Influences on construction project delivery time
- Authors: Olatunji, Aiyetan Ayodeji
- Date: 2010
- Subjects: Construction industry -- South Africa -- Management , Project management -- South Africa , Construction industry -- Economic aspects -- South Africa , Construction industry -- Technological innovations -- South Africa , Construction industry -- Labor productivity -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9681 , http://hdl.handle.net/10948/1548 , Construction industry -- South Africa -- Management , Project management -- South Africa , Construction industry -- Economic aspects -- South Africa , Construction industry -- Technological innovations -- South Africa , Construction industry -- Labor productivity -- South Africa
- Description: Construction delays are a global phenomenon. Factors causing construction delays in construction projects differ from country to country, due to different prevailing conditions. The prevailing conditions that could exert an influence on project delivery time are: political, economic, and physical factors as well as level of technological development; management style, and construction techniques. The construction industry is a major player in the economy, generating both employment and wealth. However, many projects experience extensive delays and thereby exceed initial time and cost estimates. This study aims at determining the causes of delays in project delivery in South Africa; evolving interventions, and developing a model for the delivery of projects on time. Inferential and linear regression statistical tools were used in the analysis of data for the study. The sample population consists of architects, builders, quantity surveyors, structural engineers, and clients, and the metropolitan cities of five provinces constituted the geographical delimitation of the study. The provinces are: Eastern Cape; Free State; Gauteng; KwaZulu-Natal, and Western Cape. The metropolitan cities are: Bloemfontein; Cape Town; Durban; Johannesburg, and Port Elizabeth. Findings which negatively influence project delivery time in South Africa include the following: lack of adequate planning; management style; the lack of constructability reviews of designs; inadequate motivation of workers; economic policies; lack of prompt payment to contractors, and quality of management during design and construction. Recommendations include: (1) The introduction of the following courses in built environment tertiary education � quality management competences; operational planning; design management, and generic management; (2) pre-qualification of suppliers; (3) inclusion of the following in tender documentation � human resource schedule; plant and equipment schedule; quality assurance plan, and work schedule; (4) appointment of materials specialists on a large projects; (5) the model developed should be adopted for use in the South African construction industry for the delivery of projects on time, and (6) the linear regression equation: Y = 13.1159 + 1.1341x or 35.3 percent addition on time for the estimation of project delivery time.
- Full Text:
- Date Issued: 2010
- Authors: Olatunji, Aiyetan Ayodeji
- Date: 2010
- Subjects: Construction industry -- South Africa -- Management , Project management -- South Africa , Construction industry -- Economic aspects -- South Africa , Construction industry -- Technological innovations -- South Africa , Construction industry -- Labor productivity -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9681 , http://hdl.handle.net/10948/1548 , Construction industry -- South Africa -- Management , Project management -- South Africa , Construction industry -- Economic aspects -- South Africa , Construction industry -- Technological innovations -- South Africa , Construction industry -- Labor productivity -- South Africa
- Description: Construction delays are a global phenomenon. Factors causing construction delays in construction projects differ from country to country, due to different prevailing conditions. The prevailing conditions that could exert an influence on project delivery time are: political, economic, and physical factors as well as level of technological development; management style, and construction techniques. The construction industry is a major player in the economy, generating both employment and wealth. However, many projects experience extensive delays and thereby exceed initial time and cost estimates. This study aims at determining the causes of delays in project delivery in South Africa; evolving interventions, and developing a model for the delivery of projects on time. Inferential and linear regression statistical tools were used in the analysis of data for the study. The sample population consists of architects, builders, quantity surveyors, structural engineers, and clients, and the metropolitan cities of five provinces constituted the geographical delimitation of the study. The provinces are: Eastern Cape; Free State; Gauteng; KwaZulu-Natal, and Western Cape. The metropolitan cities are: Bloemfontein; Cape Town; Durban; Johannesburg, and Port Elizabeth. Findings which negatively influence project delivery time in South Africa include the following: lack of adequate planning; management style; the lack of constructability reviews of designs; inadequate motivation of workers; economic policies; lack of prompt payment to contractors, and quality of management during design and construction. Recommendations include: (1) The introduction of the following courses in built environment tertiary education � quality management competences; operational planning; design management, and generic management; (2) pre-qualification of suppliers; (3) inclusion of the following in tender documentation � human resource schedule; plant and equipment schedule; quality assurance plan, and work schedule; (4) appointment of materials specialists on a large projects; (5) the model developed should be adopted for use in the South African construction industry for the delivery of projects on time, and (6) the linear regression equation: Y = 13.1159 + 1.1341x or 35.3 percent addition on time for the estimation of project delivery time.
- Full Text:
- Date Issued: 2010
Laser surface hardening of AISI 1518 alloy steel
- Authors: Zhang, Tao
- Date: 2010
- Subjects: Lasers , Laser beams , Lasers in engineering , Nd-YAG lasers , Steel alloys , Surfaces -- Effect of radiation on
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9613 , http://hdl.handle.net/10948/723 , Lasers , Laser beams , Lasers in engineering , Nd-YAG lasers , Steel alloys , Surfaces -- Effect of radiation on
- Description: The laser surface hardening process will enhance the hardness profile of automotive components and ensure better process control and predictability of quality as compared to the conventional hardening processes. A 2KW Nd-YAG laser system was used to harden the surface of alloy steel with various process parameters (laser power, focal spot diameter and beam velocity). The results (microhardness, microstructure change and residual stress distribution) were measured and analyzed with Vickers microhardness tester, optical/electron microscope and hole-drilling residual stress equipment. Statistical analyses of the experimental data were used for explaining the relationships between process parameters, microhardness and microstructure. General thermal hardening was applied in the research to show the influence of heating temperature and cooling method on microstructure and mechanical properties. Also, the results were compared with laser surface hardening process from microhardness, microstructure and residual stress to show the advantage of laser surface hardening. Through analysis of the results of the laser surface hardening experiments, a suitable laser power density and interaction time for optimum hardening was obtained. The presented laser surface hardening process can also be applied to other alloy steel surface hardening process.
