A framework for biometrics for social grants in South Africa
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
- Authors: Van de Haar, Helen Augusta
- Date: 2013
- Subjects: Biometric identification -- Law and legislation -- South Africa , Biometric identification cards -- South Africa , Public welfare -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9829 , http://hdl.handle.net/10948/d1021018
- Description: In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
- Full Text:
- Date Issued: 2013
A framework for co-located collaborative business process modelling using touch technologies
- Authors: Snyman, Irene
- Date: 2013
- Subjects: Reengineering (Management) , Information technology
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10498 , http://hdl.handle.net/10948/d1021015
- Description: In recent years the field of Business Process Modelling (BPM) has gained increasing attention from both the business and research communities. One of the primary drivers for BPM is the improved understanding of Business Processes (BPs) and the competitive advantage gained over competitors. In addition, BPM can improve communication in an organisation and facilitate increased support for change management. BPM is a collaborative activity that needs to be carried out in a team environment, and Collaborative Business Process Modelling (CBPM) promotes improved readability, accuracy and quality of process models as well as a reduced workload for modellers. In spite of the increased popularity of CBPM, there is limited research related to the collaborative nature of the modelling tasks performed by modellers and specifically to the synchronisation of shared process models. In addition, tools and techniques to support CBPM do not support this synchronisation effectively or efficiently. This study proposes a conceptual framework for CBPM using touch technologies in a colocated collaborative environment. The main research problem addressed by this study is that modellers experience difficulties conducting BPM activities in a co-located collaborative environment. In order to address the research problem and clarify and elaborate on the problems of CBPM, a two-fold approach was undertaken. Firstly, after an in-depth literature review, a BPM survey was designed and then sent to modellers in South African Information Technology (IT) consulting companies in order to provide a more in-depth understanding of the status and challenges of CBPM in IT consulting organisations. The results revealed that available BPM software do not adequately cater for CBPM and software tools do not enforce versioning and synchronisation. In addition, hardware constraints were reported as well as problems with integrating different parts of the process model that the modellers were working on. The results of the survey also showed that the positive aspects of CBPM are that ideas could be shared and overall there is a better understanding of the BPs being modelled. The second part of the problem elaboration consisted of usability field studies with participants from both education and industry using a traditional popular BPM software tool, Enterprise Architect (EA). Whilst several benefits of CBPM were confirmed, several challenges were encountered, particularly with regard to the integration and synchronisation of models. To overcome the problems of CBPM, a framework was developed that allows for co-located CBPM using tablet PCs. The framework includes a developed prototype of the BPMTouch software which runs on tablet PCs, as well as some theoretical aspects of CBPM. The BPMTouch software supports effective and efficient CBPM and the synchronisation of process models since it allows multiple modellers to work together on one BP model, with each modeller using his/her own tablet. If one modeller makes changes to the model, the changes are immediately reflected on the tablets of the other modellers since the changes to the model are updated in real time. Modellers cannot draw on the same model simultaneously, however, everyone can see what the active modeller (active participant with the green flag) is doing. Other participants can then become the active modeller and make changes to the model once the flag has been released and re-allocated. The results from the field studies, industry surveys and usability evaluations were all incorporated into the BPMTouch software tool design and into the aspects of CBPM in order to assist with the process of co-located CBPM using touch technologies. Usability evaluations were carried out in which industry and student participants used BPMTouch to create an integrated model and simultaneously and synchronously create a process model. The evaluations of the BPMTouch prototype revealed that participants prefer this system over traditional BPM software since the BPMTouch removes the need for post modelling integration. The theoretical contribution of the framework consists of aspects proposing that organisations should take the potential benefits and challenges of CBPM into consideration and address the Critical Success Factors (CSFs) before embarking on a CBPM project. These aspects can help with decisions relating to CBPM. The use of this framework can improve the quality of process models, reduce the workload of modellers and in this way increase the success rate of CBPM projects.
- Full Text:
- Date Issued: 2013
- Authors: Snyman, Irene
- Date: 2013
- Subjects: Reengineering (Management) , Information technology
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10498 , http://hdl.handle.net/10948/d1021015
- Description: In recent years the field of Business Process Modelling (BPM) has gained increasing attention from both the business and research communities. One of the primary drivers for BPM is the improved understanding of Business Processes (BPs) and the competitive advantage gained over competitors. In addition, BPM can improve communication in an organisation and facilitate increased support for change management. BPM is a collaborative activity that needs to be carried out in a team environment, and Collaborative Business Process Modelling (CBPM) promotes improved readability, accuracy and quality of process models as well as a reduced workload for modellers. In spite of the increased popularity of CBPM, there is limited research related to the collaborative nature of the modelling tasks performed by modellers and specifically to the synchronisation of shared process models. In addition, tools and techniques to support CBPM do not support this synchronisation effectively or efficiently. This study proposes a conceptual framework for CBPM using touch technologies in a colocated collaborative environment. The main research problem addressed by this study is that modellers experience difficulties conducting BPM activities in a co-located collaborative environment. In order to address the research problem and clarify and elaborate on the problems of CBPM, a two-fold approach was undertaken. Firstly, after an in-depth literature review, a BPM survey was designed and then sent to modellers in South African Information Technology (IT) consulting companies in order to provide a more in-depth understanding of the status and challenges of CBPM in IT consulting organisations. The results revealed that available BPM software do not adequately cater for CBPM and software tools do not enforce versioning and synchronisation. In addition, hardware constraints were reported as well as problems with integrating different parts of the process model that the modellers were working on. The results of the survey also showed that the positive aspects of CBPM are that ideas could be shared and overall there is a better understanding of the BPs being modelled. The second part of the problem elaboration consisted of usability field studies with participants from both education and industry using a traditional popular BPM software tool, Enterprise Architect (EA). Whilst several benefits of CBPM were confirmed, several challenges were encountered, particularly with regard to the integration and synchronisation of models. To overcome the problems of CBPM, a framework was developed that allows for co-located CBPM using tablet PCs. The framework includes a developed prototype of the BPMTouch software which runs on tablet PCs, as well as some theoretical aspects of CBPM. The BPMTouch software supports effective and efficient CBPM and the synchronisation of process models since it allows multiple modellers to work together on one BP model, with each modeller using his/her own tablet. If one modeller makes changes to the model, the changes are immediately reflected on the tablets of the other modellers since the changes to the model are updated in real time. Modellers cannot draw on the same model simultaneously, however, everyone can see what the active modeller (active participant with the green flag) is doing. Other participants can then become the active modeller and make changes to the model once the flag has been released and re-allocated. The results from the field studies, industry surveys and usability evaluations were all incorporated into the BPMTouch software tool design and into the aspects of CBPM in order to assist with the process of co-located CBPM using touch technologies. Usability evaluations were carried out in which industry and student participants used BPMTouch to create an integrated model and simultaneously and synchronously create a process model. The evaluations of the BPMTouch prototype revealed that participants prefer this system over traditional BPM software since the BPMTouch removes the need for post modelling integration. The theoretical contribution of the framework consists of aspects proposing that organisations should take the potential benefits and challenges of CBPM into consideration and address the Critical Success Factors (CSFs) before embarking on a CBPM project. These aspects can help with decisions relating to CBPM. The use of this framework can improve the quality of process models, reduce the workload of modellers and in this way increase the success rate of CBPM projects.
