The use of a Roving Creel Survey to monitor exploited coastal fish species in the Goukamma Marine Ptrotected Area, South Africa
- Authors: Van Zyl, Carika Sylvia
- Date: 2011
- Subjects: Fishing surveys , Fishery management -- South Africa , Fish populations -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10748 , http://hdl.handle.net/10948/1348 , Fishing surveys , Fishery management -- South Africa , Fish populations -- South Africa
- Description: A fishery-dependant monitoring method of the recreational shore-based fishery was undertaken in the Goukamma Marine Protected Area (MPA) on the south coast of South Africa for a period of 17 months. The method used was a roving creel survey (RCS), with dates, times and starting locations chosen by stratified random sampling. The MPA was divided into two sections, Buffalo Bay and Groenvlei, and all anglers encountered were interviewed. Catch and effort data were collected and catch per unit effort (CPUE) was calculated from this. The spatial distribution of anglers was also mapped. A generalized linear model (GLM) was fitted to the effort data to determine the effects of month and day type on the variability of effort in each section. Fitted values showed that effort was significantly higher on weekends than on week days, in both sections. A total average of 3662 anglers fishing 21 428 hours annually is estimated within the reserve with a mean trip length of 5.85 hours. Angler numbers were higher per unit coastline length in Buffalo Bay than Groenvlei, but fishing effort (angler hours) was higher in Groenvlei. Density distributions showed that anglers were clumped in easily accessible areas and that they favored rocky areas and mixed shores over sandy shores. Catch documented between October 2008 and December 2009 included a total of 361 fish, of 27 species from 12 families. Sparidae had the highest contribution (12 species). A Shannon-Weiner diversity index showed that diversity was higher in Buffalo Bay (0.81) than Groenvlei (0.57). Catch composition of retained fish (336 individuals) showed that the six numerically most important species were blacktail (Diplodus sargus capensis) (66 percent of catch), followed by galjoen (Dichistius capensis) at 11 percent, Cape stumpnose (Rhabdosargus holubi), belman (Umbrina robinsonii) and strepie at 3 percent, and elf (Pomatomus saltatrix) at 2 percent. Catch composition of an earlier study in Goukamma (Pradervand and Hiseman 2006) was compared with the present study, as well as data from the De Hoop MPA, which is closed to fishing. A multi-dimensional scaling plot of catch composition showed tight clustering of the De Hoop samples, and high variability among the Goukamma samples. A bray-curtis similarity index and dendrogram of similarity between study sites and study periods showed that there was an 83 percent similarity among De Hoop samples and a 75 percent similarity among Goukamma samples (ignoring the two outliers). The two sites are different with respect to species composition, but this is expected because they are different areas. Differences between time periods in Goukamma (i.e. the previous study versus the present study) were not significant. The most significant result from the catch composition analyses is the high variability among the Goukamma samples. This can be explained by the variable fishing methods used by anglers in Goukamma, compared with the standardized fishing methods used by researchers in De Hoop, and the fact that fish are more abundant and populations are more stable in De Hoop – giving higher sample sizes which reduce the variability in the statistics. Species-specific CPUE was calculated for the six numerically most important species. In both sections, CPUE was highest for blacktail, with an average of 0.133 fish per hour for Groenvlei, and 0.060 fish per hour for Buffalo Bay, over the 12 months. The second highest CPUE values per section were 0.030 for galjoen in Groenvlei and 0.039 for strepie in Buffalo Bay. Remaining CPUE values ranged from 0.014 (belman in Groenvlei) to the lowest value of 0.001 (strepie in Groenvlei). Total estimated CPUE for these six species in the MPA using the estimated effort and catch results amounted to 0.018 fish per hour. An annual estimated 3897 fish were landed in the reserve during 2009. Most fish (n=2481, 64 percent) were caught in the Groenvlei section. Numbers of blacktail were the highest of all species, within both sections (2353 fish). Strepie was the next most common (561 fish), but was caught almost entirely within the Buffalo Bay section (97 percent of individuals), followed by galjoen (548 fish) caught mostly within the Groenvlei section (92 percent of individuals). Size comparisons of the six species between the Goukamma and De Hoop MPAs showed that ranges in size are similar, but there are substantial differences in mean sizes between the two MPAs. Sample sizes of all species from the Goukamma MPA were too small to draw conclusions about stock status, except for blacktail. The Goukamma MPA is a popular fishing destination and angler effort is high. It can be considered a node of exploitation for surf zone fish, for which it provides no protection. Even though the MPA allows shore angling, sustainable fishing practices should be incorporated in management plans if the MPA is expected to protect and conserve its stocks. Of noteworthy concern is the occurrence of illegal night fishing (the public may not enter the reserve between sunrise and sunset) which leads to underestimates of catch and effort (night surveys were not conducted because of safety concerns). It is recommended that more communication should take place between the angling community and the reserve management. Sign boards giving information on species which are under pressure, and why they are under pressure, with a short explanation on their life cycles, is advised. The roving creel survey method was suitable for the study area and delivered statistically rigorous results. I thus recommend that it is continued in the future by management. I make some recommendations for reducing costs of future surveys, as well as for altering the survey design if funds are very limited.
