%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 34 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717192542+00'00') /ModDate (D:20250717192542+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R 32 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 7734 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 136.346 521.469 610.388 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 136.721 520.719 609.638 re S 0.773 0.773 0.773 rg 61.016 152.096 m 550.984 152.096 l 550.984 152.846 l 61.016 152.846 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(REDCAP LAUNCHED FOR RESEARCHERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(SU Research Support Services are pleased to announce the launch of Stellenbosch Universitys Research Electronic Data )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(Capture \(REDCap\) service. REDCap is a secure web application for building and managing online surveys and databases )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(and can be configured to meet compliance standards such as HIPAA, 21 CFR Part 11, and FISMA.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(REDCap is a tool for capturing confidential information. This requires planned and careful management in order to protect )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(the participants personal data. For data security purposes, exporting of data from the platform is discouraged, but if )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(necessary, security and confidentiality will depend on correct tagging of identifier fields in the data dictionary and correct )] TJ ET BT 61.016 562.486 Td /F4 9.0 Tf [(assigning of user rights for export by the Data Manager.)] TJ ET BT 61.016 542.497 Td /F4 9.0 Tf [(Ethics approval is required from an appropriate Stellenbosch University )] TJ ET 0.373 0.169 0.255 rg BT 346.622 542.497 Td /F4 9.0 Tf [(REC)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 346.622 541.346 m 365.621 541.346 l S 0.153 0.153 0.153 rg BT 365.621 542.497 Td /F4 9.0 Tf [( if working with humans, human material )] TJ ET BT 61.016 531.508 Td /F4 9.0 Tf [(\(such as blood or tissue\) or their data, including secondary use of such materials \(this is defined as the reuse in a new )] TJ ET BT 61.016 520.519 Td /F4 9.0 Tf [(project of previously collected data or material\). Please contact your local ethics office if you have not yet applied for ethics )] TJ ET BT 61.016 509.530 Td /F4 9.0 Tf [(clearance. The application will include questions related to how you manage, store and use data, including data entered )] TJ ET BT 61.016 498.541 Td /F4 9.0 Tf [(into REDCap. It may also require that you submit the data dictionary and an assigned roles list. Particular attention should )] TJ ET BT 61.016 487.552 Td /F4 9.0 Tf [(be paid to which identifiers you intend to collect and how you will maintain confidentiality if exporting identifiable data.)] TJ ET BT 61.016 467.563 Td /F4 9.0 Tf [(Adequate and appropriate consent is an essential requisite of REC approval. If you are collecting and storing personal )] TJ ET BT 61.016 456.574 Td /F4 9.0 Tf [(identifiers, it must be reflected in the consent form. If you intend to share or reuse data or material, it must be consented to )] TJ ET BT 61.016 445.585 Td /F4 9.0 Tf [(when the data or material is collected, otherwise, it cannot be used or shared in future research projects.)] TJ ET BT 61.016 425.596 Td /F4 9.0 Tf [(To access this service, register on )] TJ ET 0.373 0.169 0.255 rg BT 199.562 425.596 Td /F4 9.0 Tf [(redcap.