- Full Text:
- Date Issued: 2013
A framework for the implementation of social media marketing strategies in political campaigning
- Authors: Ayankoya, Kayode A
- Date: 2013
- Subjects: Online social networks -- Political aspects -- South Africa , Social networks -- South Africa , Campaign management -- South Africa , Branding (Marketing) -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8850 , http://hdl.handle.net/10948/d1020118
- Description: The concept of social media has grown rapidly in the last years. This can be attributed to the rate of adoption and the penetration of social media around the world. Currently, there is an estimate of over two billion people that are actively using social media. The increased usage of social media has changed the way people interact and communicate. Literature suggests that Internet-enabled social networks (relationship between or among individuals and groups) are developing faster than offline relationships. Previous studies have linked social media to the social network theories that define social relationships based on the actors, the ties that exist and the flow of resources among them. This is made possible by social networking sites and other Internet enabled services that allow friends to meet, connect and interact. Social media allow for individuals, groups or organisations to build their social network of friends and followers. It also facilitates the formation of communities with common interest. Social media facilitate the creation and exchange of content such as text messages, images, audio and video formats among individuals or communities that share a common interest or belong to the same social network. Social capital theorists suggest that the ties that exist in social interaction like on social media have the ability to create benefit for the actors in the networks. This provides the foundation to study the benefits that individuals and organisations can obtain from social media. The opportunity to target and communicate directly with the target market and potential customer qualifies social media as a valuable marketing tool and an important component of the integrated marketing communication. As a marketing communication tool, social media introduces a completely new paradigm into marketing communications. Therefore marketing professionals and academics are continuously seeking how to take advantage of social media for different industries. In the field of politics, the use of marketing concepts to engage voters and drive collective participation in political processes has become critical due to stiff competition. The use of social media for political campaigning and engagement could be beneficial, but politicians and political organisations are not taking full advantage of the concept. Previous studies show that organisations are aware of the opportunities that social media could provide for their organisations. However, they are reluctant because they are faced with the problems of lack of information on how to implement social media for business purposes. This treatise investigates the approach and critical success factors for the use of social media for political campaigning and engagement. To evaluate the conceptual framework that was suggested by this study based on the literature review and case studies, an empirical study was conducted among the members of the Democratic Alliance in the Eastern Cape. A survey was conducted among the members of the Democratic Alliance in the Eastern Cape using a questionnaire and 92 responses were received. The questionnaire measured the respondents’ social media usage, level of political engagement, perception on the use of social media for political engagement and the level of political activities on social media. Also, hypotheses were tested to examine the assumption that there might be an association between the respondents’ gender, population group and level of political activities on social media. The findings of this study indicate that a structured approach, a strong emphasis of engaging followers socially and micro-targeting are critical to effective implementation of social media for political campaigning and engagement. Other factors include the direct involvement of leadership, listening and encouragement of user generated contents. This study concludes that political organisations can use social media to establish multi-levelled social networks that provide access to their target audience and also reach potential audience through their friends. This social connectedness can then be translated into political social capital for campaign and engagement purposes.
- Full Text:
- Date Issued: 2013
- Authors: Ayankoya, Kayode A
- Date: 2013
- Subjects: Online social networks -- Political aspects -- South Africa , Social networks -- South Africa , Campaign management -- South Africa , Branding (Marketing) -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8850 , http://hdl.handle.net/10948/d1020118
- Description: The concept of social media has grown rapidly in the last years. This can be attributed to the rate of adoption and the penetration of social media around the world. Currently, there is an estimate of over two billion people that are actively using social media. The increased usage of social media has changed the way people interact and communicate. Literature suggests that Internet-enabled social networks (relationship between or among individuals and groups) are developing faster than offline relationships. Previous studies have linked social media to the social network theories that define social relationships based on the actors, the ties that exist and the flow of resources among them. This is made possible by social networking sites and other Internet enabled services that allow friends to meet, connect and interact. Social media allow for individuals, groups or organisations to build their social network of friends and followers. It also facilitates the formation of communities with common interest. Social media facilitate the creation and exchange of content such as text messages, images, audio and video formats among individuals or communities that share a common interest or belong to the same social network. Social capital theorists suggest that the ties that exist in social interaction like on social media have the ability to create benefit for the actors in the networks. This provides the foundation to study the benefits that individuals and organisations can obtain from social media. The opportunity to target and communicate directly with the target market and potential customer qualifies social media as a valuable marketing tool and an important component of the integrated marketing communication. As a marketing communication tool, social media introduces a completely new paradigm into marketing communications. Therefore marketing professionals and academics are continuously seeking how to take advantage of social media for different industries. In the field of politics, the use of marketing concepts to engage voters and drive collective participation in political processes has become critical due to stiff competition. The use of social media for political campaigning and engagement could be beneficial, but politicians and political organisations are not taking full advantage of the concept. Previous studies show that organisations are aware of the opportunities that social media could provide for their organisations. However, they are reluctant because they are faced with the problems of lack of information on how to implement social media for business purposes. This treatise investigates the approach and critical success factors for the use of social media for political campaigning and engagement. To evaluate the conceptual framework that was suggested by this study based on the literature review and case studies, an empirical study was conducted among the members of the Democratic Alliance in the Eastern Cape. A survey was conducted among the members of the Democratic Alliance in the Eastern Cape using a questionnaire and 92 responses were received. The questionnaire measured the respondents’ social media usage, level of political engagement, perception on the use of social media for political engagement and the level of political activities on social media. Also, hypotheses were tested to examine the assumption that there might be an association between the respondents’ gender, population group and level of political activities on social media. The findings of this study indicate that a structured approach, a strong emphasis of engaging followers socially and micro-targeting are critical to effective implementation of social media for political campaigning and engagement. Other factors include the direct involvement of leadership, listening and encouragement of user generated contents. This study concludes that political organisations can use social media to establish multi-levelled social networks that provide access to their target audience and also reach potential audience through their friends. This social connectedness can then be translated into political social capital for campaign and engagement purposes.
- Full Text:
- Date Issued: 2013
A framework to mitigate phishing threats
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
- Authors: Frauenstein, Edwin Donald
- Date: 2013
- Subjects: Computer networks -- Security measures , Mobile computing -- Security measures , Online social networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9832 , http://hdl.handle.net/10948/d1021208
- Description: We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
- Full Text:
- Date Issued: 2013
A high-level architecture for efficient packet trace analysis on gpu co-processors
- Nottingham, Alastair, Irwin, Barry V W
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429572 , vital:72623 , 10.1109/ISSA.2013.6641052
- Description: This paper proposes a high-level architecture to support efficient, massively parallel packet classification, filtering and analysis using commodity Graphics Processing Unit (GPU) hardware. The proposed architecture aims to provide a flexible and efficient parallel packet processing and analysis framework, supporting complex programmable filtering, data mining operations, statistical analysis functions and traffic visualisation, with minimal CPU overhead. In particular, this framework aims to provide a robust set of high-speed analysis functionality, in order to dramatically reduce the time required to process and analyse extremely large network traces. This architecture derives from initial research, which has shown GPU co-processors to be effective in accelerating packet classification to up to tera-bit speeds with minimal CPU overhead, far exceeding the bandwidth capacity between standard long term storage and the GPU device. This paper provides a high-level overview of the proposed architecture and its primary components, motivated by the results of prior research in the field.
- Full Text:
- Date Issued: 2013
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429572 , vital:72623 , 10.1109/ISSA.2013.6641052
- Description: This paper proposes a high-level architecture to support efficient, massively parallel packet classification, filtering and analysis using commodity Graphics Processing Unit (GPU) hardware. The proposed architecture aims to provide a flexible and efficient parallel packet processing and analysis framework, supporting complex programmable filtering, data mining operations, statistical analysis functions and traffic visualisation, with minimal CPU overhead. In particular, this framework aims to provide a robust set of high-speed analysis functionality, in order to dramatically reduce the time required to process and analyse extremely large network traces. This architecture derives from initial research, which has shown GPU co-processors to be effective in accelerating packet classification to up to tera-bit speeds with minimal CPU overhead, far exceeding the bandwidth capacity between standard long term storage and the GPU device. This paper provides a high-level overview of the proposed architecture and its primary components, motivated by the results of prior research in the field.
