Theses and Dissertations (Information Communication Technology)
Permanent URI for this collection
Browse
Browsing Theses and Dissertations (Information Communication Technology) by Title
Now showing 1 - 20 of 55
Results Per Page
Sort Options
Item A model to measure the E-learning system success at a University of Technology in South Africa(Vaal University of Technology, 2022-05) Rankapola, Madute Elias; Lebelo, S.; Zuva, T., Prof.As e-learning systems adoption increases worldwide, their effectiveness and success measurement become imperative. Therefore, it is crucial to justify the investment made in e-learning systems by assessing their value and benefits within the academic field. Higher Education Institutions (HEIs) adopt and implement e-learning systems to enhance the quality of their teaching and learning practices, such as extending the teaching and learning space beyond physical locations, convenience, on-demand learning, self-paced learning, cost-effectiveness, time-efficient and flexible learning environments. However, some universities in developing countries encounter many challenges in implementing e-learning systems and eventually drop out of their e-learning system endeavours. This implies that universities in developing countries may face unique challenges compared to those in developed countries. Therefore, the current study aimed to identify and investigate critical e-learning system success factors at universities of technology in South Africa and develop a comprehensive model to measure the e-learning system success. A literature review was conducted to achieve the research aims and objectives, and a research model that encompassed the variables: Technical System Quality (TSQ), Content & Information Quality (C&IQ), Educational System Quality (ESQ), Service Quality (SQ), User Self-Efficacy (USE), User Satisfaction (US), Intention to Use/Use (IU/U), Net Benefits and System Loyalty (SL). A cross-sectional survey was implemented using a 5-Likert scale electronic questionnaire to collect data from a sample of 654 participants studying Information and Communication Technology (ICT) from universities of technology in South Africa. The reliability was measured using Cronbach's alpha and all the values were greater than 0,73, higher than the threshold of 0.70 for acceptable reliability. Validity was conducted through convergent (AVE>0.5) and discriminant validity (AVE>ICCS). Factor analysis was done using Principal Component Analysis (PCA), and all nine constructs were retained after the analysis. The structural model displayed suitable model fit indices (CMIN/DF = 3.514; CFI = 0.935; Normed Fit Index Root Mean Square Error of Approximation (NFI) = 0.953; Comparative fit index (CFI) = 0.959; AGFI = 0.880; Tucker-Lewis Index (TLI) = 0.926; and (RMSEA) = 0.068). These GoF results highlighted that the model was acceptable for deriving conclusions from the hypotheses tested. Pearson Correlation Analysis results showed positive relationships exist between the variables except for TSQ & USE. Multiple regression analysis indicated that USE→C&IQ (β= 0.183, <0.05); USE→ESQ (β = 0.453, <0.05) USE→SQ (β = 0.785,<0.05), USE→US (β = 0.995, <0.05), US→USE (β = 0.605, <0.05), IU/U→US (β = 0.797, <0.05), NB→IU/US (β= 0.538, <0.05), IU/U→NB (β = 0.166, <0.05), SL→NB (β = 0.736, <0.05) were statistically supported. The final model was then developed. The study contributed to the body of knowledge by highlighting critical factors that influence an e-learning system success at universities of technology in South Africa. The study provided a deep insight into the theories and models used for measuring system success. A modified model was developed. The model may be used by researchers to test system success in different settings and countries. Universities of Technology may use the model to guide the design, development and adoption of e-learning systems.Item Acceptance of biometric authentication security technology on mobile devices(Vaal University of Technology, 2022) Malatji, W. R.; Van Eck, Rene, Dr.; Zuva, Tranos, Prof.Mobile devices are rapidly becoming a key computing platform, transforming how people access business and personal information. Accessing business and personal data using mobile devices requires authentication that is secure. The world is rapidly becoming connected and all users of mobile devices need to be clear regarding individual data security. As a result, biometrics for mobile devices has come into existence. Biometric technology can be applied on mobile devices to improve the trustworthiness of wireless services. Furthermore, it is of great importance and necessary to start paying attention to and investing in mobile biometric technologies, as they are quickly turning into tools of choice for productivity. In the literature review, it shows that few studies measured the acceptance of biometric authentication technology on mobile devices. This study seeks to find out the perceptions as to the acceptance of biometric authentication technology on mobile devices. TAM2 was used as the foundation for generating the hypothesis and developing the conceptual framework for this study. This quantitative study used a survey-based questionnaire to collect data from 305 participants. The simple random sampling technique was used to select participants for this study. The response rate was 98% of the expected population, which was a total of 302 valid responses. A descriptive analysis was deployed to provide a description of respondents’ demographic characteristics. SPSS was used to compute the multiple regressions in order to evaluate the research hypotheses. The findings of this study revealed that perceived humanness, perceived interactivity, perceived social presence, perceived ease of use and subjective social norm, and perceived usefulness and trust are important determinants of customers’ intention to accept and use mobile biometric devices. It was found that reliability is a good predictor of trust. On the other hand privacy, identity theft and combining data are also important determinants of trust. This work can be used to strengthen biometric authentication