The roles of black-backed jackals and caracals in issues of human-wildlife conflict in the Eastern Cape, South Africa
- Authors: Murison, Megan Kate
- Date: 2015
- Subjects: Black-backed jackal -- South Africa -- Eastern Cape , Human-animal relationships -- South Africa -- Eastern Cape , Predatory animals -- Control -- South Africa -- Eastern Cape , Black-backed jackal -- Food -- South Africa -- Eastern Cape , Black-backed jackal -- Effect of human beings on -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5939 , http://hdl.handle.net/10962/d1018667
- Description: [Partial abstract]: Human-wildlife conflict is a widely observed phenomenon and encompasses a range of negative interactions between humans and wildlife. Depredation upon livestock and game species proves to be the prevalent form of this conflict and often results in the killing of carnivores. Within the South African context, despite intense lethal control, two sympatric mesopredators, the blackbacked jackal (Canis mesomelas) and the caracal (Caracal caracal), remain common enough to be considered a major threat to human livelihoods through depredation. Wildlife ranches and livestock farms dominate the landscape in the Eastern Cape Province. Moreover, human-predator conflict within the region is extensive as both the black-backed jackal and caracal are seen to be inimical by landowners. Understanding this conflict is essential for mitigating any potential adverse environmental reactions (i.e. range collapses or extinctions) and requires knowledge of anthropogenic, ecological and environmental factors. I interviewed 73 land owners across five municipal boundaries in the Eastern Cape to quantify perceptions of predator control methods.
- Full Text:
- Authors: Murison, Megan Kate
- Date: 2015
- Subjects: Black-backed jackal -- South Africa -- Eastern Cape , Human-animal relationships -- South Africa -- Eastern Cape , Predatory animals -- Control -- South Africa -- Eastern Cape , Black-backed jackal -- Food -- South Africa -- Eastern Cape , Black-backed jackal -- Effect of human beings on -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5939 , http://hdl.handle.net/10962/d1018667
- Description: [Partial abstract]: Human-wildlife conflict is a widely observed phenomenon and encompasses a range of negative interactions between humans and wildlife. Depredation upon livestock and game species proves to be the prevalent form of this conflict and often results in the killing of carnivores. Within the South African context, despite intense lethal control, two sympatric mesopredators, the blackbacked jackal (Canis mesomelas) and the caracal (Caracal caracal), remain common enough to be considered a major threat to human livelihoods through depredation. Wildlife ranches and livestock farms dominate the landscape in the Eastern Cape Province. Moreover, human-predator conflict within the region is extensive as both the black-backed jackal and caracal are seen to be inimical by landowners. Understanding this conflict is essential for mitigating any potential adverse environmental reactions (i.e. range collapses or extinctions) and requires knowledge of anthropogenic, ecological and environmental factors. I interviewed 73 land owners across five municipal boundaries in the Eastern Cape to quantify perceptions of predator control methods.
- Full Text:
The trophic ecology of the endangered endemic Barau's Petrel (Pterodroma baraui) from Reunion Island, south-western Indian Ocean
- Authors: Danckwerts, Daniel Keith
- Date: 2015
- Subjects: Petrels -- Réunion , Pterodroma baraui , Ecology -- Réunion
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5925 , http://hdl.handle.net/10962/d1017803
- Description: Réunion is the only tropical island that supports two endemic gadfly petrels. Population modelling has indicated that the current threats to the Barau’s Petrel (Pterodroma baraui) may drive it to extinction; this fate is almost definite for the Mascarene Petrel (Pseudobulweria aterrima). Management interventions have therefore been implemented, but conservation potential is handicapped since virtually nothing is known about the former species’ at-sea biology. Thus, following numerous recommendations, this study aimed to combine stomach content, stable isotope, and fatty acid analyses so to provide new information on the at-sea ecology of Barau’s Petrel. Breeding colonies were repeatedly visited over the same season and samples gathered from adults, fledglings, and downy chicks. Stomach contents consisted mostly of accumulated cephalopod beaks whereas structures from fishes, molluscs, arthropods, and crustaceans were less frequently encountered. Fatty acid profiles of blood varied greatly among individuals and the lowincidences of monounsaturated and n-3 fatty acids discounted fish as an important dietary component. δ¹⁵N of blood indicated a niche between the fourth and fifth trophic levels, which proposes that these birds scavenge to a greater degree than other sympatric seabirds and suggests that adults are also reliant on their endogenous reserves during breeding. δ¹³C values confirmed the migratory behaviour of adults since birds returning from the non-breeding grounds were enriched relative to individuals sampled through the breeding period. Significant intra-breeding season variations in δ13C were also observed, which matched this species’ patterns of habitat use as have recently described. These results collectively indicate an opportunistic behaviour, which implies some degree of resilience against shifts in prey availability/accessibility, and suggest that this species’ reproduction isdependent on distant foraging areas. This breeding strategy is synonymous with great vulnerability as over-investing into a single breeding episode may jeopardize future survival and fecundity. Thus, in light of environmental conditions that are becoming increasingly more susceptible to dramatic changes, the birds could rather be prioritising adult survival, over reproductive output. Further work is obviously necessary and should benefit from databases of fatty acid profiles and isotope signatures of potential prey species.