- Full Text:
- Date Issued: 2013
A history of the German settlers in the Eastern Cape, 1857-1919
- Authors: Zipp, Gisela Lesley
- Date: 2013
- Subjects: Colonists -- Eastern Cape -- 19th Century Immigrants -- Germany -- History Immigrants -- Germany -- Social life and customs
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3609 , http://hdl.handle.net/10962/d1004215
- Description: This thesis came into being as the result of a question innocently posed to me three years ago: Why do some towns in the Eastern Cape have German names? This thesis is not so much an answer to that question (which is answered in the following paragraphs) as an attempt to answer the questions that followed: Were the Germans really as benevolent and hard-working as much of the most readily available literature implies? Why did the military settlers leave and the peasant farmer settlers remain? What was the nature of relationships between the German settlers and other groups in the area? How did the German settlers see themselves? The existing literature provides the historic details, more or less, but not the context and explanations I sought. As such, I set out to find them and document them myself, addressing three main questions: 1. What was the (changing) nature of the German settlers' day-to-day lives between 1857 and 1919? 2. How was a German identity maintained/constructed within the German communities of the Eastern Cape between 1857 and 1919? 3. How did the Germans interact with other groups in the area? In answering these questions, I have also provided the necessary background as to why these settlers chose to come to South Africa, and why some of them left. I have limited this study to the period between 1857 and 1919 so as to include the First World War and its immediate aftermath, a time when enmity between Great Britain and Germany would have made life difficult for German descendants in the Union of South Africa. Introduction, p. 7.
- Full Text:
- Date Issued: 2013
- Authors: Zipp, Gisela Lesley
- Date: 2013
- Subjects: Colonists -- Eastern Cape -- 19th Century Immigrants -- Germany -- History Immigrants -- Germany -- Social life and customs
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3609 , http://hdl.handle.net/10962/d1004215
- Description: This thesis came into being as the result of a question innocently posed to me three years ago: Why do some towns in the Eastern Cape have German names? This thesis is not so much an answer to that question (which is answered in the following paragraphs) as an attempt to answer the questions that followed: Were the Germans really as benevolent and hard-working as much of the most readily available literature implies? Why did the military settlers leave and the peasant farmer settlers remain? What was the nature of relationships between the German settlers and other groups in the area? How did the German settlers see themselves? The existing literature provides the historic details, more or less, but not the context and explanations I sought. As such, I set out to find them and document them myself, addressing three main questions: 1. What was the (changing) nature of the German settlers' day-to-day lives between 1857 and 1919? 2. How was a German identity maintained/constructed within the German communities of the Eastern Cape between 1857 and 1919? 3. How did the Germans interact with other groups in the area? In answering these questions, I have also provided the necessary background as to why these settlers chose to come to South Africa, and why some of them left. I have limited this study to the period between 1857 and 1919 so as to include the First World War and its immediate aftermath, a time when enmity between Great Britain and Germany would have made life difficult for German descendants in the Union of South Africa. Introduction, p. 7.
- Full Text:
- Date Issued: 2013
A kernel-driven framework for high performance internet routing simulation
- Herbert, Alan, Irwin, Barry V W
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429585 , vital:72624 , 10.1109/ISSA.2013.6641048
- Description: The ability to provide the simulation of packets traversing an internet path is an integral part of providing realistic simulations for network training, and cyber defence exercises. This paper builds on previous work, and considers an in-kernel approach to solving the routing simulation problem. The inkernel approach is anticipated to allow the framework to be able to achieve throughput rates of 1GB/s or higher using commodity hardware. Processes that run outside the context of the kernel of most operating system require context switching to access hardware and kernel modules. This leads to considerable delays in the processes, such as network simulators, that frequently access hardware such as hard disk accesses and network packet handling. To mitigate this problem, as experienced with earlier implementations, this research looks towards implementing a kernel module to handle network routing and simulation within a UNIX based system. This would remove delays incurred from context switching and allows for direct access to the hardware components of the host.
- Full Text:
- Date Issued: 2013
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429585 , vital:72624 , 10.1109/ISSA.2013.6641048
- Description: The ability to provide the simulation of packets traversing an internet path is an integral part of providing realistic simulations for network training, and cyber defence exercises. This paper builds on previous work, and considers an in-kernel approach to solving the routing simulation problem. The inkernel approach is anticipated to allow the framework to be able to achieve throughput rates of 1GB/s or higher using commodity hardware. Processes that run outside the context of the kernel of most operating system require context switching to access hardware and kernel modules. This leads to considerable delays in the processes, such as network simulators, that frequently access hardware such as hard disk accesses and network packet handling. To mitigate this problem, as experienced with earlier implementations, this research looks towards implementing a kernel module to handle network routing and simulation within a UNIX based system. This would remove delays incurred from context switching and allows for direct access to the hardware components of the host.
- Full Text:
- Date Issued: 2013
A marine chemical ecology study of the sea hare, Bursatella leachii in South Africa
- Authors: D'Souza, Nicole
- Date: 2013 , 2013-03-22
- Subjects: Sea hares (Mollusks) -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Ecology -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Behavior -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Defenses -- Behavior -- South Africa -- Kenton-on-Sea
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4283 , http://hdl.handle.net/10962/d1002952 , Sea hares (Mollusks) -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Ecology -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Behavior -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Defenses -- Behavior -- South Africa -- Kenton-on-Sea
- Description: The large cosmopolitan sea hare Bursatella leachii is a common resident in Eastern Cape river mouths during summer and late autumn where they congregate in beds of Zostera capensis to breed. In this thesis, the previously known toxic formamide marine secondary metabolite (-)-bursatellin (2.2), which may deter predators of South African specimens of the globally distributed sea hare Bursatella leachii, was isolated and identified (Chapter 2). There have been no previous chemical ecology studies of B. leachii and the latter half of this thesis is devoted to chemical ecology studies of this organism. Interestingly, the isolation of the (-)-diastereomer of 2.2 from specimens of B. leachii collected from the Kariega River mouth (near Kenton-on-Sea) suggests that the South African specimens of this species are similar to specimens collected from Puerto Rico and from the Mediterranean Sea. Two different chromatographic techniques for isolating 2.2 were compared in order to maximize the amount of 2.2 isolated from the Kariega River mouth sea hares. The doubling of selected resonances observed in both the ¹H and ¹³C NMR spectra of the bursatellin isolated in this study suggest one of three possibilities; either firstly, the presence of closely related compound(s), secondly, the presence of diastereomers or thirdly the presence of rotamers. Through NMR kinetic studies, we were able to establish that the presence of rotamers was very unlikely due to no change in the relative ratio (3:1) of the ¹H NMR signals with an increase in temperature. Although the attempted synthesis of the acetate derivative (2.28), as a means of separating a diastereomeric mixture was successful, the chromatographic separation of the proposed acetylated diastereomers was not successful. Preparation of the camphanate ester derivatives (e.g. 2.30) proved to be unsuccessful. Five B. leachii specimens were dissected, their organs separated and individually extracted with methanol. The methanol extracts were individually chromatographed on HP-20 media, and the distribution of bursatellin determined by isolation and NMR. It was evident from this investigation that the distribution of 2.2 within individual B. leachii specimens was found to be highest within the B. leachii ink gland. The lower amounts of 2.2 contained in the digestive system, relative to other organs, was hypothesized to occur because 2.2 is sequestered from the diet of the sea hare and efficiently moved from the gut to various organs around the body where it is stored. The absence of 2.2 from the skin was surprising and may be a result of a smaller mass of skin relative to other organs coupled with the limitations of the chromatographic separation techniques employed. Surprisingly, no bursatellin was found within juvenile