- Full Text:
- Date Issued: 2011
- Authors: Van Zyl, Carika Sylvia
- Date: 2011
- Subjects: Fishing surveys , Fishery management -- South Africa , Fish populations -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10748 , http://hdl.handle.net/10948/1348 , Fishing surveys , Fishery management -- South Africa , Fish populations -- South Africa
- Description: A fishery-dependant monitoring method of the recreational shore-based fishery was undertaken in the Goukamma Marine Protected Area (MPA) on the south coast of South Africa for a period of 17 months. The method used was a roving creel survey (RCS), with dates, times and starting locations chosen by stratified random sampling. The MPA was divided into two sections, Buffalo Bay and Groenvlei, and all anglers encountered were interviewed. Catch and effort data were collected and catch per unit effort (CPUE) was calculated from this. The spatial distribution of anglers was also mapped. A generalized linear model (GLM) was fitted to the effort data to determine the effects of month and day type on the variability of effort in each section. Fitted values showed that effort was significantly higher on weekends than on week days, in both sections. A total average of 3662 anglers fishing 21 428 hours annually is estimated within the reserve with a mean trip length of 5.85 hours. Angler numbers were higher per unit coastline length in Buffalo Bay than Groenvlei, but fishing effort (angler hours) was higher in Groenvlei. Density distributions showed that anglers were clumped in easily accessible areas and that they favored rocky areas and mixed shores over sandy shores. Catch documented between October 2008 and December 2009 included a total of 361 fish, of 27 species from 12 families. Sparidae had the highest contribution (12 species). A Shannon-Weiner diversity index showed that diversity was higher in Buffalo Bay (0.81) than Groenvlei (0.57). Catch composition of retained fish (336 individuals) showed that the six numerically most important species were blacktail (Diplodus sargus capensis) (66 percent of catch), followed by galjoen (Dichistius capensis) at 11 percent, Cape stumpnose (Rhabdosargus holubi), belman (Umbrina robinsonii) and strepie at 3 percent, and elf (Pomatomus saltatrix) at 2 percent. Catch composition of an earlier study in Goukamma (Pradervand and Hiseman 2006) was compared with the present study, as well as data from the De Hoop MPA, which is closed to fishing. A multi-dimensional scaling plot of catch composition showed tight clustering of the De Hoop samples, and high variability among the Goukamma samples. A bray-curtis similarity index and dendrogram of similarity between study sites and study periods showed that there was an 83 percent similarity among De Hoop samples and a 75 percent similarity among Goukamma samples (ignoring the two outliers). The two sites are different with respect to species composition, but this is expected because they are different areas. Differences between time periods in Goukamma (i.e. the previous study versus the present study) were not significant. The most significant result from the catch composition analyses is the high variability among the Goukamma samples. This can be explained by the variable fishing methods used by anglers in Goukamma, compared with the standardized fishing methods used by researchers in De Hoop, and the fact that fish are more abundant and populations are more stable in De Hoop – giving higher sample sizes which reduce the variability in the statistics. Species-specific CPUE was calculated for the six numerically most important species. In both sections, CPUE was highest for blacktail, with an average of 0.133 fish per hour for Groenvlei, and 0.060 fish per hour for Buffalo Bay, over the 12 months. The second highest CPUE values per section were 0.030 for galjoen in Groenvlei and 0.039 for strepie in Buffalo Bay. Remaining CPUE values ranged from 0.014 (belman in Groenvlei) to the lowest value of 0.001 (strepie in Groenvlei). Total estimated CPUE for these six species in the MPA using the estimated effort and catch results amounted to 0.018 fish per hour. An annual estimated 3897 fish were landed in the reserve during 2009. Most fish (n=2481, 64 percent) were caught in the Groenvlei section. Numbers of blacktail were the highest of all species, within both sections (2353 fish). Strepie was the next most common (561 fish), but was caught almost entirely within the Buffalo Bay section (97 percent of individuals), followed by galjoen (548 fish) caught mostly within the Groenvlei section (92 percent of individuals). Size comparisons of the six species between the Goukamma and De Hoop MPAs showed that ranges in size are similar, but there are substantial differences in mean sizes between the two MPAs. Sample sizes of all species from the Goukamma MPA were too small to draw conclusions about stock status, except for blacktail. The Goukamma MPA is a popular fishing destination and angler effort is high. It can be considered a node of exploitation for surf zone fish, for which it provides no protection. Even though the MPA allows shore angling, sustainable fishing practices should be incorporated in management plans if the MPA is expected to protect and conserve its stocks. Of noteworthy concern is the occurrence of illegal night fishing (the public may not enter the reserve between sunrise and sunset) which leads to underestimates of catch and effort (night surveys were not conducted because of safety concerns). It is recommended that more communication should take place between the angling community and the reserve management. Sign boards giving information on species which are under pressure, and why they are under pressure, with a short explanation on their life cycles, is advised. The roving creel survey method was suitable for the study area and delivered statistically rigorous results. I thus recommend that it is continued in the future by management. I make some recommendations for reducing costs of future surveys, as well as for altering the survey design if funds are very limited.
- Full Text:
- Date Issued: 2011
The impact of human resource management practices on the psychological contract during a psychological recession
- Theron, Anthonie Van Straaten
- Authors: Theron, Anthonie Van Straaten
- Date: 2011
- Subjects: Psychology, Industrial , Contracts -- Psychological aspects , Organisational behaviour
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8772 , http://hdl.handle.net/10948/d1012611 , Psychology, Industrial , Contracts -- Psychological aspects , Organisational behaviour
- Description: The aim of this study was to investigate the impact of Human Resource Management (HRM) practices on the psychological contracts of employees who have been negatively impacted by the widespread psychological recession. The psychological contract that exists between employees and organisations is brittle due to the psychological recession, which is defined as an emotional state in which employees feel extremely vulnerable to economic hardship. This contributes to a negative and cynical view of the present and an even bleaker view of the future. Breach of the psychological contract has severe negative consequences for employees and organisations. These include reduced employee well-being, trust levels, various organisational citizenship behaviours, increased cynical attitudes toward the organisation, and stronger intention to quit. The target population for the present study consisted of all permanent support staff working at an organisation that has recently went through a large-scale retrenchment exercise (n=52). A self-administered questionnaire was distributed amongst employees. The findings suggest that when the harsh effects of the psychological recession increase, employees are more likely to engage in various destructive behaviours at work due to breach and violation of their psychological contracts. Furthermore, the results indicated that an increase in the number of progressive HRM practices correlated with a decrease in breach and violation of the psychological contract. It was further revealed that the widespread psychological recession may make the employment relationship brittle and prone to breach and violation. The findings suggest that through the effective development and application of many explicit HRM practices, employees’ psychological contracts may become less fragile to breach and violation during a psychological recession.