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 199.562 424.445 m 268.097 424.445 l S 0.153 0.153 0.153 rg BT 268.097 425.596 Td /F4 9.0 Tf [( with your active SU username and password. As part of the )] TJ ET BT 61.016 414.607 Td /F4 9.0 Tf [(registration process, you will receive an email verification request. This auto-generated email will include instructions on )] TJ ET BT 61.016 403.618 Td /F4 9.0 Tf [(how to set up Google Authenticator. For security reasons, Google Authenticator )] TJ ET BT 380.174 403.618 Td /F1 9.0 Tf [(must)] TJ ET BT 401.675 403.618 Td /F4 9.0 Tf [( be used with REDCap to ensure )] TJ ET BT 61.016 392.629 Td /F4 9.0 Tf [(multi-factor authentication.)] TJ ET BT 61.016 372.640 Td /F4 9.0 Tf [(A training instance of REDCap is also available on )] TJ ET 0.373 0.169 0.255 rg BT 264.101 372.640 Td /F4 9.0 Tf [(redcaptest.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 264.101 371.489 m 347.144 371.489 l S 0.153 0.153 0.153 rg BT 347.144 372.640 Td /F4 9.0 Tf [(, where you can explore REDCap functionality and )] TJ ET BT 61.016 361.651 Td /F4 9.0 Tf [(present training sessions. Real data may not be captured in the training environment. Google Authenticator has to be set )] TJ ET BT 61.016 350.662 Td /F4 9.0 Tf [(up separately for the training environment and the live environment.)] TJ ET BT 61.016 330.673 Td /F4 9.0 Tf [(SU does not provide institutional support for the day-to-day operational use of REDCap. It is a researchers responsibility )] TJ ET BT 61.016 319.684 Td /F4 9.0 Tf [(to familiarise themselves with the software, however, )] TJ ET 0.373 0.169 0.255 rg BT 273.587 319.684 Td /F4 9.0 Tf [(embedded video guidance)] TJ ET 0.18 w 0 J [ ] 0 d 273.587 318.533 m 379.148 318.533 l S 0.153 0.153 0.153 rg BT 379.148 319.684 Td /F4 9.0 Tf [( and numerous )] TJ ET 0.373 0.169 0.255 rg BT 441.680 319.684 Td /F4 9.0 Tf [(FAQs)] TJ ET 0.18 w 0 J [ ] 0 d 441.680 318.533 m 464.684 318.533 l S 0.153 0.153 0.153 rg BT 464.684 319.684 Td /F4 9.0 Tf [( are available online. )] TJ ET BT 61.016 308.695 Td /F4 9.0 Tf [(SU-specific guidelines are available )] TJ ET 0.373 0.169 0.255 rg BT 205.565 308.695 Td /F4 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 205.565 307.544 m 223.574 307.544 l S 0.153 0.153 0.153 rg BT 223.574 308.695 Td /F4 9.0 Tf [(. For fee-based REDCap advanced support, contact )] TJ ET 0.373 0.169 0.255 rg BT 433.175 308.695 Td /F4 9.0 Tf [(redcap@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 433.175 307.544 m 508.343 307.544 l S 0.153 0.153 0.153 rg BT 508.343 308.695 Td /F4 9.0 Tf [(. For )] TJ ET BT 61.016 297.706 Td /F4 9.0 Tf [(technical support \(i.e. access-related or system errors\), contact )] TJ ET 0.373 0.169 0.255 rg BT 314.600 297.706 Td /F4 9.0 Tf [(help@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 314.600 296.555 m 379.265 296.555 l S 0.153 0.153 0.153 rg BT 