technology in-cooperation with mobile devices for simplicity of use. Since most mobile devices are used for personal and business information, further research on the acceptance of biometric authentication technology on mobile devices is needed.Item Adoption of mobile learning at the University of Technology in South Africa(Vaal University of Technology, 2019-11-29) Hlatshwayo, Motsotua Confidence; Baxter, Roger; Zuva, Tranos, Prof.The influence of Information and Communication Technology (ICT) in the education system has encouraged both students and educators to become more and more computer literate. With the increased use of portable devices (tablets, PDAs, Smartphones, iPads etc.), mobile learning (m-learning) has gained popularity as it is believed to be an effective and efficient tool for content presentation and knowledge acquisition in education sector. The realisation of the benefits depends on the effective adoption of m-learning technology. The superseding purpose of this study was to investigate the adoption of mobile learning at a University of Technology (UoT) in South Africa. A quantitative study was carried out at an UoT in South Africa, with respect to mobile learning perceptions; 64 valid questionnaires were received from the participants. The proposed research framework/model derived from Extended Technology Acceptance Model (ETAM) and Technology Acceptance Model 3 (TAM3) was used. The Statistical Package for the Social Sciences (SPSS), version 25.0. was used for analysing data. The findings revealed that perceived usefulness of mobile learning, attitude toward mobile learning, service and system quality as well as perceived ease of use are significant predictors of intention to use mobile learning application. Perceived mobility on mobile learning strongly influences perceived usefulness more than perceived ease of use of mobile learning application. The study concluded that it is necessary to measure perception of potential users using the variables in the model proposed before adoption of mobile learning application to ascertain an effective adoption of the technology in education.Item Analysis and application of semantic web mechanism for storing and querying ontologies(Vaal University of Technology, 2017-02) Kwuimi, Raoul; Fonou-Dombeu, J. V., Dr.Since the introduction of Semantic Web in the early 2000, storing and querying ontologies have been a subject of greater research. Thus, several types of storage media and mechanisms have been developed to increase storage and query speed and efficiency of ontologies in Semantic Web applications. Existing Semantic Web mechanisms for storing and querying ontologies are implemented on several storage media and support different languages. However, there is a shortage of studies that provide an empirical analysis and application of these ontology storage and query mechanisms in the Semantic Web domain. This study conducted an analysis and application of the Semantic Web mechanisms for storing and querying ontologies. A thorough literature review was carried out to identify relevant publications pertaining to existing Semantic Web mechanisms for storing and querying ontologies as well as the platforms and storage media for implementing these mechanisms. Thereafter, the Design research method was used consisting of a set of predefined steps, namely, awareness, suggestion, development, evaluation, and conclusion. The awareness stage identified the need for an architecture to test several ontology storage media and mechanisms. In the suggestion stage a framework was proposed to empirically analyse and evaluate existing ontology storage and query mechanisms. The required Semantic Web platforms were identified to implement the framework in the development stage. The evaluation stage used a set of metrics to evaluate the framework including: the loading times of ontologies, the disc space used to store the ontology repositories and the mean and variance of query response times. Further, the evaluation stage analysed and discussed the storage mechanisms implemented in Semantic Web platforms. Finally, the outcome of the performance of the framework is presented in the conclusion stage. The framework was practically tested with six ontologies of different formats and sizes on two popular Semantic Web platforms, namely, Sesame and Jena API and the ontology storage and query mechanisms were analysed and compared. Although the underlying structures of repositories in the in-memory and native files in Jena and Sesame could not be accessed, it was possible to access and analyse the data in the repositories in the relational database storage in both Sesame and Jena. The results showed that Sesame relational uses a combination of mechanisms such as normalized triples store in combination with vertical partitioning. That combination allows Sesame to store ontologies based on their contents; in other words, each ontology has a different database schema in Sesame. Jena on the other hand, uses only a normalized triple store mechanism, also known as generic schema mechanism to store ontologies; thus, all ontologies in Jena have the same database schema. The study would be useful to the Semantic Web and Computer Science communities as it does not only provide theoretical knowledge but also the empirical findings that may serve as a base for further development of ontology storage media and mechanisms.Item An approach to a creative pedagogy to improve the learner-content relation in Tertiary ICT education in South Africa.