- Full Text:
- Date Issued: 2011
- Authors: Theron, Anthonie Van Straaten
- Date: 2011
- Subjects: Psychology, Industrial , Contracts -- Psychological aspects , Organisational behaviour
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8772 , http://hdl.handle.net/10948/d1012611 , Psychology, Industrial , Contracts -- Psychological aspects , Organisational behaviour
- Description: The aim of this study was to investigate the impact of Human Resource Management (HRM) practices on the psychological contracts of employees who have been negatively impacted by the widespread psychological recession. The psychological contract that exists between employees and organisations is brittle due to the psychological recession, which is defined as an emotional state in which employees feel extremely vulnerable to economic hardship. This contributes to a negative and cynical view of the present and an even bleaker view of the future. Breach of the psychological contract has severe negative consequences for employees and organisations. These include reduced employee well-being, trust levels, various organisational citizenship behaviours, increased cynical attitudes toward the organisation, and stronger intention to quit. The target population for the present study consisted of all permanent support staff working at an organisation that has recently went through a large-scale retrenchment exercise (n=52). A self-administered questionnaire was distributed amongst employees. The findings suggest that when the harsh effects of the psychological recession increase, employees are more likely to engage in various destructive behaviours at work due to breach and violation of their psychological contracts. Furthermore, the results indicated that an increase in the number of progressive HRM practices correlated with a decrease in breach and violation of the psychological contract. It was further revealed that the widespread psychological recession may make the employment relationship brittle and prone to breach and violation. The findings suggest that through the effective development and application of many explicit HRM practices, employees’ psychological contracts may become less fragile to breach and violation during a psychological recession.
- Full Text:
- Date Issued: 2011
Detection and identification of plasmodium species causing malaria in Malawi using rapid diagnostic tests
- Authors: Tegha, Gerald Loiswayo
- Date: 2011
- Subjects: Malaria -- Diagnosis -- Malawi , Plasmodium
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10127 , http://hdl.handle.net/10948/d1021240
- Description: Malaria represents one of the oldest documented diseases among humans and even today organisms in the genus Plasmodium kill more people than any other infectious disease, especially in tropical and subtropical areas. The four most common species which infect humans are Plasmodium falciparum, Plasmodium vivax, Plasmodium ovale and Plasmodium malaria. Of these four species, Plasmodium falciparum and Plasmodium vivax account for 95 percent of infections globally. Microscopy has been used since early days for the diagnosis of malaria because this method is simple, does not require highly equipped facilities, and in most cases enables differentiation among the species causing malaria in humans when performed by skilled microscopy readers. However, this method has been misleading in identifying parasite species, especially in the case of low level parasitemia, a mixed parasite infection, or modification by drug treatment as well as in placental malaria. Malaria rapid diagnostic tests (RDT) have played a major role in malaria management; particularly in providing blood based diagnosis in remote locations where microscopy based diagnosis is unavailable. These diagnostic tests are fast and easy to perform and do not require electricity or specific equipment. As part of strengthening malaria diagnostics in Malawi, the Ministry of Health and Population strongly recommends the use of malaria RDT’s at all levels of the health care delivery system. However, malaria microscopy remains a gold standard test for malaria. All patients (regardless of age) with suspected uncomplicated malaria should have a confirmed diagnosis with malaria RDT before anti-malaria treatment is administered. Based on field performance evaluations that assessed performance, quality control and production capacities of the manufacturing companies of malaria RDT’s, the Ministry of Health and Population recommended two brands of Histidine Rich Protein 2 (HRP-2), RDT’s for use in Malawi. These are SD Bioline malaria Ag Pf and the New Paracheck malaria Ag Pf. All these RDT’s are able to detect only P. falciparum. However, other species have been reported to exist in the country and there is a need to find proper RDT’s which will be able to detect all other species including P. falciparum. The main aim of this study was to evaluate Paramax-3 Pf/Pv/Pan RDT (Zephyr Biomedicals, India), if used in Malawi, could be able to detect and identify the different species of Plasmodium causing malaria in Malawi. The study recruited a total of 250 adult and infants at Bwaila Hospital in Lilongwe, Malawi. Study results showed that the overall sensitivity and specificity of the Paramax-3 RDT used in the study were 100 percent and 83 percent respectively. However, it was observed that the RDT test was not able to identify the P. ovale, and in some cases, the RDT test was positive for P. falciparum when the PCR identified the species as P. ovale. No P. vivax was detected both by RDT and PCR. This study was able to detect and identify the presence of P. malaria and P. ovale in Malawi apart from the P. falciparum. There were no significant differences between microscopy results compared to both the RDT and the PCR, with 94 percent and 98 percent sensitivities of R1 and R2 compared to RDT, as well as 94 percent and 96 percent sensitivities for R1 and R2 compared to PCR respectively. Both R1 and R2 had low specificities for example, R1 had 72 percent and R2 had 80 percent compared to RDT. Comparing R1 and R2 to PCR, the sensitivities were 64.9 percent and 67.2 percent respectively. However, the readers had difficulties differentiating the different species microscopically. The history of anti-malaria treatment had no significant effect on the outcome of the results in both the RDT and PCR.