379.265 297.706 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 277.717 Td /F4 9.0 Tf [(A REDCap mobileappis also available and can be used on iPhone, iPad, or Android phone or tablet. The REDCap )] TJ ET BT 61.016 266.728 Td /F4 9.0 Tf [(Mobile App adds a new dimension to REDCaps versatility by providing users witha tool for offline data collection, )] TJ ET BT 61.016 255.739 Td /F4 9.0 Tf [(particularly in environments with poor Internet connectivity. The devices \(tablet or phone\) must be secured. REDCap )] TJ ET BT 61.016 244.750 Td /F4 9.0 Tf [(Mobile App users must report any stolen tablets or phones to )] TJ ET 0.373 0.169 0.255 rg BT 306.131 244.750 Td /F4 9.0 Tf [(SU IT)] TJ ET 0.18 w 0 J [ ] 0 d 306.131 243.599 m 329.135 243.599 l S 0.153 0.153 0.153 rg BT 329.135 244.750 Td /F4 9.0 Tf [( and the )] TJ ET 0.373 0.169 0.255 rg BT 364.163 244.750 Td /F4 9.0 Tf [(SU REDCap Administrators)] TJ ET 0.18 w 0 J [ ] 0 d 364.163 243.599 m 474.683 243.599 l S 0.153 0.153 0.153 rg BT 474.683 244.750 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 224.761 Td /F4 9.0 Tf [()] TJ ET BT 61.016 204.772 Td /F4 9.0 Tf [()] TJ ET BT 61.016 184.783 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 166.294 Td /F2 9.0 Tf [(Posted in:Apps,Research | | With 0 comments)] TJ ET q 225.000 0 0 96.750 61.016 549.461 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 549.4609 286.0157 646.2109 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2018/07/redcap2.jpg) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 346.6217 541.6642 365.6207 550.8217 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://www.sun.ac.za/english/research-innovation/Research-Development/integrity-ethics) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 199.5617 424.7632 268.0967 433.9207 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://redcap.sun.ac.za) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 264.1007 371.8072 347.1437 380.9647 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://redcaptest.sun.ac.za) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 273.5867 318.8512 379.1477 328.0087 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://redcap.sun.ac.za/index.php?action=training) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 441.6797 318.8512 464.6837 328.0087 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://wiki.library.ucsf.edu/display/RKB/REDCap+Frequently+Asked+Questions) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 205.5647 307.8622 223.5737 317.0197 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/admin/Infoteg/dokumente/redcap_governance.pdf) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 433.1747 307.8622 508.3427 317.0197 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (mailto:redcap@sun.ac.za) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 314.5997 296.8732 379.2647 306.0307 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (mailto:help@sun.ac.za) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 306.1307 243.9172 329.1347 253.0747 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (mailto:help@sun.ac.za) >> endobj 32 0 obj << /Type /Annot /Subtype /Link /A 33 0 R /Border [0 0 0] /H /I /Rect [ 364.1627 243.9172 474.6827 253.0747 ] >> endobj 33 0 obj << /Type /Action /S /URI /URI (mailto:redcap@sun.ac.za) >> endobj 34 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 129 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 8092>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((Ɗ((((((((((((((((UGzgIRm%v]:r%-YO+KHX*w( {}+sP.Iss)3v R nzGnw>? WA5m|H8aW5gLn{)wFJ8'x(?e>C k} ]8e5]]( (!EPEPEPEPEPEPEPEPEPEPEPEPEPEPߴ̓}A#l= e??:ҼOXp`sqg?