The six-legged flying squad
- Villet, Martin H, Muller, Nikite W J
- Authors: Villet, Martin H , Muller, Nikite W J
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442677 , vital:74020 , https://journals.co.za/doi/pdf/10.10520/AJA1729830X_227
- Description: How do bugs and insects help forensic entomologists to settle disputes and solve crimes? Martin Villet and Nikite Muller explain.
- Full Text:
- Authors: Villet, Martin H , Muller, Nikite W J
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442677 , vital:74020 , https://journals.co.za/doi/pdf/10.10520/AJA1729830X_227
- Description: How do bugs and insects help forensic entomologists to settle disputes and solve crimes? Martin Villet and Nikite Muller explain.
- Full Text:
The test for duress in the South African law of contract
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70756 , vital:29726 , https://hdl.handle.net/10520/EJC53682
- Description: Although it is well-known that a contract induced by duress is voidable at the instance of an aggrieved party, little analysis of this cause of action has been undertaken in South Africa. The test for duress developed by Wessels, and adopted by the courts in Broodryk v Smuts NO 1942 TPD 47, has exercised a vice-grip over this area of contract law. In this article, all five elements of the traditional South African test are subjected to critical examination, and their deficiencies are exposed and discussed. It is argued that the test is neither logically nor conceptually satisfactory, and has hampered development of this area of law. Trends in other jurisdictions, belonging to both the civil-law and the common-law families, are analysed and compared to South African law. On this basis a more modern and coherent test is proposed. This test would be two-pronged, and involve an assessment, in turn, of the lawfulness of the threat made and of whether the party who in fact succumbed to an unlawful threat and entered into the contract was legally justified in doing so.
- Full Text:
- Authors: Glover, Graham B
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70756 , vital:29726 , https://hdl.handle.net/10520/EJC53682
- Description: Although it is well-known that a contract induced by duress is voidable at the instance of an aggrieved party, little analysis of this cause of action has been undertaken in South Africa. The test for duress developed by Wessels, and adopted by the courts in Broodryk v Smuts NO 1942 TPD 47, has exercised a vice-grip over this area of contract law. In this article, all five elements of the traditional South African test are subjected to critical examination, and their deficiencies are exposed and discussed. It is argued that the test is neither logically nor conceptually satisfactory, and has hampered development of this area of law. Trends in other jurisdictions, belonging to both the civil-law and the common-law families, are analysed and compared to South African law. On this basis a more modern and coherent test is proposed. This test would be two-pronged, and involve an assessment, in turn, of the lawfulness of the threat made and of whether the party who in fact succumbed to an unlawful threat and entered into the contract was legally justified in doing so.
- Full Text:
Thinking about fear and freedom:
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158794 , vital:40229 , https://hdl.handle.net/10520/EJC146175
- Description: Some convictions have chrystalised for me in the process of putting together this new edition of Rhodes Journalism Review.
- Full Text:
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158794 , vital:40229 , https://hdl.handle.net/10520/EJC146175
- Description: Some convictions have chrystalised for me in the process of putting together this new edition of Rhodes Journalism Review.
- Full Text:
Toward visualised network intrusion detection
- van Riel, J.P, Irwin, Barry V W
- Authors: van Riel, J.P , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428238 , vital:72496 , https://www.cs.ru.ac.za/research/g02v2468/publications/vanRiel-SATNAC2006.pdf
- Description: To deal with the large volume of network data, contemporary solutions seek to automate the process of detecting intrusive activity. However, intrusion detection systems can produce an overwhelming number of alerts, and many false alarms can obscure serious intrusion attempts. To overcome these difficulties, this paper suggests combining dedicat-ed sensor network monitoring with visualisation. With the aim of evaluat-ing intrusion detection systems, we introduce the idea of using graph-ical representations to superimpose alert information over raw network traffic.
- Full Text:
- Authors: van Riel, J.P , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428238 , vital:72496 , https://www.cs.ru.ac.za/research/g02v2468/publications/vanRiel-SATNAC2006.pdf
- Description: To deal with the large volume of network data, contemporary solutions seek to automate the process of detecting intrusive activity. However, intrusion detection systems can produce an overwhelming number of alerts, and many false alarms can obscure serious intrusion attempts. To overcome these difficulties, this paper suggests combining dedicat-ed sensor network monitoring with visualisation. With the aim of evaluat-ing intrusion detection systems, we introduce the idea of using graph-ical representations to superimpose alert information over raw network traffic.