sea hares. Chapter three discusses the isolation of ilimaquinone (3.1) and pelorol (3.19) from the sponge Hippospongia metachroma and the structure elucidation of each compound using computer modeling to illustrate the conformation. It was deemed necessary to isolate these well known and abundant bioactive marine natural products from a sponge as standard compounds in the bioassays given the paucity of 2.2 available for this study. Chapter four describes the assays used to test the biological activity of the bursatellin 2.2 compared to the generally bioactive ilimaquinone and the structurally related and commercially available broad spectrum antibiotic chloramphenicol. B. leachii, a shell-less marine mollusc inhabits a variety of intertidal habitats and, therefore, is exposed to several different predators, yet does not appear to have any specific predators. Potential predators of this sea hare in the Kariega Estuary could be fish and amphipods which are found in close proximity to these sea hares. Results of the assays showed that at roughly natural concentrations, (calculated from the isolated chromatographic yield) feeding was deterred by the fish and amphipods, which implied that 2.2 may confer a defensive role within the organism. The relatively high concentration present within the ink gland of B. leachii may support this hypothesis. Surprisingly, given its structural similarity to chloramphenicol, 2.3 did not show any antimicrobial action against five of the six bacterial strains against which it was screened [chloramphenicol inhibited the growth of all the bacterial strains at very low concentrations (0.25 mg/mL)]. Bursatellin was found to be only active against Staphylococus aureus at high concentrations ca. 2 mg/mL when compared to chloramphenicol. Neither bursatellin nor chloramphenicol showed anti-fungal activity. Although this study suggests that the sea hares may use chemical defences in addition to opaline ink to defend themselves, they also live within the seagrass Z. capensis, which possibly provides the sea hare with a cryptic form of physical defence against several predators that are unable to swim freely within the weed beds in the littoral zone of the estuary. , Adobe Acrobat 9.53 Paper Capture Plug-in
- Full Text:
- Date Issued: 2013
- Authors: D'Souza, Nicole
- Date: 2013 , 2013-03-22
- Subjects: Sea hares (Mollusks) -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Ecology -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Behavior -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Defenses -- Behavior -- South Africa -- Kenton-on-Sea
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4283 , http://hdl.handle.net/10962/d1002952 , Sea hares (Mollusks) -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Ecology -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Behavior -- South Africa -- Kenton-on-Sea , Sea hares (Mollusks) -- Defenses -- Behavior -- South Africa -- Kenton-on-Sea
- Description: The large cosmopolitan sea hare Bursatella leachii is a common resident in Eastern Cape river mouths during summer and late autumn where they congregate in beds of Zostera capensis to breed. In this thesis, the previously known toxic formamide marine secondary metabolite (-)-bursatellin (2.2), which may deter predators of South African specimens of the globally distributed sea hare Bursatella leachii, was isolated and identified (Chapter 2). There have been no previous chemical ecology studies of B. leachii and the latter half of this thesis is devoted to chemical ecology studies of this organism. Interestingly, the isolation of the (-)-diastereomer of 2.2 from specimens of B. leachii collected from the Kariega River mouth (near Kenton-on-Sea) suggests that the South African specimens of this species are similar to specimens collected from Puerto Rico and from the Mediterranean Sea. Two different chromatographic techniques for isolating 2.2 were compared in order to maximize the amount of 2.2 isolated from the Kariega River mouth sea hares. The doubling of selected resonances observed in both the ¹H and ¹³C NMR spectra of the bursatellin isolated in this study suggest one of three possibilities; either firstly, the presence of closely related compound(s), secondly, the presence of diastereomers or thirdly the presence of rotamers. Through NMR kinetic studies, we were able to establish that the presence of rotamers was very unlikely due to no change in the relative ratio (3:1) of the ¹H NMR signals with an increase in temperature. Although the attempted synthesis of the acetate derivative (2.28), as a means of separating a diastereomeric mixture was successful, the chromatographic separation of the proposed acetylated diastereomers was not successful. Preparation of the camphanate ester derivatives (e.g. 2.30) proved to be unsuccessful. Five B. leachii specimens were dissected, their organs separated and individually extracted with methanol. The methanol extracts were individually chromatographed on HP-20 media, and the distribution of bursatellin determined by isolation and NMR. It was evident from this investigation that the distribution of 2.2 within individual B. leachii specimens was found to be highest within the B. leachii ink gland. The lower amounts of 2.2 contained in the digestive system, relative to other organs, was hypothesized to occur because 2.2 is sequestered from the diet of the sea hare and efficiently moved from the gut to various organs around the body where it is stored. The absence of 2.2 from the skin was surprising and may be a result of a smaller mass of skin relative to other organs coupled with the limitations of the chromatographic separation techniques employed. Surprisingly, no bursatellin was found within juvenile sea hares. Chapter three discusses the isolation of ilimaquinone (3.1) and pelorol (3.19) from the sponge Hippospongia metachroma and the structure elucidation of each compound using computer modeling to illustrate the conformation. It was deemed necessary to isolate these well known and abundant bioactive marine natural products from a sponge as standard compounds in the bioassays given the paucity of 2.2 available for this study. Chapter four describes the assays used to test the biological activity of the bursatellin 2.2 compared to the generally bioactive ilimaquinone and the structurally related and commercially available broad spectrum antibiotic chloramphenicol. B. leachii, a shell-less marine mollusc inhabits a variety of intertidal habitats and, therefore, is exposed to several different predators, yet does not appear to have any specific predators. Potential predators of this sea hare in the Kariega Estuary could be fish and amphipods which are found in close proximity to these sea hares. Results of the assays showed that at roughly natural concentrations, (calculated from the isolated chromatographic yield) feeding was deterred by the fish and amphipods, which implied that 2.2 may confer a defensive role within the organism. The relatively high concentration present within the ink gland of B. leachii may support this hypothesis. Surprisingly, given its structural similarity to chloramphenicol, 2.3 did not show any antimicrobial action against five of the six bacterial strains against which it was screened [chloramphenicol inhibited the growth of all the bacterial strains at very low concentrations (0.25 mg/mL)]. Bursatellin was found to be only active against Staphylococus aureus at high concentrations ca. 2 mg/mL when compared to chloramphenicol. Neither bursatellin nor chloramphenicol showed anti-fungal activity. Although this study suggests that the sea hares may use chemical defences in addition to opaline ink to defend themselves, they also live within the seagrass Z. capensis, which possibly provides the sea hare with a cryptic form of physical defence against several predators that are unable to swim freely within the weed beds in the littoral zone of the estuary. , Adobe Acrobat 9.53 Paper Capture Plug-in
- Full Text:
- Date Issued: 2013
A mathematical investigation of the effects of sexual orientation and HIV status on HPV transmission and vaccination
- Authors: Holtzhausen, Tresia Louisa
- Date: 2013
- Subjects: Virus diseases -- Mathematical models , Cervix uteri -- Cancer -- Treatment , Sexual orientation , Immune response -- Mathematical models
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/3946 , vital:20494
- Description: The effect of the inclusion of sexual behaviour, particularly three sexual orientation classes, on the transmission dynamics of HPV and cervical cancer incidence was investigated. A comprehensive literature review of mathematical models of HPV transmission and the natural history of cervical cancer was concluded. A mathematical model using ordinary differential equations was developed, which incorporated the three sexual orientation classes, and a sexual mixing algorithm for modelling the transmission dynamics. Reproduction numbers, determined through a simplified version of the developed model, indicated that the bisexual population could form a bridge between the heterosexual and homosexual population. The level of interaction is determined by the selection preferences of a bisexual individual to form a partnership with an individual of the same or opposite sex. The model was simulated, with parameters based on a South African population and HPV type 16/18, to investigate the effects of HIV status, sexual orientation and various vaccination strategies on HPV transmission and cervical cancer incidence. The results indicated that HIV status is a significant factor when determining cervical cancer incidence. The results regarding vaccination strategies agreed with results from the literature review with a two sex before sexual debut and catch up program the most effective, noting that with increased vaccination coverage of females the marginal impact on cervical cancer incidence of this approach diminished.
