The economic impact of Rhodes University students on the Grahamstown economy
- Authors: Snowball, Jeanette D , Antrobus, Geoffrey G
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67475 , vital:29099
- Description: Publisher version , From Executive Summary: This study compares the spending patterns and economic impact of three groups of Rhodes University students: South Africans (SA), Other Africans and students from the Rest of the World (RoW). Data was collected via self-completion questionnaires and the final sample size was 163. Despite differences in spending patterns, total spending was found to be remarkably similar across groups, the major differences being between those students in university residence and those in digs (rented accommodation in town). Total monthly spending for those in residence was highest for SA students (R1034), then Other Africans (R850) and finally RoW (R777). For those in digs, total monthly spending was very similar, but again highest for SA students (R2495), then RoW (R2480) and then students from Other African countries (R2461). SA students have a considerably lower average unearned income than other groups, with students from the RoW having the highest unearned income (R1060 for those in residence and R2300 for those in digs). However, 55% of SA students, compared to 47% of foreign students, have sources of earned income, usually related to the university. Monthly income also tended to be higher for SA students (R654) than for other groups (Other Africa = R557; RoW = R575). The general conclusion that can be drawn is that there is very little difference in total spending between groups, although SA students have a somewhat higher average than others. A straight line ordinary least squares regression showed that, holding all else constant, SA students spent on average R169 more per month than foreign students (significant at the 10% level).
- Full Text:
- Date Issued: 2005
The effect of structure on the electrochemical properties of 14 marine pyrroloquinoline metabolites
- Authors: Antunes, Edith M , Maree, Suzanne E , Nyokong, Tebello , Davies-Coleman, Mike T , Maree, M David
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/286126 , vital:56242 , xlink:href="https://doi.org/10.3184/030823405775146915"
- Description: The electrochemical properties of 14 structurally related pyrroloquinoline metabolites (compounds 1–14) isolated from marine sponges were studied in pH-varied experiments using cyclic and square wave voltammetry. In general both substitution patterns and pH were observed to influence the reduction potentials of these molecules.
- Full Text:
- Date Issued: 2005
The environmental Kuznets curve: a literature survey
- Authors: Nahman, Anton , Antrobus, Geoffrey G
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143191 , vital:38209 , DOI: 10.1111/j.1813-6982.2005.00008.x
- Description: Literature on the environmental Kuznets curve (EKC) is examined, focussing on the possibility that the EKC may be explained by trade patterns. If significant, this trade effect would cast doubt on the oft‐stated conclusion that economic growth automatically leads to environmental improvement. Research has been insufficient, although a number of promising approaches have been developed. Although evidence on the pollution‐haven hypothesis is mixed, there is enough to suggest that the EKC development path may not be available to today's developing countries. Other problems cast doubt on whether the EKC exists in any relevant sense at all.
- Full Text:
- Date Issued: 2005
The reflection on peace agreements in Africa: feature
- Authors: Bischoff, Paul, 1954-
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/161398 , vital:40623
- Description: For Africa, the advent of globalisation, delivered in the shape of Structural Adjustment Programmes in the period from the early 1980s, ushered in the beginning of the end of the nation-building framework adopted at independence. Government's withdrawal from social, intellectual and economic areas of life brought into sharp relief the vulnerability of both state and society. Accompanied on the foreign policy front by a loss of Big Power protection after the Cold War ended, 'low and intrastate politics' came to the fore.
- Full Text:
- Date Issued: 2005
The relevance of (South African) Renaissance studies
- Authors: Wright, Laurence
- Date: 2005
- Language: English
- Type: text , article
- Identifier: vital:7055 , http://hdl.handle.net/10962/d1007416 , https://www.ajol.info/index.php/sisa/article/view/40550
- Description: preprint , This paper is part of a longer piece devoted to the elucidation of two related propositions. The first is that in South Africa the humanities in general, and Renaissance Studies in particular, are stymied by a lack of strategic thinking from those in the academy. The second is that the humanities, and Renaissance Studies, and Shakespeare, are valid and needed in this country, possibly as never before. This paper tackles the latter question, the challenge of intrinsic relevance. What possible bearing have art and literature, politics and religion, customs and technologies developed 10,000 kilometres away and nearly half a millennium ago to do with South Africa in the 21st century? I steal up on the main issue by outlining an abbreviated rhetoric of relevance, establishing a framework within which intrinsic relevance can be conceptualised for Renaissance Studies today.
- Full Text:
- Date Issued: 2005
The symbiosis between capitalists:
- Authors: Kyazze, Simwogerere
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159211 , vital:40277 , https://hdl.handle.net/10520/EJC146362
- Description: Question: Who is the most famous writer of the New Millennium? Answer: JK Rowling, author of the Harry Potter stories. If you answered in the affirmative, you will be forgiven for sharing the view of many teenagers (and an increasing number of young adults) around the world who swear by Mr Potter's benign witchcraft. But while we ponder the Harry Potter juggernaut (Ms Rowling's books are bestsellers in any language), let us also ponder why very few serious intellectuals make it to the top of the world's most famous best-seller lists (The New York Times, Amazon.com, Times of London, etc). There is a reason why Gore Vidal, Jeffery Sachs, Noam Chomsky and Edward Said, have all had some of their best work published by little known outfits such as St Mark's Publishing House, and not celebrated imprints of the Simon and Schuster or Alfred Knopf calibre.
- Full Text:
- Date Issued: 2005
Towards a better grasp of what matters in view of ‘the posts’
- Authors: O'Donoghue, Rob B , Lotz-Sisitka, Heila
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/182693 , vital:43854 , xlink:href="https://doi.org/10.1080/13504620500169593"
- Description: This response to McKenzie suggests that the issues of representivity, legitimacy and politics, inscribed within an institutional continuism characteristic of modernity within the McKenzie discourse, could well be recast within a reflexive view informed by insights derived with developing social theory. It briefly overviews the struggle for human agency that played out within the deconstructive engagements of the posts and probes how perspectives in social theory are opening the way for a break with features of environmental education as an institutional field. The review points to a reconstituting of the idea of environmental education research from scholastic field of/for environmental awareness and sustainable development, to a reflexive engagement within processes of social reproduction and reorientation in a changing world. A shift such as this would constitute a subtle change in a developing field of research, to situated design decisions of reflexive engagement (research) in social fields constituted within developing cultural contexts of risk.
- Full Text:
- Date Issued: 2005
Towards a Classification of Intrusion Strength
- Authors: Motara, Yusuf M , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428261 , vital:72498 , https://www.researchgate.net/profile/Yusuf-Mota-ra/publication/267206150_Towards_a_Classification_of_Intru-sion_Strength/links/547485820cf245eb436de34e/Towards-a-Classification-of-Intrusion-Strength.pdf
- Description: This paper proposes a new term, “intrusion strength”, for use by the se-curity community and those affected by compromised systems. It justi-fies the usefulness of such a term, proposes a preliminary ranking of intrusion strength factors, and concludes by mentioning the work nec-essary to create a full taxonomy of intrusion strength.
- Full Text:
- Date Issued: 2005
Towards an economic valuation of biodiversity: freshwater ecosystems
- Authors: Antrobus, Geoffrey G , Law, Matt
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143013 , vital:38185 , http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.620.4217andrep=rep1andtype=pdf
- Description: The valuation of environmental resources and biodiversity as a whole has become an increasingly necessary topic of research as our understanding of the importance and benefits of the healthy functioning of the environment develops. A major shortcoming of current research is that there has been very little advance in the valuation of freshwater biodiversity. The paper examines the socioeconomic importance of biodiversity and outlines the fundamentals of economic valuation thereof. The difficulties associated with the valuation of freshwater ecosystems are outlined and the results of a study presented to the South African Water Research Commission incorporating resource economics into freshwater quality objectives is described. The valuation of freshwater biodiversity is an important and complicated task that needs close attention in future research.
- Full Text:
- Date Issued: 2005
Towards an Infrastructural Framework for Secure Electronic Publication
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428274 , vital:72499 , https://d1wqtxts1xzle7.cloudfront.net/3456213/No_147_-_Forrester-libre.pdf?1390832679=andresponse-content-disposi-tion=inline%3B+filename%3DTowards_an_Infrastructural_Framework_for.pdfandExpires=1714791785andSignature=TY2i5fIQcyv493crTdmDaMEDLBmnqe-s1yjeJ4OAk~-Syb12yZ1EBj-cJi8jxrmIorji6THEB4kSon43fOBcA5XUwoZ0H1T~LooHIyiqhBymL2ZtszKbFdqu1zZCrCkfR1YYAjUiVaM2BNSyC-P-mtY6S5aFcwztHl43eogmS70AIt0x76p9gIvL3xQsyE-VXBrtOrbkbQweUmgZs80bQDMnS-oou481C0BJyp8y6St6BETLKCaJC~uPYzrHOG1CwVxNZQoz38zJ3pLIzuNmdLcrlts3BbASji3c53MY-CoEGflXljrvzG6f85EBo-Oy9kjyAzvJ9gZmfISayfA-~w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: To prevent the accidental, or deliberate, publication of documents contain-ing hidden information the organisation needs to have an Electronic Publi-cation Policy, more importantly though, it needs to have the Technical Infra-structure in place to enforce the policy. This paper outlines such a Technical Infrastructure.
- Full Text:
- Date Issued: 2005
Transmitting rdf graph deltas for a cheaper semantic web
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428288 , vital:72500
- Description: The Resoure Description Format is set to become the format to fulfill the vision of the Semantic Web. If RDF is widely to be used as a data representation framework, it would be advantageous to support the transmission differences in RDF graphs, enabling small and therefore possibly more frequent updates. This paper discusses the tools re-quired to enable transmission of graph differences, and the work need-ed to complete this toolset.
- Full Text:
- Date Issued: 2005
Trust on the Web
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
Wireless communication for previously disadvantaged secondary schools in Grahamstown, South Africa.
- Authors: Brandt, Ingrid , Terzoli, Alfredo , Hodgkinson-Williams, Cheryl
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427615 , vital:72451 , https://citeseerx.ist.psu.edu/document?repid=rep1andtype=pdfanddoi=2520d49f684e821c84350ae8c504572f35186d2f
- Description: With an alarmingly low teledensity in South Africa, less than 5% in some rural areas, and not much hope of further wired infrastructure, as the costs incurred are high compared to potential revenue, wireless connec-tivity could be a great asset and service in South Africa. This paper looks at how wireless communication technologies, 802.11, WiMAX and VSAT, can be used to allow broadband connectivity of schools to the Internet, with special reference to experimental work that is being done in Grahamstown schools.
- Full Text:
- Date Issued: 2005
Wireless Network Visualization Using Radio Propagation Modelling
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428859 , vital:72541 , https://d1wqtxts1xzle7.cloudfront.net/81589186/Papers_5CJanse_van_Rensburg_Wireless_Radio_Prop-libre.pdf?1646243170=esponse-content-disposi-tion=inline%3B+filename%3DWireless_Network_Visualization_Using_Rad.pdfExpires=1714748958Signature=OF69CzUsXIaE9WuVUQ~p01LV8Fdm4EOpX1eudE3qomWEWQ9jngy36AuZ38dZEAfIhWWFgO7byMtmx8hOUE3uYjjqLLGziqWV05r~K2n~DdSHAO1x2omrK53ew3lSW2AJ677zsqOIcRb-yVr7kE2PbAw1QolptUWQVI2YpAHEKdg5EQXm2iAW~FrQ7ljJxuwZTKaVLoubxj4HRLwJxTPIS9iN9nHn3sNKyIojfG6duWnCQ0dpkIKiKWTY6HVioBQCiN1vSdLUagXnTeRthoOFGyfo2kd3XG1Pi3tttIwFviPCh5H1297BCpMruY-h6XjSnPBGgAG33dOnkClBFnyAKg__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Wireless technologies have had an enormous impact on networking in re-cent years. It can create new business oppurtunities and allow users to communicate and share data in a new fashion. Wireless Networks de-crease installation costs, reduce the deployment time of a network and overcome physical barrier problems inherent in wiring. Unfortunately this flexibility comes at a price. The deployment, installation and setup of a WLAN is not a simple task and a number of factors need to be considered. Wireless Networks are notorious for being insecure due to signal spill, ad-hoc unauthorized access points and varying encryption strengths and standards. RF (Radio Frequency) interference and physical barriers sup-press a signal. In addition the channel frequencies each access point will be using in order to provide maximum roaming but minimum inter access point interference need to be considered. It is a complex balancing act to take these factors into account while still maintaining coverage, perfor-mance and security requirements. In this paper the benefits and feasibility of a model will be discussed that will enable the network administrator to visualize the coverage footprint of their wireless network when the above factors are taken into consideration. The program will be able to predict the strength, propagation and unwanted spill of signals which could compro-mise the security of an organisation prior to the deployment of a WLAN. In addition the model will provide functionality to visualize a signal from audit data once the WLAN is operational. The end result will be a program that can aid in the configuration, installation and management of a secure WLAN.
- Full Text:
- Date Issued: 2005
XML digital signature and RDF
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Date Issued: 2005
You can’t be serious:
- Authors: Strelitz, Larry N , Steenveld, Lynette N
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159215 , vital:40278 , https://hdl.handle.net/10520/EJC146377
- Description: As well as pandering to the lowest common denominator and simplifying complex issues, tabloids are also condemned for generally failing to provide information that citizens need in order to make informed political judgements - the latter being the raison d'etre of serious newspapers. In summary, tabloids "lower the standards of public discourse" (Ornerbring and Jonson, 2004: 283).
- Full Text:
- Date Issued: 2005