009
- Subjects: Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9677 , http://hdl.handle.net/10948/1209 , Construction industry -- South Africa -- Management , Business logistics -- South Africa
- Description: Much research work has assessed the construction process and discovered that the process is ineffective and besieged with problems. Analysis of these problems has shown that a major part of them are related to the state and workings of the supply chains. Prior research justifies that waste and problems in construction supply chains are extensively present and persistent. This anomaly may be ascribed to the nature of the industry. Horizontal integration that is common place in the construction industry tends to fragment the supply chain, resulting in an unstable production environment occasioned by high unpredictability, much rework, low profits and eventual low level of value creation in the process. Therefore, an increased level of integration of interfaces and processes has been canvassed. The purpose of supply chain management is to achieve the expected increased level of integration of the whole supply chain. Supply chain management is a concept that has flourished in the manufacturing industry through Just in Time production and logistics. Supply chain management represents an autonomous managerial tool, though still largely dominated by logistics. Supply chain management has long been advocated as a means of improving the performance of supply chains in construction. This research study reports on an investigation into the impact of supply chain management on value creation in the South African construction industry. The research discovered that collaborative working is already in the industry and contractors consider supply chain management important for project success. Here construction supply chains were approached from the relationship view point. All issues are encouraged to be viewed and resolved in the supply chain from the relationship perspective.
- Full Text:
- Date Issued: 2009
The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective
- Authors: Ngqondi, Tembisa Grace
- Date: 2009
- Subjects: Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9765 , http://hdl.handle.net/10948/1066 , Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Description: Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
- Full Text:
- Date Issued: 2009
- Authors: Ngqondi, Tembisa Grace
- Date: 2009
- Subjects: Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9765 , http://hdl.handle.net/10948/1066 , Computer security , Computer networks -- Security measures -- Standards , Data protection -- Management -- Standards
- Description: Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
- Full Text:
- Date Issued: 2009
- «
- ‹
- 1
- ›
- »