- Full Text:
Towards Central Vulnerability Management By Mobile Phone Operators
- Moyo, Thamsanqa, Irwin, Barry V W, Wright, Madeleineh
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
Trade and the environmental Kuznets curve: is Southern Africa a pollution haven?
- Nahman, Anton, Antrobus, Geoffrey G
- Authors: Nahman, Anton , Antrobus, Geoffrey G
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143202 , vital:38210 , DOI: 10.1111/j.1813-6982.2005.00055.x
- Description: Evidence that the environmental Kuznets curve (EKC) may be explained by trade patterns casts doubt on the oft‐stated conclusion that economic growth automatically leads to environmental improvement. Trends in net exports as a proportion of consumption for both USA and UK trade with SACU were examined for various dirty industries. Some evidence of pollution haven effects is found, although a similar trend for clean industries suggests that this effect is weak. However, even a general shift in manufacturing industries from North to South (as opposed to a shift in specifically dirty industries) may explain the EKC to some extent.
- Full Text:
- Authors: Nahman, Anton , Antrobus, Geoffrey G
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143202 , vital:38210 , DOI: 10.1111/j.1813-6982.2005.00055.x
- Description: Evidence that the environmental Kuznets curve (EKC) may be explained by trade patterns casts doubt on the oft‐stated conclusion that economic growth automatically leads to environmental improvement. Trends in net exports as a proportion of consumption for both USA and UK trade with SACU were examined for various dirty industries. Some evidence of pollution haven effects is found, although a similar trend for clean industries suggests that this effect is weak. However, even a general shift in manufacturing industries from North to South (as opposed to a shift in specifically dirty industries) may explain the EKC to some extent.
- Full Text:
Trade in reed-based craft products in rural villages in the Eastern Cape, South Africa
- Pereira, Taryn, Shackleton, Charlie M, Shackleton, Sheona E
- Authors: Pereira, Taryn , Shackleton, Charlie M , Shackleton, Sheona E
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181290 , vital:43716 , xlink:href="https://doi.org/10.1080/03768350600927235"
- Description: Selling traditional craft products made from fibrous plants is an important source of income for economically vulnerable rural women. In the Eastern Cape Province of South Africa, Cyperus textilis and Juncus kraussii have been used for centuries to make products of functional and cultural importance, such as sleeping mats and baskets. In the former Transkei village clusters of Mpozolo and Ntubeni, female crafters harvest the raw material and make and sell the products in their communities and in nearby towns. Interviews with 40 of them revealed what the trade contributes to their livelihoods and what enhances or limits their success. The findings show that crafting contributes vital income to vulnerable households, on average 26 ± 4 per cent of annual household cash income, over 40 per cent for the poorest households and 5–15 per cent for wealthier households. Lack of access to non-traditional markets was identified as the main constraint on the trade.
- Full Text:
- Authors: Pereira, Taryn , Shackleton, Charlie M , Shackleton, Sheona E
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181290 , vital:43716 , xlink:href="https://doi.org/10.1080/03768350600927235"
- Description: Selling traditional craft products made from fibrous plants is an important source of income for economically vulnerable rural women. In the Eastern Cape Province of South Africa, Cyperus textilis and Juncus kraussii have been used for centuries to make products of functional and cultural importance, such as sleeping mats and baskets. In the former Transkei village clusters of Mpozolo and Ntubeni, female crafters harvest the raw material and make and sell the products in their communities and in nearby towns. Interviews with 40 of them revealed what the trade contributes to their livelihoods and what enhances or limits their success. The findings show that crafting contributes vital income to vulnerable households, on average 26 ± 4 per cent of annual household cash income, over 40 per cent for the poorest households and 5–15 per cent for wealthier households. Lack of access to non-traditional markets was identified as the main constraint on the trade.
- Full Text:
Unique electrochemical behavior of tantalum (V) phthalocyanine
- Tau, Prudence, Nyokong, Tebello
- Authors: Tau, Prudence , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286139 , vital:56243 , xlink:href="https://doi.org/10.1142/S1088424606000090"
- Description: The electrochemical and spectroscopic behavior of tantalum(V) phthalocyanine are presented. The NMR spectra is consistent with the lack of symmetry of the complex. Cyclic (CV) and square wave (SWV) voltammetries, and spectroelectrochemistry, were employed in the study of the complex. Two one-electron reductions and a simultaneous 4-electron reduction were observed. Reduction occurs first at the metal to form a Ta(IV) species, followed by ring based processes.