(Vaal University of Technology, 2018-12) Van Eck, Rene; Jordaan, A., ProfThe work-integrated learning (WIL) concept was introduced to enhance the employability of students completing their IT qualification at universities of Technology (UoTs) in South Africa. Employability is defined as a combination of characteristics that make a person a useful and thereby desirable employee. WIL is defined as a component of a curriculum to improve the value of student learning by integrating academic training and practical workplace exposure. However, a large cohort of students registered for the IT qualification at UoTs do not find company placement for WIL, resulting in these students having to complete this final qualifying module of their qualification by undertaking a group project on campus. The group project entails developing a software system for a client. The overall sentiment expressed by employers, lecturers and students in this study is that students who remain on campus for the group project are not as well-prepared as those who find placement at a company for their in-service training. This study aimed to develop and propose an approach to a creative pedagogy in the form of a simulated working environment on campus within a tertiary educational setting to contribute towards enhancing the learner-content relation of WIL students, in order to improve the employability of students by providing the on-campus project students with an equal opportunity to those going into industry for their in-service training. The philosophy adopted for this research is interpretivism, with the Vaal University of Technology as the case of the research. The investigation adopted a mixed-method approach where respondents were requested to complete questionnaires focusing on their perceptions of on-campus group work vs. in-service training at companies for the WIL component of the IT qualification. Five respondent groups were identified for participation in the study, namely: i) In-service training students, i.e. WIL students who found placement in a company; ii) Project students, i.e. WIL students who remained on campus to do a group project; iii) Graduates, i.e. students who already completed WIL and graduated; iv) Employers of WIL students who found placement at a company; and v) Lecturers involved in WIL training on campus. The responses of the various respondent groups were analysed qualitatively and quantitatively. Comparisons of the perceptions of the respective groups were made to explore the possibility of a viable solution to the on-campus group work challenges that were identified. Based on reviewing recent literature, analysing the data collected from the completed to questionnaires by different role players, and adapting and the institutional strategy framework for WIL developed by Jacobs in 2015, an approach to a creative pedagogy in the form of a virtual company on campus for WIL students is presented to provide students who cannot find placement in industry for their in-service training with an equal experience to the in-service training company students. The proposed pedagogical approach incorporates the five standards defined by Tharp in 2018 as requirements for an effective and successful curriculum in the development of the actual virtual company. These include: contextualisation, challenging activities, joint productive activity, intellectual conversation and language development. The proposed approach adopts a three-layered approach to a creative pedagogy, with the aim of improving the employability of on-campus WIL students. The first layer lays the basis for implementing a virtual company on campus and includes aspects such as the objective for a simulated working environment on campus, employer preferences, and the skills set students should possess for employers to offer them a placement in their company for in-service training. The second layer focuses on the details that should be in place for a virtual company to be successfully implemented. This practical layer in the implementation of the virtual company focuses on infrastructure, Finance, HR, legislative approval, and appropriate assessments. The third layer only follows when the second layer has been put into place. This layer deals with how academic content can be included in the proposed pedagogical approach. The study also revealed that in addition to adopting the concept of a virtual company on campus for WIL students, a substantial focus should be on soft skills training. The exit level outcomes (ELOs) related to a simulated working environment for the WIL module of the IT are specified in the HEQF (Higher Education Qualifications Framework) document as set out by the South African Qualifications Authority.Item Assessment of e-learning readiness in South African schools(Vaal University of Technology, 2019) Kolo, Ditlalane Irene; Van Eck, René; Zuva, Tranos, Prof.The delivery of education and/or curriculum is shifting from the traditional method of delivery to a digital format, most notably the e-learning, using available technology. However, without e-learning readiness, e-learning benefits will not be reaped and the probability of failure in adopting e-learning will be high. Therefore, it is imperative to know the levels of readiness for e-learning of educators and learners in South African schools. In this study, e-learning readiness of the South African educators and learners in previously disadvantaged schools in Gauteng were investigated. A twenty-nine (29) item questionnaire was used to obtain the data. This new learning method is being introduced and will be implemented by Gauteng Department of Education. The data obtained from the questionnaires was then analyzed by using a STOPE (Strategy, Technology, Organization, People and Environment) model. The results obtained by using STOPE analysis indicated the overall readiness for e-learning at a level of 77%. This is above the mid-point of 50% showing that the schools in Gauteng are ready for adoption of e-learning. The five-point Likert scale method was also used to check the e-learning readiness and established a level of 3.86. The schools in Gauteng that participated in our study are ready for e-learning adoption but need to improve on their people and content readiness. These schools show that they will benefit in adopting e-learning in their schools.Item Asset tracking, monitoring and recovery system based on hybrid radio frequency identification and global positioning system technologies(Vaal University of Technology, 2021) Matshego, Itumeleng Olebogeng; Appiah, M., Dr.; Zuva, Tranos, Prof.Tracking involves information gathering, manipulation and proving information on the location of a set item. Many single or hybrid technologies – Global