- Full Text:
- Date Issued: 2010
- Authors: Zhang, Tao
- Date: 2010
- Subjects: Lasers , Laser beams , Lasers in engineering , Nd-YAG lasers , Steel alloys , Surfaces -- Effect of radiation on
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9613 , http://hdl.handle.net/10948/723 , Lasers , Laser beams , Lasers in engineering , Nd-YAG lasers , Steel alloys , Surfaces -- Effect of radiation on
- Description: The laser surface hardening process will enhance the hardness profile of automotive components and ensure better process control and predictability of quality as compared to the conventional hardening processes. A 2KW Nd-YAG laser system was used to harden the surface of alloy steel with various process parameters (laser power, focal spot diameter and beam velocity). The results (microhardness, microstructure change and residual stress distribution) were measured and analyzed with Vickers microhardness tester, optical/electron microscope and hole-drilling residual stress equipment. Statistical analyses of the experimental data were used for explaining the relationships between process parameters, microhardness and microstructure. General thermal hardening was applied in the research to show the influence of heating temperature and cooling method on microstructure and mechanical properties. Also, the results were compared with laser surface hardening process from microhardness, microstructure and residual stress to show the advantage of laser surface hardening. Through analysis of the results of the laser surface hardening experiments, a suitable laser power density and interaction time for optimum hardening was obtained. The presented laser surface hardening process can also be applied to other alloy steel surface hardening process.
- Full Text:
- Date Issued: 2010
Modelling and control of combustion in a high velocity air flame (HVAF) thermal spraying process
- Authors: Barth, Dominic
- Date: 2010
- Subjects: Metal spraying , Combustion
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9644 , http://hdl.handle.net/10948/1266 , Metal spraying , Combustion
- Description: Thermal spraying is a technology, which is used for coating of components and structures in order to achieve certain tribological characteristics, or for protection against corrosion, excessive temperature and wear. Within thermal spray, there are processes, which utilise combustion of liquid fuel to obtain high velocities flows providing, therefore, good adhesion of coating materials to substrates. These include High Velocity Oxygen Flame (HVOF) and High Velocity Air Flame (HVAF) process, of which the former one is widely used as it has been developed for at least two decades, while HVAF is less common. However, some studies indicate that HVAF has a number of advantages over HVOF, including the economic benefits. The thermal spray gun, based on the HVAF process, has been developed before, but the system was controlled manually. Therefore, there is a need to develop a fully automated controller of an HVAF thermal spray system. Process control of thermal spraying is highly complex as it involves simultaneous control of a number of processes, including; ignition process, combustion process, spraying material melting, as well as control and monitoring of auxiliary equipment. This paper presents the development of a control system for an HVAF thermal spray system, based on a Microchip PIC microcontroller. The designed control system was applied for controlling of thermal spraying of carbides powders, and provided a reliable ignition and stable combustion process, powder feeding and all other functions of control.
- Full Text:
- Date Issued: 2010
- Authors: Barth, Dominic
- Date: 2010
- Subjects: Metal spraying , Combustion
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9644 , http://hdl.handle.net/10948/1266 , Metal spraying , Combustion
- Description: Thermal spraying is a technology, which is used for coating of components and structures in order to achieve certain tribological characteristics, or for protection against corrosion, excessive temperature and wear. Within thermal spray, there are processes, which utilise combustion of liquid fuel to obtain high velocities flows providing, therefore, good adhesion of coating materials to substrates. These include High Velocity Oxygen Flame (HVOF) and High Velocity Air Flame (HVAF) process, of which the former one is widely used as it has been developed for at least two decades, while HVAF is less common. However, some studies indicate that HVAF has a number of advantages over HVOF, including the economic benefits. The thermal spray gun, based on the HVAF process, has been developed before, but the system was controlled manually. Therefore, there is a need to develop a fully automated controller of an HVAF thermal spray system. Process control of thermal spraying is highly complex as it involves simultaneous control of a number of processes, including; ignition process, combustion process, spraying material melting, as well as control and monitoring of auxiliary equipment. This paper presents the development of a control system for an HVAF thermal spray system, based on a Microchip PIC microcontroller. The designed control system was applied for controlling of thermal spraying of carbides powders, and provided a reliable ignition and stable combustion process, powder feeding and all other functions of control.
- Full Text:
- Date Issued: 2010
Navigating between information security management documents : a modeling methodology
- Authors: Domingues, Steve
- Date: 2010
- Subjects: Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9761 , http://hdl.handle.net/10948/1212 , Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Description: Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
- Full Text:
- Date Issued: 2010
- Authors: Domingues, Steve
- Date: 2010
- Subjects: Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9761 , http://hdl.handle.net/10948/1212 , Computer security -- Management , Business -- Data processing -- Security measures , Information resources management -- Security measures , Business -- Standards
- Description: Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
- Full Text:
- Date Issued: 2010
Process window for friction stir welding of 3 mm titanium (Ti-6AI-4V)
- Authors: Mashinini, Peter Madindwa
- Date: 2010
- Subjects: Friction stir welding , Titanium -- Welding , Welded joints
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9618 , http://hdl.handle.net/10948/1413 , Friction stir welding , Titanium -- Welding , Welded joints
- Description: Friction stir welding was used to join 3 mm Ti-6Al-4V alloy in a butt joint configuration. This research focused on optimization of a tool geometry and the interaction between process parameters and static performance of welded joints. The main parameters varied were tool travel speed and tool rotational speed. The results showed a relationship between heat input as a function of process parameters and static strength. Improved tensile properties correspond to high heat input. The hardness plots revealed an increase in hardness on both the stir zone and heat affected zone despite the small defects on the weld root. The weld microstructure was also evaluated, which showed a variation in microstructure on both the heat affected zone and stir zone in comparison to the parent material. It was also found that the use of MgO as a heat barrier on the backing plate was detrimental to the weld tensile properties of butt-welded plates compared to bead-on-plate welds of which MgO had no influence.