|&x ҼV%kU/ykJ3NcߚtݑǍ zOftϥjz$In# {W4Cg{VWoguO}Dfah$&8'h$7|rq^8&|2kVH+&}.K1I=}j.a?G<Fc4Oj˫9[?ؤkDkq_WÏQ^o%2 5s_<@PFhձ3qMkUk@q_?Ut;=*TT26p4 dq@SE8W>p>\ү,++ufWk_/h-qkgZaolnOGSRQ\gzIYF͹p:EeܐfN+'TotF+U\d]]xG,MɤiH[=5+ǰG׈c'Z:]W=$nz( _7̾0BG s4V=,0=q'5j[ brjq0}̅@LסJ"a,enG l{JkA Zm#OPAo]^1fo-;:-c9Iwαđ][lcb%'O;dt{3Tug0ӭ&R(aR@18Zi_tkjٯџu:l0C_-owhnt|Kgwwl g¾Ҵ-OiHnY ]ckUmph>N}y|׾#A1s:42;:cnoʇ:dobx ksǥC,yB?kWp>Q]WEl]qI 9xP EKE|?Q|w EYۦvNJEal0q?i7~'蚊O:݌42`pUW{i ۉ@o}o$gIS1Q: e6]ȱA4HFI>__!|Mu$gg1 @{rkw-oQOys$l?'5:~cMk"vO-X`BAb9>tm7AOҬmm!R"( ~ xj |0ޛ ~[ Y vtTrA #W ar;W͞*4]6CHSH$n${W"G'+;N88&AK.}n]P]~~,y3k$IZY~To(SqFEDoUi ƽt|[x;67p6,qWc)lw4όg+K'8eqf]mIs*vTRH־-6h,\(y,O_af8M?sxoF ,[OW3smͯt8V|+O~?o5eյheF{@uem93}x D2[W2< *&еiX`RAO!IwKIi.}M|hdnex᧎týu#E~څamYLDC"tt`# p?] LguE}ʋW瘯?jգm?%?|N}WZE֡k<",JA ~Z:#C`/5^ߤY<#EZ#{4xS᷊I:0$!OD]I4pidT_V8! B(_ښu~mD7&YR<}LWѓ$T`.Q ?0k?aYxB>VAl1@RQLhBȑp+>]C[@vir݆~Q_VԘ Fħ$q_&xOC'ҴXUG?3OkS_=Sw.|Aa GV!3$޽@_qsna̺5 IH4ן|G#cP?Ic_h!/{-m}o%uTߚu/P%͜7#@_ oWHC% FcVГiז  @hFMHQMTKZ%3 85KƓqkX.f(zW͞6m[oh XqGՇҹO7IO0p$ٗq¦[ֹ٧.K7ۮipmkf!T^qNFhBZZZkpi[me* r~6|1icx]bI|HMą6g|}O5%WB𵰵 2,yr}|p\<+j-$+鹐ʀ8"'c#g62/fƾpmEl?!|[nniȿ_2%Lko"E්ULh5qS,e1ƣ~Y5w6~iry ) ( H=4_mvfYc)G?}ϭkZST +aQG޿8(׉yp|n%#j{;w7B߹ k(џ {+.-G^x? ChoAWДQE̾E-mq_zuu4jvrM$ҿO*nmy2v$}J'M>ݼIq&Pcҽ{Umu2MKkw 2FH#jvR#5(%O#5}k/B_RM=9AJF6p,%-جW?d_jϤ#\؃q<,OH9{ j6fp.0'6K%1‘vpix»{[KKf!]\ #dی~5w#:u?ӶM"]ˁzTo6}{sp,`{gXz@W/xg&9\J(5-j`E pEVPF5_Yz0ԯoDi2ryKr I(Þ&;X 8[x#5 UG@Xl/âK$ITv*07k~0>.i^vj1 gQ铜gpFNz} zV-nlHEF)" >j~&Ѵ}2MRQ&nܡ3H;(;IYx3sjVkn3+53jzTH=0vk(Ki-χtkumn1aLQ$M 1rv[7_&^jZtMŪ}Pwe%Cq HLija.{{+[W6ojY#*e g$:T7O*tBOn>K9;4o [.bu {[2$d7'jw핧~œ{^ok:,ڧru<9N \_”Y>(x=e[[z=+BoQ"=J$ S0}vϾ3]?y42Ӹנ{,g;*:P=Eioeg kUFQ@Q@bx P43YqWfBknRjF\R] !u;]!+\<`g ";+unPϋ]68UfP[F3(غ]GO{ K M>..# `_rz;x}D!'T=啥ݤ/1?&wʬy+2٦Ku+EXmK`t5|yeIG򫪰@9Ɗ^ 5=3W~Tޑ8Vi|bbdn}6lmm 9%$1`y|{OUvӣK&>s d zWV U9ǡ sC+?^hD R{J5MDCw\]GkqQeؿ"On9ZiZ9O Cyr=T꣌TQV<[~ռ;YbOJd)uLBH<.xK|\7/Z:LidV m s0:׸Z+j:մ<__/ι=-兞s2],Mѕ^u|,,n˪i>#'Iqj-.|% NS3 O*;۟eNdգޑ!c8{_ZI6}&d j-QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE((((((Q@Q@Q@Q@Q@Q@Q@Q@ endstream endobj xref 0 35 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000659 00000 n 0000008445 00000 n 0000008557 00000 n 0000008672 00000 n 0000008792 00000 n 0000008900 00000 n 0000009027 00000 n 0000009130 00000 n 0000009258 00000 n 0000009397 00000 n 0000009525 00000 n 0000009600 00000 n 0000009728 00000 n 0000009807 00000 n 0000009935 00000 n 0000010037 00000 n 0000010165 00000 n 0000010292 00000 n 0000010420 00000 n 0000010540 00000 n 0000010668 00000 n 0000010743 00000 n 0000010871 00000 n 0000010944 00000 n 0000011072 00000 n 0000011145 00000 n 0000011273 00000 n 0000011348 00000 n trailer << /Size 35 /Root 1 0 R /Info 5 0 R >> startxref 19608 %%EOF Research « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Research