Positioning System (GPS), Radio Frequency (RF), Bluetooth (BLT) or Wireless Fidelity (WiFi) – have been used to provide tracking information of an asset of interest. The use of hybrid technology in tracking assets has proven to be effective if the selection of the technologies used is done correctly. This study used a hybrid of GPS and Radio Frequency technologies to track assets of interest because of their characteristics for use inside and outside a building. In this study GPS geo-fencing was used and time interval was used to receive data from the technology. Heuristic methodology, which enabled us to divide a room into sections, was used, where testing was done in sections in a room with different types of material, such as bricks, wood or metal, and the RF signal degradation, called attenuation, was measured. A straight-line distance and a sum of distances at 30-minute intervals were calculated to determine how far the asset had travelled from the point of origin to the new position. A distance of less than 10 metres was ignored. Geofencing was used to trigger an event since it indicates that the asset has crossed the permitted boundary. An RF reader was placed at the door to identify when the asset left a building and triggered an event. A model was used for searching for a missing item in a room. The results showed that the system was able to produce two distances, one straight-line distance and the other the approximate sum distance travelled by the asset in 30-minute intervals. The RF model was able to find an asset in a room filled with different materials.Item The cognitive impact of the implementation of an entry level certificate in information technology(2013-07-18) Van Staden, Corne Johandia; Du Plessis, Linda; Janse van Rensburg, GailResearch has found that learners find it difficult to solve programming problems in a logical way, therefore the failure rate in Programming I is high. The Entry-level Certificate in Information Technology was introduced as an intervention to address this problem. Four aspects were focused on in the Entry-level Certificate in Information Technology, namely English comprehension, academic competency, numerical skills and the problem-solving skills of learners. Basic computer literacy was the common theme used throughout the Information Technology Boot Camp (ITBC) to address the above-mentioned aspects, in order to broaden access to the Vaal University of Technology (VUT). The research indicates that English comprehension is a very important component of the Information and Communication Technology (ICT) modules, and that it is important for learners to have an English proficiency level of grade 12 before enroUing for a diploma in I CT. The ICT and numerical skills modules also narrowed the gap between secondary and tertiary education, by equipping the learners with prior knoWJledge that is crucial for being successful in the ICT diploma. To conclude access was broadened to the VUT and the intervention of the ITBC did impact positively on the cognitive functioning of learners.Item Combating the corporate paper war: optimising electronic mail and electronic filing(2006-11) Bothma, Marchelle Marelize; Hoffmann, E. C.The primary objective of this research project was primarily to investigate filing methods and mailing practices in the computer support or administrative environment with specific focus on the abuse of paper. The research design consisted of an exploratory investigation in selected Higher Education Institutions in the Province of Gauteng whereby a structured questionnaire was used as a measuring instrument. The investigation was sub-divided into two categories, namely, paper-based filing systems and mailing systems as opposed to electronic filing and mailing systems. In the empirical findings, analysis and interpretations, correlation and cross-tabulation were done on all sets of variables in order to determine whether any meaningful associations could be found. With reference to the title of this study "Combating the corporate paper war: optimising electronic mail and electronic filing", it has been proven that the war against paper abuse is far from over. Perceptions regarding a future paperless office and assumptions that technology such as the electronic mail facility and electronic filing could assist organisations to combat paper abuse were unfounded, due to a lack of guidance and control measures in the corporate environment. Consequently, it is recommended that an e-filing and e-mailing model be created and followed in conjunction with specified computer software features in order to counteract the abuse of paper. Follow-up research could focus on electronic filing methods versus scanning of documents for filing purposes.Item Comparative study of open source and dot NET environments for ontology development.(Vaal University of Technology, 2020-05) Mahoro, Leki Jovial; Moyo, Sihle; Fonou-Dombeu, J. V., Dr.Many studies have evaluated and compared the existing open-sources Semantic Web platforms for ontologies development. However, none of these studies have included the dot NET-based semantic web platforms in the empirical investigations. This study conducted a comparative analysis of open-source and dot NET-based semantic web platforms for ontologies development. Two popular dot NET-based semantic web platforms, namely, SemWeb.NET and dotNetRDF were analyzed and compared against open-source environments including Jena Application Programming Interface (API), Protégé and RDF4J also known as Sesame Software Development Kit (SDK). Various metrics such as storage mode, query support, consistency checking, interoperability with other tools, and many more were used to compare two categories of platforms. Five ontologies of different sizes are used in the experiments. The experimental results showed that the open-source platforms provide more facilities for creating, storing and processing ontologies compared to the dot NET-based tools. Furthermore, the experiments revealed that Protégé and RDF4J open-source and dotNetRDF platforms provide both graphical user interface (GUI) and command line interface for ontologies