- Full Text:
- Date Issued: 2010
- Authors: Mashinini, Peter Madindwa
- Date: 2010
- Subjects: Friction stir welding , Titanium -- Welding , Welded joints
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9618 , http://hdl.handle.net/10948/1413 , Friction stir welding , Titanium -- Welding , Welded joints
- Description: Friction stir welding was used to join 3 mm Ti-6Al-4V alloy in a butt joint configuration. This research focused on optimization of a tool geometry and the interaction between process parameters and static performance of welded joints. The main parameters varied were tool travel speed and tool rotational speed. The results showed a relationship between heat input as a function of process parameters and static strength. Improved tensile properties correspond to high heat input. The hardness plots revealed an increase in hardness on both the stir zone and heat affected zone despite the small defects on the weld root. The weld microstructure was also evaluated, which showed a variation in microstructure on both the heat affected zone and stir zone in comparison to the parent material. It was also found that the use of MgO as a heat barrier on the backing plate was detrimental to the weld tensile properties of butt-welded plates compared to bead-on-plate welds of which MgO had no influence.
- Full Text:
- Date Issued: 2010
The adoption of quality assurance in e-Health acquisition for rural hospitals in the Eastern Cape Province
- Authors: Ruxwana, Nkqubela
- Date: 2010
- Subjects: Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9731 , http://hdl.handle.net/10948/1514 , Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Description: The evolution of e-health has the potential to assist in the management of scarce resources and the shortage of skills, enhance efficiencies, improve quality and increase work productivity within the healthcare sector. As a result, an increase is seen in e-health solutions developments with the aim to improve healthcare services, hospital information systems, health decision support, telemedicine and other technical systems that have the potential to reduce cost, improve quality, and enhance the accessibility and delivery of healthcare. However, unfortunately their implementation contiues to fail. Although there are several reasons for this, in this study a lack of project quality management is viewed as a key contributor to the failure of e-health solutions implementation projects in rural hospitals. This results in neglected aspects of quality assurance (QA), which forms an integral part of project quality management. The purpose of this study is to develop a Genertic Quality Assurance Model (GQAM) for the successful acquisition (i.e. development and implementation) of e-health solutions in rural hospitals in the Eastern Cape Province to enable improved quality of care and service delivery. In order to develop and test this model it was necessary to identify the QA methodologies that are currently used in rural hospitals and to evaluate their strengths and weaknesses, as well as their impact on project success. The study is divided into four phases; in each phase different study designs were followed. The study used triangulation of qualitative and some elements of quantitative research approaches, in terms of which a case study approach was adpoted to answer the research questions. This study did indeed develop a GQAM that can be used to ensure e-health solution success in rural hospitals. Furthermore, to aid in the implementation of this model, a set of QA value chain implementation guidelines were developed, as a framework, to inject the nodel into typical (SDLC) phases.
- Full Text:
- Date Issued: 2010
- Authors: Ruxwana, Nkqubela
- Date: 2010
- Subjects: Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9731 , http://hdl.handle.net/10948/1514 , Quality assurance -- Management , Hospital care -- Quality control , Health facilities -- Quality control , Health -- Computer network resources , Public health -- Information services
- Description: The evolution of e-health has the potential to assist in the management of scarce resources and the shortage of skills, enhance efficiencies, improve quality and increase work productivity within the healthcare sector. As a result, an increase is seen in e-health solutions developments with the aim to improve healthcare services, hospital information systems, health decision support, telemedicine and other technical systems that have the potential to reduce cost, improve quality, and enhance the accessibility and delivery of healthcare. However, unfortunately their implementation contiues to fail. Although there are several reasons for this, in this study a lack of project quality management is viewed as a key contributor to the failure of e-health solutions implementation projects in rural hospitals. This results in neglected aspects of quality assurance (QA), which forms an integral part of project quality management. The purpose of this study is to develop a Genertic Quality Assurance Model (GQAM) for the successful acquisition (i.e. development and implementation) of e-health solutions in rural hospitals in the Eastern Cape Province to enable improved quality of care and service delivery. In order to develop and test this model it was necessary to identify the QA methodologies that are currently used in rural hospitals and to evaluate their strengths and weaknesses, as well as their impact on project success. The study is divided into four phases; in each phase different study designs were followed. The study used triangulation of qualitative and some elements of quantitative research approaches, in terms of which a case study approach was adpoted to answer the research questions. This study did indeed develop a GQAM that can be used to ensure e-health solution success in rural hospitals. Furthermore, to aid in the implementation of this model, a set of QA value chain implementation guidelines were developed, as a framework, to inject the nodel into typical (SDLC) phases.
- Full Text:
- Date Issued: 2010
The effects of hyperinflation on the Zimbabwean construction industry
- Authors: Moyo, Admire
- Date: 2010
- Subjects: Inflation (Finance) -- Zimbabwe , Zimbabwe -- Economic conditions , Construction industry -- Economic aspects -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9687 , http://hdl.handle.net/10948/1197 , Inflation (Finance) -- Zimbabwe , Zimbabwe -- Economic conditions , Construction industry -- Economic aspects -- Zimbabwe
- Description: Less than two decades ago, Zimbabwe was a symbol for the rest of the world of what Africa could become (Dell, 2005). DiSilvio (2007) contends that independent Zimbabwe was an economic success on route to attaining status of the most “developed country” in Africa. Contrary to expectations, by 2003 the Zimbabwean economy was shrinking faster than any other economy in the world at 18 percent per year (Richardson, 2005). Reports indicate that the Zimbabwean economy is in crisis and has since been set back by more than 50 years (Matikinye, 2005). This phenomenon necessitated the need for an investigation to ascertain its cause in Zimbabwe. As a result, the research identifies and presents hyperinflation as the root cause of the crisis in Zimbabwe and illustrates the validity of this assertion with a focus on the Zimbabwean construction industry. As part of the research inquiry, a review of related literature was conducted. The literature review illustrated the generic effects of hyperinflation as well as the effects of this phenomenon in action in Zimbabwe. The literature study was followed by a questionnaire survey. The questionnaire was completed by 23 contractors and 7 clients from a census of contractors and clients in Zimbabwe. The questionnaire consisted of a number of variables, which the respondents were asked to rate vis-à-vis the effects of hyperinflation in the construction industry. In summary, the questionnaire sought to determine the causes of hyperinflation in Zimbabwe, its specific effects on the construction industry and how respondents thought the phenomenon could be mitigated so as to revive the Zimbabwean construction industry. The techniques of re-scaling, in conjunction with descriptive and inferential statistics, ranking and quadrant analysis were applied to the data. Results from these analyses revealed a high degree of agreement among respondents vis-à-vis the effects of hyperinflation on the Zimbabwean construction industry. The interpretation of the results further revealed that hyperinflation has undoubtedly led to the collapse of the Zimbabwean construction industry. In conclusion, the research, applying the interpretations of v the survey findings, prescribes a number of ways in which the Zimbabwean construction sector may be resurrected. Among the recommended prescriptions, there are a number of debatable issues that arise that the researcher proposes should be subject to future study.
- Full Text:
- Date Issued: 2010
- Authors: Moyo, Admire
- Date: 2010
- Subjects: Inflation (Finance) -- Zimbabwe , Zimbabwe -- Economic conditions , Construction industry -- Economic aspects -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9687 , http://hdl.handle.net/10948/1197 , Inflation (Finance) -- Zimbabwe , Zimbabwe -- Economic conditions , Construction industry -- Economic aspects -- Zimbabwe
- Description: Less than two decades ago, Zimbabwe was a symbol for the rest of the world of what Africa could become (Dell, 2005). DiSilvio (2007) contends that independent Zimbabwe was an economic success on route to attaining status of the most “developed country” in Africa. Contrary to expectations, by 2003 the Zimbabwean economy was shrinking faster than any other economy in the world at 18 percent per year (Richardson, 2005). Reports indicate that the Zimbabwean economy is in crisis and has since been set back by more than 50 years (Matikinye, 2005). This phenomenon necessitated the need for an investigation to ascertain its cause in Zimbabwe. As a result, the research identifies and presents hyperinflation as the root cause of the crisis in Zimbabwe and illustrates the validity of this assertion with a focus on the Zimbabwean construction industry. As part of the research inquiry, a review of related literature was conducted. The literature review illustrated the generic effects of hyperinflation as well as the effects of this phenomenon in action in Zimbabwe. The literature study was followed by a questionnaire survey. The questionnaire was completed by 23 contractors and 7 clients from a census of contractors and clients in Zimbabwe. The questionnaire consisted of a number of variables, which the respondents were asked to rate vis-à-vis the effects of hyperinflation in the construction industry. In summary, the questionnaire sought to determine the causes of hyperinflation in Zimbabwe, its specific effects on the construction industry and how respondents thought the phenomenon could be mitigated so as to revive the Zimbabwean construction industry. The techniques of re-scaling, in conjunction with descriptive and inferential statistics, ranking and quadrant analysis were applied to the data. Results from these analyses revealed a high degree of agreement among respondents vis-à-vis the effects of hyperinflation on the Zimbabwean construction industry. The interpretation of the results further revealed that hyperinflation has undoubtedly led to the collapse of the Zimbabwean construction industry. In conclusion, the research, applying the interpretations of v the survey findings, prescribes a number of ways in which the Zimbabwean construction sector may be resurrected. Among the recommended prescriptions, there are a number of debatable issues that arise that the researcher proposes should be subject to future study.
- Full Text:
- Date Issued: 2010
The possibility of a flexible wireless 3-D measurement in the modern automobile production
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
- Authors: Frede, Stefan
- Date: 2010
- Subjects: Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9619 , http://hdl.handle.net/10948/1203 , Three-dimensional display systems , Automobile industry and trade , Automobile industry and trade -- South Africa -- Quality control
- Description: The quality control of geometrical coherences and relations in modern automobile production is done by different stationary and flexible measurement systems and strategies. Furthermore, there currently exists possibilities of inline measurements and offline measurements. This project presents the basic research concerning the possibility of a flexible wireless measurement system in modern automobile production, that is able to combine the advantages of both strategies. An investigation of existing measurement techniques was done in order to find a sensor technology, which enables the wireless measurement process. The research project introduces the current location systems and positioning systems. These techniques are compared by a value benefit analysis to expose a suited technology as basis for the measurement system. As result of the value benefit anlysis, the ultrasonic technique was selected for further investigations. The ultrasonic test setup is used to analyze the accuracy of modern sensors and to verify the possibility of a project related integration. The tests are done in different conditions, in order to compare the laboratory application and the industrial application. During the test measurements different physical influencing variables and disturbances occurred. From this research project, it can be concluded that the laboratory application of the system is possible. However, the industrial application is subject to restrictions.
- Full Text:
- Date Issued: 2010
A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
A framework for the secure use of portable storage devices : a South African higher education perspective
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
A framework towards effective control in information security governance
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
A model for enhancing presence handling in instant messaging
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
A model for information security control audit for small to mid-sized organisations
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009
Addressing the digital divide through the implementation of a wireless school network
- Authors: Du Preez, Creswell
- Date: 2009
- Subjects: Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9758 , http://hdl.handle.net/10948/1298 , Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Description: Societal trends have changed more in the last decade than they have in the last century. This is particularly prevalent in the education environment. Concepts such as Lifelong Learning (the continued learning/educating of an individual throughout his/her lifetime), New Competencies (technology that is now part of almost every skill in the workplace) and Telecommuting (more people working from home rather than traditional offices) have become common-place today (Twigg, 1996, pp. 1-2). Education delivery needs to provide for these societal changes in order to ensure competent individuals pass on to the next level of education and ultimately to the work force. With key trends in technology such as Digitization, Maturation and Disintermediation becoming common in the workplace, education delivery must address the ―Digital Divide. (Twigg, 1996, pp. 2-3). Historically, schools in South Africa have used traditional teaching methods that have stayed the same for the last century. Educational institutions in South Africa, in particular, the previously disadvantaged schools of the Eastern Cape, face various challenges such as the dwindling ability to collect school fees from parents of scholars and declining financial support from the government. In Chapter Seven of the Draft White Paper on e-Education, which was gazetted on 26 August, 2004, the DoE, as part of its implementation strategies, urged the private sector to respond by implementing ICT initiatives nationwide. Phase 1 of the strategy advocated that ―Institutions are connected, access the internet and communicate electronically. (Department of Education, 2004, pp. 37-40). This dissertation shows that it is feasible to create a communications’ network among South African schools. It is believed that such a network can add great value to the education system in South Africa. The potential for this network to address the gap in the Digital Divide is enormous. This dissertation examines various ICT communications’ technologies and isolates wireless communications’ technology as best suited for this purpose, due to the speeds offered by the technology and the cost structure associated with it. A case study examines a pilot installation of the network and endeavours to prove the concept.
- Full Text:
- Date Issued: 2009
- Authors: Du Preez, Creswell
- Date: 2009
- Subjects: Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9758 , http://hdl.handle.net/10948/1298 , Educational technology -- South Africa , Information technology -- Social aspects -- South Africa
- Description: Societal trends have changed more in the last decade than they have in the last century. This is particularly prevalent in the education environment. Concepts such as Lifelong Learning (the continued learning/educating of an individual throughout his/her lifetime), New Competencies (technology that is now part of almost every skill in the workplace) and Telecommuting (more people working from home rather than traditional offices) have become common-place today (Twigg, 1996, pp. 1-2). Education delivery needs to provide for these societal changes in order to ensure competent individuals pass on to the next level of education and ultimately to the work force. With key trends in technology such as Digitization, Maturation and Disintermediation becoming common in the workplace, education delivery must address the ―Digital Divide. (Twigg, 1996, pp. 2-3). Historically, schools in South Africa have used traditional teaching methods that have stayed the same for the last century. Educational institutions in South Africa, in particular, the previously disadvantaged schools of the Eastern Cape, face various challenges such as the dwindling ability to collect school fees from parents of scholars and declining financial support from the government. In Chapter Seven of the Draft White Paper on e-Education, which was gazetted on 26 August, 2004, the DoE, as part of its implementation strategies, urged the private sector to respond by implementing ICT initiatives nationwide. Phase 1 of the strategy advocated that ―Institutions are connected, access the internet and communicate electronically. (Department of Education, 2004, pp. 37-40). This dissertation shows that it is feasible to create a communications’ network among South African schools. It is believed that such a network can add great value to the education system in South Africa. The potential for this network to address the gap in the Digital Divide is enormous. This dissertation examines various ICT communications’ technologies and isolates wireless communications’ technology as best suited for this purpose, due to the speeds offered by the technology and the cost structure associated with it. A case study examines a pilot installation of the network and endeavours to prove the concept.
- Full Text:
- Date Issued: 2009
An enterprise information security model for a micro finance company: a case study
- Authors: Owen, Morné
- Date: 2009
- Subjects: Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9763 , http://hdl.handle.net/10948/1151 , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Description: The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that should be taken into account, and the maintenance of the model once implemented to ensure ongoing relevance. A questionnaire conducted at the MFC provided insight into the perceived understanding of information security. The questionnaire results were used to ensure the model solution addressed current information security shortcomings within the MFC. This study found that the information security controls in ISO 27002 should be applicable to any industry. The uniqueness for the MFC is not in the security controls, but rather in the regulations and laws applicable to it.
- Full Text:
- Date Issued: 2009
- Authors: Owen, Morné
- Date: 2009
- Subjects: Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9763 , http://hdl.handle.net/10948/1151 , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Management information systems -- Security measures -- South Africa
- Description: The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that should be taken into account, and the maintenance of the model once implemented to ensure ongoing relevance. A questionnaire conducted at the MFC provided insight into the perceived understanding of information security. The questionnaire results were used to ensure the model solution addressed current information security shortcomings within the MFC. This study found that the information security controls in ISO 27002 should be applicable to any industry. The uniqueness for the MFC is not in the security controls, but rather in the regulations and laws applicable to it.
- Full Text:
- Date Issued: 2009
An investigation into user interface factors impacting on user experience: Pastel accounting case study
- Authors: Mashapa, Job
- Date: 2009
- Subjects: User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9762 , http://hdl.handle.net/10948/1184 , User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Description: The purpose of this research is to propose metrics to evaluate the user interface factors that impact on the user experience of Software Accounting Applications (SAAs) used to support the accounting business activities in Small Medium and Micro Enterprises (SMMEs) operating in developing countries. The research commences by outlining the conceptual background that introduces the study. In the introductory chapter, the problems together with the objectives that motivate the significance of the study are presented. In the same chapter, the overall research focus and how each of the research questions are treated to accomplish the intended goals are defined. In Chapter 2, the typical accounting business activities for SMMEs operating in developing countries are investigated. Findings from the preliminary survey revealed that Pastel accounting is the commonly used SMME accounting application used in developing countries. Inventory management, cash book processing, preparation of financial statements, customer and supplier documents processing are revealed as the most prevalent SMME accounting activities. This chapter highlights the problems that inhibit the implementation and the delivery of full benefits of using these SAAs. After indentifying the SAA problems, user experience aspects of the SAA are addressed in Chapter 3. User experience (UX) is defined and existing UX evaluation criteria are discussed. The findings form the basis for choosing the applicable criteria for evaluating the User Interface (UI) factors impacting on the UX of Pastel accounting. The proposed user experience evaluation metrics are described in Chapter 4. A discussion on how the metrics are implemented and what UI aspect they measure is presented. The research design and methodology followed is discussed in Chapter 5. The chapter outlines the possible research philosophy, strategy, methods and data collecting methods. A choice is made about the appropriate approach to answer the stated research questions to satisfy the intended overall research objective. A phenomenologist, qualitative inductive approach is adopted in the study. A contextual inquiry case-study strategy is chosen as applicable to this research. Data is collected using expert reviews, user observation and subjective questionnaires. After the choice of the research techniques, the case study results are presented and analysed in Chapter 6. It is found that Pastel UI is attractive and the users are happy with the visual design of the application. The major factors that impact on Pastel accounting are its lack of 4 feedback and its complexity which makes it difficult for first time users to use the application and the paucity of the help function. After the observed findings, the conclusions and recommendations of the research are presented in Chapter 7. It has been concluded that Pastel accounting UI fails to captivate a positive user experience for first-time users; the users do not find the expected help from the Help function and are often left wondering about the status of the system and the outcome of their actions on a task. Recommendations on how designers would make Pastel user interface more helpful, easy to use, and provide adequate feedback are presented in Chapter 7.
- Full Text:
- Date Issued: 2009
- Authors: Mashapa, Job
- Date: 2009
- Subjects: User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9762 , http://hdl.handle.net/10948/1184 , User interfaces (Computer systems) -- South Africa , Accounting -- Data processing , Accounting -- Computer programs , Small business -- South Africa -- Computer network resources
- Description: The purpose of this research is to propose metrics to evaluate the user interface factors that impact on the user experience of Software Accounting Applications (SAAs) used to support the accounting business activities in Small Medium and Micro Enterprises (SMMEs) operating in developing countries. The research commences by outlining the conceptual background that introduces the study. In the introductory chapter, the problems together with the objectives that motivate the significance of the study are presented. In the same chapter, the overall research focus and how each of the research questions are treated to accomplish the intended goals are defined. In Chapter 2, the typical accounting business activities for SMMEs operating in developing countries are investigated. Findings from the preliminary survey revealed that Pastel accounting is the commonly used SMME accounting application used in developing countries. Inventory management, cash book processing, preparation of financial statements, customer and supplier documents processing are revealed as the most prevalent SMME accounting activities. This chapter highlights the problems that inhibit the implementation and the delivery of full benefits of using these SAAs. After indentifying the SAA problems, user experience aspects of the SAA are addressed in Chapter 3. User experience (UX) is defined and existing UX evaluation criteria are discussed. The findings form the basis for choosing the applicable criteria for evaluating the User Interface (UI) factors impacting on the UX of Pastel accounting. The proposed user experience evaluation metrics are described in Chapter 4. A discussion on how the metrics are implemented and what UI aspect they measure is presented. The research design and methodology followed is discussed in Chapter 5. The chapter outlines the possible research philosophy, strategy, methods and data collecting methods. A choice is made about the appropriate approach to answer the stated research questions to satisfy the intended overall research objective. A phenomenologist, qualitative inductive approach is adopted in the study. A contextual inquiry case-study strategy is chosen as applicable to this research. Data is collected using expert reviews, user observation and subjective questionnaires. After the choice of the research techniques, the case study results are presented and analysed in Chapter 6. It is found that Pastel UI is attractive and the users are happy with the visual design of the application. The major factors that impact on Pastel accounting are its lack of 4 feedback and its complexity which makes it difficult for first time users to use the application and the paucity of the help function. After the observed findings, the conclusions and recommendations of the research are presented in Chapter 7. It has been concluded that Pastel accounting UI fails to captivate a positive user experience for first-time users; the users do not find the expected help from the Help function and are often left wondering about the status of the system and the outcome of their actions on a task. Recommendations on how designers would make Pastel user interface more helpful, easy to use, and provide adequate feedback are presented in Chapter 7.
- Full Text:
- Date Issued: 2009
Civil engineering components for a conceptual elevated light rail transit model with reference to Nelson Mandela Bay
- Authors: Zang, Jin
- Date: 2009
- Subjects: Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9593 , http://hdl.handle.net/10948/769 , Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Description: The increase of motor vehicles, especially in cities, cause transport problems of traffic congestion, vehicle accidents, air pollution and a lack of public spaces. The increasing number of motor vehicles consumes huge amounts of finite petrol energy and emits large amounts of gases that are harmful to the atmosphere and the natural environment. Therefore, the current road transport network is not a sustainable form of public transport for the future. In order to seek a suitable transportation mode, the Infrastructure and Engineering Business Unit of the Nelson Mandela Bay Municipality (NMBM) did some feasibility studies about light rail transit (LRT) from 1984 to 1988. The NMBM-report (1988: 8) concluded that a LRT system would provide the most suitable and primary mode to serve Nelson Mandela Bay (NMB). Although LRT was regarded as the most suitable primary mode of transport at that time (1988), further studies that were reported in 2006 recommended an alternative public transportation system. This research refers to these studies done for the NMB area and other studies and reports for other areas, but focus on the identification of the most suitable civil engineering components for a conceptual elevated light rail transit (ELRT) model. Electrical driven LRT systems have advantages over internal-combustion driven vehicles in terms of environmental protection. Traditional LRT systems are at ground level and are integrated with the existing road network. Some successful LRT systems indicate that the success of LRT systems is mainly dependent on integration with the existing road network. However, the integration of road transport systems with LRT systems cause increased congestion and accidents. An ELRT system can solve these problems. Bangkok has already built an ELRT system to solve its severe traffic congestion. 4 In order to develop a conceptual ELRT model, this research aimed to determine the most suitable civil engineering components for a conceptual ELRT model, including: (i) the most suitable type of bridge foundation; (ii) the most suitable type bridge girder; (iii) the most suitable type of sleeper; and (iv) whether the track should be a ballasted or non-ballasted type. The grounded theory approach was adopted to build up sets of data from which the most suitable components could be selected. In addition, design analyses were done of the various types of components to determine their suitability for a conceptual ELRT model. Experienced engineers and experts were also consulted to identify the most suitable components. After analyses and selection of the most suitable components, outstanding experts were approached to evaluate the components that showed up as the most suitable through the research. The research results indicated that bored and cast-in-place piles, a double-cell trapezoidal segmental box girder, and twin-block sleepers on a non-ballasted sleeper bed are the most suitable civil engineering components.