- Full Text:
- Date Issued: 2013
- Authors: Holtzhausen, Tresia Louisa
- Date: 2013
- Subjects: Virus diseases -- Mathematical models , Cervix uteri -- Cancer -- Treatment , Sexual orientation , Immune response -- Mathematical models
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/3946 , vital:20494
- Description: The effect of the inclusion of sexual behaviour, particularly three sexual orientation classes, on the transmission dynamics of HPV and cervical cancer incidence was investigated. A comprehensive literature review of mathematical models of HPV transmission and the natural history of cervical cancer was concluded. A mathematical model using ordinary differential equations was developed, which incorporated the three sexual orientation classes, and a sexual mixing algorithm for modelling the transmission dynamics. Reproduction numbers, determined through a simplified version of the developed model, indicated that the bisexual population could form a bridge between the heterosexual and homosexual population. The level of interaction is determined by the selection preferences of a bisexual individual to form a partnership with an individual of the same or opposite sex. The model was simulated, with parameters based on a South African population and HPV type 16/18, to investigate the effects of HIV status, sexual orientation and various vaccination strategies on HPV transmission and cervical cancer incidence. The results indicated that HIV status is a significant factor when determining cervical cancer incidence. The results regarding vaccination strategies agreed with results from the literature review with a two sex before sexual debut and catch up program the most effective, noting that with increased vaccination coverage of females the marginal impact on cervical cancer incidence of this approach diminished.
- Full Text:
- Date Issued: 2013
A maturing manifesto: the constitutionalisation of children’s rights in South African jurisprudence 2007-2012
- Sloth-Nielsen, Julia, Kruuse, Helen
- Authors: Sloth-Nielsen, Julia , Kruuse, Helen
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68972 , vital:29344 , http://dx.doi.org/10.1163/15718182-02102005
- Description: Pre-print , This article represents the next in a series of five-year overviews of children’s rights in the courts in South Africa. Using the Convention on the Rights of the Child and the African Charter on the Welfare of Children as a point of departure, the study suggests that it is in the public sphere that children’s rights have had their most impact in the period under review. The article highlights eight areas of distinction in this five-year period: these include judicial approval of resource mobilisation for the fulfilment of children’s rights, emphasis on the quality of and standards in education; the development of innovative remedies to deal with unreasonable state measures affecting children, and an increasing focus on the right to dignity of the child. The authors conclude that the scope of the cases cited points to the growing insertion of children’s rights considerations in increasingly diverse areas of legal interaction. Furthermore, the authors posit that the CRC and ACRWC – together with non-binding sources of international law – have substantively informed and enriched the jurisprudence of South African courts.
- Full Text:
- Date Issued: 2013
- Authors: Sloth-Nielsen, Julia , Kruuse, Helen
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68972 , vital:29344 , http://dx.doi.org/10.1163/15718182-02102005
- Description: Pre-print , This article represents the next in a series of five-year overviews of children’s rights in the courts in South Africa. Using the Convention on the Rights of the Child and the African Charter on the Welfare of Children as a point of departure, the study suggests that it is in the public sphere that children’s rights have had their most impact in the period under review. The article highlights eight areas of distinction in this five-year period: these include judicial approval of resource mobilisation for the fulfilment of children’s rights, emphasis on the quality of and standards in education; the development of innovative remedies to deal with unreasonable state measures affecting children, and an increasing focus on the right to dignity of the child. The authors conclude that the scope of the cases cited points to the growing insertion of children’s rights considerations in increasingly diverse areas of legal interaction. Furthermore, the authors posit that the CRC and ACRWC – together with non-binding sources of international law – have substantively informed and enriched the jurisprudence of South African courts.
- Full Text:
- Date Issued: 2013
A mentoring strategy for learnerships
- Authors: Hansen, Janine
- Date: 2013
- Subjects: Mentoring in business , Experiential learning , Soft skills
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9389 , http://hdl.handle.net/10948/d1019892
- Description: Mentoring is a powerful developmental tool that can be utilised in organisations to enable learnerships to learn various skills – hard and soft – that will enable them to become more equipped for the workplace. The hard skills refer to technical competencies, e.g. computer literacy, and soft skills refer to competencies such as interpersonal skills, communication skills, work etiquette, etc. Mentoring is no quick fix to filling all the gaps within a learnership, but it can add significant value to have a formal mentoring strategy within organisations to transfer much needed skills and competencies. The literature on mentoring provides many examples of possible strategies, and in this research project, the competencies of both mentor and mentee were highlighted, together with the advantages, disadvantages, myths and challenges in formal mentoring strategies. The process of developing a mentoring strategy is not complex, but requires support and involvement from various stakeholders to ensure the sustained success of a mentoring strategy. The different models of mentoring strategies in the literature review provided a framework for the researcher to develop a mentoring strategy that was tested through the completion of questionnaires sent to organisations that employ learnerships. The research study rated the responses of the respondents on the suggested model and various steps to be followed in the process. The research study concluded with a formal mentoring strategy or model that can be used within organisations that employ learnerships.
- Full Text:
- Date Issued: 2013
- Authors: Hansen, Janine
- Date: 2013
- Subjects: Mentoring in business , Experiential learning , Soft skills
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9389 , http://hdl.handle.net/10948/d1019892
- Description: Mentoring is a powerful developmental tool that can be utilised in organisations to enable learnerships to learn various skills – hard and soft – that will enable them to become more equipped for the workplace. The hard skills refer to technical competencies, e.g. computer literacy, and soft skills refer to competencies such as interpersonal skills, communication skills, work etiquette, etc. Mentoring is no quick fix to filling all the gaps within a learnership, but it can add significant value to have a formal mentoring strategy within organisations to transfer much needed skills and competencies. The literature on mentoring provides many examples of possible strategies, and in this research project, the competencies of both mentor and mentee were highlighted, together with the advantages, disadvantages, myths and challenges in formal mentoring strategies. The process of developing a mentoring strategy is not complex, but requires support and involvement from various stakeholders to ensure the sustained success of a mentoring strategy. The different models of mentoring strategies in the literature review provided a framework for the researcher to develop a mentoring strategy that was tested through the completion of questionnaires sent to organisations that employ learnerships. The research study rated the responses of the respondents on the suggested model and various steps to be followed in the process. The research study concluded with a formal mentoring strategy or model that can be used within organisations that employ learnerships.
- Full Text:
- Date Issued: 2013
A mobile toolkit and customised location server for the creation of cross-referencing location-based services
- Ndakunda, Shange-Ishiwa Tangeni
- Authors: Ndakunda, Shange-Ishiwa Tangeni
- Date: 2013
- Subjects: Location-based services -- Security measures , Mobile communication systems -- Security measures , Digital communications , Java (Computer program language) , Application software -- Development -- Computer programs , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4703 , http://hdl.handle.net/10962/d1013604
- Description: Although there are several Software Development kits and Application Programming Interfaces for client-side location-based services development, they mostly involve the creation of self-referencing location-based services. Self-referencing location-based services include services such as geocoding, reverse geocoding, route management and navigation which focus on satisfying the location-based requirements of a single mobile device. There is a lack of open-source Software Development Kits for the development of client-side location-based services that are cross-referencing. Cross-referencing location-based services are designed for the sharing of location information amongst different entities on a given network. This project was undertaken to assemble, through incremental prototyping, a client-side Java Micro Edition location-based services Software Development Kit and a Mobicents location server to aid mobile network operators and developers alike in the quick creation of the transport and privacy protection of cross-referencing location-based applications on Session Initiation Protocol bearer networks. The privacy of the location information is protected using geolocation policies. Developers do not need to have an understanding of Session Initiation Protocol event signaling specifications or of the XML Configuration Access Protocol to use the tools that we put together. The developed tools are later consolidated using two sample applications, the friend-finder and child-tracker services. Developer guidelines are also provided, to aid in using the provided tools.
- Full Text:
- Date Issued: 2013
- Authors: Ndakunda, Shange-Ishiwa Tangeni
- Date: 2013
- Subjects: Location-based services -- Security measures , Mobile communication systems -- Security measures , Digital communications , Java (Computer program language) , Application software -- Development -- Computer programs , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4703 , http://hdl.handle.net/10962/d1013604
- Description: Although there are several Software Development kits and Application Programming Interfaces for client-side location-based services development, they mostly involve the creation of self-referencing location-based services. Self-referencing location-based services include services such as geocoding, reverse geocoding, route management and navigation which focus on satisfying the location-based requirements of a single mobile device. There is a lack of open-source Software Development Kits for the development of client-side location-based services that are cross-referencing. Cross-referencing location-based services are designed for the sharing of location information amongst different entities on a given network. This project was undertaken to assemble, through incremental prototyping, a client-side Java Micro Edition location-based services Software Development Kit and a Mobicents location server to aid mobile network operators and developers alike in the quick creation of the transport and privacy protection of cross-referencing location-based applications on Session Initiation Protocol bearer networks. The privacy of the location information is protected using geolocation policies. Developers do not need to have an understanding of Session Initiation Protocol event signaling specifications or of the XML Configuration Access Protocol to use the tools that we put together. The developed tools are later consolidated using two sample applications, the friend-finder and child-tracker services. Developer guidelines are also provided, to aid in using the provided tools.
- Full Text:
- Date Issued: 2013
A model for enhancing employee engagement in private emergency medical doctors
- Authors: Leeching, Jonray Kevin
- Date: 2013
- Subjects: Medical economics -- South Africa Employee health promotion , Emergency medicine Medical care -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47925 , vital:40453
- Description: Since the beginning of the millennium there has been a drive by organisations to achieve more with fewer resources. This has been heightened further by the global financial recession which has both direct and indirect effects on South Africa. Employee engagement has now become a critical business issue as the economic landscape becomes increasingly turbulent and organisations need coherent strategies to maintain their competitive advantages. Employee engagement is a business management concept that is particularly relevant to organisations that leverage off human capital and involves the maximising of individual commitment to and satisfaction with work. When the current healthcare environment is taken into consideration, with its dire shortage of medical doctors, a human resources scheme that has employee engagement at its heart must be considered an imperative by medical organisations. Upon embarking on the research into the topic it became evident that there was a scarcity of investigations into employee engagement as it applied to physicians. The purpose of this treatise, then, is to examine the key drivers of employee engagement in emergency medicine doctors and develop an engagement model that can be used by organisations to enhance this positive psychological state for their good, the good of the medical doctor and, in due course, for their patients. In order to achieve this goal a thorough literature review was performed which drew on both academic and practitioner sources of information into the concepts of employee, knowledge worker and physician engagement. This led to the development of a hypothesised model which was tested using rigorous measures incorporating questionnaire-style, quantitative data collection and statistical analysis. The results of the research show that communication; work-life; company alignment; growth and development; recognition and reward; management support; autonomy; and mission and purpose are all closely associated with the construct of employee engagement. Work-life and company alignment, in particular, were shown to have direct positive associations with the concept and are postulated to be key areas for emergency medical organisations to focus their attentions in the quest for engaged and motivated doctors. Ultimately, employee engagement is shown to be valuable, measurable and actionable. The devised model for employee engagement in emergency medical doctors can be utilised in the harnessing of physicians hearts and minds to the work that they love doing and the organisations that they love doing it for. This is a win-win result for all of the important stakeholders of healthcare in South Africa.
- Full Text:
- Date Issued: 2013
- Authors: Leeching, Jonray Kevin
- Date: 2013
- Subjects: Medical economics -- South Africa Employee health promotion , Emergency medicine Medical care -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47925 , vital:40453
- Description: Since the beginning of the millennium there has been a drive by organisations to achieve more with fewer resources. This has been heightened further by the global financial recession which has both direct and indirect effects on South Africa. Employee engagement has now become a critical business issue as the economic landscape becomes increasingly turbulent and organisations need coherent strategies to maintain their competitive advantages. Employee engagement is a business management concept that is particularly relevant to organisations that leverage off human capital and involves the maximising of individual commitment to and satisfaction with work. When the current healthcare environment is taken into consideration, with its dire shortage of medical doctors, a human resources scheme that has employee engagement at its heart must be considered an imperative by medical organisations. Upon embarking on the research into the topic it became evident that there was a scarcity of investigations into employee engagement as it applied to physicians. The purpose of this treatise, then, is to examine the key drivers of employee engagement in emergency medicine doctors and develop an engagement model that can be used by organisations to enhance this positive psychological state for their good, the good of the medical doctor and, in due course, for their patients. In order to achieve this goal a thorough literature review was performed which drew on both academic and practitioner sources of information into the concepts of employee, knowledge worker and physician engagement. This led to the development of a hypothesised model which was tested using rigorous measures incorporating questionnaire-style, quantitative data collection and statistical analysis. The results of the research show that communication; work-life; company alignment; growth and development; recognition and reward; management support; autonomy; and mission and purpose are all closely associated with the construct of employee engagement. Work-life and company alignment, in particular, were shown to have direct positive associations with the concept and are postulated to be key areas for emergency medical organisations to focus their attentions in the quest for engaged and motivated doctors. Ultimately, employee engagement is shown to be valuable, measurable and actionable. The devised model for employee engagement in emergency medical doctors can be utilised in the harnessing of physicians hearts and minds to the work that they love doing and the organisations that they love doing it for. This is a win-win result for all of the important stakeholders of healthcare in South Africa.
- Full Text:
- Date Issued: 2013
A model for managing user experience
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
- Authors: Mashapa, Job
- Date: 2013
- Subjects: Technological innovations -- Management , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9826 , http://hdl.handle.net/10948/d1020765
- Description: New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
- Full Text:
- Date Issued: 2013
A model for supporting environmental awereness in higher education using social media
- Authors: Tlebere, Thabo Eugene
- Date: 2013
- Subjects: Social media , Environmental education , Universities and colleges
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10496 , http://hdl.handle.net/10948/d1020820
- Description: University sustainability is a field of research that has been gaining increased interest in recent years. The reduction of environmental impact has become a strategic objective of universities globally. Universities have been prompted to take necessary action to ensure that their environmental impact is at a minimum. The environmental component of sustainability deals with the current conservation of the earth’s natural resources so that future generations can also have access to them. Human beings, due to their increasing needs, are accountable for the exploitation of natural resources. They are regarded as the main contributors to imbalances in the natural systems. Environmental concerns such as global warming, deforestations, disposal of wastes, and ozone reduction are the outcomes of the damage caused by humans on the environment. The aim of environmental education is to acquire remediation of the environment by making individuals aware of the environment and by educating them about how to live a more sustainable lifestyle. Environmental awareness is perceived as knowledge of the factors that affect the environment and having sensitivity towards the environment. Higher Education Institutions (HEIs) bear the responsibility of educating individuals about environmental issues since they provide education to future leaders in society who may have an influence on future conditions in the environment. Social media are capable of delivering information to a large spectrum of audiences at a low cost. The Pew Internet American Life Project reported that the number of adults who utilise social media has increased by 57 percent from 2005 to 2011. Several environmental activist organisations utilise social media to carry out environmental awareness campaigns. In this study two environmental awareness campaigns which were powered by social media were conducted to improve environmental awareness of individuals in a higher education environment. A Social media Model for ENvironmental Awareness (SMENA) was developed to facilitate the environmental awareness campaigns. The SMENA includes a website, social media as well as theoretical guidelines for creating environmental awareness campaigns, and for using social media for environmental awareness campaigns. A case study at the Nelson Mandela Metropolitan University (NMMU) was used to empirically evaluate SMENA. Students at the Department of Computer Sciences of NMMU were exposed to information about environmental issues through social media with the intention of improving their environmental knowledge and awareness. The SMENA website usability was rated positively and students enjoyed the blogs and information distributed by means of social media. The results of the study intervention were positive and showed that social media can be used to improve the environmental knowledge of students. This study provides a valuable contribution to both the field of environmental education and social media usage and acceptance. The guidelines and requirements for using social media to improve environmental awareness provided in this study can be used to assist educators and university management with addressing the problems of reducing environmental impact.
