The Condictio Indebiti and Unjust Factors (1)
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186869 , vital:44541 , xlink:href="file:///C:/Users/User/Downloads/69THRHR419%20(2).pdf"
- Description: Since the Supreme Court of Appeal has continued to avoid taking the step of recognising a general enrichment action,' the traditional enrichment actions of the common law remain fundamentally important to the operation of the law of unjustified enrichment in South Africa. Most significant of these is the condictio indebiti, which is probably the most well-known and liberally utilised enrichment action in South African law.2 In this article, the nature and scope of this condictio will be examined, and it will be shown that it has grown beyond its notionally traditional role of reversing payments or transfers made unjustifiably by mistake, to include causes of action in duress and protest. The implications of this for the condictio, as well as for the foundations of our enrichment law will then be examined, with reference to the two leading schools of enrichment law: the civilian school, typified by German law, and the common-law school, typified by English law.
- Full Text:
- Date Issued: 2006
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186869 , vital:44541 , xlink:href="file:///C:/Users/User/Downloads/69THRHR419%20(2).pdf"
- Description: Since the Supreme Court of Appeal has continued to avoid taking the step of recognising a general enrichment action,' the traditional enrichment actions of the common law remain fundamentally important to the operation of the law of unjustified enrichment in South Africa. Most significant of these is the condictio indebiti, which is probably the most well-known and liberally utilised enrichment action in South African law.2 In this article, the nature and scope of this condictio will be examined, and it will be shown that it has grown beyond its notionally traditional role of reversing payments or transfers made unjustifiably by mistake, to include causes of action in duress and protest. The implications of this for the condictio, as well as for the foundations of our enrichment law will then be examined, with reference to the two leading schools of enrichment law: the civilian school, typified by German law, and the common-law school, typified by English law.
- Full Text:
- Date Issued: 2006
The Condictio Indebiti and Unjust Factors (2)
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186880 , vital:44544 , xlink:href="///C:/Users/User/Downloads/69THRHR561%20(1).pdf"
- Description: Since the Supreme Court of Appeal has continued to avoid taking the step of recognising a general enrichment action,' the traditional enrichment actions of the common law remain fundamentally important to the operation of the law of unjustified enrichment in South Africa. Most significant of these is the condictio indebiti, which is probably the most well-known and liberally utilised enrichment action in South African law.2 In this article, the nature and scope of this condictio will be examined, and it will be shown that it has grown beyond its notionally traditional role of reversing payments or transfers made unjustifiably by mistake, to include causes of action in duress and protest. The implications of this for the condictio, as well as for the foundations of our enrichment law will then be examined, with reference to the two leading schools of enrichment law: the civilian school, typified by German law, and the common-law school, typified by English law.
- Full Text:
- Date Issued: 2006
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186880 , vital:44544 , xlink:href="///C:/Users/User/Downloads/69THRHR561%20(1).pdf"
- Description: Since the Supreme Court of Appeal has continued to avoid taking the step of recognising a general enrichment action,' the traditional enrichment actions of the common law remain fundamentally important to the operation of the law of unjustified enrichment in South Africa. Most significant of these is the condictio indebiti, which is probably the most well-known and liberally utilised enrichment action in South African law.2 In this article, the nature and scope of this condictio will be examined, and it will be shown that it has grown beyond its notionally traditional role of reversing payments or transfers made unjustifiably by mistake, to include causes of action in duress and protest. The implications of this for the condictio, as well as for the foundations of our enrichment law will then be examined, with reference to the two leading schools of enrichment law: the civilian school, typified by German law, and the common-law school, typified by English law.
- Full Text:
- Date Issued: 2006
The effect of Ge, Si and Sn phthalocyanine photosensitizers on cell proliferation and viability of human oesophageal carcinoma cells
- Seotsanyana-Mokhosi, Itumeleng, Kresfelder, Tina, Abrahamse, Heidi, Nyokong, Tebello
- Authors: Seotsanyana-Mokhosi, Itumeleng , Kresfelder, Tina , Abrahamse, Heidi , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286115 , vital:56241 , xlink:href="https://doi.org/10.1016/j.jphotobiol.2005.12.004"
- Description: The photodynamic activity of water soluble mixed sulfonated metallophthalocyanines complexes: GePcSmix, SnPcSmix and SiPcSmix on human oesophageal carcinoma (SNO) cells are reported, and compared with the activity of the unmetallated H2PcSmix and of the newly synthesized water soluble adjacently substituted binaphthalo phthalocyanine (complex 3). The alkaline phosphate (ALP) showed damage to the cell membrane in the presence of complex 3 without irradiation. The GePcSmix complex caused a relatively large increase in inflammation and a high intracellular ATP.