Mobile technology survey reveals new trends

Friday, November 1st, 2013

Android and Apple mobile phones look likely to dominate share amongst students within a year while Blackberry’s share is dwindling rapidly. The picture has changed significantly since 2012:

mobile-phones

This is just one example of the results of a recent mobile technology survey conducted by the Information Technology division to track trends in students’ mobile devices. The purpose of these surveys (the first was conducted in September 2012) are to identify trends so that relevant university mobile services and strategies can be implemented in future. Understanding the mix of devices that students possess and how rapidly the picture is changing, is crucial for informed planning and decision-making.

Another unexpected trend is the slow penetration of tablets on campus. Since the vast majority of students have daily access to a laptop, ultrabook or notebook, the tablet seems to be an optional “third” device, which 47% of students can’t afford and 25% prefer not to use. Only 28% of respondents have a tablet, almost half of which are Apple iPads, closely followed by Android tablets. Students indicate that the take-up is likely to increase but accelerate slowly.

Unfortunately awareness of the national Student Technology Programme, which provides students with the opportunity to purchase heavily discounted tablets, laptops and notebooks, is also still lacking.

On the positive side students consistently rate mobile services and content related to learning and academic events and schedules as the most important. It is possible that as more learning content, including e-textbooks, becomes available via mobile devices, for offline consumption as well, that the penetration of tablets may accelerate.

mobile-content

More surveys will be conducted in the foreseeable future to discern trends and changes over time and students are encouraged to participate.

One lucky respondent, BComm student, Pierre-Etienne Rossouw, was the winner of an Incredible Connection gift voucher to the value of R1500.

2832 students out of 32266 invitees responded.

 

[PHOTO: Ralph Pina (director of development) with winner Pierre-Etienne Rossouw]

 

 

 

Moodle takes over from Vista & Blackboard

Friday, May 24th, 2013

From 2014 Stellenbosch University’s electronic learning management system will switch from Vista and Blackboard to Moodle, an  open source eLearning system. The switch to another system was necessitated from a change in the University’s strategy and shortcomings in the existing system that could not be corrected. The decision was based on a thorough investigation. Henceforth Moodle will be the standard eLearning system of the University.

A task team (Johann Kistner, drs Antoinette van der Merwe & JP Bosman and ms Marinda van Rooyen) facilitated the evaluation, including consulations with academic, administrative and support services staff. The success of systems, as well as the scale on which they were used by other universities, were also looked at. In the end a decision was made based on a set of predefined, weighed criteria. The following was taken into account:

  1. Off-campus access to the system must be reliable, because of the significant growth in the use of e-Learning Technology from outside campus:  service courses,      postgraduate modules, and students working from their homes.
  2. A reliable assessment component, because e-assessment is increasingly  used.
  3. A mobile interface that works on all equipment, due to the huge increase in the use of mobile devices (phones, tablets, laptops) to access the learning        management system.
  4. An accurate tracking system, because the tracking of students’ progress are critical for student success.
  5. Off-line functionality, which is very important in the (South) African context. The system must provide for students learning materials and other information to easily sync to their devices while on campus or via the network, and then to work at home without having to be online all the time.
  6. A more flexible licensing model, because community involvement and working with schools and other universities, especially on the African continent (e.g. in the CHEC courses and schools support) means that restrictive license agreements is not sustainable.

On a practical level this means that Moodle will be used for all modules from January and Vista and Blackboard will only be available for 2013 modules until March 2014. (until after the  last exam opportunity)

The short time span before implementation is planned presents substantial challenges for lecturers to migrate information in time and also for IT to ensure that servers are ready for the change. The project is currently being defined and the team is sticking to a tight time line to ensure that this goal will be achieved.

More information will also be communicated in future editions of Bits & Bytes.

Turnitin clips plagiarism’s wings

Friday, May 24th, 2013

Academic work at a university entails that the student be exposed to the ideas, written material and other intellectual and creative material of others. The intention with academic studies is precisely that the ideas of both the lecturers and the students will be shaped and polished by others. At the same time, students ought to go further than what was devised, written and created by others; he or she should critically evaluate it, provide new and original input or syntheses, and apply these to contemporary and local studies of problems. This is where academic activity becomes satisfying at university level.

Naturally, lecturers can only evaluate the contribution of their students if the contributions of others are clearly distinguished. This takes place through acknowledged systems or the process of acknowledgement and referencing. If these conventions are not adhered to and the required recognition is not given, the basis of the academic work at a university is undermined. Plagiarism is committed when someone else’s work (words, ideas, creations) are taken over and passed off as the writer’s own.