- Full Text:
- Date Issued: 2013
- Authors: Tlebere, Thabo Eugene
- Date: 2013
- Subjects: Social media , Environmental education , Universities and colleges
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10496 , http://hdl.handle.net/10948/d1020820
- Description: University sustainability is a field of research that has been gaining increased interest in recent years. The reduction of environmental impact has become a strategic objective of universities globally. Universities have been prompted to take necessary action to ensure that their environmental impact is at a minimum. The environmental component of sustainability deals with the current conservation of the earth’s natural resources so that future generations can also have access to them. Human beings, due to their increasing needs, are accountable for the exploitation of natural resources. They are regarded as the main contributors to imbalances in the natural systems. Environmental concerns such as global warming, deforestations, disposal of wastes, and ozone reduction are the outcomes of the damage caused by humans on the environment. The aim of environmental education is to acquire remediation of the environment by making individuals aware of the environment and by educating them about how to live a more sustainable lifestyle. Environmental awareness is perceived as knowledge of the factors that affect the environment and having sensitivity towards the environment. Higher Education Institutions (HEIs) bear the responsibility of educating individuals about environmental issues since they provide education to future leaders in society who may have an influence on future conditions in the environment. Social media are capable of delivering information to a large spectrum of audiences at a low cost. The Pew Internet American Life Project reported that the number of adults who utilise social media has increased by 57 percent from 2005 to 2011. Several environmental activist organisations utilise social media to carry out environmental awareness campaigns. In this study two environmental awareness campaigns which were powered by social media were conducted to improve environmental awareness of individuals in a higher education environment. A Social media Model for ENvironmental Awareness (SMENA) was developed to facilitate the environmental awareness campaigns. The SMENA includes a website, social media as well as theoretical guidelines for creating environmental awareness campaigns, and for using social media for environmental awareness campaigns. A case study at the Nelson Mandela Metropolitan University (NMMU) was used to empirically evaluate SMENA. Students at the Department of Computer Sciences of NMMU were exposed to information about environmental issues through social media with the intention of improving their environmental knowledge and awareness. The SMENA website usability was rated positively and students enjoyed the blogs and information distributed by means of social media. The results of the study intervention were positive and showed that social media can be used to improve the environmental knowledge of students. This study provides a valuable contribution to both the field of environmental education and social media usage and acceptance. The guidelines and requirements for using social media to improve environmental awareness provided in this study can be used to assist educators and university management with addressing the problems of reducing environmental impact.
- Full Text:
- Date Issued: 2013
A model for the implementation of Integrated Quality Management System (IQMS) in selected Eastern Cape schools
- Authors: Sambumbu, Antony Matemba
- Date: 2013
- Language: English
- Type: Thesis , Doctoral , PhD (in Public Administration)
- Identifier: vital:11703 , http://hdl.handle.net/10353/d1015152
- Description: The main purpose of this research was to evaluate the processes for IQMS implementation in the selected Eastern Cape schools so as to determine the model that can be postulated for improving the IQMS implementation in the South African schools. While mainly deriving from the fact that so far, empirical research reveals that the process for IQMS implementation has been marred with a significant number of challenges. The study star begins with the formulation of a thought-process in its overriding hypothesis. The hypothesis is that the application of a five constructs’ IQMS Implementation Model in Figure 1.1 would signficantly influence the successful IQMS implementation in South African schools. The five constructs that are outlined in the IQMS Implementation Model in Figure 1.1 include: (1) Considering the Notion of “Quality” and Whole School Evaluation, (2) Performance Management and Developmental Appraisals, (3) Considering Key Success Factors for IQMS Implementation, (4) the Use of Appropriate Implementation Processes, Systems and Methods, and (5) Constant Monitoring, and Evaluations and Applications of the Improvement Actions. Despite the fact that the integrated quality management theories strongly support this hypothesis, the study, in line with these five constructs which were also aligned with the five research questions and hypotheses that guided this research applies exploratory factor analysis. This has been done in order to further define the structure of the IQMS Implementation Model in Figure 1.1 prior to applying confirmatory factor analysis in order to determine whether the IQMS Implementation Model in Figure 1.1 would perfectly reproduce the 53 observed sample data which was used in the study. The results confirmed the overriding hypothesis in the IQMS Implementation Model in Figure 1.1 which is that effectiveness of the IQMS implementation processes in the South African schools can be significantly influenced by the application of the five constructs. These include: Considering the Notion of “Quality” and Whole School Evaluation, Performance Management and Developmental Appraisals, Considering Key Success Factors for IQMS Implementation, the Use of the Appropriate Implementation Processes, Systems and Methods, and Undertaking Constant Monitoring, Evaluations and Improvement Action. In effect, it was recommended that the Eastern Cape Department of Education must adopt the IQMS implementation Model in Figure 1.1 in order to effectively implement its integrated quality management systems. Despite examining the limitations of the study, the recommendations chapter also discussed the area for further research in which it was suggested that the area for further research would be: Evaluating the impact of appropriate standards’ setting on the successful IQMS implementation in the schools in the Eastern Cape schools.
- Full Text:
- Date Issued: 2013
- Authors: Sambumbu, Antony Matemba
- Date: 2013
- Language: English
- Type: Thesis , Doctoral , PhD (in Public Administration)
- Identifier: vital:11703 , http://hdl.handle.net/10353/d1015152
- Description: The main purpose of this research was to evaluate the processes for IQMS implementation in the selected Eastern Cape schools so as to determine the model that can be postulated for improving the IQMS implementation in the South African schools. While mainly deriving from the fact that so far, empirical research reveals that the process for IQMS implementation has been marred with a significant number of challenges. The study star begins with the formulation of a thought-process in its overriding hypothesis. The hypothesis is that the application of a five constructs’ IQMS Implementation Model in Figure 1.1 would signficantly influence the successful IQMS implementation in South African schools. The five constructs that are outlined in the IQMS Implementation Model in Figure 1.1 include: (1) Considering the Notion of “Quality” and Whole School Evaluation, (2) Performance Management and Developmental Appraisals, (3) Considering Key Success Factors for IQMS Implementation, (4) the Use of Appropriate Implementation Processes, Systems and Methods, and (5) Constant Monitoring, and Evaluations and Applications of the Improvement Actions. Despite the fact that the integrated quality management theories strongly support this hypothesis, the study, in line with these five constructs which were also aligned with the five research questions and hypotheses that guided this research applies exploratory factor analysis. This has been done in order to further define the structure of the IQMS Implementation Model in Figure 1.1 prior to applying confirmatory factor analysis in order to determine whether the IQMS Implementation Model in Figure 1.1 would perfectly reproduce the 53 observed sample data which was used in the study. The results confirmed the overriding hypothesis in the IQMS Implementation Model in Figure 1.1 which is that effectiveness of the IQMS implementation processes in the South African schools can be significantly influenced by the application of the five constructs. These include: Considering the Notion of “Quality” and Whole School Evaluation, Performance Management and Developmental Appraisals, Considering Key Success Factors for IQMS Implementation, the Use of the Appropriate Implementation Processes, Systems and Methods, and Undertaking Constant Monitoring, Evaluations and Improvement Action. In effect, it was recommended that the Eastern Cape Department of Education must adopt the IQMS implementation Model in Figure 1.1 in order to effectively implement its integrated quality management systems. Despite examining the limitations of the study, the recommendations chapter also discussed the area for further research in which it was suggested that the area for further research would be: Evaluating the impact of appropriate standards’ setting on the successful IQMS implementation in the schools in the Eastern Cape schools.