- Full Text:
- Date Issued: 2006
- Authors: Seotsanyana-Mokhosi, Itumeleng , Kresfelder, Tina , Abrahamse, Heidi , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286115 , vital:56241 , xlink:href="https://doi.org/10.1016/j.jphotobiol.2005.12.004"
- Description: The photodynamic activity of water soluble mixed sulfonated metallophthalocyanines complexes: GePcSmix, SnPcSmix and SiPcSmix on human oesophageal carcinoma (SNO) cells are reported, and compared with the activity of the unmetallated H2PcSmix and of the newly synthesized water soluble adjacently substituted binaphthalo phthalocyanine (complex 3). The alkaline phosphate (ALP) showed damage to the cell membrane in the presence of complex 3 without irradiation. The GePcSmix complex caused a relatively large increase in inflammation and a high intracellular ATP.
- Full Text:
- Date Issued: 2006
The identification of mammalian species through the classification of hair patterns using image pattern recognition
- Moyo, Thamasanqa, Bangay, Shaun D, Foster, Greg
- Authors: Moyo, Thamasanqa , Bangay, Shaun D , Foster, Greg
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432938 , vital:72914 , https://doi.org/10.1145/1108590.1108619
- Description: The identification of mammals through the use of their hair is important in the fields of forensics and ecology. The application of computer pattern recognition techniques to this process provides a means of reducing the subjectivity found in the process, as manual techniques rely on the interpretation of a human expert rather than quantitative measures. The first application of image pattern recognition techniques to the classification of African mammalian species using hair patterns is presented. This application uses a 2D Gabor filter-bank and motivates the use of moments to classify hair scale patterns. Application of a 2D Gabor filter-bank to hair scale processing provides results of 52% accuracy when using a filter-bank of size four and 72% accuracy when using a filter-bank of size eight. These initial results indicate that 2D Gabor filters produce information that may be successfully used to classify hair according to images of its patterns.
- Full Text:
- Date Issued: 2006
- Authors: Moyo, Thamasanqa , Bangay, Shaun D , Foster, Greg
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432938 , vital:72914 , https://doi.org/10.1145/1108590.1108619
- Description: The identification of mammals through the use of their hair is important in the fields of forensics and ecology. The application of computer pattern recognition techniques to this process provides a means of reducing the subjectivity found in the process, as manual techniques rely on the interpretation of a human expert rather than quantitative measures. The first application of image pattern recognition techniques to the classification of African mammalian species using hair patterns is presented. This application uses a 2D Gabor filter-bank and motivates the use of moments to classify hair scale patterns. Application of a 2D Gabor filter-bank to hair scale processing provides results of 52% accuracy when using a filter-bank of size four and 72% accuracy when using a filter-bank of size eight. These initial results indicate that 2D Gabor filters produce information that may be successfully used to classify hair according to images of its patterns.
- Full Text:
- Date Issued: 2006
The inducement of a contract by duress of goods - a reappraisal
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70734 , vital:29722 , https://hdl.handle.net/10520/EJC54192
- Full Text: false
- Date Issued: 2006
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70734 , vital:29722 , https://hdl.handle.net/10520/EJC54192
- Full Text: false
- Date Issued: 2006
The Need for Centralised, Cross Platform Information Aggregation
- Otten, Fred, Irwin, Barry V W, Slay, Hannah
- Authors: Otten, Fred , Irwin, Barry V W , Slay, Hannah
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428773 , vital:72535 , https://d1wqtxts1xzle7.cloudfront.net/2355475/8jlt6v8tz4wmhs6.pdf?1425084143=response-content-disposi-tion=inline%3B+filename%3DThe_need_for_centralised_cross_platform.pdfExpires=1714743760Signature=fsImuFaOfYc2FtUC88DqRrK1Anh84~rvBsZt2j46BfPyKMbbmswGZN5E2ajRJ7tZi5SZ4zQJvI5U6L47nmoXlNA0~Vo3pON-sYEo6Kn3TiTLvxwUpPQALnP7IvL-EEhgh11T-OuNZf0Q8QArxk6iqi4zjiOYbHUb~FDWw8MJ7ekH~frNS75mDrjpZ4xL8MqPNRHctaR3E5m~4i71SYO8hfbZw4vu7AhNNNvrRoIhbtLCEUsg-j7TkBDgVHts8LCsM5knmEKwgQTSBQTkLoRuNmXngqYikjvL7jUuHXibjSVaMSD78WRqXE~LDDkT7KXU7EbkPXzjRYJyamQ5qDXa3A__ey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to moni-tor, control, and secure them. Network security involves the creation of large amounts of information in the form of logs and messages from a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. This makes the monitoring and control difficult, and hence poses security problems. The aggregation of information is necessary in information audits, intrusion detection, network monitoring and management. The use of different platforms and devices complicates the problem, and makes aggregation more difficult. Network security administrators and security researchers require aggregation to simplify the analysis and comprehension of activity across the entire net-work. Centralised information aggregation will help deal with redundancy, analysis, monitoring and control. This aids the detection of wide spread attacks on global organisational networks, improving intrusion detection and mitigation. This paper discusses and motivates the need for central-ised, cross platform information aggregation in greater detail. It also sug-gests methods which may be used, discusses the security issues, and gives the advantages and disadvantages of aggregation.