- Full Text:
- Date Issued: 2011
- Authors: Tegha, Gerald Loiswayo
- Date: 2011
- Subjects: Malaria -- Diagnosis -- Malawi , Plasmodium
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10127 , http://hdl.handle.net/10948/d1021240
- Description: Malaria represents one of the oldest documented diseases among humans and even today organisms in the genus Plasmodium kill more people than any other infectious disease, especially in tropical and subtropical areas. The four most common species which infect humans are Plasmodium falciparum, Plasmodium vivax, Plasmodium ovale and Plasmodium malaria. Of these four species, Plasmodium falciparum and Plasmodium vivax account for 95 percent of infections globally. Microscopy has been used since early days for the diagnosis of malaria because this method is simple, does not require highly equipped facilities, and in most cases enables differentiation among the species causing malaria in humans when performed by skilled microscopy readers. However, this method has been misleading in identifying parasite species, especially in the case of low level parasitemia, a mixed parasite infection, or modification by drug treatment as well as in placental malaria. Malaria rapid diagnostic tests (RDT) have played a major role in malaria management; particularly in providing blood based diagnosis in remote locations where microscopy based diagnosis is unavailable. These diagnostic tests are fast and easy to perform and do not require electricity or specific equipment. As part of strengthening malaria diagnostics in Malawi, the Ministry of Health and Population strongly recommends the use of malaria RDT’s at all levels of the health care delivery system. However, malaria microscopy remains a gold standard test for malaria. All patients (regardless of age) with suspected uncomplicated malaria should have a confirmed diagnosis with malaria RDT before anti-malaria treatment is administered. Based on field performance evaluations that assessed performance, quality control and production capacities of the manufacturing companies of malaria RDT’s, the Ministry of Health and Population recommended two brands of Histidine Rich Protein 2 (HRP-2), RDT’s for use in Malawi. These are SD Bioline malaria Ag Pf and the New Paracheck malaria Ag Pf. All these RDT’s are able to detect only P. falciparum. However, other species have been reported to exist in the country and there is a need to find proper RDT’s which will be able to detect all other species including P. falciparum. The main aim of this study was to evaluate Paramax-3 Pf/Pv/Pan RDT (Zephyr Biomedicals, India), if used in Malawi, could be able to detect and identify the different species of Plasmodium causing malaria in Malawi. The study recruited a total of 250 adult and infants at Bwaila Hospital in Lilongwe, Malawi. Study results showed that the overall sensitivity and specificity of the Paramax-3 RDT used in the study were 100 percent and 83 percent respectively. However, it was observed that the RDT test was not able to identify the P. ovale, and in some cases, the RDT test was positive for P. falciparum when the PCR identified the species as P. ovale. No P. vivax was detected both by RDT and PCR. This study was able to detect and identify the presence of P. malaria and P. ovale in Malawi apart from the P. falciparum. There were no significant differences between microscopy results compared to both the RDT and the PCR, with 94 percent and 98 percent sensitivities of R1 and R2 compared to RDT, as well as 94 percent and 96 percent sensitivities for R1 and R2 compared to PCR respectively. Both R1 and R2 had low specificities for example, R1 had 72 percent and R2 had 80 percent compared to RDT. Comparing R1 and R2 to PCR, the sensitivities were 64.9 percent and 67.2 percent respectively. However, the readers had difficulties differentiating the different species microscopically. The history of anti-malaria treatment had no significant effect on the outcome of the results in both the RDT and PCR.
- Full Text:
- Date Issued: 2011
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
Strategies for value-creation in a post-merged organisation
- Authors: Roodt, Kendra-Lynn
- Date: 2011
- Subjects: Consolidation and merger of corporation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/8650 , vital:26417
- Description: A merger occurs when two or more organisations integrate for a specific reason and become one entity in order to ensure success. Careful consideration and thorough planning must be done and several steps need to be followed to avoid a merger being unsuccessful. Good leadership and communication strategies are the key to a successful merger. This study deals with the strategies for value-creation in a post-merged organisation and the main problem that this research study addressed was: What strategies could an organisation use to ensure that desired values are created in a post-merged organisation? To answer the above question it was necessary to address the preferred organisational values and outcomes of a successful merger and leadership strategies that organisations can utilise to ensure that the preferred values and outcomes of a merger are achieved. Thereafter, various models were outlined and evaluated and a proposed integrated model for the implementation of desired values in a merged institution element was developed to ensure that the members of the organisation internalise the desired values and that these values are reflected in all organisational functions and behaviour. Lastly, based on the theoretical findings of the literature survey, a questionnaire was developed and distributed amongst employees of the Nelson Mandela Metropolitan University (NMMU). As a result of this study it was clear that it is imperative that the decision to implement the leadership and communication strategies proposed in the integrated model remains with the senior management. The organisation will only experience success while coordinating these strategies if senior management is totally committed to the process.
- Full Text:
- Date Issued: 2011
- Authors: Roodt, Kendra-Lynn
- Date: 2011
- Subjects: Consolidation and merger of corporation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/8650 , vital:26417
- Description: A merger occurs when two or more organisations integrate for a specific reason and become one entity in order to ensure success. Careful consideration and thorough planning must be done and several steps need to be followed to avoid a merger being unsuccessful. Good leadership and communication strategies are the key to a successful merger. This study deals with the strategies for value-creation in a post-merged organisation and the main problem that this research study addressed was: What strategies could an organisation use to ensure that desired values are created in a post-merged organisation? To answer the above question it was necessary to address the preferred organisational values and outcomes of a successful merger and leadership strategies that organisations can utilise to ensure that the preferred values and outcomes of a merger are achieved. Thereafter, various models were outlined and evaluated and a proposed integrated model for the implementation of desired values in a merged institution element was developed to ensure that the members of the organisation internalise the desired values and that these values are reflected in all organisational functions and behaviour. Lastly, based on the theoretical findings of the literature survey, a questionnaire was developed and distributed amongst employees of the Nelson Mandela Metropolitan University (NMMU). As a result of this study it was clear that it is imperative that the decision to implement the leadership and communication strategies proposed in the integrated model remains with the senior management. The organisation will only experience success while coordinating these strategies if senior management is totally committed to the process.
- Full Text:
- Date Issued: 2011
Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
Wireless rotational process monitoring system
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
- Authors: Odendaal, Morné
- Date: 2011
- Subjects: Manufacturing processes -- Automation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9599 , http://hdl.handle.net/10948/1347 , Manufacturing processes -- Automation
- Description: The manufacturing industry is constantly looking for ways to reduce production costs and at the same time to increase productivity. Automation of common manufacturing operations is one of these methods. By automating common manufacturing operations; various machines, robots, control systems and information technologies are used to reduce the overall human input requirement (mental and physical). Recent advances in technology have made it possible to now also automate (or facilitate) the maintenance requirement of these machines and tools. Modern tools and machines, which can estimate when it will fail or when failure is imminent have obvious advantages for predictive maintenance purposes. Another function of this technology is to determine how efficiently a tool or machine operates, or what the quality of the produced goods is. Predictive maintenance can decrease manufacturing plant or machine down times – which have a positive effect on cost-savings – has gained considerable importance over the last two decades.
- Full Text:
- Date Issued: 2011
Guidelines for the successful integration of ICT in schools in Cameroon
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
An analysis of selected cartoons published during Zimbabwe's 2008 elections
- Authors: Mushohwe, Knowledge
- Date: 2011
- Subjects: Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8493 , http://hdl.handle.net/10948/1609 , Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Description: During Zimbabwe’s 2008 harmonised elections the country’s media laws had a direct impact on the way editorial cartoonists expressed themselves. Although the online newspapers were unregulated and the print media published under Zimbabwe’s media laws, Public Order and Security Act and Access to Information and Protection of Privacy act - the editorial cartoons from both sources show deliberate bias towards one candidate and contempt towards the main rival. The study contextualises the understanding of the editorial cartoon, as practised in an environment of freedom of speech and defined by the four categories identified by Press (1981) and Manning and Phiddian (2004), and delineates the effect of media laws on the newspaper industry in Zimbabwe. The four categories of editorial cartoons identified are descriptive editorial cartoons, laughing satirical editorial cartoons, destructive satirical editorial cartoons, and savage indignation editorial cartoons. The study reviews eight editorial cartoons, read using a semiotic framework investigating non-verbal communication, as defined and suggested by Du Plooy (1996), and a text and language grid, as suggested by Leech (1974), according to the criteria of symbols/metaphors, exaggeration/distortion, stereotypes, caricature, irony, captions, and background knowledge, as developed by Fetsko (2001). A comparative analysis of the cartoons reveals that objectives and functions of the unregulated zimonline.co.za and the regulated the Herald newspapers are the same. They constitute propagandistic representations of Zimbabwean politics that are more an extension of political ideology than they are a reflection of the country’s sociopolitical landscape.
- Full Text:
- Date Issued: 2011
- Authors: Mushohwe, Knowledge
- Date: 2011
- Subjects: Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8493 , http://hdl.handle.net/10948/1609 , Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Description: During Zimbabwe’s 2008 harmonised elections the country’s media laws had a direct impact on the way editorial cartoonists expressed themselves. Although the online newspapers were unregulated and the print media published under Zimbabwe’s media laws, Public Order and Security Act and Access to Information and Protection of Privacy act - the editorial cartoons from both sources show deliberate bias towards one candidate and contempt towards the main rival. The study contextualises the understanding of the editorial cartoon, as practised in an environment of freedom of speech and defined by the four categories identified by Press (1981) and Manning and Phiddian (2004), and delineates the effect of media laws on the newspaper industry in Zimbabwe. The four categories of editorial cartoons identified are descriptive editorial cartoons, laughing satirical editorial cartoons, destructive satirical editorial cartoons, and savage indignation editorial cartoons. The study reviews eight editorial cartoons, read using a semiotic framework investigating non-verbal communication, as defined and suggested by Du Plooy (1996), and a text and language grid, as suggested by Leech (1974), according to the criteria of symbols/metaphors, exaggeration/distortion, stereotypes, caricature, irony, captions, and background knowledge, as developed by Fetsko (2001). A comparative analysis of the cartoons reveals that objectives and functions of the unregulated zimonline.co.za and the regulated the Herald newspapers are the same. They constitute propagandistic representations of Zimbabwean politics that are more an extension of political ideology than they are a reflection of the country’s sociopolitical landscape.
- Full Text:
- Date Issued: 2011
Motivations of international trophy hunters choosing to hunt in South Africa
- Authors: Mulder, Attilia Cesira
- Date: 2011
- Subjects: Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9360 , http://hdl.handle.net/10948/1328 , Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Description: In travel research, it is generally accepted that push factors are the motivations that prompt an individual to travel, and pull factors are those by which the individual is enticed by the attractiveness of the destination, once the decision to travel has been made. Having this been said, this research examined the motivations of international trophy hunters and why they chose to hunt in South Africa. The empirical data were collected by means of a postal survey. Two thousand self-administered questionnaires were distributed to overseas hunters who had previously visited South Africa to participate in a hunting safari. One hundred and ninety one questionnaires were suitable for the data analysis. Results of the principal component factor analysis yielded six push motivational dimensions that influenced an individual to participate in trophy hunting, and three pull motivational dimensions that encouraged hunters to hunt in South Africa. Multivariate analyses (MANOVA) were conducted to examine differences between the push and pull factors across various socio-demographic characteristics. Where differences in the MANOVA were found, additional analyses were conducted to examine differences between push and pull factors on the socio-demographic subgroups. Pearson's correlation coefficient was used to measure the degree of interrelationships among push and pull factors for socio-demographic factors. To address the objectives of the current study, five postulations were formulated. The first postulation revealed that personal, psychological needs and values, such as status, family, social interaction, exercise and challenge, were the main factors that push individuals to participate in trophy hunting. Postulation 2 indicated that a number of factors pull overseas hunters to hunt in South Africa namely, nature/scenery, fantasy and information sources - particularly recommendations by other hunters. The third postulation was confirmed namely that country of residence, age, gender, occupation and income have an influence on push and pull factors of motivation. Postulation 4 partly confirmed that a positive relationship exists between a number of push and pull factors of motivation. Lastly, postulation 5 verified that socio-demographics do have an influence on the relationship between push and pull factors of motivation. Results of the study thus provide destination/tourism/marketing managers and/or professionals within the hunting industry with a better understanding of hunters' travel motivation and behavior.
- Full Text:
- Date Issued: 2011
- Authors: Mulder, Attilia Cesira
- Date: 2011
- Subjects: Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9360 , http://hdl.handle.net/10948/1328 , Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Description: In travel research, it is generally accepted that push factors are the motivations that prompt an individual to travel, and pull factors are those by which the individual is enticed by the attractiveness of the destination, once the decision to travel has been made. Having this been said, this research examined the motivations of international trophy hunters and why they chose to hunt in South Africa. The empirical data were collected by means of a postal survey. Two thousand self-administered questionnaires were distributed to overseas hunters who had previously visited South Africa to participate in a hunting safari. One hundred and ninety one questionnaires were suitable for the data analysis. Results of the principal component factor analysis yielded six push motivational dimensions that influenced an individual to participate in trophy hunting, and three pull motivational dimensions that encouraged hunters to hunt in South Africa. Multivariate analyses (MANOVA) were conducted to examine differences between the push and pull factors across various socio-demographic characteristics. Where differences in the MANOVA were found, additional analyses were conducted to examine differences between push and pull factors on the socio-demographic subgroups. Pearson's correlation coefficient was used to measure the degree of interrelationships among push and pull factors for socio-demographic factors. To address the objectives of the current study, five postulations were formulated. The first postulation revealed that personal, psychological needs and values, such as status, family, social interaction, exercise and challenge, were the main factors that push individuals to participate in trophy hunting. Postulation 2 indicated that a number of factors pull overseas hunters to hunt in South Africa namely, nature/scenery, fantasy and information sources - particularly recommendations by other hunters. The third postulation was confirmed namely that country of residence, age, gender, occupation and income have an influence on push and pull factors of motivation. Postulation 4 partly confirmed that a positive relationship exists between a number of push and pull factors of motivation. Lastly, postulation 5 verified that socio-demographics do have an influence on the relationship between push and pull factors of motivation. Results of the study thus provide destination/tourism/marketing managers and/or professionals within the hunting industry with a better understanding of hunters' travel motivation and behavior.
- Full Text:
- Date Issued: 2011
Analysis of a human capital plan for the southern region of Eskom distribution
- Moonsamy, Sivabakiam Maduray
- Authors: Moonsamy, Sivabakiam Maduray
- Date: 2011
- Subjects: Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9386 , http://hdl.handle.net/10948/d1010996 , Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Description: We are living in an era of inconceivable knowledge, skills and talent paucity as technology continue to revolutionise the world, creating new and diverse economic opportunities and changing the perception of work, its environments and the skills and knowledge demanded in organisations. This phenomenon has resulted in global competition for skilled and knowledge workers as the new world of work morphs enigmatically, leaving organisations vulnerable, and unable to deal with this complex issue. Organisational leaders are cognisant of the changes, but are grappling with the problems of managing, retaining, and creating a resilient workforce. If talent is put onto the back burner and left unattended, it has the potential to create overwhelming turmoil in the South African economy and the economies throughout the world. The global changes will impact directly on how we approach workforce challenges in the future. Today, human capital is regarded as the distinct wealth contributor and creator for economic and organisational prosperity (Meyer, 2004). Hence, Human Capital Planning is crucial for every organisation, including Eskom, to ensure that its strategic objectives are met through the effective management and utilisation of its human resources in order to maintain its competitive advantage and ensure its sustainability into the future. Globally, as well as in South Africa, various contributing factors have resulted in skills shortages throughout the energy industry. Eskom has embarked on several growth initiatives requiring additional manpower, diverse specialist knowledge and skills-sets, and a more robust pipeline of technically qualified employees across all levels in the organisation firstly, to sustain itself, and secondly to embed the transition of a high performing organisation by attracting and acquiring the right skills and talent in the right jobs (Eskom Business Plan, 2010). Human Capital Planning is therefore crucial especially for Eskom Distribution, Southern Region to ensure that its strategic objectives are met through the effective management and optimisation of its human resources, whilst simultaneously cognisant of the changing landscape both internally, viz. within the region and the broader Eskom, and externally in South Africa and the global markets.
