Social recruiting: a next generation social engineering attack
- Schoeman, A H B, Irwin, Barry V W
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
STAT3 interacts directly with Hsp90:
- Prinsloo, Earl, Kramer, Adam H, Edkins, Adrienne L, Blatch, Gregory L
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
A framework for DNS based detection and mitigation of malware infections on a network
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
African Languages And ICT Education
- Dalvit, Lorenzo, Murray, Sarah, Terzoli, Alfredo
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
An illustrated leaflet containing antiretroviral information targeted for low-literate readers: development and evaluation
- Dowse, Roslind, Ramela, Thato, Browne, Sara H
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
Biphenyl sorption to different soil clay minerals
- Tandlich, Roman, Baláž, Štefan
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
Polygamy in the recognition of Customary Marriages Act:
- Authors: Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141809 , vital:38006 , DOI: 10.1080/10130950.2009.9676275
- Description: The Recognition of Customary Marriages Act (RCMA) 1998, recognises customary marriages which are “negotiated, celebrated or concluded according to any of the systems of indigenous African customary law which exist in South Africa” including polygamous marriages. The Act arises in the context of South Africa's Constitution which bans discrimination on grounds of culture and sexual orientation and allows for heterogeneity in its definitions of marriage and the family. A pluralist approach to family jurisprudence, however, is sometimes conceived of as setting up an irresolvable tension between the constitutional commitment to gender equality and protection for patriarchal prerogatives sanctioned by customary law. The fact that rights sometimes collide with one another is one of the reasons why it is impossible always to treat rights as absolute. When rights clash the question that arises is which of the rights that find themselves in tension with one another should give way and why?
- Full Text:
- Date Issued: 2011
- Authors: Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141809 , vital:38006 , DOI: 10.1080/10130950.2009.9676275
- Description: The Recognition of Customary Marriages Act (RCMA) 1998, recognises customary marriages which are “negotiated, celebrated or concluded according to any of the systems of indigenous African customary law which exist in South Africa” including polygamous marriages. The Act arises in the context of South Africa's Constitution which bans discrimination on grounds of culture and sexual orientation and allows for heterogeneity in its definitions of marriage and the family. A pluralist approach to family jurisprudence, however, is sometimes conceived of as setting up an irresolvable tension between the constitutional commitment to gender equality and protection for patriarchal prerogatives sanctioned by customary law. The fact that rights sometimes collide with one another is one of the reasons why it is impossible always to treat rights as absolute. When rights clash the question that arises is which of the rights that find themselves in tension with one another should give way and why?
- Full Text:
- Date Issued: 2011
Tartarus: A honeypot based malware tracking and mitigation framework
- Hunter, Samuel O, Irwin, Barry V W
- Authors: Hunter, Samuel O , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428629 , vital:72525 , https://d1wqtxts1xzle7.cloudfront.net/96055420/Hunter-libre.pdf?1671479103=andresponse-content-disposi-tion=inline%3B+filename%3DTartarus_A_honeypot_based_malware_tracki.pdfandExpires=1714722666andSignature=JtPpR-IoAXILqsIJSlmCEvn6yyytE17YLQBeFJRKD5aBug-EbLxFpEGDf4GtQXHbxHvR4~E-b5QtMs1H6ruSYDti9fIHenRbLeepZTx9jYj92to3qZjy7UloigYbQuw0Y6sN95jI7d4HX-Xkspbz0~DsnzwFmLGopg7j9RZSHqpSpI~fBvlml3QQ2rLCm4aB9u8tSW8du5u~FiJgiLHNgJaPzEOzy4~yfKkXBh--LTFdgeAVYxQbOESGGh9k5bc-LDJhQ6dD5HpXsM3wKJvYuVyU6m83vT2scogVgKHIr-t~XuiqL35PfI3hs2c~ZO0TH4hCqwiNMHQ8GCYsLvllsA__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: On a daily basis many of the hosts connected to the Internet experi-ence continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the con-cern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on known malicious signa-tures, these systems have been at a serious disadvantage when it comes to detecting new, never before seen malware. This paper will introduce Tartarus which is a malware tracking and mitigation frame-work that makes use of honeypot technology in order to detect mali-cious traffic. Tartarus implements a dynamic quarantine technique to mitigate the spread of self propagating malware on a production net-work. In order to better understand the spread and impact of internet worms Tartarus is used to construct a detailed demographic of poten-tially malicious hosts on the internet. This host demographic is in turn used as a blacklist for firewall rule creation. The sources of malicious traffic is then illustrated through the use of a geolocation based visuali-sation.