processing, whereas, Jena open-source and SemWeb.NET are command line platforms. Moreover, the results showed that the open-source platforms are capable of processing multiple ontologies’ files formats including Resource Description Framework (RDF) and Ontology Web Language (OWL) formats, whereas, the dot NET-based tools only process RDF ontologies. Finally, the experiment results indicate that the dot NET-based platforms have limited memory size as they failed to load and query large ontologies compared to open-source environments.Item Computer literacy as additional empowerment mechanism in learning programmes(2004-01) Van Staden, A; Hoffmann, E. C.The world of digital interactivity, of computers, of cyberspace and the "e-revolution', is making computer literacy more indispensable than ever. There is an increasing demand for ICT skills worldwide- South Africa is not alone in identifying shortages. The information and communication technology in South Africa is exacerbated by emigration on the one hand and the previously disadvantaged learners on the other hand. With an education system that is stretched, higher education has not kept pace with information and communication technology training in South Africa, therefore learners display a shortcoming of basic computer skills. The purpose of this study is to emphasise the importance of implementing computer literacy training throughout the entire learning programme of learners at higher education institutions. Learners randomly selected from the Faculty of Management Sciences, Vaal University of Technology, indicated their computer literacy via questionnaires and levels of experience. It is clear that the abilities of the learners are not sufficient to ensure that they are computer literate or that they will be effective users in the workplace. This study results in a powerful argument in support of the extension of continued growth in computer usage in the workplace.Item A conceptual framework for crowdsourcing in higher education.(2018-04) Shongwe, Thulani W.; Van Eck, Rene; Zuva, Tranos, ProfThe speedy growth of Internet based information and communication tools produced a new field of prospects for educational organizations to reach their aims. One of the options is crowdsourcing. Crowdsourcing was recently the answer to the growth for providing different applications in areas such as education, financing, and entrepreneurship. South African schools are considerably failing in education. A big challenge is when it comes to the mathematics delivery method which ends up affecting the learners’ performance. When compared to other middle income nations, South Africa is ranked third from the bottom in terms of its performance when it comes to mathematics. This study designed a conceptual crowdsourcing tutoring framework. The framework defines the use of how crowdsourcing can contribute to tutoring grade 11 and 12 mathematics in order to improve the learners’ performance. A prototype was developed to illustrate the crowdsourcing tutoring framework. The simpleKmeans algorithm was used in the prototype. The algorithm was used to select learners, tutors and appropriate textbooks for the virtual class. The prototype system proved to be effective as it was able to cluster students according to their performance and tutors according to their student pass rate. Through the usage of a clustering simpleKmeans algorithm, this study was able to create a virtual class that illustrated how all the components come together for the proposed crowdsourcing tutoring virtual class. The use of the prototype system was able to fill the virtual class with students who obtained low average marks and educators with the pupils who had the highest pass rate. This study was able to build a virtual class with the following components: learners, tutors and textbooks. Objectives and research questions of this study were fulfilled. In future studies the researcher will endeavor to make the system recommend textbooks without using the textbooks used by the teachers who produced the best results.Item Consumer readiness for the adoption of IOT Smart Homes (CRA-IOT-SH) in Gauteng, South Africa(Vaal University of Technology, 2022) Julies, Bryan David; Zuva, Tranos, Prof.Smart home technology has numerous advantages to the modernised home; however, the technology is in its early phase and the uptake among consumers is still very low. The reason for the slow uptake is due to privacy, security, trust, performance expectancy/connectivity standards, reliability, costs, perceived usefulness, installation, interoperability, energy efficiency, effort expectancy, maintenance and administration. However, numerous literature looked at the differences between the owner’s demand and what the smart devices functionality offers to the homeowner. In order for IOT smart home consumers to fully enjoy the benefits of this new technology, there is a need to measure their level of readiness. There have been little or no research done to measure consumer readiness for the adoption of IOT smart home technology, particularly in Gauteng, South Africa. This study therefore investigated the factors that influence consumer readiness for the adoption of IOT smart homes in Gauteng. The study investigated and established possible factors that influence the adoption of IOT smart homes and consumers’ intention of use. CRA-IOT-SH model was proposed. One hundred and three (103) questionnaires were distributed and seventy-four (74), that is, seventy two percent (72%) useable questionnaires were returned. The population of this study was only limited to individuals who lived in Gauteng Province, South Africans and consumers of IOT home technology. For this reason, the sample size that was use was Cochran formula with unknown population (𝑛0 ). Reliability and validity of the data were analysed and found to be acceptable. Reliability and validity of the data were analysed and found to be acceptable. The results demonstrated that five (5) factors that had statistically significant and positive impact on the consumers’ attitude (AT) are perceived ease of use (PEOU), perceive usefulness (PU), relative advantage (RA), perceived innovation (PI) and trust (T). In addition, social influence (SI) and attitude (AT) were found to influence intention of use (IOU). The findings from this research can offer insights for organisations looking to provide smart home as a business in their communities.Item Decision support framework for the adoption of software development methodologies.(Vaal University of Technology, 2019) Simelane, Lynette; Feukeu, Etienne Alain, Dr.; Zuva, Tranos, Prof.There are many software development methodologies that are used to control the process of developing a software system. However, no exact system has been found which could help software engineers in selecting the best software development methodology (SDM). The increasing complexity of software development today has led to complex management of software systems. This complexity increases the challenges faced by professionals in selecting the most appropriate SDM to adopt in a project. This is important because the wrong choice of methodology is costly for the organization as it may impact on deliveries, maintenance costs, budget projects and reliability. In this study we propose a decision support framework to assist professionals in the selection of appropriate software development methodologies that would fit each organisation and project setting. The case based reasoning (CBR) methodology was implemented in this study. This methodology focuses on problem solving that centres on the reutilization of past experiences. The CBR methodology was implemented using the SQL programming language. We tested the precision of the decision support framework by comparing the recommended methodology to the actual software methodology that was adopted for the project. The DS framework recorded an 80% precision result. In addition, the findings contribute to reducing the software crisis faced by today’s professionals. Therefore the framework can be adopted as a reliable tool for methodology selection in software development projects.Item Developing a formula for the comparison of athletics performances across gender, age and event boundaries based on South African standards(2018-01) Bekker, S. W. J.; Janse van Rensburg, J. F.The author addressed the need of parents, school teachers and athletic coaches to be able to assess the level of performance and to compare performances of individual athletes of either gender and in any age group. This was achieved by creating formulas for the following areas in track and field athletics: • Correctly set base standards for all events from the results of 5 year weighted average performances. • Use the base standards to determine comparative standards for all events in all age groups. • Define a function to compare male and female performances in all events. • For all events, generate tables with a range from 0 to 1000 as a comparative measurement. These formulae were created using data from international and national meetings. Different case studies were used for each of the areas and the results were evaluated using the data. In all four areas, it was possible to define hybrid functions with a confidence factor better than 99%. The final performance tables can be updated during revision periods (every 2 to 4 years) by using the national results for the last 5 years. These revisions will be required as implements, tracks and training methods change with time and this will then in turn influence the performances. This is evident from the continuous improvement of records in all events. These tables will not only assist coaches to improve training techniques but it will also facilitate team managers to improve team selections, and it will open the options of meeting organizers to arrange meetings using different formats. As this is a new and unique formulation for measuring performances at junior level in world athletics it can be used as a basis for future improvements in the field of comparative measurement for athletics. Using these tables at senior level it may assist to settle arguments of performance comparisons that are not addressed by the current tables used by the International Amateur Athletics Federation (IAAF). It will also avoid the use of different tables for the same events in standard track and field athletics compared to those used for combined event competitions. The author of the tables used by the IAAF has recognised this work as a new and unique development. Future development will include the automatic update of all functions and creation of tables for publication from a standard Windows® based application. A companion application, using the results from this research, will be developed. This application will address all the administration functions required to conduct a meeting. It will include the preparation for the meeting, capturing of results during the meeting and result reporting after the meeting.Item Diffusion innovation, adoption, and acceptance of a recommender systems in higher education(Vaal University of Technology, 2022-04-21) Hlungwane, Ntsako Morgen; Sehume, Odilia M. M., Dr.; Zuva, Tranos, Prof.Recommender systems (RS) are widely used to help with reducing information overload by suggesting relevant items to users proactively or reactively. The usefulness of RS has made them used in different sectors, such as e-commerce, retail environments, and even the education sector. RS is penetrating different sectors with varying speeds, and its adoption and acceptance vary in different sectors. Therefore, this study investigated the diffusion, adoption, and acceptance of RS in higher education. A quantitative method was used in this study. The data was collected using questionnaires and a model was proposed. Two hundred and sixty-one usable questionnaires were received from participants. The requirements for the study's reliability and validity were both met. The results have shown that diffusion, adoption, and acceptance of RSs in higher education do not occur by chance. They also indicated that diffusion has a positive influence on the adoption with β= 0.625, Sig. = 0.000, and adoption has a positive influence on the acceptance with β = 0.606, Sig. = 0.000 of RSs in the higher education sector. The benefits gained by those who use RSs have a positive effect on RS diffusion (= 0.695, Sig. = 0.000) and adoption (= 0.579, Sig. = 0.000), allowing RSs to grow in the higher education sector. RS are still in their early diffusion stage in higher education as an educational tool. There is a need to intentionally promote RS benefits in higher education to enable a faster diffusion of the technology.Item Electronic portfolios to enhance the learning experience of scholars at private tertiary institutions in South Africa(Vaal University of Technology, 2016-07) Mapundu, Michael Tonderai; Lombard, A.; Jordaan, A., Prof.The purpose of this study was to investigate the use electronic portfolios (e-portfolios) in private tertiary institutions in South Africa to enhance the learning experience of scholars. The study adopted an interpretive ontological stance and subjective epistemological stance as the researcher sought to understand how-portfolios can be used to enhance learning. The focus was on understanding people in a social setting though employing field research to collect and interpret data. Action research, in this case employing a pre-test, intervention and post-test limited to a single cycle, was selected as strategy. The empirical part of the study was conducted during the first semester of 2014 (January to May) at a private tertiary university in Gauteng, South Africa. A pre-survey has been conducted before implementation and a post-survey after the implementation of e-portfolios to test the attitude of the participants, where after the results were compared. The pre-test was administered before creating e-portfolios and the post-test towards the end of the semester after developing and maintaining e-portfolios. Questionnaires were used to obtain information such as the attitude of the respondents on learning, assessment, reflection, collaboration and interpersonal communication through the use of e-portfolios. Questionnaires served as the main data collection tool throughout the survey. The sample was selected from first and second year students in the Information Technology faculty, with the sample size n=48. The researcher further collected data through observing subjects and conducting group interviews that were recorded to augment the questionnaire approach and verify the results through triangulation. The questionnaires were distributed to the participants who were given thirty minutes to complete. Responses were made using a five-point Likert scale and open-ended questions. The response rate was outstanding as all 48 subjects participated in the study. The researcher used a mixed-methods approach for this study; SPSS 22.0 was used for quantitative data analysis and thematic analysis was employed for the qualitative data. Reliability for quantitative data was determined using Cronbach’s alpha. Regression analysis was done as well as correlations to determine relationships and associations. To further cement relationships, t-tests and Spearman’s correlation coefficient were employed. Trustworthiness for qualitative data and justification for credibility, dependability, transferability and confirmability were discussed. The results revealed that e-portfolios could be used effectively at private tertiary institutions to enhance the learning experience of scholars as evidenced by the significant statistics obtained in this study.Item An exploratory study of the security and privacy issues affecting the adoption of the internet of things in Vereeniging(Vaal University of Technology, 2022) Yeboah, Thomas; Sibanda, E.; Van Eck, R., Dr.Background The convergence of numerous technologies, such as real-time analytics, machine learning, ubiquitous computing, commodity sensors, and embedded systems, has resulted in the evolution of the Internet of Things. With the advent of the Internet of Things, people can be empowered, the government can be made more transparent, and information can be made more accessible. Several schools of thought argue that there is increasing worry over the possibility of the Internet of Things (IoT) diminishing people's autonomy over their own life. When there is a combination of big data and the Internet of Things, people's lives are more exposed to large businesses and political organisations. As a result, individuals have less influence over their own destinies. The present study was an ‘Exploratory Study of the Security and Privacy Issues Affecting the Adoption of the Internet of Things in Vereeniging’. The researcher adopted interpretivism as the research philosophy and the present study was inductive in its approach. The target population for this study was 30 IT specialists in Vereeniging who participated in the study through semi-structured interviews. The study has established that, to a greater extent, organisations are adopting IoT technology in their operations. The study established that smart home appliances, smart security systems, fitness trackers, wireless headphones/earbuds and so many more such items have become an intrinsic part of people’s daily lives that if we were deprived of them, people would feel a void somewhere. The study found that organisations are implementing a plethora of strategies to make sure that they are secure in their use of IoT technologies. The study also discovered that there is rampant crime emanating from human behaviour resulting in the damage of IoT infrastructure and devices in some organisations. Several fascinating discoveries on how IoT users view privacy and security have been uncovered in this research paper. The study shows that while IoT use is on the rise, so too is the growing concern around privacy and security. However, consumers choose to sacrifice these measures for the advantages and additional benefits that the technology provides to their life. While these views may remain constant for the foreseeable future, any large security incident or privacy intrusion could significantly shift beliefs. It seems that people who utilise the Internet of Things (IoT) would prefer for businesses to be more transparent about the