- Full Text:
- Date Issued: 2011
- Authors: Moonsamy, Sivabakiam Maduray
- Date: 2011
- Subjects: Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9386 , http://hdl.handle.net/10948/d1010996 , Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Description: We are living in an era of inconceivable knowledge, skills and talent paucity as technology continue to revolutionise the world, creating new and diverse economic opportunities and changing the perception of work, its environments and the skills and knowledge demanded in organisations. This phenomenon has resulted in global competition for skilled and knowledge workers as the new world of work morphs enigmatically, leaving organisations vulnerable, and unable to deal with this complex issue. Organisational leaders are cognisant of the changes, but are grappling with the problems of managing, retaining, and creating a resilient workforce. If talent is put onto the back burner and left unattended, it has the potential to create overwhelming turmoil in the South African economy and the economies throughout the world. The global changes will impact directly on how we approach workforce challenges in the future. Today, human capital is regarded as the distinct wealth contributor and creator for economic and organisational prosperity (Meyer, 2004). Hence, Human Capital Planning is crucial for every organisation, including Eskom, to ensure that its strategic objectives are met through the effective management and utilisation of its human resources in order to maintain its competitive advantage and ensure its sustainability into the future. Globally, as well as in South Africa, various contributing factors have resulted in skills shortages throughout the energy industry. Eskom has embarked on several growth initiatives requiring additional manpower, diverse specialist knowledge and skills-sets, and a more robust pipeline of technically qualified employees across all levels in the organisation firstly, to sustain itself, and secondly to embed the transition of a high performing organisation by attracting and acquiring the right skills and talent in the right jobs (Eskom Business Plan, 2010). Human Capital Planning is therefore crucial especially for Eskom Distribution, Southern Region to ensure that its strategic objectives are met through the effective management and optimisation of its human resources, whilst simultaneously cognisant of the changing landscape both internally, viz. within the region and the broader Eskom, and externally in South Africa and the global markets.
- Full Text:
- Date Issued: 2011
Educating users about information security by means of game play
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
Social media use among NMMU students
- Authors: Mohamed, Hassan
- Date: 2011
- Subjects: Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9274 , http://hdl.handle.net/10948/1636 , Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Description: This research provides insight into the use of social networks and social media by students at the Nelson Mandela Metropolitan University. The primary purpose of this research is to investigate student social media practices at NMMU to establish the reasons for students engaging in social media. A growing number of educators acknowledge the potential of social networking to (re)engage learners with their studies, while others fear that such practices compromise and disrupt student engagement with traditional education provision (Selwyn, 2009). This study, therefore, aims to identify how and for what reasons students use social networks and social media. This study attempts to provide answers to the following research questions: For which social networking sites do students register and actively engage in? What is the most popular social networking site for students? How often do students engage in social media practices? What is the main purpose for students engaging in social media practices? How do students gain access to social media? For what educational purposes can social media be used? For which business purposes can social media be used? Do students use social media to collaborate with peers and lecturers? Do students use social media to make buying decisions? The literature overview was conducted on social media and social networks from journals and books published between the periods 2003 to 2011 as the popularity of social media came to the forefront during this period. Topics researched included social networks and libraries, educational and business uses of social networking and social media. A quantitative study was considered to be most appropriate to conduct the research for this study; and non-probability sampling was the most appropriate given the size of the population and the nature of this research. xiv Students were invited to participate in the research by completing and submitting a survey questionnaire at the conclusion of their lectures in the second semester during the month of September. The data collected was then analysed using descriptive and inferential statistics to provide insight into student use of social media. The results would determine if relationships exist between the independent variables from the questionnaire, namely, age, gender, campus and course enrolment and the dependent factors, namely, usage, information exchange and security. This relationship would be determined for both the perceptions of social networking in general and the perceptions of NMMU social networking. These results are then used to identify further areas of research in the future. The majority of the population sample was between the ages of 17 and 21 and primarily females. The sample typically became aware of social media by means of word-of-mouth and accesses their social networking site/s more than five times a day. The main reason for registering and joining social networking sites was for social purposes. Furthermore, the sample used social networking sites for entertainment, social involvement, meeting new friends and maintaining relationships. The sample agreed that social networking makes information searching easier. The majority of the sample indicated that they were not registered on any NMMU Social Networking sites of the university or any faculty, department or unit social networking sites at the NMMU. However, it was clear that the majority of students was registered on social networking sites of some sort and would continue to use social networking and social media. The results from the study indicated that the mean value for the perceptions of social media in general were greater than that of the perceptions of NMMU social media in terms of usage. Likewise, the mean value for the perceptions of social networking in general was also greater than that of the perceptions of NMMU Social Networking for information exchange but the difference were very small. However, the mean value for the perceptions of NMMU Social Networking showed a greater mean value than that of the perceptions of social networking in general in terms of security. This means that respondents used social networking in general more than NMMU Social Networking. xv However, the respondents perceived NMMU Social Networking sites to be more secure than social networking sites in general. The results of this study could provide Higher Education Institutions in South Africa with the impetus to use social networks and social media to enhance students‟ learning experiences.
- Full Text:
- Date Issued: 2011
- Authors: Mohamed, Hassan
- Date: 2011
- Subjects: Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9274 , http://hdl.handle.net/10948/1636 , Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Description: This research provides insight into the use of social networks and social media by students at the Nelson Mandela Metropolitan University. The primary purpose of this research is to investigate student social media practices at NMMU to establish the reasons for students engaging in social media. A growing number of educators acknowledge the potential of social networking to (re)engage learners with their studies, while others fear that such practices compromise and disrupt student engagement with traditional education provision (Selwyn, 2009). This study, therefore, aims to identify how and for what reasons students use social networks and social media. This study attempts to provide answers to the following research questions: For which social networking sites do students register and actively engage in? What is the most popular social networking site for students? How often do students engage in social media practices? What is the main purpose for students engaging in social media practices? How do students gain access to social media? For what educational purposes can social media be used? For which business purposes can social media be used? Do students use social media to collaborate with peers and lecturers? Do students use social media to make buying decisions? The literature overview was conducted on social media and social networks from journals and books published between the periods 2003 to 2011 as the popularity of social media came to the forefront during this period. Topics researched included social networks and libraries, educational and business uses of social networking and social media. A quantitative study was considered to be most appropriate to conduct the research for this study; and non-probability sampling was the most appropriate given the size of the population and the nature of this research. xiv Students were invited to participate in the research by completing and submitting a survey questionnaire at the conclusion of their lectures in the second semester during the month of September. The data collected was then analysed using descriptive and inferential statistics to provide insight into student use of social media. The results would determine if relationships exist between the independent variables from the questionnaire, namely, age, gender, campus and course enrolment and the dependent factors, namely, usage, information exchange and security. This relationship would be determined for both the perceptions of social networking in general and the perceptions of NMMU social networking. These results are then used to identify further areas of research in the future. The majority of the population sample was between the ages of 17 and 21 and primarily females. The sample typically became aware of social media by means of word-of-mouth and accesses their social networking site/s more than five times a day. The main reason for registering and joining social networking sites was for social purposes. Furthermore, the sample used social networking sites for entertainment, social involvement, meeting new friends and maintaining relationships. The sample agreed that social networking makes information searching easier. The majority of the sample indicated that they were not registered on any NMMU Social Networking sites of the university or any faculty, department or unit social networking sites at the NMMU. However, it was clear that the majority of students was registered on social networking sites of some sort and would continue to use social networking and social media. The results from the study indicated that the mean value for the perceptions of social media in general were greater than that of the perceptions of NMMU social media in terms of usage. Likewise, the mean value for the perceptions of social networking in general was also greater than that of the perceptions of NMMU Social Networking for information exchange but the difference were very small. However, the mean value for the perceptions of NMMU Social Networking showed a greater mean value than that of the perceptions of social networking in general in terms of security. This means that respondents used social networking in general more than NMMU Social Networking. xv However, the respondents perceived NMMU Social Networking sites to be more secure than social networking sites in general. The results of this study could provide Higher Education Institutions in South Africa with the impetus to use social networks and social media to enhance students‟ learning experiences.
- Full Text:
- Date Issued: 2011
An analysis of the reliability of the 22kV distribution network of the Nelson Mandela Bay Municipality
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
User-interface evaluation metrics for a typical M-Learning application
- Authors: Kantore, Adelin
- Date: 2011
- Subjects: User interfaces (Computer systems) , Mobile communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9749 , http://hdl.handle.net/10948/1452 , User interfaces (Computer systems) , Mobile communication systems
- Description: Usability is seen as an important aspect for the quality of an M-learning application. Yet very little research has been conducted in this area – particularly in South Africa. Even though the trials of M-learning projects have been witnessed in the country during the last five years, very little is known about the systems that were implemented as regards their usability. Additionally, metrics and measures used in evaluating usability have not been reported. A need exists for relevant metrics to M-learning usability. The primary objective of this work was to propose metrics and measures – for the purpose of evaluating the User-Interfacedesign usability of M-learning application. The research included a literature review of M-learning, as well as the development of metrics and measures based on the Goal Question Metric (GQM) Model. This model has helped provide a reference model and measurements for evaluating the User-InterfaceUsability. A case study was used as a research strategy. An application called Kontax was selected for evaluation by users and expert reviewers. Data-collection methods consisted of User Testing and Heuristics evaluations. Data-gathering instruments included the use of surveys and user- satisfaction questionnaires based on the proposed metrics, task scenarios and expert-reviewed questionnaires based on the proposed metrics; all these instruments were developed. It was found that, although the users thought the system was very interesting, and they wished to hear more about it in the future, the system nevertheless had usability flaws which made it difficult to use. All the users failed to register so that they could use the system; additionally, the system-error messages did not help the users recognize, and recover from an error – leaving the user to simply log out. Help was not adequate, thus making it difficult for first-time users to know what to do when they needed support. The system was also said to have a lot of information presented on its home page, which caused the user to be disoriented. The Kontax application has usability flaws which should be III attended to, in order to improve its usability. The proposed metrics proved to be very useful in evaluating the usability of the tool.
- Full Text:
- Date Issued: 2011
- Authors: Kantore, Adelin
- Date: 2011
- Subjects: User interfaces (Computer systems) , Mobile communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9749 , http://hdl.handle.net/10948/1452 , User interfaces (Computer systems) , Mobile communication systems
- Description: Usability is seen as an important aspect for the quality of an M-learning application. Yet very little research has been conducted in this area – particularly in South Africa. Even though the trials of M-learning projects have been witnessed in the country during the last five years, very little is known about the systems that were implemented as regards their usability. Additionally, metrics and measures used in evaluating usability have not been reported. A need exists for relevant metrics to M-learning usability. The primary objective of this work was to propose metrics and measures – for the purpose of evaluating the User-Interfacedesign usability of M-learning application. The research included a literature review of M-learning, as well as the development of metrics and measures based on the Goal Question Metric (GQM) Model. This model has helped provide a reference model and measurements for evaluating the User-InterfaceUsability. A case study was used as a research strategy. An application called Kontax was selected for evaluation by users and expert reviewers. Data-collection methods consisted of User Testing and Heuristics evaluations. Data-gathering instruments included the use of surveys and user- satisfaction questionnaires based on the proposed metrics, task scenarios and expert-reviewed questionnaires based on the proposed metrics; all these instruments were developed. It was found that, although the users thought the system was very interesting, and they wished to hear more about it in the future, the system nevertheless had usability flaws which made it difficult to use. All the users failed to register so that they could use the system; additionally, the system-error messages did not help the users recognize, and recover from an error – leaving the user to simply log out. Help was not adequate, thus making it difficult for first-time users to know what to do when they needed support. The system was also said to have a lot of information presented on its home page, which caused the user to be disoriented. The Kontax application has usability flaws which should be III attended to, in order to improve its usability. The proposed metrics proved to be very useful in evaluating the usability of the tool.
- Full Text:
- Date Issued: 2011
From desktop to mobile : a framework for function and content transformation
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
A model for cultivating resistance to social engineering attacks
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
Hydrogen economy : MEA manufacturing for PEM electrolysers
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
Reviewing medium: paint as flesh
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
A model for assessing the anticipated relative financial impact of implementing the tools of lean manufacturing on a manufacturing concern
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011