- Full Text:
- Date Issued: 2013
A performative-performance analytical approach: infusing Butlerian theory into the narrative-discursive method
- Morison, Tracy, Macleod, Catriona I
- Authors: Morison, Tracy , Macleod, Catriona I
- Date: 2013
- Language: English
- Type: Article
- Identifier: vital:6212 , http://hdl.handle.net/10962/d1003065 , http://dx.doi.org/10.1177/1077800413494344
- Description: Judith Butler’s theory of performativity provides gender theorists with a rich theoretical language for thinking about gender. Despite this, Butlerian theory is difficult to apply, as Butler does not provide guidance on actual analysis of language use in context. In order to address this limitation, we suggest carefully supplementing performativity with the notion of performance in a manner that allows for the inclusion of relational specificities and the mechanisms through which gender, and gender trouble, occur. To do this, we turn to current developments within discursive psychology and narrative theory. We extend the narrative-discursive method proposed by Taylor and colleagues, infusing it with Butlerian theory in order to fashion a dual analytical lens, which we call the performativity-performance approach. We provide a brief example of how the proposed analytical process may be implemented.
- Full Text:
- Date Issued: 2013
- Authors: Morison, Tracy , Macleod, Catriona I
- Date: 2013
- Language: English
- Type: Article
- Identifier: vital:6212 , http://hdl.handle.net/10962/d1003065 , http://dx.doi.org/10.1177/1077800413494344
- Description: Judith Butler’s theory of performativity provides gender theorists with a rich theoretical language for thinking about gender. Despite this, Butlerian theory is difficult to apply, as Butler does not provide guidance on actual analysis of language use in context. In order to address this limitation, we suggest carefully supplementing performativity with the notion of performance in a manner that allows for the inclusion of relational specificities and the mechanisms through which gender, and gender trouble, occur. To do this, we turn to current developments within discursive psychology and narrative theory. We extend the narrative-discursive method proposed by Taylor and colleagues, infusing it with Butlerian theory in order to fashion a dual analytical lens, which we call the performativity-performance approach. We provide a brief example of how the proposed analytical process may be implemented.
- Full Text:
- Date Issued: 2013
A phenomenological exploration : how secondary school teachers cope with depressed adolescents in their classrooms
- Authors: Vermonti, Stefano
- Date: 2013
- Subjects: Teachers -- Training of , Depression in adolescence , Inclusive education
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:9585 , http://hdl.handle.net/10948/d1020935
- Description: This study focuses on the perception of teachers who have depressed adolescent learners in their classrooms as well as explores how teachers cope with teaching depressed adolescent learners in their classrooms. For the purpose of this study, a qualitative research method was employed. Data was collected in the form of twelve semi-structured interviews with teachers in order to ascertain their perceptions on including and accommodating depressed adolescent learners in their classrooms. The data was analysed for emerging themes and sub-themes according to Tesch‟s eightstep data analysis process. This study highlights the characteristics, symptoms and causes of depression in adolescents and the effect it has on learners within our educational system. The results of the study indicate that the inclusion of depressed adolescents in the classroom can be problematic for teachers since they feel that they are not suitably trained to deal with these learners in a teaching and learning environment. The participating teachers indicated that they are not able to identify and support depressed adolescent learners in their classrooms effectively. The participating teachers feel that they require further training on how to refer these depressed adolescent learners and their parents for further intervention and support. Based on the findings of this study, the researcher constructed guiding principles in order to address the issues raised by the participating teachers. In the light of the guiding principles, recommendations were made towards teachers, parents, schools, health professionals, the Department of Education, the Department of Health and further research in order to accommodate depressed adolescent learners in South African schools effectively.
- Full Text:
- Date Issued: 2013
- Authors: Vermonti, Stefano
- Date: 2013
- Subjects: Teachers -- Training of , Depression in adolescence , Inclusive education
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:9585 , http://hdl.handle.net/10948/d1020935
- Description: This study focuses on the perception of teachers who have depressed adolescent learners in their classrooms as well as explores how teachers cope with teaching depressed adolescent learners in their classrooms. For the purpose of this study, a qualitative research method was employed. Data was collected in the form of twelve semi-structured interviews with teachers in order to ascertain their perceptions on including and accommodating depressed adolescent learners in their classrooms. The data was analysed for emerging themes and sub-themes according to Tesch‟s eightstep data analysis process. This study highlights the characteristics, symptoms and causes of depression in adolescents and the effect it has on learners within our educational system. The results of the study indicate that the inclusion of depressed adolescents in the classroom can be problematic for teachers since they feel that they are not suitably trained to deal with these learners in a teaching and learning environment. The participating teachers indicated that they are not able to identify and support depressed adolescent learners in their classrooms effectively. The participating teachers feel that they require further training on how to refer these depressed adolescent learners and their parents for further intervention and support. Based on the findings of this study, the researcher constructed guiding principles in order to address the issues raised by the participating teachers. In the light of the guiding principles, recommendations were made towards teachers, parents, schools, health professionals, the Department of Education, the Department of Health and further research in order to accommodate depressed adolescent learners in South African schools effectively.
- Full Text:
- Date Issued: 2013
A poverty alleviation project of the Department of Social Development in Nelson Mandela Bay
- Authors: Veveza, Nonkosazana Sandra
- Date: 2013
- Subjects: Poverty -- Economic aspects -- South Africa -- Nelson Mandela Bay Municipality , Economic development projects -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9200 , http://hdl.handle.net/10948/d1020401
- Description: Income-generating projects represent one strategy adopted by the Eastern Cape Department of Social Development (DoSD) to alleviate poverty. The purpose of this study was to evaluate the impact of an income-generating, or poverty alleviation, project funded by the DoSD in New Brighton, Port Elizabeth, in the Eastern Cape Province of South Africa. A sample of ten respondents was drawn from the project. The sampling method of this study was purposive sampling. Data was gathered through semi-structured questionnaires. Related literature focusing on income-generating projects for poverty alleviation was reviewed. Various recommendations have been made, based on the findings of the study. The findings of the study indicated the need for regular visits from Department officials to conduct monitoring and evaluation. Project members also need training in financial management as they cannot manage their finances. The research findings indicated clearly that strategies used by the Department were not effective enough to achieve the desired goals of an income-generating project.
- Full Text:
- Date Issued: 2013
- Authors: Veveza, Nonkosazana Sandra
- Date: 2013
- Subjects: Poverty -- Economic aspects -- South Africa -- Nelson Mandela Bay Municipality , Economic development projects -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9200 , http://hdl.handle.net/10948/d1020401
- Description: Income-generating projects represent one strategy adopted by the Eastern Cape Department of Social Development (DoSD) to alleviate poverty. The purpose of this study was to evaluate the impact of an income-generating, or poverty alleviation, project funded by the DoSD in New Brighton, Port Elizabeth, in the Eastern Cape Province of South Africa. A sample of ten respondents was drawn from the project. The sampling method of this study was purposive sampling. Data was gathered through semi-structured questionnaires. Related literature focusing on income-generating projects for poverty alleviation was reviewed. Various recommendations have been made, based on the findings of the study. The findings of the study indicated the need for regular visits from Department officials to conduct monitoring and evaluation. Project members also need training in financial management as they cannot manage their finances. The research findings indicated clearly that strategies used by the Department were not effective enough to achieve the desired goals of an income-generating project.
- Full Text:
- Date Issued: 2013
A process assessment framework for rural ICT projects in developing countries: an exploration of the Siyakhula Living Lab, South Africa
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013