A case study approach to assess the growth towards world class at EH Walton Packaging (Pty) Ltd
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
- Authors: Piron, Susan
- Date: 2008
- Subjects: Total quality management , Manufacturing resource planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9816 , http://hdl.handle.net/10948/d1018759
- Description: The Printing and Packaging Industry in South Africa has become very competitive over the last decade. Imports and the move towards environmentally friendly packaging have put additional strain on certain sectors of this industry. EH Walton Packaging (Pty) Ltd is one of oldest converters in the industry, established in 1845, and has always been a leader with regards to new technology. It has grown from a small, family business to one of the biggest and most respected in South Africa, but it is still a private company. Due to the rapid growth the shareholders approved a multi-million rand expansion project in 2000. After completion the anticipated increase in shareholder value did not materialize, even though the production facility is always busy. The objective of this research study is to demonstrate to senior management that quality does not end with accreditation of ISO 9001:2000, but that total quality management is invaluable as a business strategy to reach world class manufacturing standards and to sustain organisational excellence. The research will investigate the origins and development of total quality management and world-class manufacturing and extract the most important elements that form the basis of sustainable competitiveness, as well as research done on the reasons why businesses fail. These elements will be further investigated, with special emphasis on the African/South African environment. Research showed that sustained excellence in business and quality is based on customer focus, guided by strategic planning, with leadership at the core, enhanced by philosophy, employee improvement and involvement, and quality assurance. Failure of achieving excellence is best summarized by Deming’s Seven Deadly Sins. The case study approach that was followed to determine the status of total quality elements within the company yielded contrasting results. A number of the “sins” were identified as present in the business strategy; levels of leadership varies from traditional Summary to high performance; understanding of where the company is heading is fragmented; there are no social programs in place and training only concentrates on apprenticeships and not on developing shop floor skills – to mention a few. Surprising is the world-class orientation with regards to customers; but again, this is contrasted with the lack of active customer satisfaction initiatives. The study concludes that although many negative aspects exist and that the prevailing culture does not appear to support change towards world-class growth, there is an element of positive energy among employees. Most of the employees who participated in the study believe that the company has a bright future. It is these attitudes that must be used to drive change, with a clear vision, good strategies and world-class leaders.
- Full Text:
- Date Issued: 2008
A critical analysis of the definition of gross income
- Authors: Beck, Tracy Geraldine
- Date: 2008
- Subjects: Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8977 , http://hdl.handle.net/10948/805 , Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Description: Income tax is levied upon a taxpayer’s taxable income. Various steps are taken in order to arrive at the taxpayer’s taxable income. The starting point when calculating taxable income is determining the taxpayer’s ‘gross income’. ‘Gross income’ is defined in terms of section 1 of the Act. Various terms within the gross income definition are not clearly defined, except in the case of a ‘resident’. Even in the case of the definition of a ‘resident’, the aspect of ‘ordinarily resident’ is not defined and nor is the ‘place of effective management’. The following components fall within the definition of ‘gross income’: • The total amount in cash or otherwise; • received by or accrued to, or in favour of, a person; • from anywhere, in the case of a person who is a resident; • from a South African source (or deemed source), in the case of a non-resident; • other than receipts or accruals of a capital nature. The ‘total amount’ in ‘cash or otherwise’ is the first step when determining the taxable income of a taxpayer for a particular year of assessment. Gross income only arises if an amount is received or has accrued; this amount need not be in the form of money but must have a money value. The next component, ‘received by or accrued to’, is related to time and implies that a taxpayer should include amounts that have been ‘received by’, as well as amounts that have ‘accrued to’ him during the year of assessment. ‘Resident’ and ‘non-resident’ unlike the other components, are defined in terms of section 1 of the Income Tax Act. There are two rules used to determine whether natural persons are residents, these are: • To determine whether natural persons are ‘ordinarily resident’; or • where the natural person is not an ‘ordinarily resident’, the ‘physical presence test’ will be applied. ‘Source’ means origin and not place; it is therefore the ‘originating cause of the receipt of the money’. There is no single definition for the word ‘source’ as circumstances may differ in various cases. The facts of each case must be analysed in order to determine the actual source of income for that particular case. The last component of the definition of ‘gross income’ is the exclusion of ‘receipts and accruals of a capital nature’. The Act does not define the meaning of ‘capital nature’ but does indicate that receipts or accruals of a capital nature are, with certain exceptions, not included in ‘gross income’. Receipts or accruals that are not of a capital nature is known as ‘revenue’ and subjected to tax. This study is primarily aimed at an examination of court cases related to the various components falling within the definition of ‘gross income’.
- Full Text:
- Date Issued: 2008
- Authors: Beck, Tracy Geraldine
- Date: 2008
- Subjects: Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8977 , http://hdl.handle.net/10948/805 , Income tax -- Law and legislation -- South Africa -- Interpretation and construction , Capital gains tax -- South Africa , Income tax -- South Africa
- Description: Income tax is levied upon a taxpayer’s taxable income. Various steps are taken in order to arrive at the taxpayer’s taxable income. The starting point when calculating taxable income is determining the taxpayer’s ‘gross income’. ‘Gross income’ is defined in terms of section 1 of the Act. Various terms within the gross income definition are not clearly defined, except in the case of a ‘resident’. Even in the case of the definition of a ‘resident’, the aspect of ‘ordinarily resident’ is not defined and nor is the ‘place of effective management’. The following components fall within the definition of ‘gross income’: • The total amount in cash or otherwise; • received by or accrued to, or in favour of, a person; • from anywhere, in the case of a person who is a resident; • from a South African source (or deemed source), in the case of a non-resident; • other than receipts or accruals of a capital nature. The ‘total amount’ in ‘cash or otherwise’ is the first step when determining the taxable income of a taxpayer for a particular year of assessment. Gross income only arises if an amount is received or has accrued; this amount need not be in the form of money but must have a money value. The next component, ‘received by or accrued to’, is related to time and implies that a taxpayer should include amounts that have been ‘received by’, as well as amounts that have ‘accrued to’ him during the year of assessment. ‘Resident’ and ‘non-resident’ unlike the other components, are defined in terms of section 1 of the Income Tax Act. There are two rules used to determine whether natural persons are residents, these are: • To determine whether natural persons are ‘ordinarily resident’; or • where the natural person is not an ‘ordinarily resident’, the ‘physical presence test’ will be applied. ‘Source’ means origin and not place; it is therefore the ‘originating cause of the receipt of the money’. There is no single definition for the word ‘source’ as circumstances may differ in various cases. The facts of each case must be analysed in order to determine the actual source of income for that particular case. The last component of the definition of ‘gross income’ is the exclusion of ‘receipts and accruals of a capital nature’. The Act does not define the meaning of ‘capital nature’ but does indicate that receipts or accruals of a capital nature are, with certain exceptions, not included in ‘gross income’. Receipts or accruals that are not of a capital nature is known as ‘revenue’ and subjected to tax. This study is primarily aimed at an examination of court cases related to the various components falling within the definition of ‘gross income’.