data that is being collected and why it is being reused. They wish to get more security safeguards to safeguard their personal info. Based on these findings and previous studies, a safer IoT environment will be provided for both users and private corporations. Future IoT research studies can build on the outcomes of this study. Based on the findings in this study, the following recommendations are made: Cryptography Cryptography is helpful in safeguarding private data that is located on one network and moved to another network via a secure transmission link. Encryption can be applied to safeguard the transfer of data across an unsecured network using various cryptographic methods, such as AES, SHA-1, MD5, RSA, etc. For optimal computational efficiency, high-performance CPUs and ample memory are required. However, it's not clear how these strategies can be used efficiently at this time. As the hardware in IoT has restricted processing speed and minimal memory, significant research is necessary to correctly implement these algorithms. End to End Security Authenticity towards data can be maintained by means of many protocols, such as TLS/SSL and IPSec, which implement end-to-end security. As IoT devices have less processing power, these protocols are not feasible. As a result, security on an end-to-end basis cannot be accomplished, thus leaving the door open for hackers for data manipulation, man-in-middle attacks, denial of service attacks, and even distributed denial of service attacks. As a result, new research on the approach needed for the creation of a similar technology, analogous to TLS/SSL or IPSec, is required to safeguard data transmissions and ward off hackers. Firewall or IPS In the case of a network without firewall or intrusion prevention system, there is an open invitation to the outside world. Packet filter and Intrusion Prevention System (IPS) both have deep packet inspection capacity to manage the flow of traffic heading towards the destination. However, IoT does not provide functionality that includes packet inspection and packet filtering. Security researchers are allowed to perform research in this field, where they may build a low resource-intensive firewall to analyse and manipulate packets for IoT devices.Item Facial and keystroke biometric recognition for computer based assessments(Vaal University of Technology, 2019-12) Adetunji, Temitope Oluwafunmilayo; Appiah, Martin, Dr.; Zuva, Tranos, Prof.Computer based assessments have become one of the largest growing sectors in both nonacademic and academic establishments. Successful computer based assessments require security against impersonation and fraud and many researchers have proposed the use of Biometric technologies to overcome this issue. Biometric technologies are defined as a computerised method of authenticating an individual (character) based on behavioural and physiological characteristic features. Basic biometric based computer based assessment systems are prone to security threats in the form of fraud and impersonations. In a bid to combat these security problems, keystroke dynamic technique and facial biometric recognition was introduced into the computer based assessment biometric system so as to enhance the authentication ability of the computer based assessment system. The keystroke dynamic technique was measured using latency and pressure while the facial biometrics was measured using principal component analysis (PCA). Experimental performance was carried out quantitatively using MATLAB for simulation and Excel application package for data analysis. System performance was measured using the following evaluation schemes: False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER) and Accuracy (AC), for a comparison between the biometric computer based assessment system with and without the keystroke and face recognition alongside other biometric computer based assessment techniques proposed in the literature. Successful implementation of the proposed technique would improve computer based assessment’s reliability, efficiency and effectiveness and if deployed into the society would improve authentication and security whilst reducing fraud and impersonation in our society.Item Framework for Adoption of Information and Communication Technology security culture in SMMEs in Gauteng Province, South Africa(Vaal University of Technology, 2019) Mokwetli, M. A.; Tshepiso, Nkoana; Zuva, Tranos, Prof.Information and Communication Technology (ICT) has become prevalent in our everyday business and personal lives. As such, users and organisations must know how to protect themselves against human errors that led to more companies losing or sharing information that should not be shared. The issue emanates from lack of ICT security culture both in individuals and organisations. This research is based on a wide theoretical review that is focused on proposing a conceptual model on technological, environmental and organisational factors that influence the adoption of ICT security culture and implementation in Small Medium and Micro Enterprises (SMMEs). Factors or determinants that influence the adoption of ICT security culture in SMMEs in the Gauteng province were investigated. Questionnaires were distributed to examine the perception of ICT security culture adoption among SMMEs in the Gauteng province South Africa. A sample of 647 individuals from different SMMEs in the Gauteng province returned the questionnaire. The results of the research study show that technological context (perceived benefits), environmental context (government regulations) and organisational context (management support) determinants have direct influence on the ICT security culture adoption. The recommendation is that information security awareness programmes must be put in place. Further research is recommended using more determinants that might have a positive impact toward the adoption of the ICT security culture. In order to minimize data breaches due to human error it is recommended that SMMEs around Gauteng Province in South Africa adopt the framework as outlined in this research study.
- «
- 1 (current)
- 2
- 3
- »