- Full Text:
- Date Issued: 2011
- Authors: Hunter, Samuel O , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428629 , vital:72525 , https://d1wqtxts1xzle7.cloudfront.net/96055420/Hunter-libre.pdf?1671479103=andresponse-content-disposi-tion=inline%3B+filename%3DTartarus_A_honeypot_based_malware_tracki.pdfandExpires=1714722666andSignature=JtPpR-IoAXILqsIJSlmCEvn6yyytE17YLQBeFJRKD5aBug-EbLxFpEGDf4GtQXHbxHvR4~E-b5QtMs1H6ruSYDti9fIHenRbLeepZTx9jYj92to3qZjy7UloigYbQuw0Y6sN95jI7d4HX-Xkspbz0~DsnzwFmLGopg7j9RZSHqpSpI~fBvlml3QQ2rLCm4aB9u8tSW8du5u~FiJgiLHNgJaPzEOzy4~yfKkXBh--LTFdgeAVYxQbOESGGh9k5bc-LDJhQ6dD5HpXsM3wKJvYuVyU6m83vT2scogVgKHIr-t~XuiqL35PfI3hs2c~ZO0TH4hCqwiNMHQ8GCYsLvllsA__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: On a daily basis many of the hosts connected to the Internet experi-ence continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the con-cern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on known malicious signa-tures, these systems have been at a serious disadvantage when it comes to detecting new, never before seen malware. This paper will introduce Tartarus which is a malware tracking and mitigation frame-work that makes use of honeypot technology in order to detect mali-cious traffic. Tartarus implements a dynamic quarantine technique to mitigate the spread of self propagating malware on a production net-work. In order to better understand the spread and impact of internet worms Tartarus is used to construct a detailed demographic of poten-tially malicious hosts on the internet. This host demographic is in turn used as a blacklist for firewall rule creation. The sources of malicious traffic is then illustrated through the use of a geolocation based visuali-sation.
- Full Text:
- Date Issued: 2011
Applicability of the REALM health literacy test to an English second-language South African population:
- Dowse, Roslind, Lecoko, Motlalepule L E, Ehlers, Martina S
- Authors: Dowse, Roslind , Lecoko, Motlalepule L E , Ehlers, Martina S
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156798 , vital:40051 , https://doi.org/10.1007/s11096-010-9392-y
- Description: Objective and setting. To investigate health literacy in an English second language population using the REALM test, to evaluate its appropriateness and to compare health literacy between four different education categories. Setting Primary healthcare clinics and participant homes in Grahamstown, South Africa.
- Full Text:
- Date Issued: 2010
- Authors: Dowse, Roslind , Lecoko, Motlalepule L E , Ehlers, Martina S
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156798 , vital:40051 , https://doi.org/10.1007/s11096-010-9392-y
- Description: Objective and setting. To investigate health literacy in an English second language population using the REALM test, to evaluate its appropriateness and to compare health literacy between four different education categories. Setting Primary healthcare clinics and participant homes in Grahamstown, South Africa.
- Full Text:
- Date Issued: 2010
Bodies that belong: race and space in Elleke Boehmer's Nile Baby
- Authors: Marais, Mike
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144094 , vital:38310 , DOI: 10.1080/00138398.2010.488337
- Description: South African literature has never been particularly perceptive in addressing the question of race. While this is especially true of writing of the apartheid period, not much has changed in the postapartheid years. Only rarely does one encounter a literary treatment of race that is aware of its performative, rather than essential, nature. Rarer still are works that are conscious of the ways in which we gain a sense of belonging by shaping our environments to affirm our raced subjectives.
- Full Text:
- Date Issued: 2010
- Authors: Marais, Mike
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144094 , vital:38310 , DOI: 10.1080/00138398.2010.488337
- Description: South African literature has never been particularly perceptive in addressing the question of race. While this is especially true of writing of the apartheid period, not much has changed in the postapartheid years. Only rarely does one encounter a literary treatment of race that is aware of its performative, rather than essential, nature. Rarer still are works that are conscious of the ways in which we gain a sense of belonging by shaping our environments to affirm our raced subjectives.
