The influence of project management service provision on role-players within the South African construction industry
- Authors: Hefer, Andre le Roux
- Date: 2012
- Subjects: Project management -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9663 , http://hdl.handle.net/10948/d1008295 , Project management -- South Africa , Construction industry -- South Africa
- Description: The legitimate existence of the Project Management Profession in the South African construction industry needs to relate to positive project influence on the industry roleplayers. This study assessed the perceived lack of recognition and acceptance of Project Management as a stand-alone profession relating to: · Appointments of Project Managers being questioned due to a perceived lack of influence and impact on project success. · Project Managers not being recognised as an integral part of the industry. · Project Management not being perceived as having a unique and defined function. Interviews were held with 23 industry role-players made up of clients, contractors and consultants. The interviews solicited input on the role-players’ perception and experience related to the influence of Project Management over the past 10 years, not only on a list of success criteria relative to their own role in the industry, but also their perception of the influence on the other defined role-player groups. Included in the interview questionnaire was also a range of general questions to refine the feedback and further test the hypotheses. The data were interpreted and analysed by comparing the feedback of the respondents as a combination and separately as groups. The results of the study indicate that: · Project Management could be seen as a legitimate part of the industry; · The industry role-players perceive Project Management as making an impact and having a growing influence on the industry; A specific but broad set of skills are required by Project Managers; · The Project Management function cannot be fulfilled by other consultants, but there are project related criteria which should be considered before making a final judgment. These criteria relate to project size and complexity; and · Project Management is currently perceived to be more related to a specific person’s skill than to a specific profession. The study’s aim was to influence and inform the views of industry role-players on the appointment of a Project Manager in the construction industry.
- Full Text:
- Date Issued: 2012
- Authors: Hefer, Andre le Roux
- Date: 2012
- Subjects: Project management -- South Africa , Construction industry -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9663 , http://hdl.handle.net/10948/d1008295 , Project management -- South Africa , Construction industry -- South Africa
- Description: The legitimate existence of the Project Management Profession in the South African construction industry needs to relate to positive project influence on the industry roleplayers. This study assessed the perceived lack of recognition and acceptance of Project Management as a stand-alone profession relating to: · Appointments of Project Managers being questioned due to a perceived lack of influence and impact on project success. · Project Managers not being recognised as an integral part of the industry. · Project Management not being perceived as having a unique and defined function. Interviews were held with 23 industry role-players made up of clients, contractors and consultants. The interviews solicited input on the role-players’ perception and experience related to the influence of Project Management over the past 10 years, not only on a list of success criteria relative to their own role in the industry, but also their perception of the influence on the other defined role-player groups. Included in the interview questionnaire was also a range of general questions to refine the feedback and further test the hypotheses. The data were interpreted and analysed by comparing the feedback of the respondents as a combination and separately as groups. The results of the study indicate that: · Project Management could be seen as a legitimate part of the industry; · The industry role-players perceive Project Management as making an impact and having a growing influence on the industry; A specific but broad set of skills are required by Project Managers; · The Project Management function cannot be fulfilled by other consultants, but there are project related criteria which should be considered before making a final judgment. These criteria relate to project size and complexity; and · Project Management is currently perceived to be more related to a specific person’s skill than to a specific profession. The study’s aim was to influence and inform the views of industry role-players on the appointment of a Project Manager in the construction industry.
- Full Text:
- Date Issued: 2012
The relationship between health and safety and human risk taking behaviour in the South African electrical construction industry
- Authors: Du Toit, Willem Johannes
- Date: 2012
- Subjects: Electrical engineering -- Safety measures , Electrical engineering -- Health aspects , Construction industry -- Safety measures , Psychology, industrial
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9691 , http://hdl.handle.net/10948/d1009529 , Electrical engineering -- Safety measures , Electrical engineering -- Health aspects , Construction industry -- Safety measures , Psychology, industrial
- Description: Mankind, and the development of people, exists due to risk-taking behaviour. It is not that humans should not take risks, but rather the ability to identify the magnitude of risk exposure in order that mankind‟s actions would be so selected as to mitigate exposed risk factors, that no harm should befall them. The approach to health and safety (H&S) has always been to manage H&S environmental factors that could have a negative impact on people, capital, and organisational systems. However, the critical component of human risk-taking behaviour that would have a far greater impact has rarely been acknowledged as part of the drivers that increase risk exposure. Human behaviour is a major contributing factor in accident causation. Although human error cannot be completely eliminated, it should be identified and correctly managed according to each individual‟s risk-taking profile. The reason people decide to take certain risks under certain conditions and the effect it has on H&S management systems is a key component to managing organisational risk exposure. To quantify the value of individual risk-taking behaviour could provide management with better opportunities of lowering the organisational risk exposure. Human risk-taking behaviour is influenced by each individual‟s perception of risk. Such perception of risk will influence decisions on risk-taking behaviour, which in turn is influenced by the individual‟s psychological profile and environmental factors, including character and the impact of a cultural environment. The electrical construction and maintenance industry differs from other similar industries in that the physical entity of electricity requires not only sensory perception for the identification and evaluation of risk factors, but also requires specialised knowledge and testing equipment to evaluate the parameters of electrical installation, plant or equipment. Without such competence, direct exposure to most electrical installations could be fatal. The optimum human resource (HR) solution for managing the risk potential of high risk-taking behaviour is the rating and allocation of specific job tasks that can match and limit the individual potential for risk-taking behaviour and the impact on organisational incident statistics. Maintaining and optimising employee job performance enables organisations to better achieve pre-set goals and missions. Such improvements being a catalyst for better job performance by setting limitations on high risk-taking behaviour, that will improve H&S performance by lowering incident rates.
- Full Text:
- Date Issued: 2012
- Authors: Du Toit, Willem Johannes
- Date: 2012
- Subjects: Electrical engineering -- Safety measures , Electrical engineering -- Health aspects , Construction industry -- Safety measures , Psychology, industrial
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9691 , http://hdl.handle.net/10948/d1009529 , Electrical engineering -- Safety measures , Electrical engineering -- Health aspects , Construction industry -- Safety measures , Psychology, industrial
- Description: Mankind, and the development of people, exists due to risk-taking behaviour. It is not that humans should not take risks, but rather the ability to identify the magnitude of risk exposure in order that mankind‟s actions would be so selected as to mitigate exposed risk factors, that no harm should befall them. The approach to health and safety (H&S) has always been to manage H&S environmental factors that could have a negative impact on people, capital, and organisational systems. However, the critical component of human risk-taking behaviour that would have a far greater impact has rarely been acknowledged as part of the drivers that increase risk exposure. Human behaviour is a major contributing factor in accident causation. Although human error cannot be completely eliminated, it should be identified and correctly managed according to each individual‟s risk-taking profile. The reason people decide to take certain risks under certain conditions and the effect it has on H&S management systems is a key component to managing organisational risk exposure. To quantify the value of individual risk-taking behaviour could provide management with better opportunities of lowering the organisational risk exposure. Human risk-taking behaviour is influenced by each individual‟s perception of risk. Such perception of risk will influence decisions on risk-taking behaviour, which in turn is influenced by the individual‟s psychological profile and environmental factors, including character and the impact of a cultural environment. The electrical construction and maintenance industry differs from other similar industries in that the physical entity of electricity requires not only sensory perception for the identification and evaluation of risk factors, but also requires specialised knowledge and testing equipment to evaluate the parameters of electrical installation, plant or equipment. Without such competence, direct exposure to most electrical installations could be fatal. The optimum human resource (HR) solution for managing the risk potential of high risk-taking behaviour is the rating and allocation of specific job tasks that can match and limit the individual potential for risk-taking behaviour and the impact on organisational incident statistics. Maintaining and optimising employee job performance enables organisations to better achieve pre-set goals and missions. Such improvements being a catalyst for better job performance by setting limitations on high risk-taking behaviour, that will improve H&S performance by lowering incident rates.
- Full Text:
- Date Issued: 2012
User experience metrics for Dr Math
- Authors: Ngaye, Zonke
- Date: 2012
- Subjects: Mathematics -- Data processing , Mathematical models , Mathematics -- Study and teaching , Numerical analysis
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9799 , http://hdl.handle.net/10948/d1012036 , Mathematics -- Data processing , Mathematical models , Mathematics -- Study and teaching , Numerical analysis
- Description: The purpose of this research study is to propose guidelines for providing a positive user experience for pupils using Dr Math®. User experience was found to have a positive impact on the acceptance and adoption of a product. Thus the proposed guidelines contribute in maximizing the adoption and acceptance of Dr Math® among pupils. This study begins with an introductory chapter that describes the problem that forms the basis for this research. The chapter defines the objectives that this study is intended to achieve in order to accomplish its ultimate goal. The methodology followed to conduct this research study as well as its scope are also defined here. The results from a preliminary survey revealed that despite its potential accessibility, Dr Math® has a low adoption rate. However, when compared to other mobile learning (m-learning) applications for mathematics learning, Dr Math® is more popular. Thus Dr Math® was selected as a case for study. Chapter 2 of this study provides a detailed description of Dr Math® as a local mobile application for mathematics learning. It was found that the affordability and accessibility of Dr Math® did not necessarily imply a high adoption rate. There are various possible barriers to its low adoption. User experience (UX), which is the focus of this study, is one of them. Thus, a subsequent chapter deals with UX. Chapter 3 discusses UX, its scope, components and definition and places particular emphasis on its significance in the success of any product. The chapter also highlights the characteristics of a positive UX and the importance of designing for this outcome. In Chapter 4, a discussion and justification of the methodology used to conduct this research is discussed. This study primarily employs a qualitative inductive approach within an interpretivism paradigm. An exploratory single case study was used to obtain an in-depth analysis of the case. Data was collected using Dr Math® log files as a documentary source. Gathered data was then analysed and organized into themes and categories using qualitative content analysis as outlined in Chapter 5. Also the findings obtained from the results, which are mainly the factors that were found to have an impact on the user interaction with Dr Math®, are presented here. The identified factors served as a basis from which the guidelines presented in Chapter 6 were developed. Chapter 7 presents the conclusions and recommendations of the research. From both theoretical and empirical work, it was concluded that Dr Math® has the potential to improve mathematics learning in South Africa. Its adoption rate, however, is not satisfying: hence, the investigation of the factors impacting on the user interaction with Dr Math®, from which the proposed guidelines are based.
- Full Text:
- Date Issued: 2012
- Authors: Ngaye, Zonke
- Date: 2012
- Subjects: Mathematics -- Data processing , Mathematical models , Mathematics -- Study and teaching , Numerical analysis
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9799 , http://hdl.handle.net/10948/d1012036 , Mathematics -- Data processing , Mathematical models , Mathematics -- Study and teaching , Numerical analysis
- Description: The purpose of this research study is to propose guidelines for providing a positive user experience for pupils using Dr Math®. User experience was found to have a positive impact on the acceptance and adoption of a product. Thus the proposed guidelines contribute in maximizing the adoption and acceptance of Dr Math® among pupils. This study begins with an introductory chapter that describes the problem that forms the basis for this research. The chapter defines the objectives that this study is intended to achieve in order to accomplish its ultimate goal. The methodology followed to conduct this research study as well as its scope are also defined here. The results from a preliminary survey revealed that despite its potential accessibility, Dr Math® has a low adoption rate. However, when compared to other mobile learning (m-learning) applications for mathematics learning, Dr Math® is more popular. Thus Dr Math® was selected as a case for study. Chapter 2 of this study provides a detailed description of Dr Math® as a local mobile application for mathematics learning. It was found that the affordability and accessibility of Dr Math® did not necessarily imply a high adoption rate. There are various possible barriers to its low adoption. User experience (UX), which is the focus of this study, is one of them. Thus, a subsequent chapter deals with UX. Chapter 3 discusses UX, its scope, components and definition and places particular emphasis on its significance in the success of any product. The chapter also highlights the characteristics of a positive UX and the importance of designing for this outcome. In Chapter 4, a discussion and justification of the methodology used to conduct this research is discussed. This study primarily employs a qualitative inductive approach within an interpretivism paradigm. An exploratory single case study was used to obtain an in-depth analysis of the case. Data was collected using Dr Math® log files as a documentary source. Gathered data was then analysed and organized into themes and categories using qualitative content analysis as outlined in Chapter 5. Also the findings obtained from the results, which are mainly the factors that were found to have an impact on the user interaction with Dr Math®, are presented here. The identified factors served as a basis from which the guidelines presented in Chapter 6 were developed. Chapter 7 presents the conclusions and recommendations of the research. From both theoretical and empirical work, it was concluded that Dr Math® has the potential to improve mathematics learning in South Africa. Its adoption rate, however, is not satisfying: hence, the investigation of the factors impacting on the user interaction with Dr Math®, from which the proposed guidelines are based.
- Full Text:
- Date Issued: 2012
VoIP : a corporate governance approach to avoid the risk of civil liability
- Authors: Gerber, Tian Johannes
- Date: 2012
- Subjects: Internet telephony -- Security measures , Telecommunication policy -- South Africa , Computer network protocols -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9812 , http://hdl.handle.net/10948/d1016272
- Description: Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementation, an organization should implement the technology with knowledge of the potential risk of civil liability. This is further highlighted by the King III Report which indicates that the Directors of an organization should be ultimately responsible for Corporate Governance and, therefore, IT Governance and Information Security Governance. The report goes further to say that any newly implemented technology, such as VoIP, should comply with all South African legislation and regulations. This responsibility encourages the practice of both due care and due diligence. However, recent trends exercised by Information Security professionals, responsible for drafting Information Security policies and related procedures, often neglect the regulatory requirements and choose to only implement international best practices with no consideration of the risk of civil liability. Although these best practice frameworks may inadvertently comply with existing local legislation, a chance of an oversight is possible. Oversights may not only result in criminal sanctions, but also civil action due to losses or damages suffered. With regard to implementing VoIP, good Corporate Governance could potentially be ensured through the use of both identified regulations and relevant international best practices. This dissertation aims to aid organizations in avoiding or at least mitigating the risk of civil liability to better leverage VoIP’s value, through good Corporate Governance practices. This should aid in the exercise of due care and due diligence when implementing VoIP as a means of conducting business communication.
- Full Text:
- Date Issued: 2012
- Authors: Gerber, Tian Johannes
- Date: 2012
- Subjects: Internet telephony -- Security measures , Telecommunication policy -- South Africa , Computer network protocols -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9812 , http://hdl.handle.net/10948/d1016272
- Description: Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementation, an organization should implement the technology with knowledge of the potential risk of civil liability. This is further highlighted by the King III Report which indicates that the Directors of an organization should be ultimately responsible for Corporate Governance and, therefore, IT Governance and Information Security Governance. The report goes further to say that any newly implemented technology, such as VoIP, should comply with all South African legislation and regulations. This responsibility encourages the practice of both due care and due diligence. However, recent trends exercised by Information Security professionals, responsible for drafting Information Security policies and related procedures, often neglect the regulatory requirements and choose to only implement international best practices with no consideration of the risk of civil liability. Although these best practice frameworks may inadvertently comply with existing local legislation, a chance of an oversight is possible. Oversights may not only result in criminal sanctions, but also civil action due to losses or damages suffered. With regard to implementing VoIP, good Corporate Governance could potentially be ensured through the use of both identified regulations and relevant international best practices. This dissertation aims to aid organizations in avoiding or at least mitigating the risk of civil liability to better leverage VoIP’s value, through good Corporate Governance practices. This should aid in the exercise of due care and due diligence when implementing VoIP as a means of conducting business communication.
- Full Text:
- Date Issued: 2012
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
A model for cultivating resistance to social engineering attacks
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
A model for privacy-aware presence management in mobile communications
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Jacobus Albertus
- Date: 2011
- Subjects: Mobile communications systems , Mobile communication systems -- Management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9757 , http://hdl.handle.net/10948/1354 , Mobile communications systems , Mobile communication systems -- Management
- Description: As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occur it can be frustrating. On the other hand it is equally disruptive to receive a call when one is busy with an important task or in a situation where communication is inappropriate. Social protocol dictates that we try to minimize such situations for the benefit of others nearby and for ourselves. This management of communications is a constant and difficult task. Using presence – which signals a person’s availability and willingness to communicate – is a solution to this problem. Such information can benefit communication partners by increasing the likelihood of a successful connection and decreasing disruptions. This research addresses the problem of staying connected while keeping control over mobile communications. It adopts a design-science research paradigm, with the primary research artifact being a model for privacy-aware presence management in mobile communications. As part of the model development knowledge contributions are made in several ways. Existing knowledge about the problem area is extended through a quantitative analysis of mobile communications management. This analysis uses a novel survey, collecting useful empirical data for future research. This includes how people currently manage their communications and what features they expect from a potential “call management” system. The examination and use of presence standards, as a foundation for the model, provides a comparison of the main presence technologies available today. A focus on privacy features identifies several shortcomings in standards which, if addressed, can help to improve and make these standards more complete. The model stresses the privacy of potentially sensitive presence information. A unique perspective based on social relationship theories is adopted. The use of relationship groups not only makes logical sense but also assists in the management of presence information and extends existing standards. Finally, the evaluation of the model demonstrates the feasibility of a practical implementation as well the ability to extend the model in next generation mobile networks. Thus the model presents a solid foundation for the development of future services. In these ways the proposed model contributes positively towards balancing efficient mobile communications with the need for privacy-awareness.
- Full Text:
- Date Issued: 2011
A review of the performance of Botswana citizen building contractors
- Authors: Muche, Freeman Hansungule
- Date: 2011
- Subjects: Contractors , Building -- Botswana , Construction industry -- Botswana
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9685 , http://hdl.handle.net/10948/1336 , Contractors , Building -- Botswana , Construction industry -- Botswana
- Description: Botswana was left underdeveloped in 1966 when it gained its independence from Great Britain. However, with the discovery of diamonds in the late 1970s, the economy of the country changed and two decades later the construction industry had experienced phenomenal growth. A growth propelled by the dominance of foreign contractors and the few citizen contractors available at the time resulted in a competitive environment in the industry. However, citizen contractors were unable to compete on the same level with their foreign counterparts, which was attributable to various factors such as a lack of resources and of business and technical experience. Being a major player in the construction industry, and realising the need to equip and encourage its own base of citizen contractors to actively participate in construction activities, the government of Botswana adopted new measures and policies that were meant to address the imbalances in the construction industry much to the advantage of citizen contractors. The rationale behind this study is to investigate the performance of citizen building contractors following the introduction of preferential procurement policies by the government of Botswana. This research study adopted the descriptive and analytical survey method which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The sample strata included building contractors, consultants, and clients in the Botswana construction industry in Gaborone, Francistown, Selebi-phikwe, Maun, Serowe, and Lobatse. The empirical findings revealed that there is indeed a need to review some of the government assistance programs for citizen contractors in order to avoid the abuse of government resources and to further increase the citizen contractor’s knowledge base, skills, resources and capacity through mentorship and workshops. vi It is therefore incumbent upon government to protect those beneficiaries who genuinely require such assistance by critical assessment of the ineffective policies for the benefit of the whole industry
- Full Text:
- Date Issued: 2011
- Authors: Muche, Freeman Hansungule
- Date: 2011
- Subjects: Contractors , Building -- Botswana , Construction industry -- Botswana
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9685 , http://hdl.handle.net/10948/1336 , Contractors , Building -- Botswana , Construction industry -- Botswana
- Description: Botswana was left underdeveloped in 1966 when it gained its independence from Great Britain. However, with the discovery of diamonds in the late 1970s, the economy of the country changed and two decades later the construction industry had experienced phenomenal growth. A growth propelled by the dominance of foreign contractors and the few citizen contractors available at the time resulted in a competitive environment in the industry. However, citizen contractors were unable to compete on the same level with their foreign counterparts, which was attributable to various factors such as a lack of resources and of business and technical experience. Being a major player in the construction industry, and realising the need to equip and encourage its own base of citizen contractors to actively participate in construction activities, the government of Botswana adopted new measures and policies that were meant to address the imbalances in the construction industry much to the advantage of citizen contractors. The rationale behind this study is to investigate the performance of citizen building contractors following the introduction of preferential procurement policies by the government of Botswana. This research study adopted the descriptive and analytical survey method which entailed the use of questionnaires and a review of the related literature for gathering relevant data. The sample strata included building contractors, consultants, and clients in the Botswana construction industry in Gaborone, Francistown, Selebi-phikwe, Maun, Serowe, and Lobatse. The empirical findings revealed that there is indeed a need to review some of the government assistance programs for citizen contractors in order to avoid the abuse of government resources and to further increase the citizen contractor’s knowledge base, skills, resources and capacity through mentorship and workshops. vi It is therefore incumbent upon government to protect those beneficiaries who genuinely require such assistance by critical assessment of the ineffective policies for the benefit of the whole industry
- Full Text:
- Date Issued: 2011
An analysis of the reliability of the 22kV distribution network of the Nelson Mandela Bay Municipality
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
Applicability of public-private partnership in provision of water infrastructure to central coastal Namibia mines
- Kavela, Lukas Tangeni Taukondjo
- Authors: Kavela, Lukas Tangeni Taukondjo
- Date: 2011
- Subjects: Water-supply -- Namibia , Public-private sector cooperation -- Namibia -- Water-supply
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9701 , http://hdl.handle.net/10948/d1015641
- Description: This study investigated the potential application of Public-Private Partnerships (PPPs) in water supply, taking cognisance of the water demand and supply in the Central Coastal Namibian (CCN) mines. NamWater does not meet demand for the existing and planned mines in the CCN. Primary objective was to investigate and analyse water demand and supply as well as the effectiveness of PPP as a solution by exploring its potential, successes and challenges. In order to obtain relevant information, literature review was used to collect evidence on water demand and supply in the north-central Namibia as well as the application of PPP in provision of water supply. Multi-case studies were carried out on three operational mines, namely; Rio Tinto Rössing Uranium Mine, Langer Heinrich Uranium Mine and Areva Trekkopje Uranium Mine to attain empirical data on water supply requirements. A self-administered questionnaire was used to collect the data supplemented by interviews with NamWater, operational mines within the study area, government institutions, and knowledgeable consultants on water and the mining environment. The key findings included: institutional weaknesses and lack of legislation frameworks to support PPP projects; skills shortage; and financing problems were identified as major challenges. Results further show that these problems could be resolved by effectively implementing a PPP approach, whereby the Special Purpose Vehicle (SPV) enters into a contract with the public authority. The study concludes that there is a need to increase water output to meet current and future supply requirements to these mines. This situation should be addressed by all stakeholders, from government to private sectors. The study recommends that a sea water desalination plant should be developed to increase water capacity supply to the existing operational and prospective mines in the area. The PPP approach is proposed as a possible solution to water supply infrastructure service delivery problem to ensure long-term water security in the CCN mines.
- Full Text:
- Date Issued: 2011
- Authors: Kavela, Lukas Tangeni Taukondjo
- Date: 2011
- Subjects: Water-supply -- Namibia , Public-private sector cooperation -- Namibia -- Water-supply
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9701 , http://hdl.handle.net/10948/d1015641
- Description: This study investigated the potential application of Public-Private Partnerships (PPPs) in water supply, taking cognisance of the water demand and supply in the Central Coastal Namibian (CCN) mines. NamWater does not meet demand for the existing and planned mines in the CCN. Primary objective was to investigate and analyse water demand and supply as well as the effectiveness of PPP as a solution by exploring its potential, successes and challenges. In order to obtain relevant information, literature review was used to collect evidence on water demand and supply in the north-central Namibia as well as the application of PPP in provision of water supply. Multi-case studies were carried out on three operational mines, namely; Rio Tinto Rössing Uranium Mine, Langer Heinrich Uranium Mine and Areva Trekkopje Uranium Mine to attain empirical data on water supply requirements. A self-administered questionnaire was used to collect the data supplemented by interviews with NamWater, operational mines within the study area, government institutions, and knowledgeable consultants on water and the mining environment. The key findings included: institutional weaknesses and lack of legislation frameworks to support PPP projects; skills shortage; and financing problems were identified as major challenges. Results further show that these problems could be resolved by effectively implementing a PPP approach, whereby the Special Purpose Vehicle (SPV) enters into a contract with the public authority. The study concludes that there is a need to increase water output to meet current and future supply requirements to these mines. This situation should be addressed by all stakeholders, from government to private sectors. The study recommends that a sea water desalination plant should be developed to increase water capacity supply to the existing operational and prospective mines in the area. The PPP approach is proposed as a possible solution to water supply infrastructure service delivery problem to ensure long-term water security in the CCN mines.
- Full Text:
- Date Issued: 2011
Constructability effects of green buildings
- Authors: Hurbissoon, Roneesh Mehta
- Date: 2011
- Subjects: Sustainable construction , Architecture and energy conservation , Construction industry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9722 , http://hdl.handle.net/10948/1379 , Sustainable construction , Architecture and energy conservation , Construction industry
- Description: The Earth's health is deteriorating and will deteriorate even more rapidly unless people adopt eco-friendly policies. Green building has long been a concept but it has not yet been universally applied in practice. The concept of sustainability emerged in the 1970s and can be associated with the energy crisis and environmental pollution concerns. This research is aimed at investigating whether building “green” is more demanding than non-green buildings in terms of cost and the use of green materials against traditional materials; whether professionals in the construction industry are knowledgeable in terms of green buildings; and lastly, to determine whether green buildings are contributing significantly to the environment. The literature reviewed and results of quantitative research amongst professionals from the Island of Mauritius formed the basis of the study. The study revealed that green building is expensive relative to traditional buildings considering. However, the concepts employed (for example: lower energy use, less waste disposal, lower water usage, and sustainable design) provide green buildings with long term savings. Furthermore, the scarcity of natural materials makes it expensive. The study also showed that contractors and professionals have a preference for traditional materials over green materials thus making them more familiar with traditional materials. Contractors and professionals are believed to understand green materials only on a limited basis. This may be attributed to the specific environmental issues involved; however, the research revealed that the professionals are familiar with the basic concepts of green buildings. Lastly, the research showed that green building is still at its infancy but the benefits of green buildings are understood; resulting in green buildings having a good growth potential. The study should be valuable to construction industry professional and clients.
- Full Text:
- Date Issued: 2011
- Authors: Hurbissoon, Roneesh Mehta
- Date: 2011
- Subjects: Sustainable construction , Architecture and energy conservation , Construction industry
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9722 , http://hdl.handle.net/10948/1379 , Sustainable construction , Architecture and energy conservation , Construction industry
- Description: The Earth's health is deteriorating and will deteriorate even more rapidly unless people adopt eco-friendly policies. Green building has long been a concept but it has not yet been universally applied in practice. The concept of sustainability emerged in the 1970s and can be associated with the energy crisis and environmental pollution concerns. This research is aimed at investigating whether building “green” is more demanding than non-green buildings in terms of cost and the use of green materials against traditional materials; whether professionals in the construction industry are knowledgeable in terms of green buildings; and lastly, to determine whether green buildings are contributing significantly to the environment. The literature reviewed and results of quantitative research amongst professionals from the Island of Mauritius formed the basis of the study. The study revealed that green building is expensive relative to traditional buildings considering. However, the concepts employed (for example: lower energy use, less waste disposal, lower water usage, and sustainable design) provide green buildings with long term savings. Furthermore, the scarcity of natural materials makes it expensive. The study also showed that contractors and professionals have a preference for traditional materials over green materials thus making them more familiar with traditional materials. Contractors and professionals are believed to understand green materials only on a limited basis. This may be attributed to the specific environmental issues involved; however, the research revealed that the professionals are familiar with the basic concepts of green buildings. Lastly, the research showed that green building is still at its infancy but the benefits of green buildings are understood; resulting in green buildings having a good growth potential. The study should be valuable to construction industry professional and clients.
- Full Text:
- Date Issued: 2011
Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
Educating users about information security by means of game play
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
From desktop to mobile : a framework for function and content transformation
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
Guidelines for the successful integration of ICT in schools in Cameroon
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
Health information technologies for improved continuity of care: a South African perspective
- Authors: Mostert-Phipps, Nicolette
- Date: 2011
- Subjects: Medical records -- Data processing , Medical technology -- South Africa , Medical innovations -- South Africa , Health -- Information services
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9730 , http://hdl.handle.net/10948/1619 , Medical records -- Data processing , Medical technology -- South Africa , Medical innovations -- South Africa , Health -- Information services
- Description: The fragmented nature of modern health care provision makes it increasingly difficult to achieve continuity of care. This is equally true in the context of the South African healthcare landscape. This results in a strong emphasis on the informational dimension of continuity of care which highlights the importance of the continuity of medical records. Paper-based methods of record keeping are inadequate to support informational continuity of care which leads to an increased interest in electronic methods of record keeping through the adoption of various Health Information Technologies (HITs). This research project investigates the role that various HITs such as Personal Health Records (PHRs), Electronic Medical Records (EMRs), and Health Information Exchanges (HIEs) can play in improving informational continuity of care resulting in the development of a standards-based technological model for the South African healthcare sector. This technological model employs appropriate HITs to address the problem of informational continuity of care in the South African healthcare landscape The benefits that are possible through the adoption of the proposed technological model can only be realized if the proposed HITs are used in a meaningful manner once adopted and implemented. The Delphi method is employed to identify factors that need to be addressed to encourage the adoption and meaningful use of such HITs in the South African healthcare landscape. Lastly, guidelines are formulated to encourage the adoption and meaningful use of HITs in the South African healthcare landscape to improve the continuity of care. The guidelines address both the technological requirements on a high level, as well as the factors that need to be addressed to encourage the adoption and meaningful use of the technological components suggested. These guidelines will play a significant role in raising awareness of the factors that need to be addressed to create an environment conducive to the adoption and meaningful use of appropriate HITs in order to improve the continuity of care in the South African healthcare landscape.
- Full Text:
- Date Issued: 2011
- Authors: Mostert-Phipps, Nicolette
- Date: 2011
- Subjects: Medical records -- Data processing , Medical technology -- South Africa , Medical innovations -- South Africa , Health -- Information services
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9730 , http://hdl.handle.net/10948/1619 , Medical records -- Data processing , Medical technology -- South Africa , Medical innovations -- South Africa , Health -- Information services
- Description: The fragmented nature of modern health care provision makes it increasingly difficult to achieve continuity of care. This is equally true in the context of the South African healthcare landscape. This results in a strong emphasis on the informational dimension of continuity of care which highlights the importance of the continuity of medical records. Paper-based methods of record keeping are inadequate to support informational continuity of care which leads to an increased interest in electronic methods of record keeping through the adoption of various Health Information Technologies (HITs). This research project investigates the role that various HITs such as Personal Health Records (PHRs), Electronic Medical Records (EMRs), and Health Information Exchanges (HIEs) can play in improving informational continuity of care resulting in the development of a standards-based technological model for the South African healthcare sector. This technological model employs appropriate HITs to address the problem of informational continuity of care in the South African healthcare landscape The benefits that are possible through the adoption of the proposed technological model can only be realized if the proposed HITs are used in a meaningful manner once adopted and implemented. The Delphi method is employed to identify factors that need to be addressed to encourage the adoption and meaningful use of such HITs in the South African healthcare landscape. Lastly, guidelines are formulated to encourage the adoption and meaningful use of HITs in the South African healthcare landscape to improve the continuity of care. The guidelines address both the technological requirements on a high level, as well as the factors that need to be addressed to encourage the adoption and meaningful use of the technological components suggested. These guidelines will play a significant role in raising awareness of the factors that need to be addressed to create an environment conducive to the adoption and meaningful use of appropriate HITs in order to improve the continuity of care in the South African healthcare landscape.
- Full Text:
- Date Issued: 2011
Information security service management : a service management approach to information security management
- Authors: Rastogi, Rahul
- Date: 2011
- Subjects: Information technology -- Security measures
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9755 , http://hdl.handle.net/10948/1389 , Information technology -- Security measures
- Description: In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
- Full Text:
- Date Issued: 2011
- Authors: Rastogi, Rahul
- Date: 2011
- Subjects: Information technology -- Security measures
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9755 , http://hdl.handle.net/10948/1389 , Information technology -- Security measures
- Description: In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
- Full Text:
- Date Issued: 2011
Intelligent automotive thermal comfort control
- Authors: Kranz, Jürgen
- Date: 2011
- Subjects: Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9645 , http://hdl.handle.net/10948/1435 , Automobiles -- Heating and ventilation
- Description: Mobility has become a substantial part in our society. Since we spend a lot of our available time on the road, we expect the automotive environment to provide similar comfort levels than residential buildings. Within this context, this research thesis especially focuses on automotive thermal comfort control. The automotive cabin is a very special environment, which is characterized by extreme inhomogeneity and overall transient behavior. Thermal comfort is a very vague and a very subjective term, which depends on physiological and psychological variables. Theories for thermal comfort in transient environments have not been fully established yet and researchers are still busy with its investigation. At present, automotive industry relies on extensive thermal comfort models, manikins and powerful simulation tools to assess and control thermal comfort. This thesis studies the application of artificial intelligence and proposes a blackbox approach which aims for extracting thermal comfort knowledge directly from human's interaction with the HVAC controls. This methodology avoids the use of human physiological and psychological thermal comfort models and does not require any a-priori knowledge. A novel comfort acquisition tool has been developed and has been integrated into a research vehicle in order to gather the required data for system learning. Data has been collected during spring, autumn and summer conditions in Southern Africa. Methods of data mining have been applied and an intelligent implementation using artificial neural networks has been proposed. The achieved results are promising and allow for about 87 perecent correct classification. It is concluded that methods of artificial intelligence perform well and are far superior compared to conventional approaches. These methods can be used as a powerful tool for the development process of vehicle air-conditioning controls and have great potential for time and cost reduction.
- Full Text:
- Date Issued: 2011
- Authors: Kranz, Jürgen
- Date: 2011
- Subjects: Automobiles -- Heating and ventilation
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9645 , http://hdl.handle.net/10948/1435 , Automobiles -- Heating and ventilation
- Description: Mobility has become a substantial part in our society. Since we spend a lot of our available time on the road, we expect the automotive environment to provide similar comfort levels than residential buildings. Within this context, this research thesis especially focuses on automotive thermal comfort control. The automotive cabin is a very special environment, which is characterized by extreme inhomogeneity and overall transient behavior. Thermal comfort is a very vague and a very subjective term, which depends on physiological and psychological variables. Theories for thermal comfort in transient environments have not been fully established yet and researchers are still busy with its investigation. At present, automotive industry relies on extensive thermal comfort models, manikins and powerful simulation tools to assess and control thermal comfort. This thesis studies the application of artificial intelligence and proposes a blackbox approach which aims for extracting thermal comfort knowledge directly from human's interaction with the HVAC controls. This methodology avoids the use of human physiological and psychological thermal comfort models and does not require any a-priori knowledge. A novel comfort acquisition tool has been developed and has been integrated into a research vehicle in order to gather the required data for system learning. Data has been collected during spring, autumn and summer conditions in Southern Africa. Methods of data mining have been applied and an intelligent implementation using artificial neural networks has been proposed. The achieved results are promising and allow for about 87 perecent correct classification. It is concluded that methods of artificial intelligence perform well and are far superior compared to conventional approaches. These methods can be used as a powerful tool for the development process of vehicle air-conditioning controls and have great potential for time and cost reduction.
- Full Text:
- Date Issued: 2011