- Full Text:
- Date Issued: 2009
- Authors: Zang, Jin
- Date: 2009
- Subjects: Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9593 , http://hdl.handle.net/10948/769 , Railroads, Local and light -- South Africa -- Port Elizabeth , Street-railroads -- South Africa -- Port Elizabeth , Local transit -- South Africa -- Port Elizabeth
- Description: The increase of motor vehicles, especially in cities, cause transport problems of traffic congestion, vehicle accidents, air pollution and a lack of public spaces. The increasing number of motor vehicles consumes huge amounts of finite petrol energy and emits large amounts of gases that are harmful to the atmosphere and the natural environment. Therefore, the current road transport network is not a sustainable form of public transport for the future. In order to seek a suitable transportation mode, the Infrastructure and Engineering Business Unit of the Nelson Mandela Bay Municipality (NMBM) did some feasibility studies about light rail transit (LRT) from 1984 to 1988. The NMBM-report (1988: 8) concluded that a LRT system would provide the most suitable and primary mode to serve Nelson Mandela Bay (NMB). Although LRT was regarded as the most suitable primary mode of transport at that time (1988), further studies that were reported in 2006 recommended an alternative public transportation system. This research refers to these studies done for the NMB area and other studies and reports for other areas, but focus on the identification of the most suitable civil engineering components for a conceptual elevated light rail transit (ELRT) model. Electrical driven LRT systems have advantages over internal-combustion driven vehicles in terms of environmental protection. Traditional LRT systems are at ground level and are integrated with the existing road network. Some successful LRT systems indicate that the success of LRT systems is mainly dependent on integration with the existing road network. However, the integration of road transport systems with LRT systems cause increased congestion and accidents. An ELRT system can solve these problems. Bangkok has already built an ELRT system to solve its severe traffic congestion. 4 In order to develop a conceptual ELRT model, this research aimed to determine the most suitable civil engineering components for a conceptual ELRT model, including: (i) the most suitable type of bridge foundation; (ii) the most suitable type bridge girder; (iii) the most suitable type of sleeper; and (iv) whether the track should be a ballasted or non-ballasted type. The grounded theory approach was adopted to build up sets of data from which the most suitable components could be selected. In addition, design analyses were done of the various types of components to determine their suitability for a conceptual ELRT model. Experienced engineers and experts were also consulted to identify the most suitable components. After analyses and selection of the most suitable components, outstanding experts were approached to evaluate the components that showed up as the most suitable through the research. The research results indicated that bored and cast-in-place piles, a double-cell trapezoidal segmental box girder, and twin-block sleepers on a non-ballasted sleeper bed are the most suitable civil engineering components.
- Full Text:
- Date Issued: 2009
Corruption and its effects on the development of the construction industry in Malawi
- Chiocha, Charles Injess Martin
- Authors: Chiocha, Charles Injess Martin
- Date: 2009
- Subjects: Contruction industry -- Corrupt practices -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9692 , http://hdl.handle.net/10948/933 , Contruction industry -- Corrupt practices -- Malawi
- Description: The purpose of this study was to investigate corruption and its effects on the development of the construction industry in Malawi. The major causes were identified and probable solutions as well as preventive measures suggested for all stakeholders in the construction industry in Malawi and neighbouring countries to follow in order to combat bribery and corruption. This treatise consisted of a literature review for the causes of bribery, fraud and corruption, effects of corruption on the construction industry, preventive measures, probable solutions to corruption and a descriptive survey involving responses from building and civil engineering contractors, the built environment professionals, home owners, developers, public works officers amongst others from the construction industry in Malawi. According to the literature study, the construction industry is one of the most corrupt industries in the world, which is a huge concern and threat both to governments, investors and humanity at large. This must be addressed by all the official players in the construction industry, from the innovator of a project to the tradesmen employed on that site. The research showed that all players in the construction industry are aware of the impact of corruption on the development of the construction industry in Malawi. Furthermore, there is room for improvement as far as prevention, reduction and elimination of corruption is concerned.
- Full Text:
- Date Issued: 2009
- Authors: Chiocha, Charles Injess Martin
- Date: 2009
- Subjects: Contruction industry -- Corrupt practices -- Malawi
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:9692 , http://hdl.handle.net/10948/933 , Contruction industry -- Corrupt practices -- Malawi
- Description: The purpose of this study was to investigate corruption and its effects on the development of the construction industry in Malawi. The major causes were identified and probable solutions as well as preventive measures suggested for all stakeholders in the construction industry in Malawi and neighbouring countries to follow in order to combat bribery and corruption. This treatise consisted of a literature review for the causes of bribery, fraud and corruption, effects of corruption on the construction industry, preventive measures, probable solutions to corruption and a descriptive survey involving responses from building and civil engineering contractors, the built environment professionals, home owners, developers, public works officers amongst others from the construction industry in Malawi. According to the literature study, the construction industry is one of the most corrupt industries in the world, which is a huge concern and threat both to governments, investors and humanity at large. This must be addressed by all the official players in the construction industry, from the innovator of a project to the tradesmen employed on that site. The research showed that all players in the construction industry are aware of the impact of corruption on the development of the construction industry in Malawi. Furthermore, there is room for improvement as far as prevention, reduction and elimination of corruption is concerned.
- Full Text:
- Date Issued: 2009
Cost and reward as motivating factors in distributed collaborative learning assignments : a grounded theory analasis
- Van Niekerk, Johanna Cornelia
- Authors: Van Niekerk, Johanna Cornelia
- Date: 2009
- Subjects: Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9764 , http://hdl.handle.net/10948/1103 , Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Description: The objective of this research study was to obtain a better understanding of the factors that affect lecturer and student participation in distributed collaborative learning assignments (DCLAs). A substantial number of courses worldwide have included DCLAs in their curricula in an attempt to teach students virtual communication and teaming skills, and to allow distributed students to learn course content collaboratively in a virtual environment. The execution and management of these assignments have proven to be more challenging that expected. Several attempts reported on in the literature had to be abandoned when cost exceeded the rewards for both lecturers and students. In a fouryear cyclical action research project carried out at the PETech (Port Elizabeth Technikon, currently part of the Nelson Mandela Metropolitan University, South Africa), ICT students at several of the PETech campuses were required to complete a DCLA in virtual teams. This project also had to be terminated when it was realised that virtual team learning was minimal and the time investment unacceptably high. For the research study reported on in this thesis the data collected during the four “preresearch” cycles and the experiences reported in the literature were analysed. The lessons learnt were applied to a new additional DCLA cycle which formed part of an ICT course, although this execution still showed room for improvement. A second additional cycle was then executed which had a high participation rate and was overwhelmingly labelled by the participating students as a valuable and enjoyable learning experience. Analysis of the factors affecting participation in DCLAs shows that they are numerous and tightly interlinked, and that each factor is able to take on a wide range of values. This complicates descriptive reporting as each of the DCLAs was unique with unique outcomes and would have to be reported as such in order to iii ABSTRACT iv gain an understanding of the factors. Hence, a level of abstraction was needed, which was accomplished by applying the traditional Glaserian grounded theory method to the data collected during the four “preresearch” and the two additional cycles, and from the literature on the topic. The outcome is a perceived costs and rewards (PCR) theory for participation in DCLAs. As participation is crucial for the learning experience of each student as well as his/her team members in an action learning environment, deciding on participation by continually calculating the costs versus rewards became the focal point of the theory. To the best of the author’s knowledge this research study makes a theoretical contribution to the existing body of ICT educational knowledge in the form of a perceived costs and rewards theory for DCLA participation and a practical contribution in that it provides a theory that can be used to explain, understand, interpret and predict participation in DCLAs. This research study provides guidance for future research in both of these areas.