- Full Text:
- Date Issued: 2010
Cyber security: Challenges and the way forward
- Ayofe, Azeez N, Irwin, Barry V W
- Authors: Ayofe, Azeez N , Irwin, Barry V W
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428613 , vital:72524 , https://d1wqtxts1xzle7.cloudfront.net/62565276/171920200330-53981-1mqgyr5.pdf?1585592737=andresponse-content-disposi-tion=inline%3B+filename%3DCYBER_SECURITY_CHALLENGES_AND_THE_WAY_FO.pdfandExpires=1714729368andSignature=dPUCAd1sMUF-gyDTkBFb2lzDvkVNpfp0sk1z-CdAeHH6O759dBiO-M158drmJsOo1XtOJBY4tNd8Um2gi11zw4U8yEzHO-bGUJGJTJcooTXaKwZLT-wPqS779Qo2oeiQOIiuAx6zSdcfSGjbDfFOL1YWV9UeKvhtcnGJ3p-CjJAhiPWJorGn1-z8mO6oouWzyJYc0hV0-Po8yywJD60eC2S6llQmfNRpX4otgq4fgZwZu4TEcMUWPfBzGPFPNYcCLfiQVK0YLV~XdTCWrhTlYPSMzVSs~DhQk9QPBU7IGmzQkGZo3UXnNu1slCVLb9Dqm~9DSbmttIXIDGYXEjP9l4w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The high level of insecurity on the internet is becoming worrisome so much so that transaction on the web has become a thing of doubt. Cy-bercrime is becoming ever more serious and prevalent. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international per-spective on fighting Cybercrime. This work seeks to define the concept of cyber-crime, explain tools being used by the criminals to perpetrate their evil handiworks, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involve-ment, we would look at how best to detect a criminal mail and in conclu-sion, proffer recommendations that would help in checking the increas-ing rate of cyber-crimes and criminals.
- Full Text:
- Date Issued: 2010
- Authors: Ayofe, Azeez N , Irwin, Barry V W
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428613 , vital:72524 , https://d1wqtxts1xzle7.cloudfront.net/62565276/171920200330-53981-1mqgyr5.pdf?1585592737=andresponse-content-disposi-tion=inline%3B+filename%3DCYBER_SECURITY_CHALLENGES_AND_THE_WAY_FO.pdfandExpires=1714729368andSignature=dPUCAd1sMUF-gyDTkBFb2lzDvkVNpfp0sk1z-CdAeHH6O759dBiO-M158drmJsOo1XtOJBY4tNd8Um2gi11zw4U8yEzHO-bGUJGJTJcooTXaKwZLT-wPqS779Qo2oeiQOIiuAx6zSdcfSGjbDfFOL1YWV9UeKvhtcnGJ3p-CjJAhiPWJorGn1-z8mO6oouWzyJYc0hV0-Po8yywJD60eC2S6llQmfNRpX4otgq4fgZwZu4TEcMUWPfBzGPFPNYcCLfiQVK0YLV~XdTCWrhTlYPSMzVSs~DhQk9QPBU7IGmzQkGZo3UXnNu1slCVLb9Dqm~9DSbmttIXIDGYXEjP9l4w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The high level of insecurity on the internet is becoming worrisome so much so that transaction on the web has become a thing of doubt. Cy-bercrime is becoming ever more serious and prevalent. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international per-spective on fighting Cybercrime. This work seeks to define the concept of cyber-crime, explain tools being used by the criminals to perpetrate their evil handiworks, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involve-ment, we would look at how best to detect a criminal mail and in conclu-sion, proffer recommendations that would help in checking the increas-ing rate of cyber-crimes and criminals.
- Full Text:
- Date Issued: 2010
Localisation of Theiler's murine encephalomyelitis virus protein 2C to the golgi apparatus using antibodies generated against a peptide region:
- Jauka, Tembisa, Mutsvunguma, Lorraine Z, Boshoff, Aileen, Edkins, Adrienne L, Knox, Caroline M
- Authors: Jauka, Tembisa , Mutsvunguma, Lorraine Z , Boshoff, Aileen , Edkins, Adrienne L , Knox, Caroline M
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165074 , vital:41206 , DOI: 10.1016/j.jviromet.2010.05.009
- Description: The picornavirus 2C protein is highly conserved and indispensible for virus replication. Polyclonal antibodies against Theiler's murine encephalomyelitis virus (TMEV) 2C protein were generated by immunisation of rabbits with a peptide comprising amino acids 31–210 of the protein. Antibodies were used to investigate the localisation of 2C in infected cells by indirect immunofluorescence and confocal microscopy. Analysis of infected cells revealed that the distribution of 2C changed during infection.
- Full Text:
- Date Issued: 2010
- Authors: Jauka, Tembisa , Mutsvunguma, Lorraine Z , Boshoff, Aileen , Edkins, Adrienne L , Knox, Caroline M
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165074 , vital:41206 , DOI: 10.1016/j.jviromet.2010.05.009
- Description: The picornavirus 2C protein is highly conserved and indispensible for virus replication. Polyclonal antibodies against Theiler's murine encephalomyelitis virus (TMEV) 2C protein were generated by immunisation of rabbits with a peptide comprising amino acids 31–210 of the protein. Antibodies were used to investigate the localisation of 2C in infected cells by indirect immunofluorescence and confocal microscopy. Analysis of infected cells revealed that the distribution of 2C changed during infection.
- Full Text:
- Date Issued: 2010
A tuple space web service for distributed programming-Simplifying distributed web services applications
- Wells, George C, Mueller, Barbara, Schulé, Lo¨ıc
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
- Authors: Wells, George C , Mueller, Barbara , Schulé, Lo¨ıc
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430437 , vital:72691 , https://www.scitepress.org/PublishedPapers/2008/15170/15170.pdf
- Description: This paper describes a new tuple space web service for coordination and communication in distributed web applications. This web service is based on the Linda programming model. Linda is a coordination lan-guage for parallel and distributed processing, providing a communica-tion mechanism based on a logically shared memory space. The origi-nal Linda model has been extended through the provision of a pro-grammable mechanism, providing additional flexibility and improved performance. The implementation of the web service is discussed, to-gether with the details of the programmable matching mechanism. Some results from the implementation of a location-based mobile appli-cation, using the tuple space web service are presented, demonstrating the benefits of our system.
- Full Text:
- Date Issued: 2008
Automating the creation of 3D animation from annotated fiction text
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432639 , vital:72889 , https://www.iadisportal.org/digital-library/automating-the-creation-of-3d-animation-from-annotated-fiction-text
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2008
The relationship between emergence of the shortest path and information value using ant-like agents
- Chibaya, Colin, Bangay, Shaun D
- Authors: Chibaya, Colin , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433318 , vital:72961 , https://doi.org/10.1145/1456659.1456663
- Description: Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced by the relative levels of attractive and repulsive pheromone in each agent's local environment. Our work in [5] evaluates three pheromone perception strategies, investigating path formation speed, quality, directionality, robustness and adaptability under different parameter settings(degree of randomness, pheromone evaporation rate and pheromone diffusion rate).
- Full Text:
- Date Issued: 2008
- Authors: Chibaya, Colin , Bangay, Shaun D
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433318 , vital:72961 , https://doi.org/10.1145/1456659.1456663
- Description: Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced by the relative levels of attractive and repulsive pheromone in each agent's local environment. Our work in [5] evaluates three pheromone perception strategies, investigating path formation speed, quality, directionality, robustness and adaptability under different parameter settings(degree of randomness, pheromone evaporation rate and pheromone diffusion rate).
- Full Text:
- Date Issued: 2008
Viewpoint: reading conference recommendations in a wider context of social change
- Authors: Lotz-Sisitka, Heila
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67411 , vital:29085 , https://www.ajol.info/index.php/sajee/article/view/122783
- Description: publisher version , This short Viewpoint paper considers the role and value of conference recommendations in shaping the field of environmental education. It explores the social politics, and often contested nature, of conference recommendations and their institutional histories, arguing that the act of producing conference recommendations forms part of the practices of new social movements. The paper recommends historicising conference recommendations and OEcross readings‚ to consider changing discourses and new developments in the field. Accompanying the short Viewpoint paper, are two sets of recently produced conference recommendations, one from the 4th International Environmental Education Conference held in Ahmedabad, India, and the other from the 1st International Conference on Mainstreaming Environment and Sustainability in African Universities held in Nairobi, Kenya.
- Full Text:
- Date Issued: 2008
- Authors: Lotz-Sisitka, Heila
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67411 , vital:29085 , https://www.ajol.info/index.php/sajee/article/view/122783
- Description: publisher version , This short Viewpoint paper considers the role and value of conference recommendations in shaping the field of environmental education. It explores the social politics, and often contested nature, of conference recommendations and their institutional histories, arguing that the act of producing conference recommendations forms part of the practices of new social movements. The paper recommends historicising conference recommendations and OEcross readings‚ to consider changing discourses and new developments in the field. Accompanying the short Viewpoint paper, are two sets of recently produced conference recommendations, one from the 4th International Environmental Education Conference held in Ahmedabad, India, and the other from the 1st International Conference on Mainstreaming Environment and Sustainability in African Universities held in Nairobi, Kenya.
- Full Text:
- Date Issued: 2008
Women’s rights get a dressing down: mini skirt attacks in South Africa
- Authors: Vincent, Louise
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141888 , vital:38013 , DOI: 10.18848/1447-9508/cgp/v06i06/42462
- Description: On Sunday the 17th of February 2008 25-year old Nwabisa Ngcukana was stripped, paraded naked while more than 100 onlookers jeered and laughed, doused in alcohol and sexually assaulted by taxi drivers and hawkers at the Noord Street taxi rank in Johannesburg1 (The Star 2008: 2). She was the fourth woman to be assaulted in this way at the rank on that evening. Three other women were stripped and sexually assaulted at the same taxi rank on the previous day. In each of these cases the fact that the women were wearing mini skirts was cited as the reason for the attack.
- Full Text:
- Date Issued: 2008
- Authors: Vincent, Louise
- Date: 2008
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141888 , vital:38013 , DOI: 10.18848/1447-9508/cgp/v06i06/42462
- Description: On Sunday the 17th of February 2008 25-year old Nwabisa Ngcukana was stripped, paraded naked while more than 100 onlookers jeered and laughed, doused in alcohol and sexually assaulted by taxi drivers and hawkers at the Noord Street taxi rank in Johannesburg1 (The Star 2008: 2). She was the fourth woman to be assaulted in this way at the rank on that evening. Three other women were stripped and sexually assaulted at the same taxi rank on the previous day. In each of these cases the fact that the women were wearing mini skirts was cited as the reason for the attack.
- Full Text:
- Date Issued: 2008
An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society
- Thinyane, Mamello, Dalvit, Lorenzo, Slay, Hannah, Mapi, Thandeka, Terzoli, Alfredo
- Authors: Thinyane, Mamello , Dalvit, Lorenzo , Slay, Hannah , Mapi, Thandeka , Terzoli, Alfredo
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431218 , vital:72755 , https://doi.org/10.1145/1292491.1292508
- Description: With the information revolution that promises to shape the 21st century, knowledge has become the prime commodity, very much like land, means of production and capital have been at different times in the past. Access to information, made instantly available by the growth of the Internet, determines access to economic resources, social participa-tion and better quality of life. For this reason, the knowledge stored on the Web and the advantages offered by the spread of Information and Communication Technology (ICT) are equally important for rich socie-ties to prosper and for poor ones to develop. The only difference is that marginalised communities do not have access to the tools and have little control over the content found in the domain of ICTs. In this paper we describe an intervention to develop the potential of a typical rural community in South Africa through ICTs. This involves providing Inter-net connectivity and deploying a platform to support e-commerce, e-learning, e-government and e-health. The core of the platform is an on-tology-based model designed to integrate and respond to Indigenous Knowledge Systems. This has been achieved by combining a deep understanding of local knowledge and social networks with the use of authoring, communication and ontology-management tools. The prima-ry goal of this new approach is to find a way to make ICT solutions more sensitive to the local context, and therefore more effective. Sec-ondly, we hope to foster a sense of ownership of the project among the community, by capitalising on local knowledge and resources.
- Full Text:
- Date Issued: 2007
- Authors: Thinyane, Mamello , Dalvit, Lorenzo , Slay, Hannah , Mapi, Thandeka , Terzoli, Alfredo
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431218 , vital:72755 , https://doi.org/10.1145/1292491.1292508
- Description: With the information revolution that promises to shape the 21st century, knowledge has become the prime commodity, very much like land, means of production and capital have been at different times in the past. Access to information, made instantly available by the growth of the Internet, determines access to economic resources, social participa-tion and better quality of life. For this reason, the knowledge stored on the Web and the advantages offered by the spread of Information and Communication Technology (ICT) are equally important for rich socie-ties to prosper and for poor ones to develop. The only difference is that marginalised communities do not have access to the tools and have little control over the content found in the domain of ICTs. In this paper we describe an intervention to develop the potential of a typical rural community in South Africa through ICTs. This involves providing Inter-net connectivity and deploying a platform to support e-commerce, e-learning, e-government and e-health. The core of the platform is an on-tology-based model designed to integrate and respond to Indigenous Knowledge Systems. This has been achieved by combining a deep understanding of local knowledge and social networks with the use of authoring, communication and ontology-management tools. The prima-ry goal of this new approach is to find a way to make ICT solutions more sensitive to the local context, and therefore more effective. Sec-ondly, we hope to foster a sense of ownership of the project among the community, by capitalising on local knowledge and resources.
- Full Text:
- Date Issued: 2007
Animated feather coats using field lines
- Authors: Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433338 , vital:72963 , https://doi.org/10.1145/1294685.1294713
- Description: The tedious task of manually placing feathers on computer animated ob-jects involves aligning feathers, ensuring that they do not insect each other or penetrate the surface, deforming every feather to match the local surface features, and ensuring that the feather coat is consistent when the underly-ing object is animated. We present a technique for generating a feather coat over an object. Feather orientation is specified quickly and easily, feathers are deformed while ensuring collision prevention, and the coat can be ani-mated. We create a vector field in the space surrounding the body object and deform feathers to align with the field lines. The non-intersection proper-ty of the field lines ensures that feather intersections are avoided. We pro-vide a formulation of a suitable vector field and demonstrate that it is capa-ble of producing realistic feather coats. The process can easily be integrated into the work-flow of standard modelling and animation processes. We show examples of feather coat creation on a range of objects, proving that field line based placement of feather coats provides the desired functionality for feather modelling and animation.
- Full Text:
- Date Issued: 2007
- Authors: Bangay, Shaun D
- Date: 2007
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/433338 , vital:72963 , https://doi.org/10.1145/1294685.1294713
- Description: The tedious task of manually placing feathers on computer animated ob-jects involves aligning feathers, ensuring that they do not insect each other or penetrate the surface, deforming every feather to match the local surface features, and ensuring that the feather coat is consistent when the underly-ing object is animated. We present a technique for generating a feather coat over an object. Feather orientation is specified quickly and easily, feathers are deformed while ensuring collision prevention, and the coat can be ani-mated. We create a vector field in the space surrounding the body object and deform feathers to align with the field lines. The non-intersection proper-ty of the field lines ensures that feather intersections are avoided. We pro-vide a formulation of a suitable vector field and demonstrate that it is capa-ble of producing realistic feather coats. The process can easily be integrated into the work-flow of standard modelling and animation processes. We show examples of feather coat creation on a range of objects, proving that field line based placement of feather coats provides the desired functionality for feather modelling and animation.
- Full Text:
- Date Issued: 2007
Does 'African mathematics' facilitate access to mathematics?: towards an ongoing critical analysis of ethnomathematics in a South African context
- Horsthemke, Kai, Schäfer, Marc
- Authors: Horsthemke, Kai , Schäfer, Marc
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141004 , vital:37936 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20885
- Description: Mosibudi Mangena, the Minister of Science and Technology, said in an address to the Annual Congress of the South African Mathematical Society at the University of the Potchefstroom, November 2, 2004: "There is one thing we need to address before anything else. We need to increase the number of young people, particularly blacks and women, who are able to successfully complete the first course in Mathematics at our universities." How is this to be achieved? A popular trend involves a call for the introduction and incorporation of so-called ethnomathematics, and more particularly 'African mathematics', into secondary and tertiary curricula. Although acknowledging the obvious benefits of so-called ethnomathematics, this paper critically analyses three aspects of ethnomathematics that have been neglected in past critiques. Our focus is not on the relationship as such between ethnomathematics and mathematics education. Our critique involves (1) epistemological and logical misgivings, (2) a new look at practices and skills, (3) concerns about embracing 'African mathematics' as valid and valuable - just because it is African.
- Full Text:
- Date Issued: 2007
- Authors: Horsthemke, Kai , Schäfer, Marc
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141004 , vital:37936 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC20885
- Description: Mosibudi Mangena, the Minister of Science and Technology, said in an address to the Annual Congress of the South African Mathematical Society at the University of the Potchefstroom, November 2, 2004: "There is one thing we need to address before anything else. We need to increase the number of young people, particularly blacks and women, who are able to successfully complete the first course in Mathematics at our universities." How is this to be achieved? A popular trend involves a call for the introduction and incorporation of so-called ethnomathematics, and more particularly 'African mathematics', into secondary and tertiary curricula. Although acknowledging the obvious benefits of so-called ethnomathematics, this paper critically analyses three aspects of ethnomathematics that have been neglected in past critiques. Our focus is not on the relationship as such between ethnomathematics and mathematics education. Our critique involves (1) epistemological and logical misgivings, (2) a new look at practices and skills, (3) concerns about embracing 'African mathematics' as valid and valuable - just because it is African.
- Full Text:
- Date Issued: 2007