- Full Text:
- Date Issued: 2006
- Authors: Otten, Fred , Irwin, Barry V W , Slay, Hannah
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428773 , vital:72535 , https://d1wqtxts1xzle7.cloudfront.net/2355475/8jlt6v8tz4wmhs6.pdf?1425084143=response-content-disposi-tion=inline%3B+filename%3DThe_need_for_centralised_cross_platform.pdfExpires=1714743760Signature=fsImuFaOfYc2FtUC88DqRrK1Anh84~rvBsZt2j46BfPyKMbbmswGZN5E2ajRJ7tZi5SZ4zQJvI5U6L47nmoXlNA0~Vo3pON-sYEo6Kn3TiTLvxwUpPQALnP7IvL-EEhgh11T-OuNZf0Q8QArxk6iqi4zjiOYbHUb~FDWw8MJ7ekH~frNS75mDrjpZ4xL8MqPNRHctaR3E5m~4i71SYO8hfbZw4vu7AhNNNvrRoIhbtLCEUsg-j7TkBDgVHts8LCsM5knmEKwgQTSBQTkLoRuNmXngqYikjvL7jUuHXibjSVaMSD78WRqXE~LDDkT7KXU7EbkPXzjRYJyamQ5qDXa3A__ey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to moni-tor, control, and secure them. Network security involves the creation of large amounts of information in the form of logs and messages from a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. This makes the monitoring and control difficult, and hence poses security problems. The aggregation of information is necessary in information audits, intrusion detection, network monitoring and management. The use of different platforms and devices complicates the problem, and makes aggregation more difficult. Network security administrators and security researchers require aggregation to simplify the analysis and comprehension of activity across the entire net-work. Centralised information aggregation will help deal with redundancy, analysis, monitoring and control. This aids the detection of wide spread attacks on global organisational networks, improving intrusion detection and mitigation. This paper discusses and motivates the need for central-ised, cross platform information aggregation in greater detail. It also sug-gests methods which may be used, discusses the security issues, and gives the advantages and disadvantages of aggregation.
- Full Text:
- Date Issued: 2006
The Representation of, and Control over Mixing Desks via a Software-Based Matrix
- Foss, Richard, Foulkes, Phillip
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427306 , vital:72429 , https://www.aes.org/e-lib/browse.cfm?elib=13701
- Description: The control over all the parameters of a mixing desk can be a daunting task. This paper describes a software system that has been created to represent the signal processing and routing functions of MIDI-controllable mixing desks in a conceptually clear manner. Input to output routings are displayed in the form of a matrix, while signal processing functionality can be accessed at the inputs, outputs, and cross-points. XML is used to capture the elements of the mixing desk, and to associate appropriate MIDI control messages with these elements. This enables the same matrix template to be used for many mixing desks. Remote control is enabled by IP-based MIDI routing software known as MIDINet.
- Full Text:
- Date Issued: 2006
- Authors: Foss, Richard , Foulkes, Phillip
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427306 , vital:72429 , https://www.aes.org/e-lib/browse.cfm?elib=13701
- Description: The control over all the parameters of a mixing desk can be a daunting task. This paper describes a software system that has been created to represent the signal processing and routing functions of MIDI-controllable mixing desks in a conceptually clear manner. Input to output routings are displayed in the form of a matrix, while signal processing functionality can be accessed at the inputs, outputs, and cross-points. XML is used to capture the elements of the mixing desk, and to associate appropriate MIDI control messages with these elements. This enables the same matrix template to be used for many mixing desks. Remote control is enabled by IP-based MIDI routing software known as MIDINet.
- Full Text:
- Date Issued: 2006
The sharing of pension benefits on divorce: An inevitable affair?