The university uses Turnitin to test plagiarism. Turnitin integrates with the Learning Management System (Webstudies or Ematies). (See more information below) Assignment links are created within the LMS which students use to upload their assignments to. The assignments submitted by students are stored in a database used to check for plagiarism. This prevents one student from using another student’s paper, by identifying matching text between papers. Assignments are also be checked against web pages, books, newspapers and available journals on the net.

The University aims to ensure that mechanisms are in place that will enable lecturers to promote academic integrity and to eliminate plagiarism. The most successful approaches to dealing with student instances of plagiarism allow for a ‘developmental approach’, which implies that cases of plagiarism – with the exception of serious cases – be used as opportunities to instruct the guilty persons as to what is expected and how to handle information. In addition, such a student could be directed to redo the assignment.

For more information on the university’s the Interim Guidelines for dealing with Plagiarism, please visit the CTL website: http://stbweb02.stb.sun.ac.za/ctl/policies.html

Article compilied from the Interim approach to dealing with plagiarism policy by Marinda van Rooyen

 TURNITIN/WebStudies official website

TURNITIN Logon problems & Help

–          If you can’t log in to WebSTudies or Blackboard, Go to www.sun.ac.za/useradm  and change your password.

–          Any other WebSTudies or Blackboard related queries (modules not showing etc.), send an e-mail to WebStudies or Samuel Morris or
call+27(0)21 808-2443

 

 

DRM – a Central African country?

Friday, April 26th, 2013

The abbreviation sounds like a reference to a Central African country and although DRM has to do with management, it’s about managing something less tangible and with less defined borders.

With the increasing amount of digital content flooding our world, whether it’s music, e-books or video it has become necessary for companies to protect their property by setting certain measures in place. But what is DRM?

We’ve  found the following definition and description on one of our favorite websites –

“Digital Rights Management (DRM) is a type of access control technique used by copyright holders, publishers, and hardware manufacturers to limit the use, manipulation, and distribution of digital content after the initial sale of that content.

Examples of DRM include the encryption of digital video (on DVD and Blu-ray discs) to prevent the purchaser from ripping the content off the disc, locking ebooks to the account with which they were purchased (thus you can read your Amazon-supplied ebook on your Kindle, transfer it to your Kindle app on your iPad, or read in on Amazon.com, but you cannot give that book to a friend or transfer it to your Barnes and Noble Nook), and the restriction of downloaded gaming content to the console or computer with which it was downloaded (you cannot simply copy your Xbox Live Arcade games from your console to the consoles of all your friends).

While publishing and content companies maintain that DRM is necessary to protect their intellectual property and fight piracy, many annoyed consumers note that content locked down by DRM is still widely distributed by pirates yet paying customers are stuck with the frustration of dealing with DRM systems including locked hardware, content they cannot transfer between other devices, and other such inconveniences.”

Today is also World Intellectual Property Day with various activities presented by Stellenbosch University. More info. 

 

 

(SOURCE: www.howtogeek.com)

Access to Library e-resources changing shortly

Friday, May 25th, 2012

Until now free internet access to the US Library Services’ subscription based electronic resources were managed by a setting in users’ browsers.

This setting, known as the PAC file, consists of a list of the electronic resources the library provides free internet access to. It mainly consists of agent and subscription e-resources, although, in some cases, exceptions were made to make subject specific resources available for free. Due to the ongoing decrease in internet costs this privilege will be suspended from 1 July 2012.

Due to the increase of e-resources on the internet, as well as the recent upgrade of the campus firewall and SANReN connection, the browser setting is no longer a practical method to gain access to free internet. In future free access to e-resources will only be available on the library’s website. Users can create new bookmarks from the Library’s e-database list  in their browsers if they still need access.

This new method is applicable to desktop computers, as well as laptops on and off campus. From July 2012 users no longer have to change the configuration of their browser on their laptops when they switch between working at home or the office.

Take note that you do need to use your Inetkey at all times for access to these free e-resources when working on the campus network.

These changes will be applicable from 1 July 2012.

Article supplied by Wouter Klapwijk, Information Technology, Library and Information Service

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.