- Full Text:
- Authors: Danckwerts, Daniel Keith
- Date: 2015
- Subjects: Petrels -- Réunion , Pterodroma baraui , Ecology -- Réunion
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5925 , http://hdl.handle.net/10962/d1017803
- Description: Réunion is the only tropical island that supports two endemic gadfly petrels. Population modelling has indicated that the current threats to the Barau’s Petrel (Pterodroma baraui) may drive it to extinction; this fate is almost definite for the Mascarene Petrel (Pseudobulweria aterrima). Management interventions have therefore been implemented, but conservation potential is handicapped since virtually nothing is known about the former species’ at-sea biology. Thus, following numerous recommendations, this study aimed to combine stomach content, stable isotope, and fatty acid analyses so to provide new information on the at-sea ecology of Barau’s Petrel. Breeding colonies were repeatedly visited over the same season and samples gathered from adults, fledglings, and downy chicks. Stomach contents consisted mostly of accumulated cephalopod beaks whereas structures from fishes, molluscs, arthropods, and crustaceans were less frequently encountered. Fatty acid profiles of blood varied greatly among individuals and the lowincidences of monounsaturated and n-3 fatty acids discounted fish as an important dietary component. δ¹⁵N of blood indicated a niche between the fourth and fifth trophic levels, which proposes that these birds scavenge to a greater degree than other sympatric seabirds and suggests that adults are also reliant on their endogenous reserves during breeding. δ¹³C values confirmed the migratory behaviour of adults since birds returning from the non-breeding grounds were enriched relative to individuals sampled through the breeding period. Significant intra-breeding season variations in δ13C were also observed, which matched this species’ patterns of habitat use as have recently described. These results collectively indicate an opportunistic behaviour, which implies some degree of resilience against shifts in prey availability/accessibility, and suggest that this species’ reproduction isdependent on distant foraging areas. This breeding strategy is synonymous with great vulnerability as over-investing into a single breeding episode may jeopardize future survival and fecundity. Thus, in light of environmental conditions that are becoming increasingly more susceptible to dramatic changes, the birds could rather be prioritising adult survival, over reproductive output. Further work is obviously necessary and should benefit from databases of fatty acid profiles and isotope signatures of potential prey species.
- Full Text:
The use of probiotics in the diet of farmed South African abalone Haliotis midae L
- Authors: Maliza, Siyabonga
- Date: 2015
- Subjects: Haliotis midae -- South Africa , Abalones -- South Africa , Haliotis midae -- Feeding and feeds , Haliotis midae -- Effect of chemicals on , Haliotis midae -- Growth , Haliotis midae -- Immunology , Probiotics
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5382 , http://hdl.handle.net/10962/d1018178
- Description: Physiological stress in farmed abalone can lead to immunosuppression and increase the susceptibility to bacterial, viral and parasitic disease, often followed by mortality. Thus, handling and poor water quality can reduce farm production efficiency. Probiotics in aquaculture have been effective in a wide range of species in enhancing immunity, survival, improving feed utilisation and growth. Three putative probionts identified as a result of in vitro screening had been beneficial to laboratory-reared abalone in a previous study. The aim of this study was to produce an abalone feed that contains a suite of probionts that may promote abalone growth and health under farming conditions. The objectives were to compare growth and physiological responses (i.e., haemocyte and phagocytosis counts) of abalone fed a commercial feed (Abfeed®S 34, Marifeed, Hermanus) supplemented with probiotics (i.e., the probiotic diet) to abalone fed the commercial feed without probiotic supplementation as a control treatment in a factorial design with handling method as an independent variable. This experiment was conducted at HIK Abalone Farm (Pty Ltd) for a period of eight months with initial weight and length 36.1 ± 0.05 g and 58.6 ± 0.06 mm abalone-1. Another experiment was carried out at Roman Bay Sea Farm (Pty) Ltd with initial weight and length 34.7 ± 0.17 g and 62.3 ± 0.18 mm abalone-1, but this experiment included one factor only, i.e. the presence and absence of the probionts in the feed. At HIK there was no significant interaction between diet and handling on average length and weight gain month-1 after four (p=0.81 and p=0.32) and eight (p=0.51 and p=0.53) months, respectively. Average length (additional handling = 73.9 ± 0.52 mm, normal farm handling = 75.8 ± 0.57 mm) and weight gain (mean: additional handling = 68.5 ± 1.20 g, normal farm handling = 74.3 ± 1.86 g) increased significantly in animals that were handled under normal farm procedure and were either fed probiotic or control diet after eight months (p=0.03 and p=0.02, respectively). There was no iii difference in length gain or weight gain of abalone fed the probiotic diet and those fed the control diet (ANOVA: F(1,16)=0.04, p=0.84; F(1,16)=0.14, p=0.71, respectively). After four months phagocytotic count was significantly different between dietary treatments with mean values of 74.50 ± 10.52 and 63.52 ± 14.52 % phagocytosis count per sample for the probionts and control treatment, respectively (p=0.04), there was no difference after eight months at HIK Abalone Farm. There was no effect of stressor application (p=0.14) and no interaction between dietary treatment and stressor application for this variable i.e., phagocytosis count (p=0.61). There was no difference in feed conversion ratio between treatments with values ranging from 2.9 to 3.8. At Roman Bay Sea farm, there was no significant difference in mean length gain between abalone fed the probiotic and control diet after eight months (repeated measures ANOVA: F(4,28)=16.54. Mean weight gain of abalone fed the probiotic diet was significantly greater than those fed the control diet after eight months (repeated measures ANOVA: F(4,28)=39.82, p(0.00001). There was no significant difference in haemocyte counts between animals fed either probiotic or control diet after four and eight months at Roman Bay Sea farm (p>0.05).