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186723 , vital:44528 , xlink:href="Print only"
- Description: One of the invariable consequences of divorce is that the patrimonial assets of the marriage have to be divided up between the two parties. At a primary level, the way in which this will occur will be determined by a number of factors: the matrimonial property regime under which the parties had been married; the relevant provisions of the Divorce Act (Act 70 of 1979) that deal with the question of the patrimonial consequences of divorce; as well as any agreement on this often ticklish matter that can be reached by the parties prior to the divorce action. Approximately fourteen years ago, section 7 of the Divorce Act was amended to allow a divorced spouse to share in the pension interests of the other spouse. There is some polemic, though, as to the interpretation of this provision: in particular, it is not clear whether this pension benefit will automatically form part of the assets that are susceptible to division, or whether a prayer to this effect must specifically be sought. After a consideration of the current legal position regarding the sharing of pension benefits generally, this note will examine this specific debate.
- Full Text:
- Date Issued: 2006
- Authors: Glover, Graham B
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/186723 , vital:44528 , xlink:href="Print only"
- Description: One of the invariable consequences of divorce is that the patrimonial assets of the marriage have to be divided up between the two parties. At a primary level, the way in which this will occur will be determined by a number of factors: the matrimonial property regime under which the parties had been married; the relevant provisions of the Divorce Act (Act 70 of 1979) that deal with the question of the patrimonial consequences of divorce; as well as any agreement on this often ticklish matter that can be reached by the parties prior to the divorce action. Approximately fourteen years ago, section 7 of the Divorce Act was amended to allow a divorced spouse to share in the pension interests of the other spouse. There is some polemic, though, as to the interpretation of this provision: in particular, it is not clear whether this pension benefit will automatically form part of the assets that are susceptible to division, or whether a prayer to this effect must specifically be sought. After a consideration of the current legal position regarding the sharing of pension benefits generally, this note will examine this specific debate.
- Full Text:
- Date Issued: 2006
The test for duress in the South African law of contract
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70756 , vital:29726 , https://hdl.handle.net/10520/EJC53682
- Description: Although it is well-known that a contract induced by duress is voidable at the instance of an aggrieved party, little analysis of this cause of action has been undertaken in South Africa. The test for duress developed by Wessels, and adopted by the courts in Broodryk v Smuts NO 1942 TPD 47, has exercised a vice-grip over this area of contract law. In this article, all five elements of the traditional South African test are subjected to critical examination, and their deficiencies are exposed and discussed. It is argued that the test is neither logically nor conceptually satisfactory, and has hampered development of this area of law. Trends in other jurisdictions, belonging to both the civil-law and the common-law families, are analysed and compared to South African law. On this basis a more modern and coherent test is proposed. This test would be two-pronged, and involve an assessment, in turn, of the lawfulness of the threat made and of whether the party who in fact succumbed to an unlawful threat and entered into the contract was legally justified in doing so.
- Full Text:
- Date Issued: 2006
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70756 , vital:29726 , https://hdl.handle.net/10520/EJC53682
- Description: Although it is well-known that a contract induced by duress is voidable at the instance of an aggrieved party, little analysis of this cause of action has been undertaken in South Africa. The test for duress developed by Wessels, and adopted by the courts in Broodryk v Smuts NO 1942 TPD 47, has exercised a vice-grip over this area of contract law. In this article, all five elements of the traditional South African test are subjected to critical examination, and their deficiencies are exposed and discussed. It is argued that the test is neither logically nor conceptually satisfactory, and has hampered development of this area of law. Trends in other jurisdictions, belonging to both the civil-law and the common-law families, are analysed and compared to South African law. On this basis a more modern and coherent test is proposed. This test would be two-pronged, and involve an assessment, in turn, of the lawfulness of the threat made and of whether the party who in fact succumbed to an unlawful threat and entered into the contract was legally justified in doing so.
- Full Text:
- Date Issued: 2006
Thinking about fear and freedom:
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158794 , vital:40229 , https://hdl.handle.net/10520/EJC146175
- Description: Some convictions have chrystalised for me in the process of putting together this new edition of Rhodes Journalism Review.
- Full Text:
- Date Issued: 2006
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158794 , vital:40229 , https://hdl.handle.net/10520/EJC146175
- Description: Some convictions have chrystalised for me in the process of putting together this new edition of Rhodes Journalism Review.
- Full Text:
- Date Issued: 2006
Toward visualised network intrusion detection
- van Riel, J.P, Irwin, Barry V W
- Authors: van Riel, J.P , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428238 , vital:72496 , https://www.cs.ru.ac.za/research/g02v2468/publications/vanRiel-SATNAC2006.pdf
- Description: To deal with the large volume of network data, contemporary solutions seek to automate the process of detecting intrusive activity. However, intrusion detection systems can produce an overwhelming number of alerts, and many false alarms can obscure serious intrusion attempts. To overcome these difficulties, this paper suggests combining dedicat-ed sensor network monitoring with visualisation. With the aim of evaluat-ing intrusion detection systems, we introduce the idea of using graph-ical representations to superimpose alert information over raw network traffic.
- Full Text:
- Date Issued: 2006
- Authors: van Riel, J.P , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428238 , vital:72496 , https://www.cs.ru.ac.za/research/g02v2468/publications/vanRiel-SATNAC2006.pdf
- Description: To deal with the large volume of network data, contemporary solutions seek to automate the process of detecting intrusive activity. However, intrusion detection systems can produce an overwhelming number of alerts, and many false alarms can obscure serious intrusion attempts. To overcome these difficulties, this paper suggests combining dedicat-ed sensor network monitoring with visualisation. With the aim of evaluat-ing intrusion detection systems, we introduce the idea of using graph-ical representations to superimpose alert information over raw network traffic.
- Full Text:
- Date Issued: 2006
Towards Central Vulnerability Management By Mobile Phone Operators
- Moyo, Thamsanqa, Irwin, Barry V W, Wright, Madeleineh
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
- Date Issued: 2006
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
- Date Issued: 2006
Trade and the environmental Kuznets curve: is Southern Africa a pollution haven?
- Nahman, Anton, Antrobus, Geoffrey G
- Authors: Nahman, Anton , Antrobus, Geoffrey G
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143202 , vital:38210 , DOI: 10.1111/j.1813-6982.2005.00055.x
- Description: Evidence that the environmental Kuznets curve (EKC) may be explained by trade patterns casts doubt on the oft‐stated conclusion that economic growth automatically leads to environmental improvement. Trends in net exports as a proportion of consumption for both USA and UK trade with SACU were examined for various dirty industries. Some evidence of pollution haven effects is found, although a similar trend for clean industries suggests that this effect is weak. However, even a general shift in manufacturing industries from North to South (as opposed to a shift in specifically dirty industries) may explain the EKC to some extent.
- Full Text:
- Date Issued: 2006
- Authors: Nahman, Anton , Antrobus, Geoffrey G
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143202 , vital:38210 , DOI: 10.1111/j.1813-6982.2005.00055.x
- Description: Evidence that the environmental Kuznets curve (EKC) may be explained by trade patterns casts doubt on the oft‐stated conclusion that economic growth automatically leads to environmental improvement. Trends in net exports as a proportion of consumption for both USA and UK trade with SACU were examined for various dirty industries. Some evidence of pollution haven effects is found, although a similar trend for clean industries suggests that this effect is weak. However, even a general shift in manufacturing industries from North to South (as opposed to a shift in specifically dirty industries) may explain the EKC to some extent.
- Full Text:
- Date Issued: 2006
Trade in reed-based craft products in rural villages in the Eastern Cape, South Africa
- Pereira, Taryn, Shackleton, Charlie M, Shackleton, Sheona E
- Authors: Pereira, Taryn , Shackleton, Charlie M , Shackleton, Sheona E
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181290 , vital:43716 , xlink:href="https://doi.org/10.1080/03768350600927235"
- Description: Selling traditional craft products made from fibrous plants is an important source of income for economically vulnerable rural women. In the Eastern Cape Province of South Africa, Cyperus textilis and Juncus kraussii have been used for centuries to make products of functional and cultural importance, such as sleeping mats and baskets. In the former Transkei village clusters of Mpozolo and Ntubeni, female crafters harvest the raw material and make and sell the products in their communities and in nearby towns. Interviews with 40 of them revealed what the trade contributes to their livelihoods and what enhances or limits their success. The findings show that crafting contributes vital income to vulnerable households, on average 26 ± 4 per cent of annual household cash income, over 40 per cent for the poorest households and 5–15 per cent for wealthier households. Lack of access to non-traditional markets was identified as the main constraint on the trade.
- Full Text:
- Date Issued: 2006
- Authors: Pereira, Taryn , Shackleton, Charlie M , Shackleton, Sheona E
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181290 , vital:43716 , xlink:href="https://doi.org/10.1080/03768350600927235"
- Description: Selling traditional craft products made from fibrous plants is an important source of income for economically vulnerable rural women. In the Eastern Cape Province of South Africa, Cyperus textilis and Juncus kraussii have been used for centuries to make products of functional and cultural importance, such as sleeping mats and baskets. In the former Transkei village clusters of Mpozolo and Ntubeni, female crafters harvest the raw material and make and sell the products in their communities and in nearby towns. Interviews with 40 of them revealed what the trade contributes to their livelihoods and what enhances or limits their success. The findings show that crafting contributes vital income to vulnerable households, on average 26 ± 4 per cent of annual household cash income, over 40 per cent for the poorest households and 5–15 per cent for wealthier households. Lack of access to non-traditional markets was identified as the main constraint on the trade.
- Full Text:
- Date Issued: 2006
Unique electrochemical behavior of tantalum (V) phthalocyanine
- Tau, Prudence, Nyokong, Tebello
- Authors: Tau, Prudence , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286139 , vital:56243 , xlink:href="https://doi.org/10.1142/S1088424606000090"
- Description: The electrochemical and spectroscopic behavior of tantalum(V) phthalocyanine are presented. The NMR spectra is consistent with the lack of symmetry of the complex. Cyclic (CV) and square wave (SWV) voltammetries, and spectroelectrochemistry, were employed in the study of the complex. Two one-electron reductions and a simultaneous 4-electron reduction were observed. Reduction occurs first at the metal to form a Ta(IV) species, followed by ring based processes.
- Full Text:
- Date Issued: 2006
- Authors: Tau, Prudence , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286139 , vital:56243 , xlink:href="https://doi.org/10.1142/S1088424606000090"
- Description: The electrochemical and spectroscopic behavior of tantalum(V) phthalocyanine are presented. The NMR spectra is consistent with the lack of symmetry of the complex. Cyclic (CV) and square wave (SWV) voltammetries, and spectroelectrochemistry, were employed in the study of the complex. Two one-electron reductions and a simultaneous 4-electron reduction were observed. Reduction occurs first at the metal to form a Ta(IV) species, followed by ring based processes.
- Full Text:
- Date Issued: 2006
Urban forestry–A cinderella science in South Africa?
- Authors: Shackleton, Charlie M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/183092 , vital:43911 , xlink:href="https://doi.org/10.2989/10295920609505255"
- Description: The benefits of forests (in their broadest sense) and of trees to the natural environment and rural communities are well known throughout the world, including in South Africa (e.g. see chapters in Lawes et al. 2004). The presence of these benefits has also been extrapolated to urban situations, where natural forests and veld might be left in situ, or trees planted in public spaces, or in private gardens. These benefits span the social, aesthetic, health, environmental and economic spheres.
- Full Text:
- Date Issued: 2006
- Authors: Shackleton, Charlie M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/183092 , vital:43911 , xlink:href="https://doi.org/10.2989/10295920609505255"
- Description: The benefits of forests (in their broadest sense) and of trees to the natural environment and rural communities are well known throughout the world, including in South Africa (e.g. see chapters in Lawes et al. 2004). The presence of these benefits has also been extrapolated to urban situations, where natural forests and veld might be left in situ, or trees planted in public spaces, or in private gardens. These benefits span the social, aesthetic, health, environmental and economic spheres.
- Full Text:
- Date Issued: 2006
Urban fuelwood demand and markets in a small town in South Africa: Livelihood vulnerability and alien plant control
- Shackleton, Charlie M, McConnachie, Matthew M, Chauke, Maphambe I, Mentz, J, Sutherland, F, Gambiza, James, Jones, R
- Authors: Shackleton, Charlie M , McConnachie, Matthew M , Chauke, Maphambe I , Mentz, J , Sutherland, F , Gambiza, James , Jones, R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181224 , vital:43710 , xlink:href="https://doi.org/10.1080/13504500609469697"
- Description: Fuelwood is the primary energy for most households throughout the developing world. With increasing urbanization and declining local availability of fuelwood, a growing proportion of households obtain their fuelwood by purchasing it. These fuelwood markets are the key nexus in supply and demand scenarios and can be potentially significant points for intervention to address energy security amongst the urban poor. This paper reports on the fuelwood demand and marketing in a small town in South Africa. Despite the availability of more modern fuels and state subsidization of electricity, fuelwood was still used by half the households. Annual demand was 1.2 t per household. Over half of the households bought their fuelwood requirements because local stocks were limited. Those households that did collect their own fuelwood were significantly poorer than households that purchased fuelwood, as well as households that did not use fuelwood at all. Fuelwood markets operated through 45-60 vendors who transported fuelwood from further afield. Income from the fuelwood trade was low, but was strongly linked to hours worked. Thus, vendors working a full week did earn a meaningful income, especially in the context of high unemployment in the area. Fuelwood vendors also provided casual employment opportunities for unskilled labour. Most vendors harvested fuelwood from commonage lands, with most of the wood being from alien species. Local stocks of wood are declining in the face of constant transformation of commonage to residential areas, and a national water and biodiversity conservation programme to eradicate alien plants. This decline poses a threat to the financial viability of fuelwood markets. Yet, an opportunity exists to incorporate the vendors into the alien plant clearing programme, since they already perform such a function.
- Full Text:
- Date Issued: 2006
- Authors: Shackleton, Charlie M , McConnachie, Matthew M , Chauke, Maphambe I , Mentz, J , Sutherland, F , Gambiza, James , Jones, R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181224 , vital:43710 , xlink:href="https://doi.org/10.1080/13504500609469697"
- Description: Fuelwood is the primary energy for most households throughout the developing world. With increasing urbanization and declining local availability of fuelwood, a growing proportion of households obtain their fuelwood by purchasing it. These fuelwood markets are the key nexus in supply and demand scenarios and can be potentially significant points for intervention to address energy security amongst the urban poor. This paper reports on the fuelwood demand and marketing in a small town in South Africa. Despite the availability of more modern fuels and state subsidization of electricity, fuelwood was still used by half the households. Annual demand was 1.2 t per household. Over half of the households bought their fuelwood requirements because local stocks were limited. Those households that did collect their own fuelwood were significantly poorer than households that purchased fuelwood, as well as households that did not use fuelwood at all. Fuelwood markets operated through 45-60 vendors who transported fuelwood from further afield. Income from the fuelwood trade was low, but was strongly linked to hours worked. Thus, vendors working a full week did earn a meaningful income, especially in the context of high unemployment in the area. Fuelwood vendors also provided casual employment opportunities for unskilled labour. Most vendors harvested fuelwood from commonage lands, with most of the wood being from alien species. Local stocks of wood are declining in the face of constant transformation of commonage to residential areas, and a national water and biodiversity conservation programme to eradicate alien plants. This decline poses a threat to the financial viability of fuelwood markets. Yet, an opportunity exists to incorporate the vendors into the alien plant clearing programme, since they already perform such a function.
- Full Text:
- Date Issued: 2006
UV-Visible and Electrochemical Monitoring of Carbon Monoxide Release by Donor Complexes to Myoglobin Solutions and to Electrodes Modified with Films Containing Hemin
- Obirai, Joseph C, Hamadi, Sara, Ithurbide, Aurélie, Wartelle, Corinne, Nyokong, Tebello, Zagal, José, Top, Siden, Bedioui, Fethi
- Authors: Obirai, Joseph C , Hamadi, Sara , Ithurbide, Aurélie , Wartelle, Corinne , Nyokong, Tebello , Zagal, José , Top, Siden , Bedioui, Fethi
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/283906 , vital:56001 , xlink:href="https://doi.org/10.1002/elan.200603571"
- Description: This study reports on the evaluation of the CO donating behavior of tricarbonyl dichloro ruthenium(II) dimer ([Ru(CO)3Cl2]2) and 1,3-dimethoxyphenyl tricarbonyl chromium (C6H3(MeO)2Cr(CO)3) complex by UV-visible technique and electrochemical technique. The CO release was monitored by following the modifications of the UV-visible features of MbFe(II) in phosphate buffer solution and the redox features of reduced Hemin, HmFe(II), confined at the surface of a vitreous carbon electrode. In the latter case, the interaction between the hemin-modified electrode and the released CO was seen through the observation of an increase of the reduction current related to the FeIII/FeII redox process of the immobilized porphyrin. While the ruthenium-based complex, ([Ru(CO)3Cl2]2), depended on the presence of Fe(II) species to release CO, it was found that the chromium-based complex released spontaneously CO. This was facilitated by illuminating and/or simple stirring of the solution containing the complex.
- Full Text:
- Date Issued: 2006
- Authors: Obirai, Joseph C , Hamadi, Sara , Ithurbide, Aurélie , Wartelle, Corinne , Nyokong, Tebello , Zagal, José , Top, Siden , Bedioui, Fethi
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/283906 , vital:56001 , xlink:href="https://doi.org/10.1002/elan.200603571"
- Description: This study reports on the evaluation of the CO donating behavior of tricarbonyl dichloro ruthenium(II) dimer ([Ru(CO)3Cl2]2) and 1,3-dimethoxyphenyl tricarbonyl chromium (C6H3(MeO)2Cr(CO)3) complex by UV-visible technique and electrochemical technique. The CO release was monitored by following the modifications of the UV-visible features of MbFe(II) in phosphate buffer solution and the redox features of reduced Hemin, HmFe(II), confined at the surface of a vitreous carbon electrode. In the latter case, the interaction between the hemin-modified electrode and the released CO was seen through the observation of an increase of the reduction current related to the FeIII/FeII redox process of the immobilized porphyrin. While the ruthenium-based complex, ([Ru(CO)3Cl2]2), depended on the presence of Fe(II) species to release CO, it was found that the chromium-based complex released spontaneously CO. This was facilitated by illuminating and/or simple stirring of the solution containing the complex.
- Full Text:
- Date Issued: 2006
Virginity testing in South Africa: re-traditioning the postcolony
- Authors: Vincent, Louise
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141511 , vital:37981 , DOI: 10.1080/13691050500404225
- Description: Umhlanga is a ceremony celebrating virginity. In South Africa, it is practiced, among others, by the Zulu ethnic group who live mainly in the province of KwaZulu Natal. After falling into relative disuse in the Zulu community, the practice of virginity testing made a comeback some 10 years ago at around the time of the country's first democratic election and coinciding with the period when the HIV pandemic began to take hold. In July 2005 the South African Parliament passed a new Children's Bill which will prohibit virginity testing of children. The Bill has been met with outrage and public protest on the part of Zulu citizens. Traditional circumcision rites are also addressed in the new bill but are not banned. Instead, male children are given the right to refuse to participate in traditional initiation ceremonies which include circumcision. This paper asks why the practice of virginity testing is regarded as so troubling to the new democratic order that the state has chosen to take the heavy‐handed route of banning it. The paper further asks why the state's approach to traditional male circumcision has been so different to its approach to virginity testing. Finally, the paper asks what these two challenging cases in the country's new democracy tell us about the nature of liberal democratic citizenship in South Africa 10 years after apartheid's formal demise.
- Full Text:
- Date Issued: 2006
- Authors: Vincent, Louise
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141511 , vital:37981 , DOI: 10.1080/13691050500404225
- Description: Umhlanga is a ceremony celebrating virginity. In South Africa, it is practiced, among others, by the Zulu ethnic group who live mainly in the province of KwaZulu Natal. After falling into relative disuse in the Zulu community, the practice of virginity testing made a comeback some 10 years ago at around the time of the country's first democratic election and coinciding with the period when the HIV pandemic began to take hold. In July 2005 the South African Parliament passed a new Children's Bill which will prohibit virginity testing of children. The Bill has been met with outrage and public protest on the part of Zulu citizens. Traditional circumcision rites are also addressed in the new bill but are not banned. Instead, male children are given the right to refuse to participate in traditional initiation ceremonies which include circumcision. This paper asks why the practice of virginity testing is regarded as so troubling to the new democratic order that the state has chosen to take the heavy‐handed route of banning it. The paper further asks why the state's approach to traditional male circumcision has been so different to its approach to virginity testing. Finally, the paper asks what these two challenging cases in the country's new democracy tell us about the nature of liberal democratic citizenship in South Africa 10 years after apartheid's formal demise.
- Full Text:
- Date Issued: 2006
What matters in economics teaching and learning? A case study of an introductory macroeconomics course in South Africa
- Snowball, Jeanette D, Wilson, M K
- Authors: Snowball, Jeanette D , Wilson, M K
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68500 , vital:29270 , https://doi.org/10.19030/tlc.v3i11.1659
- Description: Publisher version , In many universities, economics lecturers now face the challenge of dealing with large, diverse classes, especially at undergraduate level. A common concern is the non-attendance at lectures of unmotivated (conscript) students. Poor lecture quality, as reflected in student evaluations of teaching (SETs), is often blamed for lack of attendance and consequent poor performance. This paper presents the results of a student assessment of a macroeconomics 1 course, coupled with a self-assessment of their own input into the course. The results obtained, using econometric models, suggest that students inputs and attitudes to the course are equally, or more, important than lecture attendance itself.
- Full Text:
- Date Issued: 2006
- Authors: Snowball, Jeanette D , Wilson, M K
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68500 , vital:29270 , https://doi.org/10.19030/tlc.v3i11.1659
- Description: Publisher version , In many universities, economics lecturers now face the challenge of dealing with large, diverse classes, especially at undergraduate level. A common concern is the non-attendance at lectures of unmotivated (conscript) students. Poor lecture quality, as reflected in student evaluations of teaching (SETs), is often blamed for lack of attendance and consequent poor performance. This paper presents the results of a student assessment of a macroeconomics 1 course, coupled with a self-assessment of their own input into the course. The results obtained, using econometric models, suggest that students inputs and attitudes to the course are equally, or more, important than lecture attendance itself.
- Full Text:
- Date Issued: 2006