- Full Text:
- Date Issued: 2008
A framework for managing timetable data quality within the NMMU
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
A model for legal compliance in the South African banking sector : an information security perspective
- Maphakela, Madidimalo Rabbie
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
- Authors: Maphakela, Madidimalo Rabbie
- Date: 2008
- Subjects: Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9783 , http://hdl.handle.net/10948/725 , Database security -- South Africa , Computer security -- South Africa , Computer networks -- Security measures -- South Africa
- Description: In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
- Full Text:
- Date Issued: 2008
A model for role-based security education, training and awareness in the South African healthcare environment
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
- Authors: Maseti, Ophola S
- Date: 2008
- Subjects: Medical care -- South Africa -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9784 , http://hdl.handle.net/10948/724 , Medical care -- South Africa -- Data processing
- Description: It is generally accepted that a business operates more efficiently when it is able to consolidate information from a variety of sources. This principle applies as much in the healthcare environment. Although limited in the South African context, the use of electronic systems to access information is advancing rapidly. Many aspects have to be considered in regards to such a high availability of information, for example, training people how to access and protect information, motivating them to use the systems and information extensively and effectively, ensuring adequate levels of security, confronting ethical issues and maintaining the availability of information at crucial times. This is especially true in the healthcare sector, where access to critical data is often vital. This data must be accessed by different kinds of people with different levels of access. However, accessibility often leads to vulnerabilities. The healthcare sector deals with very sensitive data. People’s medical records need to be kept confidential; hence, security is very important. Information of a very sensitive nature is exposed to human intervention on various levels (e.g. nurses, administrative staff, general practitioners and specialists). In this scenario, it is important for each person to be aware of the requirements in terms of security and privacy, especially from a legal perspective. Because of the large dependence on the human factor in maintaining information security, organisations must employ mechanisms that address this at the staff level. One such mechanism is information security education, training and awareness programmes. As the learner is the recipient of information in such a programme, it is increasingly important that it targets the audience that it is intended for. This will maximize the benefits achieved from such a programme. This can be achieved through following a role-based approach in the design and development of the SETA programme. This research therefore proposes a model for a role-based SETA programme, with the area of application being in the South African healthcare environment.
- Full Text:
- Date Issued: 2008
A standards-based security model for health information systems
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
- Authors: Thomson, Steven Michael
- Date: 2008
- Subjects: Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9786 , http://hdl.handle.net/10948/718 , Computer networks -- Security measures -- Standards -- South Africa , Data protection -- Management -- Standards , Computer security -- South Africa -- Management , Computers -- Access control -- South Africa , Management information systems -- Security measures -- South Africa
- Description: In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
- Full Text:
- Date Issued: 2008
Absenteeism management at Willard Batteries
- Authors: Paul, Gary William
- Date: 2008
- Subjects: Absenteeism (Labor) -- Management , Absenteeism (Labor) -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9383 , http://hdl.handle.net/10948/896 , Absenteeism (Labor) -- Management , Absenteeism (Labor) -- South Africa
- Description: The main research problem in this study centred around the assessment of the impact of an absenteeism monitoring and management system at Willard Batteries. The main research problem had five sub-problems which were addressed through the following actions: A literature study was conducted to identify the causes and impact of absenteeism in the workplace. The researcher also conducted interviews with the Human Resources Manager, line managers and employees at Willard Batteries to obtain their views of the absenteeism management strategies utilised, as well as the effects of absenteeism in their organisation. The insights gained from these interviews were incorporated into the questionnaire. The absenteeism figures of the organisation for the period 2005 to 2008 were analysed and compared against the internationally accepted absenteeism norm of three percent. An absence rate above three percent is considered as unacceptable and would imply that the current absenteeism management system is not effective. The theoretical study also entailed the reviewing of the legal framework within which absenteeism needs to be managed, as well as the literature that deals with strategies for the effective management of absenteeism. These strategies relate to the recording, calculation, analysis, benchmarking and practical management of absenteeism in the workplace. A survey questionnaire was developed to determine the perceptions of managers, supervisors and employees in relation to the impact of absenteeism on the company as well as the extent to which managers and supervisors were utilising selected absenteeism monitoring and management strategies within the company. The results from the empirical study revealed that management and supervisors were more aware of the impact of absenteeism on the organisation than their employees. It can therefore be concluded that employees perceived their absence from work to have little impact on aspects such as employee morale, cost, production and the customer. This could possibly be due to ineffective communication in terms of the cost and other consequences of absenteeism in the organisation. Employees also felt that managers were effective in taking the necessary disciplinary action with regards to absenteeism-related transgressions, but that they were not diligent in the recording and communication of absence information, as well as comparing absenteeism information inter-departmentally. Absenteeism has proven to be globally pervasive, expensive and extremely disruptive to organisations. Managers and supervisors who employ the various absence monitoring and management strategies, could be more effective in improving employee attendance. Their efforts could be further enhanced if employees are made aware of the negative impact that their absence has on the morale of their fellow employees, the cost to the company, the customer, as well as the achievement of production targets and the quality of outputs.
- Full Text:
- Date Issued: 2008
- Authors: Paul, Gary William
- Date: 2008
- Subjects: Absenteeism (Labor) -- Management , Absenteeism (Labor) -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9383 , http://hdl.handle.net/10948/896 , Absenteeism (Labor) -- Management , Absenteeism (Labor) -- South Africa
- Description: The main research problem in this study centred around the assessment of the impact of an absenteeism monitoring and management system at Willard Batteries. The main research problem had five sub-problems which were addressed through the following actions: A literature study was conducted to identify the causes and impact of absenteeism in the workplace. The researcher also conducted interviews with the Human Resources Manager, line managers and employees at Willard Batteries to obtain their views of the absenteeism management strategies utilised, as well as the effects of absenteeism in their organisation. The insights gained from these interviews were incorporated into the questionnaire. The absenteeism figures of the organisation for the period 2005 to 2008 were analysed and compared against the internationally accepted absenteeism norm of three percent. An absence rate above three percent is considered as unacceptable and would imply that the current absenteeism management system is not effective. The theoretical study also entailed the reviewing of the legal framework within which absenteeism needs to be managed, as well as the literature that deals with strategies for the effective management of absenteeism. These strategies relate to the recording, calculation, analysis, benchmarking and practical management of absenteeism in the workplace. A survey questionnaire was developed to determine the perceptions of managers, supervisors and employees in relation to the impact of absenteeism on the company as well as the extent to which managers and supervisors were utilising selected absenteeism monitoring and management strategies within the company. The results from the empirical study revealed that management and supervisors were more aware of the impact of absenteeism on the organisation than their employees. It can therefore be concluded that employees perceived their absence from work to have little impact on aspects such as employee morale, cost, production and the customer. This could possibly be due to ineffective communication in terms of the cost and other consequences of absenteeism in the organisation. Employees also felt that managers were effective in taking the necessary disciplinary action with regards to absenteeism-related transgressions, but that they were not diligent in the recording and communication of absence information, as well as comparing absenteeism information inter-departmentally. Absenteeism has proven to be globally pervasive, expensive and extremely disruptive to organisations. Managers and supervisors who employ the various absence monitoring and management strategies, could be more effective in improving employee attendance. Their efforts could be further enhanced if employees are made aware of the negative impact that their absence has on the morale of their fellow employees, the cost to the company, the customer, as well as the achievement of production targets and the quality of outputs.
- Full Text:
- Date Issued: 2008
Adoption of business information systems in an automotive manufacturing environment: a case study
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
- Authors: Dyer, Shirley
- Date: 2008
- Subjects: Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9772 , http://hdl.handle.net/10948/892 , Management information systems , Technology -- Information services , Information resources management , Business -- Data processing
- Description: Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
- Full Text:
- Date Issued: 2008
Alternative products in the inhibition of te plant pathogen scleroyinia sclerotiorum on potato production
- Authors: Dhliwayo, Tererayi
- Date: 2008
- Subjects: Potatoes -- Diseases and pests
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10587 , http://hdl.handle.net/10948/941 , Potatoes -- Diseases and pests
- Description: White mold caused by Sclerotinia sclerotiorum attacks a wide host range of broad-leafed plants which includes potatoes. Current control is limited to the use of chemicals, but biological control has emerged as an eco-friendly alternative. For the study, 19 bacterial strains and 18 fungal strains obtained from soil samples taken from a potato field naturally infested with the pathogen S. sclerotiorum were tested for the effects on S. sclerotiorum mycelium growth and sclerotia viability in vitro. A total of eight bacterial strains and six fungal strains proved to be effective in the inhibition of S. sclerotiorum mycelium growth on PDA plate using a dual culture technique. These antagonistic microbes were six Bacillus subtilis, Bacillus pumilis, Bacillus marisflavi, Fusarium solani, Fusarium equiseti, Fusarium chlamydosporum, Aspergillus niger, Aspergillus insuetus and Penicillium citrinum. There was a significant difference (p<0.05) in the interaction between S. sclerotiorum mycelium growth and the time after inoculation with a S. sclerotiorum mycelium plug for both bacterial and fungal soil isolates. An additional sclerotia viability test was carried out using four of the eight antagonistic bacteria, and six of the antagonistic fungi. The results showed that two Bacillus species, namely B. pumilis and B. marisflavi can effectively reduce sclerotia viability. The other two bacteria (both B. subtilis), recorded low percentage reduction in sclerotia viability. As for the six antagonistic fungi, the viability test proved to be less effective in determining sclerotia viability. However, the result of this study supports the use of bio-control agents, not only because they are environmentally friendly, but because they are also an effective way of controlling the plant pathogen, S. sclerotiorum.
- Full Text:
- Date Issued: 2008
- Authors: Dhliwayo, Tererayi
- Date: 2008
- Subjects: Potatoes -- Diseases and pests
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10587 , http://hdl.handle.net/10948/941 , Potatoes -- Diseases and pests
- Description: White mold caused by Sclerotinia sclerotiorum attacks a wide host range of broad-leafed plants which includes potatoes. Current control is limited to the use of chemicals, but biological control has emerged as an eco-friendly alternative. For the study, 19 bacterial strains and 18 fungal strains obtained from soil samples taken from a potato field naturally infested with the pathogen S. sclerotiorum were tested for the effects on S. sclerotiorum mycelium growth and sclerotia viability in vitro. A total of eight bacterial strains and six fungal strains proved to be effective in the inhibition of S. sclerotiorum mycelium growth on PDA plate using a dual culture technique. These antagonistic microbes were six Bacillus subtilis, Bacillus pumilis, Bacillus marisflavi, Fusarium solani, Fusarium equiseti, Fusarium chlamydosporum, Aspergillus niger, Aspergillus insuetus and Penicillium citrinum. There was a significant difference (p<0.05) in the interaction between S. sclerotiorum mycelium growth and the time after inoculation with a S. sclerotiorum mycelium plug for both bacterial and fungal soil isolates. An additional sclerotia viability test was carried out using four of the eight antagonistic bacteria, and six of the antagonistic fungi. The results showed that two Bacillus species, namely B. pumilis and B. marisflavi can effectively reduce sclerotia viability. The other two bacteria (both B. subtilis), recorded low percentage reduction in sclerotia viability. As for the six antagonistic fungi, the viability test proved to be less effective in determining sclerotia viability. However, the result of this study supports the use of bio-control agents, not only because they are environmentally friendly, but because they are also an effective way of controlling the plant pathogen, S. sclerotiorum.
- Full Text:
- Date Issued: 2008
An evaluation of how dividend policies impact on the share value of selected companies
- Authors: Barman, Graham Paul
- Date: 2008
- Subjects: Dividends , Corporations -- Valuation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8976 , http://hdl.handle.net/10948/806 , Dividends , Corporations -- Valuation
- Description: Wealth maximisation for shareholders is a combination of dividend payouts and an increase in share price. Management, as custodians of shareholder interest, should therefore consciously work towards influencing the share price favourably. The purpose of this study is to examine and analyse, through an empirical study, dividend policy and the effect, if any, it has on the value of shares by conducting a survey among financial managers to measure their views regarding dividends and share value and to either validate or disprove the academic explanation of the practice of paying dividends.
- Full Text:
- Date Issued: 2008
- Authors: Barman, Graham Paul
- Date: 2008
- Subjects: Dividends , Corporations -- Valuation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8976 , http://hdl.handle.net/10948/806 , Dividends , Corporations -- Valuation
- Description: Wealth maximisation for shareholders is a combination of dividend payouts and an increase in share price. Management, as custodians of shareholder interest, should therefore consciously work towards influencing the share price favourably. The purpose of this study is to examine and analyse, through an empirical study, dividend policy and the effect, if any, it has on the value of shares by conducting a survey among financial managers to measure their views regarding dividends and share value and to either validate or disprove the academic explanation of the practice of paying dividends.
- Full Text:
- Date Issued: 2008
An overview of the management practices for wool production amongst the communal farmers of the Hewu district in the Eastern Cape Province
- Authors: Makapela, Mbulelo Joseph
- Date: 2008
- Subjects: Sheep industry -- South Africa -- Eastern Cape , Wool industry -- South Africa -- Eastern Cape , Sheep -- South Africa -- Eastern Cape -- Reproduction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10734 , http://hdl.handle.net/10948/1009 , Sheep industry -- South Africa -- Eastern Cape , Wool industry -- South Africa -- Eastern Cape , Sheep -- South Africa -- Eastern Cape -- Reproduction
- Description: The research was conducted in the Hewu area situated between Queenstown (20 km) and Whittlesea (15km) in the Eastern Cape Province of South Africa. In this area communal farming is practiced. Livestock and livestock products (wool) are the main sources of income. The farmers are mainly farming with Merino and Döhne Merino sheep. The lack of management systems (production, reproduction and management) for communal farmers resulted into ineffective communal farming defining the research problem. The research objectives set were: • To establish production norms for wool sheep. • To establish reproduction norms for wool sheep. • To establish effective management practices for wool sheep farmers. • To examine key constraints of wool sheep farmers. The farmers shear their sheep every 12 months usually in October of every year. The average wool production per sheep is 2.17kg. The clip averages a fineness of 19.1-20 micron. That is far below the wool production of the commercial farmers of the Eastern Cape who are producing between 4kg to 5kg per sheep at an average growing period of 12 months. The lack of proper fencing and camps causes major reproduction problems. The lambing percentage of the ewes is 94.85 percent. The weaning percentage referring to the reproductive efficiency of the mated ewes is only 17.24 percent. The survival rate of the lambs born alive is only 18.18 percent. Reproduction is the biggest problem of communal farms. Effective livestock- and grazing management systems for communal areas are essential for the successful development of farmers on communal grazing areas. Unfortunately the Hewu farmers still have many problems effecting their wool production and the production of lambs.
- Full Text:
- Date Issued: 2008
- Authors: Makapela, Mbulelo Joseph
- Date: 2008
- Subjects: Sheep industry -- South Africa -- Eastern Cape , Wool industry -- South Africa -- Eastern Cape , Sheep -- South Africa -- Eastern Cape -- Reproduction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10734 , http://hdl.handle.net/10948/1009 , Sheep industry -- South Africa -- Eastern Cape , Wool industry -- South Africa -- Eastern Cape , Sheep -- South Africa -- Eastern Cape -- Reproduction
- Description: The research was conducted in the Hewu area situated between Queenstown (20 km) and Whittlesea (15km) in the Eastern Cape Province of South Africa. In this area communal farming is practiced. Livestock and livestock products (wool) are the main sources of income. The farmers are mainly farming with Merino and Döhne Merino sheep. The lack of management systems (production, reproduction and management) for communal farmers resulted into ineffective communal farming defining the research problem. The research objectives set were: • To establish production norms for wool sheep. • To establish reproduction norms for wool sheep. • To establish effective management practices for wool sheep farmers. • To examine key constraints of wool sheep farmers. The farmers shear their sheep every 12 months usually in October of every year. The average wool production per sheep is 2.17kg. The clip averages a fineness of 19.1-20 micron. That is far below the wool production of the commercial farmers of the Eastern Cape who are producing between 4kg to 5kg per sheep at an average growing period of 12 months. The lack of proper fencing and camps causes major reproduction problems. The lambing percentage of the ewes is 94.85 percent. The weaning percentage referring to the reproductive efficiency of the mated ewes is only 17.24 percent. The survival rate of the lambs born alive is only 18.18 percent. Reproduction is the biggest problem of communal farms. Effective livestock- and grazing management systems for communal areas are essential for the successful development of farmers on communal grazing areas. Unfortunately the Hewu farmers still have many problems effecting their wool production and the production of lambs.
- Full Text:
- Date Issued: 2008
Analysis and modelling of the temperature distribution during the friction taper stud welding of 10CrMo910
- Van Zyl, Carlo Angelo Antonio
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
- Authors: Van Zyl, Carlo Angelo Antonio
- Date: 2008
- Subjects: Friction welding , Pressure welding
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9630 , http://hdl.handle.net/10948/720 , http://hdl.handle.net/10948/d1012898 , Friction welding , Pressure welding
- Description: Heat generation during the FTSW process plays and important role in determining the characteristics of the weld. In order to obtain temperature fields, a transient temperature heat analysis is required. An area is the maximum temperatures reached within the base material during the FTSW process. These temperatures will be measured during experimentation, and compared to the welding simulation done using FEA. From the literature search it appeared that no heat transfer analysis had been done using finite element methods.
- Full Text:
- Date Issued: 2008
Business process security maturity: a paradigm convergence
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
- Authors: Box, Debra
- Date: 2008
- Subjects: Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9785 , http://hdl.handle.net/10948/722 , Management information systems , Reengineering (Management) , Organizational change , Systems engineering , Information resources management
- Description: Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
- Full Text:
- Date Issued: 2008
Corporate governance for sustainable development : implications for non-executive directors and the management accounting function
- Jodwana, Thembinkosi Anthony Vincent
- Authors: Jodwana, Thembinkosi Anthony Vincent
- Date: 2008
- Subjects: Corporate governance , Sustainable development , Directors of corporations , Corporations -- Finance -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8975 , http://hdl.handle.net/10948/807 , Corporate governance , Sustainable development , Directors of corporations , Corporations -- Finance -- Management
- Description: This paper will discuss the role that corporate governance can play in promoting sustainable development. Sustainable development is discussed in relation to three things: • Current development which does not result in the damage and destruction of the environment to the detriment of future inhabitants of this planet. This paper will discuss the role that corporate governance can play in promoting sustainable development. Sustainable development is discussed in relation to three things: • Current development which does not result in the damage and destruction of the environment to the detriment of future inhabitants of this planet.
- Full Text:
- Date Issued: 2008
- Authors: Jodwana, Thembinkosi Anthony Vincent
- Date: 2008
- Subjects: Corporate governance , Sustainable development , Directors of corporations , Corporations -- Finance -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8975 , http://hdl.handle.net/10948/807 , Corporate governance , Sustainable development , Directors of corporations , Corporations -- Finance -- Management
- Description: This paper will discuss the role that corporate governance can play in promoting sustainable development. Sustainable development is discussed in relation to three things: • Current development which does not result in the damage and destruction of the environment to the detriment of future inhabitants of this planet. This paper will discuss the role that corporate governance can play in promoting sustainable development. Sustainable development is discussed in relation to three things: • Current development which does not result in the damage and destruction of the environment to the detriment of future inhabitants of this planet.
- Full Text:
- Date Issued: 2008
Designing accessible portals in South Africa: a case study
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
- Authors: Meyer, Shaun
- Date: 2008
- Subjects: Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9782 , http://hdl.handle.net/10948/770 , Web portals -- South Africa -- Port Elizabeth , Web site development -- South Africa -- Port Elizabeth , Internet programming , Web sites -- Design
- Description: Web portals are considered “gateways” to the World Wide Web. These portals are becoming very popular entry points to the Web by offering important services such as email, news, weather reports, course notes and general information. In addition, some portal sites allow users the option of customising the site according to their personal interests. However, disabled and elderly people encounter many accessibility and usability barriers while accessing web portals. A preliminary review of a university portal was conducted to identify some of these accessibility problems. This treatise presents an overview of the processes to be followed when conducting an accessibility and usability evaluation. In addition, it mentions some guidelines to be considered when specifically designing portals for use by many different users from varying backgrounds.
- Full Text:
- Date Issued: 2008
Effect of a South African medicinal plant on antiretroviral drug induced abnormalities in rats
- Authors: Van Gend, Tania Anli
- Date: 2008
- Subjects: Medicinal plants -- South Africa , Antiretroviral agents -- South Africa , Materia medica, Vegetable -- South Africa , HIV infections -- Alternative treatment -- South Africa , Rats as laboratory animals , Rats -- Metabolism
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10121 , http://hdl.handle.net/10948/1080 , Medicinal plants -- South Africa , Antiretroviral agents -- South Africa , Materia medica, Vegetable -- South Africa , HIV infections -- Alternative treatment -- South Africa , Rats as laboratory animals , Rats -- Metabolism
- Description: The worldwide AIDS epidemic is known to have had a profoundly negative social, economic and personal impact and has taken a heavy toll on existing health care systems, particularly in developing countries. South Africa is experiencing an HIV epidemic with enormous social and economic consequences. Lopinavir/ritonavir antiretroviral treatment has been accredited with having a significantly positive effect and is a key advance in controlling HIV morbidity and mortality. An indigenous South African medicinal plant, Sutherlandia frutescens, known for its anti-diabetic properties and immune-boosting effects, is used for treating HIV positive patients suffering from opportunistic infections. Despite the use of the medicinal plant extract as homeotherapeutic medication, there is little evidence of toxicity testing that identifies its potential for interaction with antiretroviral drugs. However, scientific data relating to the mechanism through which Sutherlandia frutescens acts on the immune system has not been comprehensively documented. The aim of this study was to investigate lopinavir/ritonavir induced metabolic abnormalities in rats and whether the introduction of a plant extract of Sutherlandia frutescens would counteract the side effects of ARV medication. The results indicated that the rodents did not become insulin resistant, however, biochemical analysis indicated that extended ARV drug treatment would have caused insulin resistance. Significant morphological changes were found in the livers, kidneys and pancreases of rats exposed to the lopinavir/ritonavir. Rats exposed to the Sutherlandia frutescens plant extract showed improved histopathology with minimal abnormalities.
- Full Text:
- Date Issued: 2008
- Authors: Van Gend, Tania Anli
- Date: 2008
- Subjects: Medicinal plants -- South Africa , Antiretroviral agents -- South Africa , Materia medica, Vegetable -- South Africa , HIV infections -- Alternative treatment -- South Africa , Rats as laboratory animals , Rats -- Metabolism
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10121 , http://hdl.handle.net/10948/1080 , Medicinal plants -- South Africa , Antiretroviral agents -- South Africa , Materia medica, Vegetable -- South Africa , HIV infections -- Alternative treatment -- South Africa , Rats as laboratory animals , Rats -- Metabolism
- Description: The worldwide AIDS epidemic is known to have had a profoundly negative social, economic and personal impact and has taken a heavy toll on existing health care systems, particularly in developing countries. South Africa is experiencing an HIV epidemic with enormous social and economic consequences. Lopinavir/ritonavir antiretroviral treatment has been accredited with having a significantly positive effect and is a key advance in controlling HIV morbidity and mortality. An indigenous South African medicinal plant, Sutherlandia frutescens, known for its anti-diabetic properties and immune-boosting effects, is used for treating HIV positive patients suffering from opportunistic infections. Despite the use of the medicinal plant extract as homeotherapeutic medication, there is little evidence of toxicity testing that identifies its potential for interaction with antiretroviral drugs. However, scientific data relating to the mechanism through which Sutherlandia frutescens acts on the immune system has not been comprehensively documented. The aim of this study was to investigate lopinavir/ritonavir induced metabolic abnormalities in rats and whether the introduction of a plant extract of Sutherlandia frutescens would counteract the side effects of ARV medication. The results indicated that the rodents did not become insulin resistant, however, biochemical analysis indicated that extended ARV drug treatment would have caused insulin resistance. Significant morphological changes were found in the livers, kidneys and pancreases of rats exposed to the lopinavir/ritonavir. Rats exposed to the Sutherlandia frutescens plant extract showed improved histopathology with minimal abnormalities.
- Full Text:
- Date Issued: 2008
Environmental health work methods and procedures for the surveillance and control of avian influenza in the Eastern Cape Province, South Africa
- Authors: Elie, Sammy Abraham
- Date: 2008
- Subjects: Avian influenza -- Eastern Cape -- South Africa -- Prevention , Environmental health -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9834 , http://hdl.handle.net/10948/947 , http://hdl.handle.net/10948/d1009648 , Avian influenza -- Eastern Cape -- South Africa -- Prevention , Environmental health -- South Africa -- Eastern Cape
- Description: Avian influenza is an infectious disease of birds caused by the Type A strain of the influenza virus. The disease, which was first identified in Italy more than 100 years ago, occurs worldwide (World Health Organization, 2006a). The current outbreak of the highly pathogenic avian influenza A (H5N1), which began in Southeast Asia in mid-2003, is the largest and most severe on record. Never before in the recorded history of this disease have so many countries been simultaneously affected. Since the last pandemic in 1968-1969, the risk of an influenza pandemic has not been considered greater than at the present time. The importance of intervention strategies had become increasingly evident throughout the world. The World Health Organization provides a generic outline for preparedness plans to assist countries in their preparations to respond to a possible avian influenza pandemic. These guidelines may be modified as the epidemiology of avian influenza evolves. The South African National Department of Health has developed national guidelines in the form of an avian influenza preparedness plan. These draft guidelines do not provide detailed Environmental Health work methods and - procedures for the effective surveillance and control of the disease. The general purpose of this study is to develop a standardised set of Environmental Health work methods and - procedures, which will contribute to the effective surveillance and control of avian influenza in the Eastern Cape province – South Africa. Within the context of the purpose of this study, a qualitative, explorative, descriptive, inductive and deductive research design will be used. The methods of data collection will be documentary research, telephonic as well as in-depth personal interviews. In this study, documentary research will be the primary method of data collection. With a qualitative approach, the researcher will be the human instrument for data analysis. The process of qualitative data analysis will be based on data reduction and interpretation; and will be conducted as an activity simultaneously with data collection, data interpretation and narrative reporting writing.
- Full Text:
- Date Issued: 2008
- Authors: Elie, Sammy Abraham
- Date: 2008
- Subjects: Avian influenza -- Eastern Cape -- South Africa -- Prevention , Environmental health -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9834 , http://hdl.handle.net/10948/947 , http://hdl.handle.net/10948/d1009648 , Avian influenza -- Eastern Cape -- South Africa -- Prevention , Environmental health -- South Africa -- Eastern Cape
- Description: Avian influenza is an infectious disease of birds caused by the Type A strain of the influenza virus. The disease, which was first identified in Italy more than 100 years ago, occurs worldwide (World Health Organization, 2006a). The current outbreak of the highly pathogenic avian influenza A (H5N1), which began in Southeast Asia in mid-2003, is the largest and most severe on record. Never before in the recorded history of this disease have so many countries been simultaneously affected. Since the last pandemic in 1968-1969, the risk of an influenza pandemic has not been considered greater than at the present time. The importance of intervention strategies had become increasingly evident throughout the world. The World Health Organization provides a generic outline for preparedness plans to assist countries in their preparations to respond to a possible avian influenza pandemic. These guidelines may be modified as the epidemiology of avian influenza evolves. The South African National Department of Health has developed national guidelines in the form of an avian influenza preparedness plan. These draft guidelines do not provide detailed Environmental Health work methods and - procedures for the effective surveillance and control of the disease. The general purpose of this study is to develop a standardised set of Environmental Health work methods and - procedures, which will contribute to the effective surveillance and control of avian influenza in the Eastern Cape province – South Africa. Within the context of the purpose of this study, a qualitative, explorative, descriptive, inductive and deductive research design will be used. The methods of data collection will be documentary research, telephonic as well as in-depth personal interviews. In this study, documentary research will be the primary method of data collection. With a qualitative approach, the researcher will be the human instrument for data analysis. The process of qualitative data analysis will be based on data reduction and interpretation; and will be conducted as an activity simultaneously with data collection, data interpretation and narrative reporting writing.
- Full Text:
- Date Issued: 2008
Faktore wat die oorlewing van volstruiskuikens (Struthio Camelus) verhoog
- Authors: Janse Van Vuuren, Maryke
- Date: 2008
- Subjects: Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Language: Afrikaans
- Type: Thesis , Masters , MTech
- Identifier: vital:10588 , http://hdl.handle.net/10948/848 , Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Description: Hierdie verhandeling is ‘n samestelling van verskeie studies, elk opgeskryf in die formaat en styl soos vereis deur die Suid-Afrikaanse Vereeniging vir Diereproduksie (South African Society of Animal Science). Hoofstuk 1 is ‘n literatuurstudie bestaande uit ‘n algemene inleiding wat agtergrond oor die studie verskaf en sluit die probleemstelling in, naamlik die swak oorlewing van volstruiskuikens wat onder kunsmatige toestande grootgemaak word. Hoofstukke 2, 3, 4 en 5 bestaan uit die eerste vier studies, waartydens sekere bestuurs-aspekte, wat moontlik oorlewing van volstruiskuikens kan verbeter (nl: populasiedigtheid, tipe vloer-oppervlak, die aanwending van broeipare en die aanwending van peetouers), ondersoek is. Hoofstukke 6, 7, 8 & 9 handel oor studies wat gerig is om voeding meer aanloklik te maak vir volstruiskuikens teneinde voedselinname te stimuleer en sodoende produksie en oorlewing te verbeter (nl: verskaffing van groenvoer, geur van voer, kleur van voer en beligting van voer). Die laaste hoofstuk bestaan uit ‘n algemene gevolgtrekking en aanbevelings. Alhoewel daar gepoog is om herhaling in hoofstukke te beperk, was dit onmoontlik om herhaling van sekere gedeeltes van hoofstukke te voorkom.
- Full Text:
- Date Issued: 2008
- Authors: Janse Van Vuuren, Maryke
- Date: 2008
- Subjects: Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Language: Afrikaans
- Type: Thesis , Masters , MTech
- Identifier: vital:10588 , http://hdl.handle.net/10948/848 , Ostrich farming -- South Africa , Ostriches -- Breeding -- South Africa
- Description: Hierdie verhandeling is ‘n samestelling van verskeie studies, elk opgeskryf in die formaat en styl soos vereis deur die Suid-Afrikaanse Vereeniging vir Diereproduksie (South African Society of Animal Science). Hoofstuk 1 is ‘n literatuurstudie bestaande uit ‘n algemene inleiding wat agtergrond oor die studie verskaf en sluit die probleemstelling in, naamlik die swak oorlewing van volstruiskuikens wat onder kunsmatige toestande grootgemaak word. Hoofstukke 2, 3, 4 en 5 bestaan uit die eerste vier studies, waartydens sekere bestuurs-aspekte, wat moontlik oorlewing van volstruiskuikens kan verbeter (nl: populasiedigtheid, tipe vloer-oppervlak, die aanwending van broeipare en die aanwending van peetouers), ondersoek is. Hoofstukke 6, 7, 8 & 9 handel oor studies wat gerig is om voeding meer aanloklik te maak vir volstruiskuikens teneinde voedselinname te stimuleer en sodoende produksie en oorlewing te verbeter (nl: verskaffing van groenvoer, geur van voer, kleur van voer en beligting van voer). Die laaste hoofstuk bestaan uit ‘n algemene gevolgtrekking en aanbevelings. Alhoewel daar gepoog is om herhaling in hoofstukke te beperk, was dit onmoontlik om herhaling van sekere gedeeltes van hoofstukke te voorkom.
- Full Text:
- Date Issued: 2008
Geographic variation in the susceptibility of false colding Moth, Thaumatotibia Leucotreta, populations to a granulovirus (CrleGV-SA)
- Authors: Opoku-Debrah, John Kwadwo
- Date: 2008
- Subjects: Cryptophlebia leucotreta , Cryptophlebia leucotreta -- Control , Pests -- Biological control , Citrus -- Diseases and pests
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10586 , http://hdl.handle.net/10948/984 , Cryptophlebia leucotreta , Cryptophlebia leucotreta -- Control , Pests -- Biological control , Citrus -- Diseases and pests
- Description: The false codling moth (FCM), Thaumatotibia (=Cryptophlebia) leucotreta (Meyrick) (Lepidoptera: Tortricidae) is a serious pest of citrus and other crops in Sub-Saharan Africa. The introduction of the Cryptophlebia leucotreta granulovirus (CrleGV-SA) Cryptogran and Cryptex (biopesticides) has proven to be very effective in the control of FCM. However, markedly lower susceptibility of some codling moth (CM), Cydia pomonella (L.) populations to Cydia pomonella granulovirus (CpGV-M), another granulovirus product used in the control of CM’s in Europe have been reported. Genetic differences between FCM populations in South Africa have also been established. It is therefore possible that differences in the susceptibility of these geographically distinct FCM populations to CrleGV-SA might also exist. To investigate this phenomenon, a benchmark for pathogenecity was established. In continuation of previous work with Cryptogran against the 1st and 5th instar FCM larvae, dose-response relationships were established for all five larval instars of FCM. In surface dose-response bioassays, the LC50 values for the 2nd, 3rd and 4th instars were calculated to be 4.516 x 104, 1.662 x 105 and 2.205 x 106 occlusion bodies (OBs)/ml, respectively. The LC90 values for the 2nd, 3rd and 4th instars were calculated to be 4.287 x 106, 9.992 x 106 and 1.661 x 108 OBs/ml, respectively. Susceptibility to CrleGV-SA was found to decline with larval stage and increase with time of exposure. The protocol was used in guiding bioassays with field collected FCM larvae. Laboratory assays conducted with Cryptogran (at 1.661 x 108 OBs/ml) against field collected FCM larvae from Addo, Kirkwood, Citrusdal and Clanwilliam as well as a standard laboratory colony, showed a significant difference in pathogenecity in only one case. This significant difference was observed between 5th instars from the Addo colony and 5th instars from the other populations. Four geographically distinct FCM colonies from Addo, Citrusdal, Marble Hall and Nelspruit were also established. Since Cryptogran and Cryptex are always targeted against 1st instar FCM larvae in the field, further comparative laboratory assays were conducted with the Addo colony and an old laboratory colony. Cryptogran was significantly more pathogenic than Cryptex against both the Addo and the old colony. However, a high level of heterogeneity was observed in responses within each population.
- Full Text:
- Date Issued: 2008
- Authors: Opoku-Debrah, John Kwadwo
- Date: 2008
- Subjects: Cryptophlebia leucotreta , Cryptophlebia leucotreta -- Control , Pests -- Biological control , Citrus -- Diseases and pests
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10586 , http://hdl.handle.net/10948/984 , Cryptophlebia leucotreta , Cryptophlebia leucotreta -- Control , Pests -- Biological control , Citrus -- Diseases and pests
- Description: The false codling moth (FCM), Thaumatotibia (=Cryptophlebia) leucotreta (Meyrick) (Lepidoptera: Tortricidae) is a serious pest of citrus and other crops in Sub-Saharan Africa. The introduction of the Cryptophlebia leucotreta granulovirus (CrleGV-SA) Cryptogran and Cryptex (biopesticides) has proven to be very effective in the control of FCM. However, markedly lower susceptibility of some codling moth (CM), Cydia pomonella (L.) populations to Cydia pomonella granulovirus (CpGV-M), another granulovirus product used in the control of CM’s in Europe have been reported. Genetic differences between FCM populations in South Africa have also been established. It is therefore possible that differences in the susceptibility of these geographically distinct FCM populations to CrleGV-SA might also exist. To investigate this phenomenon, a benchmark for pathogenecity was established. In continuation of previous work with Cryptogran against the 1st and 5th instar FCM larvae, dose-response relationships were established for all five larval instars of FCM. In surface dose-response bioassays, the LC50 values for the 2nd, 3rd and 4th instars were calculated to be 4.516 x 104, 1.662 x 105 and 2.205 x 106 occlusion bodies (OBs)/ml, respectively. The LC90 values for the 2nd, 3rd and 4th instars were calculated to be 4.287 x 106, 9.992 x 106 and 1.661 x 108 OBs/ml, respectively. Susceptibility to CrleGV-SA was found to decline with larval stage and increase with time of exposure. The protocol was used in guiding bioassays with field collected FCM larvae. Laboratory assays conducted with Cryptogran (at 1.661 x 108 OBs/ml) against field collected FCM larvae from Addo, Kirkwood, Citrusdal and Clanwilliam as well as a standard laboratory colony, showed a significant difference in pathogenecity in only one case. This significant difference was observed between 5th instars from the Addo colony and 5th instars from the other populations. Four geographically distinct FCM colonies from Addo, Citrusdal, Marble Hall and Nelspruit were also established. Since Cryptogran and Cryptex are always targeted against 1st instar FCM larvae in the field, further comparative laboratory assays were conducted with the Addo colony and an old laboratory colony. Cryptogran was significantly more pathogenic than Cryptex against both the Addo and the old colony. However, a high level of heterogeneity was observed in responses within each population.
- Full Text:
- Date Issued: 2008
Information communication and technology in Port Elizabeth secondary schools : exploring the digital divide
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008
- Authors: Adebisi, Adeolu Abiodun
- Date: 2008
- Subjects: Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9770 , http://hdl.handle.net/10948/914 , Information technology -- Study and teaching (Secondary) -- South Africa , Educational technology -- South Africa , Information technology -- South Africa , Computer-assisted instruction -- South Africa , Educational innovations
- Description: The primary goal of the research is to investigate the extent of ICT adoption in secondary schools within the larger Port Elizabeth area. In order to demonstrate the current status, two geographical areas within that area namely privileged and less privileged areas will be selected and surveyed. The main objective of this research study is to survey the access to ICT services by learners and teachers living and working in less privileged communities compared with that of learners and teachers in the more privileged communities of Port Elizabeth. At present all the schools in these communities are funded by the same provincial government, but the extent of the digital divide is not known. This research will investigate the factors that lead to the inequalities in the access to ICT among secondary school learners and teachers. This research has the following sub goals and objectives: 1. To identify the factors that impact on the status of access to ICT services; 2. To determine which socio-economic factors contribute to the status of access to ICT services in the specific areas; 3. To determine the status of access to ICT services in specific communities within the larger Port Elizabeth area; 4. To determine whether the level of access differs between secondary schools and the homes of teachers and learners in the identified areas.
- Full Text:
- Date Issued: 2008