- Full Text:
- Authors: Maliza, Siyabonga
- Date: 2015
- Subjects: Haliotis midae -- South Africa , Abalones -- South Africa , Haliotis midae -- Feeding and feeds , Haliotis midae -- Effect of chemicals on , Haliotis midae -- Growth , Haliotis midae -- Immunology , Probiotics
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5382 , http://hdl.handle.net/10962/d1018178
- Description: Physiological stress in farmed abalone can lead to immunosuppression and increase the susceptibility to bacterial, viral and parasitic disease, often followed by mortality. Thus, handling and poor water quality can reduce farm production efficiency. Probiotics in aquaculture have been effective in a wide range of species in enhancing immunity, survival, improving feed utilisation and growth. Three putative probionts identified as a result of in vitro screening had been beneficial to laboratory-reared abalone in a previous study. The aim of this study was to produce an abalone feed that contains a suite of probionts that may promote abalone growth and health under farming conditions. The objectives were to compare growth and physiological responses (i.e., haemocyte and phagocytosis counts) of abalone fed a commercial feed (Abfeed®S 34, Marifeed, Hermanus) supplemented with probiotics (i.e., the probiotic diet) to abalone fed the commercial feed without probiotic supplementation as a control treatment in a factorial design with handling method as an independent variable. This experiment was conducted at HIK Abalone Farm (Pty Ltd) for a period of eight months with initial weight and length 36.1 ± 0.05 g and 58.6 ± 0.06 mm abalone-1. Another experiment was carried out at Roman Bay Sea Farm (Pty) Ltd with initial weight and length 34.7 ± 0.17 g and 62.3 ± 0.18 mm abalone-1, but this experiment included one factor only, i.e. the presence and absence of the probionts in the feed. At HIK there was no significant interaction between diet and handling on average length and weight gain month-1 after four (p=0.81 and p=0.32) and eight (p=0.51 and p=0.53) months, respectively. Average length (additional handling = 73.9 ± 0.52 mm, normal farm handling = 75.8 ± 0.57 mm) and weight gain (mean: additional handling = 68.5 ± 1.20 g, normal farm handling = 74.3 ± 1.86 g) increased significantly in animals that were handled under normal farm procedure and were either fed probiotic or control diet after eight months (p=0.03 and p=0.02, respectively). There was no iii difference in length gain or weight gain of abalone fed the probiotic diet and those fed the control diet (ANOVA: F(1,16)=0.04, p=0.84; F(1,16)=0.14, p=0.71, respectively). After four months phagocytotic count was significantly different between dietary treatments with mean values of 74.50 ± 10.52 and 63.52 ± 14.52 % phagocytosis count per sample for the probionts and control treatment, respectively (p=0.04), there was no difference after eight months at HIK Abalone Farm. There was no effect of stressor application (p=0.14) and no interaction between dietary treatment and stressor application for this variable i.e., phagocytosis count (p=0.61). There was no difference in feed conversion ratio between treatments with values ranging from 2.9 to 3.8. At Roman Bay Sea farm, there was no significant difference in mean length gain between abalone fed the probiotic and control diet after eight months (repeated measures ANOVA: F(4,28)=16.54. Mean weight gain of abalone fed the probiotic diet was significantly greater than those fed the control diet after eight months (repeated measures ANOVA: F(4,28)=39.82, p(0.00001). There was no significant difference in haemocyte counts between animals fed either probiotic or control diet after four and eight months at Roman Bay Sea farm (p>0.05).
- Full Text:
Towards a framework for building security operation centers
- Authors: Jacobs, Pierre Conrad
- Date: 2015
- Subjects: Security systems industry , Systems engineering , Expert systems (Computer science) , COBIT (Information technology management standard) , Computer security
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4710 , http://hdl.handle.net/10962/d1017932
- Description: In this thesis a framework for Security Operation Centers (SOCs) is proposed. It was developed by utilising Systems Engineering best practices, combined with industry-accepted standards and frameworks, such as the TM Forum’s eTOM framework, CoBIT, ITIL, and ISO/IEC 27002:2005. This framework encompasses the design considerations, the operational considerations and the means to measure the effectiveness and efficiency of SOCs. The intent is to provide guidance to consumers on how to compare and measure the capabilities of SOCs provided by disparate service providers, and to provide service providers (internal and external) a framework to use when building and improving their offerings. The importance of providing a consistent, measureable and guaranteed service to customers is becoming more important, as there is an increased focus on holistic management of security. This has in turn resulted in an increased number of both internal and managed service provider solutions. While some frameworks exist for designing, building and operating specific security technologies used within SOCs, we did not find any comprehensive framework for designing, building and managing SOCs. Consequently, consumers of SOCs do not enjoy a constant experience from vendors, and may experience inconsistent services from geographically dispersed offerings provided by the same vendor.