- Full Text:
- Authors: Tau, Prudence , Nyokong, Tebello
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286139 , vital:56243 , xlink:href="https://doi.org/10.1142/S1088424606000090"
- Description: The electrochemical and spectroscopic behavior of tantalum(V) phthalocyanine are presented. The NMR spectra is consistent with the lack of symmetry of the complex. Cyclic (CV) and square wave (SWV) voltammetries, and spectroelectrochemistry, were employed in the study of the complex. Two one-electron reductions and a simultaneous 4-electron reduction were observed. Reduction occurs first at the metal to form a Ta(IV) species, followed by ring based processes.
- Full Text:
Urban forestry–A cinderella science in South Africa?
- Authors: Shackleton, Charlie M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/183092 , vital:43911 , xlink:href="https://doi.org/10.2989/10295920609505255"
- Description: The benefits of forests (in their broadest sense) and of trees to the natural environment and rural communities are well known throughout the world, including in South Africa (e.g. see chapters in Lawes et al. 2004). The presence of these benefits has also been extrapolated to urban situations, where natural forests and veld might be left in situ, or trees planted in public spaces, or in private gardens. These benefits span the social, aesthetic, health, environmental and economic spheres.
- Full Text:
- Authors: Shackleton, Charlie M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/183092 , vital:43911 , xlink:href="https://doi.org/10.2989/10295920609505255"
- Description: The benefits of forests (in their broadest sense) and of trees to the natural environment and rural communities are well known throughout the world, including in South Africa (e.g. see chapters in Lawes et al. 2004). The presence of these benefits has also been extrapolated to urban situations, where natural forests and veld might be left in situ, or trees planted in public spaces, or in private gardens. These benefits span the social, aesthetic, health, environmental and economic spheres.
- Full Text:
Urban fuelwood demand and markets in a small town in South Africa: Livelihood vulnerability and alien plant control
- Shackleton, Charlie M, McConnachie, Matthew M, Chauke, Maphambe I, Mentz, J, Sutherland, F, Gambiza, James, Jones, R
- Authors: Shackleton, Charlie M , McConnachie, Matthew M , Chauke, Maphambe I , Mentz, J , Sutherland, F , Gambiza, James , Jones, R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181224 , vital:43710 , xlink:href="https://doi.org/10.1080/13504500609469697"
- Description: Fuelwood is the primary energy for most households throughout the developing world. With increasing urbanization and declining local availability of fuelwood, a growing proportion of households obtain their fuelwood by purchasing it. These fuelwood markets are the key nexus in supply and demand scenarios and can be potentially significant points for intervention to address energy security amongst the urban poor. This paper reports on the fuelwood demand and marketing in a small town in South Africa. Despite the availability of more modern fuels and state subsidization of electricity, fuelwood was still used by half the households. Annual demand was 1.2 t per household. Over half of the households bought their fuelwood requirements because local stocks were limited. Those households that did collect their own fuelwood were significantly poorer than households that purchased fuelwood, as well as households that did not use fuelwood at all. Fuelwood markets operated through 45-60 vendors who transported fuelwood from further afield. Income from the fuelwood trade was low, but was strongly linked to hours worked. Thus, vendors working a full week did earn a meaningful income, especially in the context of high unemployment in the area. Fuelwood vendors also provided casual employment opportunities for unskilled labour. Most vendors harvested fuelwood from commonage lands, with most of the wood being from alien species. Local stocks of wood are declining in the face of constant transformation of commonage to residential areas, and a national water and biodiversity conservation programme to eradicate alien plants. This decline poses a threat to the financial viability of fuelwood markets. Yet, an opportunity exists to incorporate the vendors into the alien plant clearing programme, since they already perform such a function.
- Full Text:
- Authors: Shackleton, Charlie M , McConnachie, Matthew M , Chauke, Maphambe I , Mentz, J , Sutherland, F , Gambiza, James , Jones, R
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/181224 , vital:43710 , xlink:href="https://doi.org/10.1080/13504500609469697"
- Description: Fuelwood is the primary energy for most households throughout the developing world. With increasing urbanization and declining local availability of fuelwood, a growing proportion of households obtain their fuelwood by purchasing it. These fuelwood markets are the key nexus in supply and demand scenarios and can be potentially significant points for intervention to address energy security amongst the urban poor. This paper reports on the fuelwood demand and marketing in a small town in South Africa. Despite the availability of more modern fuels and state subsidization of electricity, fuelwood was still used by half the households. Annual demand was 1.2 t per household. Over half of the households bought their fuelwood requirements because local stocks were limited. Those households that did collect their own fuelwood were significantly poorer than households that purchased fuelwood, as well as households that did not use fuelwood at all. Fuelwood markets operated through 45-60 vendors who transported fuelwood from further afield. Income from the fuelwood trade was low, but was strongly linked to hours worked. Thus, vendors working a full week did earn a meaningful income, especially in the context of high unemployment in the area. Fuelwood vendors also provided casual employment opportunities for unskilled labour. Most vendors harvested fuelwood from commonage lands, with most of the wood being from alien species. Local stocks of wood are declining in the face of constant transformation of commonage to residential areas, and a national water and biodiversity conservation programme to eradicate alien plants. This decline poses a threat to the financial viability of fuelwood markets. Yet, an opportunity exists to incorporate the vendors into the alien plant clearing programme, since they already perform such a function.
- Full Text:
UV-Visible and Electrochemical Monitoring of Carbon Monoxide Release by Donor Complexes to Myoglobin Solutions and to Electrodes Modified with Films Containing Hemin
- Obirai, Joseph C, Hamadi, Sara, Ithurbide, Aurélie, Wartelle, Corinne, Nyokong, Tebello, Zagal, José, Top, Siden, Bedioui, Fethi
- Authors: Obirai, Joseph C , Hamadi, Sara , Ithurbide, Aurélie , Wartelle, Corinne , Nyokong, Tebello , Zagal, José , Top, Siden , Bedioui, Fethi
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/283906 , vital:56001 , xlink:href="https://doi.org/10.1002/elan.200603571"
- Description: This study reports on the evaluation of the CO donating behavior of tricarbonyl dichloro ruthenium(II) dimer ([Ru(CO)3Cl2]2) and 1,3-dimethoxyphenyl tricarbonyl chromium (C6H3(MeO)2Cr(CO)3) complex by UV-visible technique and electrochemical technique. The CO release was monitored by following the modifications of the UV-visible features of MbFe(II) in phosphate buffer solution and the redox features of reduced Hemin, HmFe(II), confined at the surface of a vitreous carbon electrode. In the latter case, the interaction between the hemin-modified electrode and the released CO was seen through the observation of an increase of the reduction current related to the FeIII/FeII redox process of the immobilized porphyrin. While the ruthenium-based complex, ([Ru(CO)3Cl2]2), depended on the presence of Fe(II) species to release CO, it was found that the chromium-based complex released spontaneously CO. This was facilitated by illuminating and/or simple stirring of the solution containing the complex.
- Full Text:
- Authors: Obirai, Joseph C , Hamadi, Sara , Ithurbide, Aurélie , Wartelle, Corinne , Nyokong, Tebello , Zagal, José , Top, Siden , Bedioui, Fethi
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/283906 , vital:56001 , xlink:href="https://doi.org/10.1002/elan.200603571"
- Description: This study reports on the evaluation of the CO donating behavior of tricarbonyl dichloro ruthenium(II) dimer ([Ru(CO)3Cl2]2) and 1,3-dimethoxyphenyl tricarbonyl chromium (C6H3(MeO)2Cr(CO)3) complex by UV-visible technique and electrochemical technique. The CO release was monitored by following the modifications of the UV-visible features of MbFe(II) in phosphate buffer solution and the redox features of reduced Hemin, HmFe(II), confined at the surface of a vitreous carbon electrode. In the latter case, the interaction between the hemin-modified electrode and the released CO was seen through the observation of an increase of the reduction current related to the FeIII/FeII redox process of the immobilized porphyrin. While the ruthenium-based complex, ([Ru(CO)3Cl2]2), depended on the presence of Fe(II) species to release CO, it was found that the chromium-based complex released spontaneously CO. This was facilitated by illuminating and/or simple stirring of the solution containing the complex.
- Full Text:
Variation in the timing of reproduction of the four-striped field mouse, Rhabdomys pumilio, in the Eastern Cape Province, South Africa
- Jackson, Claire, Bernard, Ric T F
- Authors: Jackson, Claire , Bernard, Ric T F
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/447101 , vital:74584 , https://doi.org/10.1080/15627020.2006.11407367
- Description: We used the four-striped field mouse, Rhabdomys pumilio (Sparrmann, 1784), to test the hypothesis that reproduction in a small, short-lived mammal will be opportunistic, characterized by temporal and spatial variation in the timing of events, and only be inhibited under harsh and predictable winter conditions. Field mice were trapped for three years in two regions of the Eastern Cape Province of South Africa, one that experienced a predictable and harsh winter (Mountain Zebra National Park; MZNP) and the other which experienced a milder winter (Thomas Baines Nature Reserve; TBNR). There was no winter inhibition of reproduction at TBNR, while at MZNP female reproductive activity was inhibited but males continued to produce spermatozoa in winter. We interpret this flexibility in the timing of reproduction as supporting an opportunistic reproductive strategy which may be an adaptation to the seasonal and often unpredictable climate of the region.
- Full Text:
- Authors: Jackson, Claire , Bernard, Ric T F
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/447101 , vital:74584 , https://doi.org/10.1080/15627020.2006.11407367
- Description: We used the four-striped field mouse, Rhabdomys pumilio (Sparrmann, 1784), to test the hypothesis that reproduction in a small, short-lived mammal will be opportunistic, characterized by temporal and spatial variation in the timing of events, and only be inhibited under harsh and predictable winter conditions. Field mice were trapped for three years in two regions of the Eastern Cape Province of South Africa, one that experienced a predictable and harsh winter (Mountain Zebra National Park; MZNP) and the other which experienced a milder winter (Thomas Baines Nature Reserve; TBNR). There was no winter inhibition of reproduction at TBNR, while at MZNP female reproductive activity was inhibited but males continued to produce spermatozoa in winter. We interpret this flexibility in the timing of reproduction as supporting an opportunistic reproductive strategy which may be an adaptation to the seasonal and often unpredictable climate of the region.
- Full Text:
Virginity testing in South Africa: re-traditioning the postcolony
- Authors: Vincent, Louise
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141511 , vital:37981 , DOI: 10.1080/13691050500404225
- Description: Umhlanga is a ceremony celebrating virginity. In South Africa, it is practiced, among others, by the Zulu ethnic group who live mainly in the province of KwaZulu Natal. After falling into relative disuse in the Zulu community, the practice of virginity testing made a comeback some 10 years ago at around the time of the country's first democratic election and coinciding with the period when the HIV pandemic began to take hold. In July 2005 the South African Parliament passed a new Children's Bill which will prohibit virginity testing of children. The Bill has been met with outrage and public protest on the part of Zulu citizens. Traditional circumcision rites are also addressed in the new bill but are not banned. Instead, male children are given the right to refuse to participate in traditional initiation ceremonies which include circumcision. This paper asks why the practice of virginity testing is regarded as so troubling to the new democratic order that the state has chosen to take the heavy‐handed route of banning it. The paper further asks why the state's approach to traditional male circumcision has been so different to its approach to virginity testing. Finally, the paper asks what these two challenging cases in the country's new democracy tell us about the nature of liberal democratic citizenship in South Africa 10 years after apartheid's formal demise.
- Full Text:
- Authors: Vincent, Louise
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141511 , vital:37981 , DOI: 10.1080/13691050500404225
- Description: Umhlanga is a ceremony celebrating virginity. In South Africa, it is practiced, among others, by the Zulu ethnic group who live mainly in the province of KwaZulu Natal. After falling into relative disuse in the Zulu community, the practice of virginity testing made a comeback some 10 years ago at around the time of the country's first democratic election and coinciding with the period when the HIV pandemic began to take hold. In July 2005 the South African Parliament passed a new Children's Bill which will prohibit virginity testing of children. The Bill has been met with outrage and public protest on the part of Zulu citizens. Traditional circumcision rites are also addressed in the new bill but are not banned. Instead, male children are given the right to refuse to participate in traditional initiation ceremonies which include circumcision. This paper asks why the practice of virginity testing is regarded as so troubling to the new democratic order that the state has chosen to take the heavy‐handed route of banning it. The paper further asks why the state's approach to traditional male circumcision has been so different to its approach to virginity testing. Finally, the paper asks what these two challenging cases in the country's new democracy tell us about the nature of liberal democratic citizenship in South Africa 10 years after apartheid's formal demise.
- Full Text:
What matters in economics teaching and learning? A case study of an introductory macroeconomics course in South Africa
- Snowball, Jeanette D, Wilson, M K
- Authors: Snowball, Jeanette D , Wilson, M K
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68500 , vital:29270 , https://doi.org/10.19030/tlc.v3i11.1659
- Description: Publisher version , In many universities, economics lecturers now face the challenge of dealing with large, diverse classes, especially at undergraduate level. A common concern is the non-attendance at lectures of unmotivated (conscript) students. Poor lecture quality, as reflected in student evaluations of teaching (SETs), is often blamed for lack of attendance and consequent poor performance. This paper presents the results of a student assessment of a macroeconomics 1 course, coupled with a self-assessment of their own input into the course. The results obtained, using econometric models, suggest that students inputs and attitudes to the course are equally, or more, important than lecture attendance itself.
- Full Text:
- Authors: Snowball, Jeanette D , Wilson, M K
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68500 , vital:29270 , https://doi.org/10.19030/tlc.v3i11.1659
- Description: Publisher version , In many universities, economics lecturers now face the challenge of dealing with large, diverse classes, especially at undergraduate level. A common concern is the non-attendance at lectures of unmotivated (conscript) students. Poor lecture quality, as reflected in student evaluations of teaching (SETs), is often blamed for lack of attendance and consequent poor performance. This paper presents the results of a student assessment of a macroeconomics 1 course, coupled with a self-assessment of their own input into the course. The results obtained, using econometric models, suggest that students inputs and attitudes to the course are equally, or more, important than lecture attendance itself.
- Full Text:
Wireless Ethernet Propagation Modeling Software
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428249 , vital:72497
- Description: Wireless technologies have had an enormous impact on networking in recent years. It can create new business oppurtunities and allow users to communicate and share data in a new fashion. Wireless Networks decrease installation costs, reduce the deployment time of a network and overcome physical barrier problems inherent in wiring. Unfortunately this flexibility comes at a price. The deployment, installation and setup of a WLAN is not a simple task and a number of factors need to be con-sidered. Wireless Networks are notorious for being insecure due to signal spill, ad-hoc unauthorized access points and varying encryption strengths and standards. RF (Radio Frequency) interference and physical barriers suppress a signal. In addition the channel frequencies each access point will be using in order to provide maxi-mum roaming but minimum inter access point interference need to be considered. It is a complex balancing act to take these factors into account while still maintaining coverage, performance and security requirements. In this paper the benefits and feasibility of a model will be discussed that will enable the network administrator to visualize the coverage footprint of their wireless network when the above factors are taken into consideration. The program will be able to predict the strength, prop-agation and unwanted spill of signals which could compromise the security of an organisation prior to the deployment of a WLAN. In addition the model will provide functionality to visualize a signal from audit data once the WLAN is operational. The end result will be a program that can aid in the configuration, installation and man-agement of a secure WLAN.
- Full Text:
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428249 , vital:72497
- Description: Wireless technologies have had an enormous impact on networking in recent years. It can create new business oppurtunities and allow users to communicate and share data in a new fashion. Wireless Networks decrease installation costs, reduce the deployment time of a network and overcome physical barrier problems inherent in wiring. Unfortunately this flexibility comes at a price. The deployment, installation and setup of a WLAN is not a simple task and a number of factors need to be con-sidered. Wireless Networks are notorious for being insecure due to signal spill, ad-hoc unauthorized access points and varying encryption strengths and standards. RF (Radio Frequency) interference and physical barriers suppress a signal. In addition the channel frequencies each access point will be using in order to provide maxi-mum roaming but minimum inter access point interference need to be considered. It is a complex balancing act to take these factors into account while still maintaining coverage, performance and security requirements. In this paper the benefits and feasibility of a model will be discussed that will enable the network administrator to visualize the coverage footprint of their wireless network when the above factors are taken into consideration. The program will be able to predict the strength, prop-agation and unwanted spill of signals which could compromise the security of an organisation prior to the deployment of a WLAN. In addition the model will provide functionality to visualize a signal from audit data once the WLAN is operational. The end result will be a program that can aid in the configuration, installation and man-agement of a secure WLAN.
- Full Text:
Wireless Security Tools
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429867 , vital:72647 , https://digifors.cs.up.ac.za/issa/2006/Proceedings/Research/113_Paper.pdf
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this method. The method entails a combination of network telescope traffic capture and visualisation. Observing traffic from the perspective of a dedicated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Com-plimenting this, visual analysis facilitates the rapid review and correla-tion of events, thereby utilizing human intelligence in the identification of scanning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tai-lor made 3D scatter-plot visualisation. As the results show, the visuali-sation saliently conveys anomalous patterns, and further analysis re-veals that these patterns are indicative of covert network probing activi-ty. By incorporating visual analysis with traditional approaches, such as textual log review and the use of an intrusion detection system, this re-search contributes improved insight into network scanning incidents.
- Full Text:
Yours, mine and ours: intellectual property
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158784 , vital:40228 , https://hdl.handle.net/10520/EJC146169
- Description: When Grocott's Mail in Grahamstown wanted to use the Hector Pieterson photograph for the front cover of a Youth Day supplement celebrating the courage of the Soweto students of 1976, they decided to go the official route by contacting the photographer's agent and paying for the picture. They were told a single use would cost them thousands of rands. Obviously an impossibility for a small-town, community newspaper.
- Full Text:
- Authors: Garman, Anthea
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158784 , vital:40228 , https://hdl.handle.net/10520/EJC146169
- Description: When Grocott's Mail in Grahamstown wanted to use the Hector Pieterson photograph for the front cover of a Youth Day supplement celebrating the courage of the Soweto students of 1976, they decided to go the official route by contacting the photographer's agent and paying for the picture. They were told a single use would cost them thousands of rands. Obviously an impossibility for a small-town, community newspaper.
- Full Text:
‘Exploring the practical adequacy of the human rights, social justice, inclusivity and healthy environment policy discourse in South Africa’s National Curriculum Statement’
- Schudel, Ingrid J, Lotz-Sisitka, Heila
- Authors: Schudel, Ingrid J , Lotz-Sisitka, Heila
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/391180 , vital:68629 , xlink:href="https://www.tandfonline.com/doi/full/10.1080/13504620701284860"
- Description: This article examines the practical adequacy of the recent defining of a normative framework for the South African National Curriculum Statement that focuses on the relationship between human rights, social justice and a healthy environment. This politically framed and socially critical normative framework has developed in response to socio-political and socio-ecological histories in postapartheid curriculum transformation processes. The article critically considers the process of working with a normative framework in the defining of environmental education teaching and learning interactions, and seeks not only to explore the policy discourse critically, but also to explore what it is about the world that makes it work in different ways. Drawing on Sayer’s perspectives on the possibilities of enabling ‘situated universalism’ as a form of normative theory, and case-based data from a teacher professional development programme in the Makana District (where the authors live and work), the article probes the relationship between the establishment of a ‘universalising’ normative framework to guide national curriculum, and situated engagements with this framework in/as democratic process. In this process it questions whether educators should adopt the ‘norms’ as presented by society and simply universalize and implement them as prescribed by curriculum statements, or whether educators should adopt the strategies of postmodernists and reduce normative frameworks to relations of power situated in particular contexts.
- Full Text:
- Authors: Schudel, Ingrid J , Lotz-Sisitka, Heila
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/391180 , vital:68629 , xlink:href="https://www.tandfonline.com/doi/full/10.1080/13504620701284860"
- Description: This article examines the practical adequacy of the recent defining of a normative framework for the South African National Curriculum Statement that focuses on the relationship between human rights, social justice and a healthy environment. This politically framed and socially critical normative framework has developed in response to socio-political and socio-ecological histories in postapartheid curriculum transformation processes. The article critically considers the process of working with a normative framework in the defining of environmental education teaching and learning interactions, and seeks not only to explore the policy discourse critically, but also to explore what it is about the world that makes it work in different ways. Drawing on Sayer’s perspectives on the possibilities of enabling ‘situated universalism’ as a form of normative theory, and case-based data from a teacher professional development programme in the Makana District (where the authors live and work), the article probes the relationship between the establishment of a ‘universalising’ normative framework to guide national curriculum, and situated engagements with this framework in/as democratic process. In this process it questions whether educators should adopt the ‘norms’ as presented by society and simply universalize and implement them as prescribed by curriculum statements, or whether educators should adopt the strategies of postmodernists and reduce normative frameworks to relations of power situated in particular contexts.
- Full Text: