Information Communication Technology
Permanent URI for this community
Browse
Browsing Information Communication Technology by Title
Now showing 1 - 20 of 50
Results Per Page
Sort Options
Item Acceptance of biometric authentication security technology on mobile devices(Vaal University of Technology, 2022) Malatji, W. R.; Van Eck, Rene, Dr.; Zuva, Tranos, Prof.Mobile devices are rapidly becoming a key computing platform, transforming how people access business and personal information. Accessing business and personal data using mobile devices requires authentication that is secure. The world is rapidly becoming connected and all users of mobile devices need to be clear regarding individual data security. As a result, biometrics for mobile devices has come into existence. Biometric technology can be applied on mobile devices to improve the trustworthiness of wireless services. Furthermore, it is of great importance and necessary to start paying attention to and investing in mobile biometric technologies, as they are quickly turning into tools of choice for productivity. In the literature review, it shows that few studies measured the acceptance of biometric authentication technology on mobile devices. This study seeks to find out the perceptions as to the acceptance of biometric authentication technology on mobile devices. TAM2 was used as the foundation for generating the hypothesis and developing the conceptual framework for this study. This quantitative study used a survey-based questionnaire to collect data from 305 participants. The simple random sampling technique was used to select participants for this study. The response rate was 98% of the expected population, which was a total of 302 valid responses. A descriptive analysis was deployed to provide a description of respondentsā demographic characteristics. SPSS was used to compute the multiple regressions in order to evaluate the research hypotheses. The findings of this study revealed that perceived humanness, perceived interactivity, perceived social presence, perceived ease of use and subjective social norm, and perceived usefulness and trust are important determinants of customersā intention to accept and use mobile biometric devices. It was found that reliability is a good predictor of trust. On the other hand privacy, identity theft and combining data are also important determinants of trust. This work can be used to strengthen biometric authentication technology in-cooperation with mobile devices for simplicity of use. Since most mobile devices are used for personal and business information, further research on the acceptance of biometric authentication technology on mobile devices is needed.Item Adoption of mobile learning at the University of Technology in South Africa(Vaal University of Technology, 2019-11-29) Hlatshwayo, Motsotua Confidence; Baxter, Roger; Zuva, Tranos, Prof.The influence of Information and Communication Technology (ICT) in the education system has encouraged both students and educators to become more and more computer literate. With the increased use of portable devices (tablets, PDAs, Smartphones, iPads etc.), mobile learning (m-learning) has gained popularity as it is believed to be an effective and efficient tool for content presentation and knowledge acquisition in education sector. The realisation of the benefits depends on the effective adoption of m-learning technology. The superseding purpose of this study was to investigate the adoption of mobile learning at a University of Technology (UoT) in South Africa. A quantitative study was carried out at an UoT in South Africa, with respect to mobile learning perceptions; 64 valid questionnaires were received from the participants. The proposed research framework/model derived from Extended Technology Acceptance Model (ETAM) and Technology Acceptance Model 3 (TAM3) was used. The Statistical Package for the Social Sciences (SPSS), version 25.0. was used for analysing data. The findings revealed that perceived usefulness of mobile learning, attitude toward mobile learning, service and system quality as well as perceived ease of use are significant predictors of intention to use mobile learning application. Perceived mobility on mobile learning strongly influences perceived usefulness more than perceived ease of use of mobile learning application. The study concluded that it is necessary to measure perception of potential users using the variables in the model proposed before adoption of mobile learning application to ascertain an effective adoption of the technology in education.Item Alanine, aspartic acid and lactose-capped CuS, ZnS and FeS nanoparticles: synthesis, characterization and properties(Vaal University of Technology, 2017) Mofokeng, Thapelo Prince; Shumbula, P. M., Dr.; Moloto, M. J., Prof.Water soluble metal sulfide nanoparticles were successfully synthesized using an aqueous, simple and environmentally friendly synthetic method in the presence of Ź-alanine, Ź-aspartic acid and lactose, acting as both stabilizers and crystal growth modifiers. The structural and optical properties of the synthesized metal sulfide nanoparticles were characterized by X-ray diffraction (XRD), transmission electron microscopy (TEM), Fourier transform infrared (FTIR), Ultraviolet-visible (UV-Vis) and photoluminescence spectroscopy. Colloidal method was employed in the synthesis of CuS, ZnS and FeS nanoparticles from metal chlorides as precursors and thioacetamide (TAA) as a sulphur source. The effect of temperature on the growth and solubility of nanoparticles was investigated. The absorption spectra of all samples prepared were blue shifted as compared to their bulk materials indicating small particles size. The morphologies and sizes of the nanoparticles were influenced by the variation of temperature and capping agent. TEM images revealed interesting changes in the morphology of CuS nanoparticles formed from various capping agents. By varying the temperature, Ź-aspartic acid-capped CuS nanoparticles changed from rod-shaped particles to particles dominated with hexagonal shape. However, the morphologies of both ZnS and FeS nanoparticles were close to spherical shape and were unaffected by either change of temperature or capping agent. Water-solubility of bio-functionalized CuS, ZnS and FeS nanoparticles was investigated. Amongst the three capping agents used, Ź-alanine (Ala) was found to be the most effective capping agent to render solubility of the nanoparticles. As the temperature was increased, the solubility of the particles also increased. Cytotoxicity and antimicrobial activity of Ź-alanine-capped CuS and ZnS nanoparticles were investigated. The particles were less toxic at low to moderate concentrations and only induced toxicity at higher concentrations. Particles synthesized at 95 Ā°C were less toxic compared to other nanoparticles (35 and 65 Ā°C) for both two set of experiments, as informed by the CC50 values. Antimicrobial properties were tested using different strains of both positive and negative bacteria and fungi. It was found that Ala-capped CuS nanoparticles were more effective against the bacteria than Ala-capped ZnS nanoparticles.Item Analysis and application of semantic web mechanism for storing and querying ontologies(Vaal University of Technology, 2017-02) Kwuimi, Raoul; Fonou-Dombeu, J. V., Dr.Since the introduction of Semantic Web in the early 2000, storing and querying ontologies have been a subject of greater research. Thus, several types of storage media and mechanisms have been developed to increase storage and query speed and efficiency of ontologies in Semantic Web applications. Existing Semantic Web mechanisms for storing and querying ontologies are implemented on several storage media and support different languages. However, there is a shortage of studies that provide an empirical analysis and application of these ontology storage and query mechanisms in the Semantic Web domain. This study conducted an analysis and application of the Semantic Web mechanisms for storing and querying ontologies. A thorough literature review was carried out to identify relevant publications pertaining to existing Semantic Web mechanisms for storing and querying ontologies as well as the platforms and storage media for implementing these mechanisms. Thereafter, the Design research method was used consisting of a set of predefined steps, namely, awareness, suggestion, development, evaluation, and conclusion. The awareness stage identified the need for an architecture to test several ontology storage media and mechanisms. In the suggestion stage a framework was proposed to empirically analyse and evaluate existing ontology storage and query mechanisms. The required Semantic Web platforms were identified to implement the framework in the development stage. The evaluation stage used a set of metrics to evaluate the framework including: the loading times of ontologies, the disc space used to store the ontology repositories and the mean and variance of query response times. Further, the evaluation stage analysed and discussed the storage mechanisms implemented in Semantic Web platforms. Finally, the outcome of the performance of the framework is presented in the conclusion stage. The framework was practically tested with six ontologies of different formats and sizes on two popular Semantic Web platforms, namely, Sesame and Jena API and the ontology storage and query mechanisms were analysed and compared. Although the underlying structures of repositories in the in-memory and native files in Jena and Sesame could not be accessed, it was possible to access and analyse the data in the repositories in the relational database storage in both Sesame and Jena. The results showed that Sesame relational uses a combination of mechanisms such as normalized triples store in combination with vertical partitioning. That combination allows Sesame to store ontologies based on their contents; in other words, each ontology has a different database schema in Sesame. Jena on the other hand, uses only a normalized triple store mechanism, also known as generic schema mechanism to store ontologies; thus, all ontologies in Jena have the same database schema. The study would be useful to the Semantic Web and Computer Science communities as it does not only provide theoretical knowledge but also the empirical findings that may serve as a base for further development of ontology storage media and mechanisms.Item An approach to a creative pedagogy to improve the learner-content relation in Tertiary ICT education in South Africa.