- Full Text:
- Authors: Jacobs, Pierre Conrad
- Date: 2015
- Subjects: Security systems industry , Systems engineering , Expert systems (Computer science) , COBIT (Information technology management standard) , Computer security
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4710 , http://hdl.handle.net/10962/d1017932
- Description: In this thesis a framework for Security Operation Centers (SOCs) is proposed. It was developed by utilising Systems Engineering best practices, combined with industry-accepted standards and frameworks, such as the TM Forum’s eTOM framework, CoBIT, ITIL, and ISO/IEC 27002:2005. This framework encompasses the design considerations, the operational considerations and the means to measure the effectiveness and efficiency of SOCs. The intent is to provide guidance to consumers on how to compare and measure the capabilities of SOCs provided by disparate service providers, and to provide service providers (internal and external) a framework to use when building and improving their offerings. The importance of providing a consistent, measureable and guaranteed service to customers is becoming more important, as there is an increased focus on holistic management of security. This has in turn resulted in an increased number of both internal and managed service provider solutions. While some frameworks exist for designing, building and operating specific security technologies used within SOCs, we did not find any comprehensive framework for designing, building and managing SOCs. Consequently, consumers of SOCs do not enjoy a constant experience from vendors, and may experience inconsistent services from geographically dispersed offerings provided by the same vendor.
- Full Text:
Towards an evaluation and protection strategy for critical infrastructure
- Authors: Gottschalk, Jason Howard
- Date: 2015
- Subjects: Computer crimes -- Prevention , Computer networks -- Security measures , Computer crimes -- Law and legislation -- South Africa , Public works -- Security measures
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4721 , http://hdl.handle.net/10962/d1018793
- Description: Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
- Full Text:
- Authors: Gottschalk, Jason Howard
- Date: 2015
- Subjects: Computer crimes -- Prevention , Computer networks -- Security measures , Computer crimes -- Law and legislation -- South Africa , Public works -- Security measures
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4721 , http://hdl.handle.net/10962/d1018793
- Description: Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
- Full Text:
Towards large scale software based network routing simulation
- Authors: Herbert, Alan
- Date: 2015
- Subjects: Routers (Computer networks) , Computer software , Linux
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4709 , http://hdl.handle.net/10962/d1017931
- Description: Software based routing simulators suffer from large simulation host requirements and are prone to slow downs because of resource limitations, as well as context switching due to user space to kernel space requests. Furthermore, hardware based simulations do not scale with the passing of time as their available resources are set at the time of manufacture. This research aims to provide a software based, scalable solution to network simulation. It aims to achieve this by a Linux kernel-based solution, through insertion of a custom kernel module. This will reduce the number of context switches by eliminating the user space context requirement, and serve to be highly compatible with any host that can run the Linux kernel. Through careful consideration in data structure choice and software component design, this routing simulator achieved results of over 7 Gbps of throughput over multiple simulated node hops on consumer hardware. Alongside this throughput, this routing simulator also brings to light scalability and the ability to instantiate and simulate networks in excess of 1 million routing nodes within 1 GB of system memory
- Full Text:
- Authors: Herbert, Alan
- Date: 2015
- Subjects: Routers (Computer networks) , Computer software , Linux
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4709 , http://hdl.handle.net/10962/d1017931
- Description: Software based routing simulators suffer from large simulation host requirements and are prone to slow downs because of resource limitations, as well as context switching due to user space to kernel space requests. Furthermore, hardware based simulations do not scale with the passing of time as their available resources are set at the time of manufacture. This research aims to provide a software based, scalable solution to network simulation. It aims to achieve this by a Linux kernel-based solution, through insertion of a custom kernel module. This will reduce the number of context switches by eliminating the user space context requirement, and serve to be highly compatible with any host that can run the Linux kernel. Through careful consideration in data structure choice and software component design, this routing simulator achieved results of over 7 Gbps of throughput over multiple simulated node hops on consumer hardware. Alongside this throughput, this routing simulator also brings to light scalability and the ability to instantiate and simulate networks in excess of 1 million routing nodes within 1 GB of system memory
- Full Text:
Using risk mitigation approaches to define the requirements for software escrow
- Authors: Rode, Karl
- Date: 2015
- Subjects: Escrows , Source code (Computer Science)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4714 , http://hdl.handle.net/10962/d1017936
- Description: Two or more parties entering into a contract for service or goods may make use of an escrow of the funds for payment to enable trust in the contract. In such an event the documents or financial instruments, the object(s) in escrow, are held in trust by a trusted third party (escrow provider) until the specified conditions are fulfilled. In the scenario of software escrow, the object of escrow is typically the source code, and the specified release conditions usually address potential scenarios wherein the software provider becomes unable to continue providing services (such as due to bankruptcy or a change in services provided, etc.) The subject of software escrow is not well documented in the academic body of work, with the largest information sources, active commentary and supporting papers provided by commercial software escrow providers, both in South Africa and abroad. This work maps the software escrow topic onto the King III compliance framework in South Africa. This is of value since any users of bespoke developed applications may require extended professional assistance to align with the King III guidelines. The supporting risk assessment model developed in this work will serve as a tool to evaluate and motivate for software escrow agreements. It will also provide an overview of the various escrow agreement types and will transfer the focus to the value proposition that they each hold. Initial research has indicated that current awareness of software escrow in industry is still very low. This was evidenced by the significant number of approached specialists that declined to participate in the survey due to their own admitted inexperience in applying the discipline of software escrow within their companies. Moreover, the participants that contributed to the research indicated that they only required software escrow for medium to highly critical applications. This proved the value of assessing the various risk factors that bespoke software development introduces, as well as the risk mitigation options available, through tools such as escrow, to reduce the actual and residual risk to a manageable level.