- Full Text:
- Date Issued: 2009
- Authors: Van Niekerk, Johanna Cornelia
- Date: 2009
- Subjects: Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: vital:9764 , http://hdl.handle.net/10948/1103 , Group work in education -- South Africa , Team learning approach in education -- South Africa , Education -- Experimental methods
- Description: The objective of this research study was to obtain a better understanding of the factors that affect lecturer and student participation in distributed collaborative learning assignments (DCLAs). A substantial number of courses worldwide have included DCLAs in their curricula in an attempt to teach students virtual communication and teaming skills, and to allow distributed students to learn course content collaboratively in a virtual environment. The execution and management of these assignments have proven to be more challenging that expected. Several attempts reported on in the literature had to be abandoned when cost exceeded the rewards for both lecturers and students. In a fouryear cyclical action research project carried out at the PETech (Port Elizabeth Technikon, currently part of the Nelson Mandela Metropolitan University, South Africa), ICT students at several of the PETech campuses were required to complete a DCLA in virtual teams. This project also had to be terminated when it was realised that virtual team learning was minimal and the time investment unacceptably high. For the research study reported on in this thesis the data collected during the four “preresearch” cycles and the experiences reported in the literature were analysed. The lessons learnt were applied to a new additional DCLA cycle which formed part of an ICT course, although this execution still showed room for improvement. A second additional cycle was then executed which had a high participation rate and was overwhelmingly labelled by the participating students as a valuable and enjoyable learning experience. Analysis of the factors affecting participation in DCLAs shows that they are numerous and tightly interlinked, and that each factor is able to take on a wide range of values. This complicates descriptive reporting as each of the DCLAs was unique with unique outcomes and would have to be reported as such in order to iii ABSTRACT iv gain an understanding of the factors. Hence, a level of abstraction was needed, which was accomplished by applying the traditional Glaserian grounded theory method to the data collected during the four “preresearch” and the two additional cycles, and from the literature on the topic. The outcome is a perceived costs and rewards (PCR) theory for participation in DCLAs. As participation is crucial for the learning experience of each student as well as his/her team members in an action learning environment, deciding on participation by continually calculating the costs versus rewards became the focal point of the theory. To the best of the author’s knowledge this research study makes a theoretical contribution to the existing body of ICT educational knowledge in the form of a perceived costs and rewards theory for DCLA participation and a practical contribution in that it provides a theory that can be used to explain, understand, interpret and predict participation in DCLAs. This research study provides guidance for future research in both of these areas.
- Full Text:
- Date Issued: 2009
Development of flexible automotive measurement adaptors for the PQ25 VWSA platform
- Authors: Pretorius, Shaun
- Date: 2009
- Subjects: Automobiles -- Measurement , Optical measurements
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9626 , http://hdl.handle.net/10948/1632 , http://hdl.handle.net/10948/d1011725 , Automobiles -- Measurement , Optical measurements
- Description: The following work describes all knowledge required in the creation of new automotive optical Photogrammetrical adaptors, which allow the user thereof to measure a fully assembled vehicle in its natural position, i.e. on its wheels for the PQ25 platform at Volkswagen of South Africa. The system is the only method available to the manufacturing plant to measure a fully assembled vehicle in this manner. The FlexMess system allows for a quick portable measurement of a vehicle at all stages of Vehicle manufacturing, aligned via the Volkswagen RPS standards. In the first part of the work, the problem of establishing a system capable of measuring the PQ25 platform is achieved by redesigning the PQ24 platform (previous generation Polo) to the new PQ25 vehicle platform. Once the system was redesigned a prototype adaptor system was created. In the second part of the work, the redesigned adaptor system is checked for its accuracy and repeatability. In a statistical analysis of the adaptors ability to measure the reference points needed for alignment of a vehicle, the system is compared to a CMM and verified that the limits fall within the limits of the original FlexMesśs certified accuracy limits. The last part of the work looks at addressing some of the problems of the FlexMess system by creating concepts for an ideal future FlexMess adaptor system.
- Full Text:
- Date Issued: 2009
- Authors: Pretorius, Shaun
- Date: 2009
- Subjects: Automobiles -- Measurement , Optical measurements
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9626 , http://hdl.handle.net/10948/1632 , http://hdl.handle.net/10948/d1011725 , Automobiles -- Measurement , Optical measurements
- Description: The following work describes all knowledge required in the creation of new automotive optical Photogrammetrical adaptors, which allow the user thereof to measure a fully assembled vehicle in its natural position, i.e. on its wheels for the PQ25 platform at Volkswagen of South Africa. The system is the only method available to the manufacturing plant to measure a fully assembled vehicle in this manner. The FlexMess system allows for a quick portable measurement of a vehicle at all stages of Vehicle manufacturing, aligned via the Volkswagen RPS standards. In the first part of the work, the problem of establishing a system capable of measuring the PQ25 platform is achieved by redesigning the PQ24 platform (previous generation Polo) to the new PQ25 vehicle platform. Once the system was redesigned a prototype adaptor system was created. In the second part of the work, the redesigned adaptor system is checked for its accuracy and repeatability. In a statistical analysis of the adaptors ability to measure the reference points needed for alignment of a vehicle, the system is compared to a CMM and verified that the limits fall within the limits of the original FlexMesśs certified accuracy limits. The last part of the work looks at addressing some of the problems of the FlexMess system by creating concepts for an ideal future FlexMess adaptor system.
- Full Text:
- Date Issued: 2009