(Vaal University of Technology, 2018-12) Van Eck, Rene; Jordaan, A., ProfThe work-integrated learning (WIL) concept was introduced to enhance the employability of students completing their IT qualification at universities of Technology (UoTs) in South Africa. Employability is defined as a combination of characteristics that make a person a useful and thereby desirable employee. WIL is defined as a component of a curriculum to improve the value of student learning by integrating academic training and practical workplace exposure. However, a large cohort of students registered for the IT qualification at UoTs do not find company placement for WIL, resulting in these students having to complete this final qualifying module of their qualification by undertaking a group project on campus. The group project entails developing a software system for a client. The overall sentiment expressed by employers, lecturers and students in this study is that students who remain on campus for the group project are not as well-prepared as those who find placement at a company for their in-service training. This study aimed to develop and propose an approach to a creative pedagogy in the form of a simulated working environment on campus within a tertiary educational setting to contribute towards enhancing the learner-content relation of WIL students, in order to improve the employability of students by providing the on-campus project students with an equal opportunity to those going into industry for their in-service training. The philosophy adopted for this research is interpretivism, with the Vaal University of Technology as the case of the research. The investigation adopted a mixed-method approach where respondents were requested to complete questionnaires focusing on their perceptions of on-campus group work vs. in-service training at companies for the WIL component of the IT qualification. Five respondent groups were identified for participation in the study, namely: i) In-service training students, i.e. WIL students who found placement in a company; ii) Project students, i.e. WIL students who remained on campus to do a group project; iii) Graduates, i.e. students who already completed WIL and graduated; iv) Employers of WIL students who found placement at a company; and v) Lecturers involved in WIL training on campus. The responses of the various respondent groups were analysed qualitatively and quantitatively. Comparisons of the perceptions of the respective groups were made to explore the possibility of a viable solution to the on-campus group work challenges that were identified. Based on reviewing recent literature, analysing the data collected from the completed to questionnaires by different role players, and adapting and the institutional strategy framework for WIL developed by Jacobs in 2015, an approach to a creative pedagogy in the form of a virtual company on campus for WIL students is presented to provide students who cannot find placement in industry for their in-service training with an equal experience to the in-service training company students. The proposed pedagogical approach incorporates the five standards defined by Tharp in 2018 as requirements for an effective and successful curriculum in the development of the actual virtual company. These include: contextualisation, challenging activities, joint productive activity, intellectual conversation and language development. The proposed approach adopts a three-layered approach to a creative pedagogy, with the aim of improving the employability of on-campus WIL students. The first layer lays the basis for implementing a virtual company on campus and includes aspects such as the objective for a simulated working environment on campus, employer preferences, and the skills set students should possess for employers to offer them a placement in their company for in-service training. The second layer focuses on the details that should be in place for a virtual company to be successfully implemented. This practical layer in the implementation of the virtual company focuses on infrastructure, Finance, HR, legislative approval, and appropriate assessments. The third layer only follows when the second layer has been put into place. This layer deals with how academic content can be included in the proposed pedagogical approach. The study also revealed that in addition to adopting the concept of a virtual company on campus for WIL students, a substantial focus should be on soft skills training. The exit level outcomes (ELOs) related to a simulated working environment for the WIL module of the IT are specified in the HEQF (Higher Education Qualifications Framework) document as set out by the South African Qualifications Authority.Item Assessment of e-learning readiness in South African schools.(Vaal University of Technology, 2019) Kolo, Ditlalane Irene; Van Eck, RenĆ©; Zuva, Tranos, Prof.The delivery of education and/or curriculum is shifting from the traditional method of delivery to a digital format, most notably the e-learning, using available technology. However, without e-learning readiness, e-learning benefits will not be reaped and the probability of failure in adopting e-learning will be high. Therefore, it is imperative to know the levels of readiness for e-learning of educators and learners in South African schools. In this study, e-learning readiness of the South African educators and learners in previously disadvantaged schools in Gauteng were investigated. A twenty-nine (29) item questionnaire was used to obtain the data. This new learning method is being introduced and will be implemented by Gauteng Department of Education. The data obtained from the questionnaires was then analyzed by using a STOPE (Strategy, Technology, Organization, People and Environment) model. The results obtained by using STOPE analysis indicated the overall readiness for e-learning at a level of 77%. This is above the mid-point of 50% showing that the schools in Gauteng are ready for adoption of e-learning. The five-point Likert scale method was also used to check the e-learning readiness and established a level of 3.86. The schools in Gauteng that participated in our study are ready for e-learning adoption but need to improve on their people and content readiness. These schools show that they will benefit in adopting e-learning in their schools.Item Asset tracking, monitoring and recovery system based on hybrid radio frequency identification and global positioning system technologies(Vaal University of Technology, 2021) Matshego, Itumeleng Olebogeng; Appiah, M., Dr.; Zuva, Tranos, Prof.Tracking involves information gathering, manipulation and proving information on the location of a set item. Many single or hybrid technologies ā Global Positioning System (GPS), Radio Frequency (RF), Bluetooth (BLT) or Wireless Fidelity (WiFi) ā have been used to provide tracking information of an asset of interest. The use of hybrid technology in tracking assets has proven to be effective if the selection of the technologies used is done correctly. This study used a hybrid of GPS and Radio Frequency technologies to track assets of interest because of their characteristics for use inside and outside a building. In this study GPS geo-fencing was used and time interval was used to receive data from the technology. Heuristic methodology, which enabled us to divide a room into sections, was used, where testing was done in sections in a room with different types of material, such as bricks, wood or metal, and the RF signal degradation, called attenuation, was measured. A straight-line distance and a sum of distances at 30-minute intervals were calculated to determine how far the asset had travelled from the point of origin to the new position. A distance of less than 10 metres was ignored. Geofencing was used to trigger an event since it indicates that the asset has crossed the permitted boundary. An RF reader was placed at the door to identify when the asset left a building and triggered an event. A model was used for searching for a missing item in a room. The results showed that the system was able to produce two distances, one straight-line distance and the other the approximate sum distance travelled by the asset in 30-minute intervals. The RF model was able to find an asset in a room filled with different materials.Item The cognitive impact of the implementation of an entry level certificate in information technology(2013-07-18) Van Staden, Corne Johandia; Du Plessis, Linda; Janse van Rensburg, GailResearch has found that learners find it difficult to solve programming problems in a logical way, therefore the failure rate in Programming I is high. The Entry-level Certificate in Information Technology was introduced as an intervention to address this problem. Four aspects were focused on in the Entry-level Certificate in Information Technology, namely English comprehension, academic competency, numerical skills and the problem-solving skills of learners. Basic computer literacy was the common theme used throughout the Information Technology Boot Camp (ITBC) to address the above-mentioned aspects, in order to broaden access to the Vaal University of Technology (VUT). The research indicates that English comprehension is a very important component of the Information and Communication Technology (ICT) modules, and that it is important for learners to have an English proficiency level of grade 12 before enroUing for a diploma in I CT. The ICT and numerical skills modules also narrowed the gap between secondary and tertiary education, by equipping the learners with prior knoWJledge that is crucial for being successful in the ICT diploma. To conclude access was broadened to the VUT and the intervention of the ITBC did impact positively on the cognitive functioning of learners.Item Combating the corporate paper war: optimising electronic mail and electronic filing(2006-11) Bothma, Marchelle Marelize; Hoffmann, E. C.The primary objective of this research project was primarily to investigate filing methods and mailing practices in the computer support or administrative environment with specific focus on the abuse of paper. The research design consisted of an exploratory investigation in selected Higher Education Institutions in the Province of Gauteng whereby a structured questionnaire was used as a measuring instrument. The investigation was sub-divided into two categories, namely, paper-based filing systems and mailing systems as opposed to electronic filing and mailing systems. In the empirical findings, analysis and interpretations, correlation and cross-tabulation were done on all sets of variables in order to determine whether any meaningful associations could be found. With reference to the title of this study "Combating the corporate paper war: optimising electronic mail and electronic filing", it has been proven that the war against paper abuse is far from over. Perceptions regarding a future paperless office and assumptions that technology such as the electronic mail facility and electronic filing could assist organisations to combat paper abuse were unfounded, due to a lack of guidance and control measures in the corporate environment. Consequently, it is recommended that an e-filing and e-mailing model be created and followed in conjunction with specified computer software features in order to counteract the abuse of paper. Follow-up research could focus on electronic filing methods versus scanning of documents for filing purposes.Item Comparative study of open source and dot NET environments for ontology development.(Vaal University of Technology, 2020-05) Mahoro, Leki Jovial; Moyo, Sihle; Fonou-Dombeu, J. V., Dr.Many studies have evaluated and compared the existing open-sources Semantic Web platforms for ontologies development. However, none of these studies have included the dot NET-based semantic web platforms in the empirical investigations. This study conducted a comparative analysis of open-source and dot NET-based semantic web platforms for ontologies development. Two popular dot NET-based semantic web platforms, namely, SemWeb.NET and dotNetRDF were analyzed and compared against open-source environments including Jena Application Programming Interface (API), ProtĆ©gĆ© and RDF4J also known as Sesame Software Development Kit (SDK). Various metrics such as storage mode, query support, consistency checking, interoperability with other tools, and many more were used to compare two categories of platforms. Five ontologies of different sizes are used in the experiments. The experimental results showed that the open-source platforms provide more facilities for creating, storing and processing ontologies compared to the dot NET-based tools. Furthermore, the experiments revealed that ProtĆ©gĆ© and RDF4J open-source and dotNetRDF platforms provide both graphical user interface (GUI) and command line interface for ontologies processing, whereas, Jena open-source and SemWeb.NET are command line platforms. Moreover, the results showed that the open-source platforms are capable of processing multiple ontologiesā files formats including Resource Description Framework (RDF) and Ontology Web Language (OWL) formats, whereas, the dot NET-based tools only process RDF ontologies. Finally, the experiment results indicate that the dot NET-based platforms have limited memory size as they failed to load and query large ontologies compared to open-source environments.Item Computer literacy as additional empowerment mechanism in learning programmes(2004-01) Van Staden, A; Hoffmann, E. C.The world of digital interactivity, of computers, of cyberspace and the "e-revolution', is making computer literacy more indispensable than ever. There is an increasing demand for ICT skills worldwide- South Africa is not alone in identifying shortages. The information and communication technology in South Africa is exacerbated by emigration on the one hand and the previously disadvantaged learners on the other hand. With an education system that is stretched, higher education has not kept pace with information and communication technology training in South Africa, therefore learners display a shortcoming of basic computer skills. The purpose of this study is to emphasise the importance of implementing computer literacy training throughout the entire learning programme of learners at higher education institutions. Learners randomly selected from the Faculty of Management Sciences, Vaal University of Technology, indicated their computer literacy via questionnaires and levels of experience. It is clear that the abilities of the learners are not sufficient to ensure that they are computer literate or that they will be effective users in the workplace. This study results in a powerful argument in support of the extension of continued growth in computer usage in the workplace.Item A conceptual framework for crowdsourcing in higher education.(2018-04) Shongwe, Thulani W.; Van Eck, Rene; Zuva, Tranos, ProfThe speedy growth of Internet based information and communication tools produced a new field of prospects for educational organizations to reach their aims. One of the options is crowdsourcing. Crowdsourcing was recently the answer to the growth for providing different applications in areas such as education, financing, and entrepreneurship. South African schools are considerably failing in education. A big challenge is when it comes to the mathematics delivery method which ends up affecting the learnersā performance. When compared to other middle income nations, South Africa is ranked third from the bottom in terms of its performance when it comes to mathematics. This study designed a conceptual crowdsourcing tutoring framework. The framework defines the use of how crowdsourcing can contribute to tutoring grade 11 and 12 mathematics in order to improve the learnersā performance. A prototype was developed to illustrate the crowdsourcing tutoring framework. The simpleKmeans algorithm was used in the prototype. The algorithm was used to select learners, tutors and appropriate textbooks for the virtual class. The prototype system proved to be effective as it was able to cluster students according to their performance and tutors according to their student pass rate. Through the usage of a clustering simpleKmeans algorithm, this study was able to create a virtual class that illustrated how all the components come together for the proposed crowdsourcing tutoring virtual class. The use of the prototype system was able to fill the virtual class with students who obtained low average marks and educators with the pupils who had the highest pass rate. This study was able to build a virtual class with the following components: learners, tutors and textbooks. Objectives and research questions of this study were fulfilled. In future studies the researcher will endeavor to make the system recommend textbooks without using the textbooks used by the teachers who produced the best results.Item Decision support framework for the adoption of software development methodologies.(Vaal University of Technology, 2019) Simelane, Lynette; Feukeu, Etienne Alain, Dr.; Zuva, Tranos, Prof.There are many software development methodologies that are used to control the process of developing a software system. However, no exact system has been found which could help software engineers in selecting the best software development methodology (SDM). The increasing complexity of software development today has led to complex management of software systems. This complexity increases the challenges faced by professionals in selecting the most appropriate SDM to adopt in a project. This is important because the wrong choice of methodology is costly for the organization as it may impact on deliveries, maintenance costs, budget projects and reliability. In this study we propose a decision support framework to assist professionals in the selection of appropriate software development methodologies that would fit each organisation and project setting. The case based reasoning (CBR) methodology was implemented in this study. This methodology focuses on problem solving that centres on the reutilization of past experiences. The CBR methodology was implemented using the SQL programming language. We tested the precision of the decision support framework by comparing the recommended methodology to the actual software methodology that was adopted for the project. The DS framework recorded an 80% precision result. In addition, the findings contribute to reducing the software crisis faced by todayās professionals. Therefore the framework can be adopted as a reliable tool for methodology selection in software development projects.Item Developing a formula for the comparison of athletics performances across gender, age and event boundaries based on South African standards(2018-01) Bekker, S. W. J.; Janse van Rensburg, J. F.The author addressed the need of parents, school teachers and athletic coaches to be able to assess the level of performance and to compare performances of individual athletes of either gender and in any age group. This was achieved by creating formulas for the following areas in track and field athletics: ā¢ Correctly set base standards for all events from the results of 5 year weighted average performances. ā¢ Use the base standards to determine comparative standards for all events in all age groups. ā¢ Define a function to compare male and female performances in all events. ā¢ For all events, generate tables with a range from 0 to 1000 as a comparative measurement. These formulae were created using data from international and national meetings. Different case studies were used for each of the areas and the results were evaluated using the data. In all four areas, it was possible to define hybrid functions with a confidence factor better than 99%. The final performance tables can be updated during revision periods (every 2 to 4 years) by using the national results for the last 5 years. These revisions will be required as implements, tracks and training methods change with time and this will then in turn influence the performances. This is evident from the continuous improvement of records in all events. These tables will not only assist coaches to improve training techniques but it will also facilitate team managers to improve team selections, and it will open the options of meeting organizers to arrange meetings using different formats. As this is a new and unique formulation for measuring performances at junior level in world athletics it can be used as a basis for future improvements in the field of comparative measurement for athletics. Using these tables at senior level it may assist to settle arguments of performance comparisons that are not addressed by the current tables used by the International Amateur Athletics Federation (IAAF). It will also avoid the use of different tables for the same events in standard track and field athletics compared to those used for combined event competitions. The author of the tables used by the IAAF has recognised this work as a new and unique development. Future development will include the automatic update of all functions and creation of tables for publication from a standard WindowsĀ® based application. A companion application, using the results from this research, will be developed. This application will address all the administration functions required to conduct a meeting. It will include the preparation for the meeting, capturing of results during the meeting and result reporting after the meeting.Item Electronic portfolios to enhance the learning experience of scholars at private tertiary institutions in South Africa(Vaal University of Technology, 2016-07) Mapundu, Michael Tonderai; Lombard, A.; Jordaan, A., Prof.The purpose of this study was to investigate the use electronic portfolios (e-portfolios) in private tertiary institutions in South Africa to enhance the learning experience of scholars. The study adopted an interpretive ontological stance and subjective epistemological stance as the researcher sought to understand how-portfolios can be used to enhance learning. The focus was on understanding people in a social setting though employing field research to collect and interpret data. Action research, in this case employing a pre-test, intervention and post-test limited to a single cycle, was selected as strategy. The empirical part of the study was conducted during the first semester of 2014 (January to May) at a private tertiary university in Gauteng, South Africa. A pre-survey has been conducted before implementation and a post-survey after the implementation of e-portfolios to test the attitude of the participants, where after the results were compared. The pre-test was administered before creating e-portfolios and the post-test towards the end of the semester after developing and maintaining e-portfolios. Questionnaires were used to obtain information such as the attitude of the respondents on learning, assessment, reflection, collaboration and interpersonal communication through the use of e-portfolios. Questionnaires served as the main data collection tool throughout the survey. The sample was selected from first and second year students in the Information Technology faculty, with the sample size n=48. The researcher further collected data through observing subjects and conducting group interviews that were recorded to augment the questionnaire approach and verify the results through triangulation. The questionnaires were distributed to the participants who were given thirty minutes to complete. Responses were made using a five-point Likert scale and open-ended questions. The response rate was outstanding as all 48 subjects participated in the study. The researcher used a mixed-methods approach for this study; SPSS 22.0 was used for quantitative data analysis and thematic analysis was employed for the qualitative data. Reliability for quantitative data was determined using Cronbachās alpha. Regression analysis was done as well as correlations to determine relationships and associations. To further cement relationships, t-tests and Spearmanās correlation coefficient were employed. Trustworthiness for qualitative data and justification for credibility, dependability, transferability and confirmability were discussed. The results revealed that e-portfolios could be used effectively at private tertiary institutions to enhance the learning experience of scholars as evidenced by the significant statistics obtained in this study.Item Facial and keystroke biometric recognition for computer based assessments(Vaal University of Technology, 2019-12) Adetunji, Temitope Oluwafunmilayo; Appiah, Martin, Dr.; Zuva, Tranos, Prof.Computer based assessments have become one of the largest growing sectors in both nonacademic and academic establishments. Successful computer based assessments require security against impersonation and fraud and many researchers have proposed the use of Biometric technologies to overcome this issue. Biometric technologies are defined as a computerised method of authenticating an individual (character) based on behavioural and physiological characteristic features. Basic biometric based computer based assessment systems are prone to security threats in the form of fraud and impersonations. In a bid to combat these security problems, keystroke dynamic technique and facial biometric recognition was introduced into the computer based assessment biometric system so as to enhance the authentication ability of the computer based assessment system. The keystroke dynamic technique was measured using latency and pressure while the facial biometrics was measured using principal component analysis (PCA). Experimental performance was carried out quantitatively using MATLAB for simulation and Excel application package for data analysis. System performance was measured using the following evaluation schemes: False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER) and Accuracy (AC), for a comparison between the biometric computer based assessment system with and without the keystroke and face recognition alongside other biometric computer based assessment techniques proposed in the literature. Successful implementation of the proposed technique would improve computer based assessmentās reliability, efficiency and effectiveness and if deployed into the society would improve authentication and security whilst reducing fraud and impersonation in our society.Item Framework for Adoption of Information and Communication Technology security culture in SMMEs in Gauteng Province, South Africa(Vaal University of Technology, 2019) Mokwetli, M. A.; Tshepiso, Nkoana; Zuva, Tranos, Prof.Information and Communication Technology (ICT) has become prevalent in our everyday business and personal lives. As such, users and organisations must know how to protect themselves against human errors that led to more companies losing or sharing information that should not be shared. The issue emanates from lack of ICT security culture both in individuals and organisations. This research is based on a wide theoretical review that is focused on proposing a conceptual model on technological, environmental and organisational factors that influence the adoption of ICT security culture and implementation in Small Medium and Micro Enterprises (SMMEs). Factors or determinants that influence the adoption of ICT security culture in SMMEs in the Gauteng province were investigated. Questionnaires were distributed to examine the perception of ICT security culture adoption among SMMEs in the Gauteng province South Africa. A sample of 647 individuals from different SMMEs in the Gauteng province returned the questionnaire. The results of the research study show that technological context (perceived benefits), environmental context (government regulations) and organisational context (management support) determinants have direct influence on the ICT security culture adoption. The recommendation is that information security awareness programmes must be put in place. Further research is recommended using more determinants that might have a positive impact toward the adoption of the ICT security culture. In order to minimize data breaches due to human error it is recommended that SMMEs around Gauteng Province in South Africa adopt the framework as outlined in this research study.Item Framework for aligning information systems with business strategy in small medium enterprises in Gauteng, South Africa(Vaal University of Technology, 2020) Kale, Rethabile Charlotte; Zuva, Tranos, Prof.The alignment of Information Systems (IS) with business processes in organisations is a dynamic state whereby an organisation uses Information Technology in order to achieve business objectives. The alignment of IT exists when goals, activities and processes of a business are in harmony with the Information Systems which are supporting them. The lack of IT strategic alignment in organisations lead to poor IT Return on Investment (ROI), inefficient operations due to poor performance that impact the organizationās competitive advantage. Studies on Information Systems Alignment have merely focused on the alignment between Business and Information System Strategy. Very few studies have studied this alignment in Small and Medium Enterprises to investigate what impact the alignment has with the business performance. The purpose of this study is to measure the alignment between Information system and the business strategy in Small and Medium Enterprises and to investigate the impact of this alignment on the business performance. A model was used to measure the alignment between Business and Information System Strategy and its impact on the business performance. Data was collected through the use of a questionnaire. A sample of ninety-nine (99) individuals from a variety of SMEs was used. SPSS was used to analyse the data. The results showed the variables of the model were all positively correlated to one another. Therefore, alignment of Information Systems (IS) and Business Strategy was confirmed. The influence of the alignment was found to have a positive influence (0.459) on the overall performance of the business. In conclusion, it is imperative for SMEs to align Information Systems (IS) and Business Strategy in order to increase the overall performance of their businesses.Item A framework for analysing the complexity of ontology(Vaal University of Technology, 2016-11) Kazadi, Yannick Kazela; Okosun, Prof. K.; Fonou-Dombeu, Dr. J. V.The emergence of the Semantic Web has resulted in more and more large-scale ontologies being developed in real-world applications to represent and integrate knowledge and data in various domains. This has given rise to the problem of selection of the appropriate ontology for reuse, among the set of ontologies describing a domain. To address such problem, it is argued that the evaluation of the complexity of ontologies of a domain can assist in determining the suitable ontologies for the purpose of reuse. This study investigates existing metrics for measuring the design complexity of ontologies and implements these metrics in a framework that provides a stepwise process for evaluating the complexity of ontologies of a knowledge domain. The implementation of the framework goes through a certain number of phases including the: (1) download of 100 Biomedical ontologies from the BioPortal repository to constitute the dataset, (2) the design of a set of algorithms to compute the complexity metrics of the ontologies in the dataset including the depth of inheritance (DIP), size of the vocabulary (SOV), entropy of ontology graphs (EOG), average part length (APL) and average number of paths per class (ANP), the tree impurity (TIP), relationship richness (RR) and class richness (CR), (3) ranking of the ontologies in the dataset through the aggregation of their complexity metrics using 5 Multi-attributes Decision Making (MADM) methods, namely, Weighted Sum Method (WSM), Weighted Product Method (WPM), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), Weighted Linear Combination Ranking Technique (WLCRT) and Elimination and Choice Translating Reality (ELECTRE) and (4) validation of the framework through the summary of the results of the previous phases and analysis of their impact on the issues of selection and reuse of the biomedical ontologies in the dataset. The ranking results of the study constitute important guidelines for the selection and reuse of biomedical ontologies in the dataset. Although the proposed framework in this study has been applied in the biomedical domain, it could be applied in any other domain of Semantic Web to analyze the complexity of ontologies.Item A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.(Vaal University of Technology, 2017-06) Mohapi, Matrinta Josephine; Jordaan, A., Prof.The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services. This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutionsā networks. The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.