- Full Text:
- Authors: Rode, Karl
- Date: 2015
- Subjects: Escrows , Source code (Computer Science)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4714 , http://hdl.handle.net/10962/d1017936
- Description: Two or more parties entering into a contract for service or goods may make use of an escrow of the funds for payment to enable trust in the contract. In such an event the documents or financial instruments, the object(s) in escrow, are held in trust by a trusted third party (escrow provider) until the specified conditions are fulfilled. In the scenario of software escrow, the object of escrow is typically the source code, and the specified release conditions usually address potential scenarios wherein the software provider becomes unable to continue providing services (such as due to bankruptcy or a change in services provided, etc.) The subject of software escrow is not well documented in the academic body of work, with the largest information sources, active commentary and supporting papers provided by commercial software escrow providers, both in South Africa and abroad. This work maps the software escrow topic onto the King III compliance framework in South Africa. This is of value since any users of bespoke developed applications may require extended professional assistance to align with the King III guidelines. The supporting risk assessment model developed in this work will serve as a tool to evaluate and motivate for software escrow agreements. It will also provide an overview of the various escrow agreement types and will transfer the focus to the value proposition that they each hold. Initial research has indicated that current awareness of software escrow in industry is still very low. This was evidenced by the significant number of approached specialists that declined to participate in the survey due to their own admitted inexperience in applying the discipline of software escrow within their companies. Moreover, the participants that contributed to the research indicated that they only required software escrow for medium to highly critical applications. This proved the value of assessing the various risk factors that bespoke software development introduces, as well as the risk mitigation options available, through tools such as escrow, to reduce the actual and residual risk to a manageable level.
- Full Text:
Using the larval parasitoid, Agathis bishopi (Nixon) (Hymenoptera: Braconidae), for early detection of false codling moth, Thaumatotibia leucotreta (Meyrick) (Lepidoptera: Tortricidae) infested fruit
- Authors: Zimba, Kennedy Josaya
- Date: 2015
- Subjects: Cryptophlebia leucotreta , Citrus -- Diseases and pests -- South Africa , Pests -- Biological control -- South Africa , Cryptophlebia leucotreta -- Detection , Parasitoids -- Hosts , Braconidae
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5919 , http://hdl.handle.net/10962/d1017186
- Description: Thaumatotibia leucotreta (Meyrick) (Lepidoptera: Tortricidae) is one of the major citrus pests of economic importance for South Africa’s citrus industry. It is endemic to Africa, and therefore a phytosanitary pest with zero tolerance by most export markets. The cryptic nature of T. leucotreta makes visual inspection an inefficient method for detecting neonate larvae in fruit in the packhouse. Therefore, a more accurate method for sorting infested fruit at the packhouse, particularly for newly infested fruit could ensure market access. A recent study showed that fruit infested by T. leucotreta emit a chemical profile different from that of a healthy fruit. Several studies provide evidence that parasitoids locate their hosts feeding on fruit by exploiting the novel chemical profiles produced due to host herbivory. The aim of this study was to evaluate the potential of using the naturally occurring behaviour of a larval parasitoid Agathis bishopi (Nixon) (Hymenoptera: Braconidae) for detection of T. leucotreta infested fruit, by determining which compound in infested fruit is attractive to parasitoids. Ytube olfactometer and flight-tunnel bioassays with healthy and T. leucotreta infested fruit showed a significantly stronger response of A. bishopi female parasitoids to infested fruit. Among the volatile compounds associated with T. leucotreta infested fruit, D-limonene elicited the strongest attraction to A. bishopi female parasitoids. Attraction of mated A. bishopi female parasitoids to T. leucotreta infested fruit and D-limonene significantly increased after oviposition experience. Behavioural responses of A. bishopi female parasitoids that were associated with T. leucotreta infested fruit were investigated to determine which behaviours are distinct and interpretable. Probing and oviposition behaviours were the most noticeable and were only elicited on infested fruit when parasitoids contacted T. leucotreta frass, indicating that chemical compounds in frass are short-range cues used for final host location. Since production of D-limonene by fruit is elevated due to herbivory by different pests including mechanical injury on fruit, response of A. bishopi female parasitoids to compounds in frass offers a more specific and potentially useful mechanism for development of a detection system for T. leucotreta infested fruit. Chemical analysis of T. leucotreta frass and conditioning A. bishopi parasitoids to respond behaviourally to compounds in frass is proposed.
- Full Text:
- Authors: Zimba, Kennedy Josaya
- Date: 2015
- Subjects: Cryptophlebia leucotreta , Citrus -- Diseases and pests -- South Africa , Pests -- Biological control -- South Africa , Cryptophlebia leucotreta -- Detection , Parasitoids -- Hosts , Braconidae
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5919 , http://hdl.handle.net/10962/d1017186
- Description: Thaumatotibia leucotreta (Meyrick) (Lepidoptera: Tortricidae) is one of the major citrus pests of economic importance for South Africa’s citrus industry. It is endemic to Africa, and therefore a phytosanitary pest with zero tolerance by most export markets. The cryptic nature of T. leucotreta makes visual inspection an inefficient method for detecting neonate larvae in fruit in the packhouse. Therefore, a more accurate method for sorting infested fruit at the packhouse, particularly for newly infested fruit could ensure market access. A recent study showed that fruit infested by T. leucotreta emit a chemical profile different from that of a healthy fruit. Several studies provide evidence that parasitoids locate their hosts feeding on fruit by exploiting the novel chemical profiles produced due to host herbivory. The aim of this study was to evaluate the potential of using the naturally occurring behaviour of a larval parasitoid Agathis bishopi (Nixon) (Hymenoptera: Braconidae) for detection of T. leucotreta infested fruit, by determining which compound in infested fruit is attractive to parasitoids. Ytube olfactometer and flight-tunnel bioassays with healthy and T. leucotreta infested fruit showed a significantly stronger response of A. bishopi female parasitoids to infested fruit. Among the volatile compounds associated with T. leucotreta infested fruit, D-limonene elicited the strongest attraction to A. bishopi female parasitoids. Attraction of mated A. bishopi female parasitoids to T. leucotreta infested fruit and D-limonene significantly increased after oviposition experience. Behavioural responses of A. bishopi female parasitoids that were associated with T. leucotreta infested fruit were investigated to determine which behaviours are distinct and interpretable. Probing and oviposition behaviours were the most noticeable and were only elicited on infested fruit when parasitoids contacted T. leucotreta frass, indicating that chemical compounds in frass are short-range cues used for final host location. Since production of D-limonene by fruit is elevated due to herbivory by different pests including mechanical injury on fruit, response of A. bishopi female parasitoids to compounds in frass offers a more specific and potentially useful mechanism for development of a detection system for T. leucotreta infested fruit. Chemical analysis of T. leucotreta frass and conditioning A. bishopi parasitoids to respond behaviourally to compounds in frass is proposed.
- Full Text:
Variation in breeding systems, floral morphology and nectar properties in three co-occurring Erica species with contrasting pollination syndromes
- Authors: Lombardi, Giorgio Colombo
- Date: 2015
- Subjects: Ericas -- South Africa -- Western Cape , Ericas -- Morphology , Ericas -- Reproduction , Ericas -- Pollination , Pollination by animals , Pollination by insects , Nectar
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4273 , http://hdl.handle.net/10962/d1018567
- Description: The genus Erica is the most species rich in the Cape Floristic Kingdom, yet there are limited data on the various flower-pollinator interactions and breeding systems for the majority of these species. Until recently research has focussed on predictive floral traits, including flower shape, length of corolla and corolla opening to identify likely pollinators in this genus. Field observations provide an empirical test of such predictions. This study investigated three species of Erica and compared their pollination and breeding systems and floral biology. Research, including field experiments and pollinator observations was undertaken in the Vogelgat Private Nature Reserve, Maanschynkop Nature Reserve and Boskloof farm in the vicinity of Hermanus in the Western Cape Province of South Africa. Field observations were conducted to determine what flower- visitor interactions occurred, while nectar volumes and sugar concentrations were measured to determine the value of the reward to the different visitors. Selective exclusion and breeding system experiments were carried out to determine whether these Erica species were capable of autonomous self-fertilization or whether they are pollinator dependent for breeding success. The unusual morphology of Erica lanuginosa suggested rodent-pollination. Field observations, including photographs of visits to plants in the field, the presence of pollen in scat sample and selective exclusion and breeding system experiments identified rodents, primarily Acomys subspinosus to be the primary pollinator. Long-proboscid flies of the family Nemestrinidae were found, on the basis of field observations to be responsible for pollination of the endemic Erica aristata. This was supported by with nectar volume and sugar concentration samples which are consistent with other long-proboscid fly-pollinated plant species. Selective exclusion and breeding system experiments undertaken confirmed that Erica aristata required a pollinator to set seed. Observations and breeding trials revealed bird-pollination in Erica sessiliflora. Nectar volume and sugar concentrations in Erica sessiliflora were in line with other sunbird-pollinated plant species, providing the necessary rewards for sunbirds visiting this species. Specialised pollination by single pollinators was found in all three species and results from breeding system experiments show that out-crossing is important. Further research into pollinator-flower interactions in the genus Erica is necessary, not least to understand more fully the conservation importance of specific pollinators.
- Full Text:
- Authors: Lombardi, Giorgio Colombo
- Date: 2015
- Subjects: Ericas -- South Africa -- Western Cape , Ericas -- Morphology , Ericas -- Reproduction , Ericas -- Pollination , Pollination by animals , Pollination by insects , Nectar
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4273 , http://hdl.handle.net/10962/d1018567
- Description: The genus Erica is the most species rich in the Cape Floristic Kingdom, yet there are limited data on the various flower-pollinator interactions and breeding systems for the majority of these species. Until recently research has focussed on predictive floral traits, including flower shape, length of corolla and corolla opening to identify likely pollinators in this genus. Field observations provide an empirical test of such predictions. This study investigated three species of Erica and compared their pollination and breeding systems and floral biology. Research, including field experiments and pollinator observations was undertaken in the Vogelgat Private Nature Reserve, Maanschynkop Nature Reserve and Boskloof farm in the vicinity of Hermanus in the Western Cape Province of South Africa. Field observations were conducted to determine what flower- visitor interactions occurred, while nectar volumes and sugar concentrations were measured to determine the value of the reward to the different visitors. Selective exclusion and breeding system experiments were carried out to determine whether these Erica species were capable of autonomous self-fertilization or whether they are pollinator dependent for breeding success. The unusual morphology of Erica lanuginosa suggested rodent-pollination. Field observations, including photographs of visits to plants in the field, the presence of pollen in scat sample and selective exclusion and breeding system experiments identified rodents, primarily Acomys subspinosus to be the primary pollinator. Long-proboscid flies of the family Nemestrinidae were found, on the basis of field observations to be responsible for pollination of the endemic Erica aristata. This was supported by with nectar volume and sugar concentration samples which are consistent with other long-proboscid fly-pollinated plant species. Selective exclusion and breeding system experiments undertaken confirmed that Erica aristata required a pollinator to set seed. Observations and breeding trials revealed bird-pollination in Erica sessiliflora. Nectar volume and sugar concentrations in Erica sessiliflora were in line with other sunbird-pollinated plant species, providing the necessary rewards for sunbirds visiting this species. Specialised pollination by single pollinators was found in all three species and results from breeding system experiments show that out-crossing is important. Further research into pollinator-flower interactions in the genus Erica is necessary, not least to understand more fully the conservation importance of specific pollinators.
- Full Text:
Visualisation of PF firewall logs using open source
- Authors: Coetzee, Dirk
- Date: 2015
- Subjects: Open source software -- South Africa , Firewalls (Computer security) -- South Africa , Data logging -- South Africa , Data integrity -- South Africa , Data protection -- South Africa , Computer crimes -- South Africa , Hacktivism
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4719 , http://hdl.handle.net/10962/d1018552
- Description: If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the opportunity to find the mistake or fault in the organisation’s defence systems. Historically, it remains difficult to choose what logs are required by your organization. A number of questions should be considered: should a centralised or decentralised approach for collecting these logs be followed or a combination of both? How many events will be collected, how much additional bandwidth will be required and will the log collection be near real time? How long must the logs be saved and what if any hashing and encryption (integrity of data) should be used? Lastly, what system must be used to correlate, analyse, and make alerts and reports available? This thesis will address these myriad questions, examining the current lack of log analysis, practical implementations in modern organisation, and also how a need for the latter can be fulfilled by means of a basic approach. South African organizations must use technology that is at hand in order to know what electronic data are sent in and out of their organizations network. Concentrating only on FreeBSD PF firewall logs, it is demonstrated within this thesis the excellent results are possible when logs are collected to obtain a visual display of what data is traversing the corporate network and which parts of this data are posing a threat to the corporate network. This threat is easily determined via a visual interpretation of statistical outliers. This thesis aims to show that in the field of corporate data protection, if you can measure, you can manage.
- Full Text:
- Authors: Coetzee, Dirk
- Date: 2015
- Subjects: Open source software -- South Africa , Firewalls (Computer security) -- South Africa , Data logging -- South Africa , Data integrity -- South Africa , Data protection -- South Africa , Computer crimes -- South Africa , Hacktivism
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4719 , http://hdl.handle.net/10962/d1018552
- Description: If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the opportunity to find the mistake or fault in the organisation’s defence systems. Historically, it remains difficult to choose what logs are required by your organization. A number of questions should be considered: should a centralised or decentralised approach for collecting these logs be followed or a combination of both? How many events will be collected, how much additional bandwidth will be required and will the log collection be near real time? How long must the logs be saved and what if any hashing and encryption (integrity of data) should be used? Lastly, what system must be used to correlate, analyse, and make alerts and reports available? This thesis will address these myriad questions, examining the current lack of log analysis, practical implementations in modern organisation, and also how a need for the latter can be fulfilled by means of a basic approach. South African organizations must use technology that is at hand in order to know what electronic data are sent in and out of their organizations network. Concentrating only on FreeBSD PF firewall logs, it is demonstrated within this thesis the excellent results are possible when logs are collected to obtain a visual display of what data is traversing the corporate network and which parts of this data are posing a threat to the corporate network. This threat is easily determined via a visual interpretation of statistical outliers. This thesis aims to show that in the field of corporate data protection, if you can measure, you can manage.
- Full Text:
What limits an invasive biotic and abiotic effects on the distribution of the invasive mussel mytilus galloprovincialis on the South African coastline
- Authors: Hall, Madison
- Date: 2015
- Subjects: Perna , Mytilus galloprovincialis , Mussels -- South Africa , Introduced organisms -- Environmental aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5927 , http://hdl.handle.net/10962/d1017805
- Full Text:
- Authors: Hall, Madison
- Date: 2015
- Subjects: Perna , Mytilus galloprovincialis , Mussels -- South Africa , Introduced organisms -- Environmental aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5927 , http://hdl.handle.net/10962/d1017805
- Full Text:
Woody species composition and congregant appreciation of the cultural and spiritual services provided by cemeteries and church gardens in Grahamstown, South Africa
- Authors: De Lacy, Peter James Gerard
- Date: 2015
- Subjects: Plants -- Religious aspects , Cemeteries -- South Africa -- Grahamstown , Woody plants -- South Africa -- Grahamstown , Church gardens -- South Africa -- Grahamstown
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4783 , http://hdl.handle.net/10962/d1016401
- Description: Urbanization has increased rapidly throughout the world. The densification of urban areas has greatly reduced the number of natural areas occurring within the urban environment as well as impacting the ecosystem services that these areas provide. Urban greening and sustainable practices have been advocated as a means to once again provide the urban population with ecosystem services. Sacred natural areas that occur in surrounding forest, temple and cemetery sites have been known harbour a variety of biological diversity, as well as provide people with a number of cultural and spiritual benefits. Much of the literature on sacred natural sites comes from rural or eastern countries, leaving a large gap in the knowledge pertaining to information on these sites in both developed nations as well as urban areas. The aim of this study was to determine the abundance and composition of woody species, as well as the spiritual and cultural significance of sacred natural sites in Grahamstown. This study defined a sacred urban area as any form of garden surrounding a church, temple or mosque, as well as cemeteries. It looked at a total of 28 church gardens, one Hindu garden, one Mosque garden and five cemeteries in Grahamstown, South Africa. For each site the area was calculated and a tree and shrub inventory was done for all individuals above 1.5 m tall. Church/cemetery age, denomination and appearance were recorded as well as soil samples collected. An ordination of the data was done to summarize the community data, relating the community variation to environmental gradients. Questionnaires were completed by congregants who attended a religious building with a garden, as well as those that were not surrounded by a garden. These questionnaires were used to determine the cultural, spiritual and aesthetic value of trees and the sacred area, as well as the perceived and felt benefits that these areas provide. Those that were completed by congregants without gardens looked to find out whether or not it was believed that these areas would improve their experiences. There was an average plant density of 106.1 woody plants per hectare, with a total of 139 different species encountered. Of these, 56 percent were exotic species. This is slightly lower than that of studies done elsewhere in the world, but may be due to the omission of non-woody ornamentals and lawn species in this study. Of the top 11 most frequently occurring species, only two were indigenous. There was generally low similarity between plant assemblages found at the different sites. A significantly positive relationship was found between site size and woody plant basal area as well as the total number of woody plants. Site age and religious denomination had little influence on woody plant density, basal area, species richness or woody plant abundance. Congregants stated that a garden surrounding a religious building improved both their spiritual and aesthetic experiences. Stated spiritual and aesthetic experience was significantly influenced by basal area, while abundance significantly influenced stated aesthetic experience. Greenery was therefore important to many of the congregants, however, the species that were present were less influential. A greater sample size from a variety of religions and sacred areas within urban environments throughout the world would prove to be an interesting comparison for future research.
- Full Text:
- Authors: De Lacy, Peter James Gerard
- Date: 2015
- Subjects: Plants -- Religious aspects , Cemeteries -- South Africa -- Grahamstown , Woody plants -- South Africa -- Grahamstown , Church gardens -- South Africa -- Grahamstown
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4783 , http://hdl.handle.net/10962/d1016401
- Description: Urbanization has increased rapidly throughout the world. The densification of urban areas has greatly reduced the number of natural areas occurring within the urban environment as well as impacting the ecosystem services that these areas provide. Urban greening and sustainable practices have been advocated as a means to once again provide the urban population with ecosystem services. Sacred natural areas that occur in surrounding forest, temple and cemetery sites have been known harbour a variety of biological diversity, as well as provide people with a number of cultural and spiritual benefits. Much of the literature on sacred natural sites comes from rural or eastern countries, leaving a large gap in the knowledge pertaining to information on these sites in both developed nations as well as urban areas. The aim of this study was to determine the abundance and composition of woody species, as well as the spiritual and cultural significance of sacred natural sites in Grahamstown. This study defined a sacred urban area as any form of garden surrounding a church, temple or mosque, as well as cemeteries. It looked at a total of 28 church gardens, one Hindu garden, one Mosque garden and five cemeteries in Grahamstown, South Africa. For each site the area was calculated and a tree and shrub inventory was done for all individuals above 1.5 m tall. Church/cemetery age, denomination and appearance were recorded as well as soil samples collected. An ordination of the data was done to summarize the community data, relating the community variation to environmental gradients. Questionnaires were completed by congregants who attended a religious building with a garden, as well as those that were not surrounded by a garden. These questionnaires were used to determine the cultural, spiritual and aesthetic value of trees and the sacred area, as well as the perceived and felt benefits that these areas provide. Those that were completed by congregants without gardens looked to find out whether or not it was believed that these areas would improve their experiences. There was an average plant density of 106.1 woody plants per hectare, with a total of 139 different species encountered. Of these, 56 percent were exotic species. This is slightly lower than that of studies done elsewhere in the world, but may be due to the omission of non-woody ornamentals and lawn species in this study. Of the top 11 most frequently occurring species, only two were indigenous. There was generally low similarity between plant assemblages found at the different sites. A significantly positive relationship was found between site size and woody plant basal area as well as the total number of woody plants. Site age and religious denomination had little influence on woody plant density, basal area, species richness or woody plant abundance. Congregants stated that a garden surrounding a religious building improved both their spiritual and aesthetic experiences. Stated spiritual and aesthetic experience was significantly influenced by basal area, while abundance significantly influenced stated aesthetic experience. Greenery was therefore important to many of the congregants, however, the species that were present were less influential. A greater sample size from a variety of religions and sacred areas within urban environments throughout the world would prove to be an interesting comparison for future research.
- Full Text: