Beauveria and Metarhizium against false codling moth (Lepidoptera: Tortricidae): a step towards selecting isolates for potential development of a mycoinsecticide
- Coombes, Candice A, Hill, Martin P, Moore, Sean D, Dames, Joanna F, Fullard, T
- Authors: Coombes, Candice A , Hill, Martin P , Moore, Sean D , Dames, Joanna F , Fullard, T
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/405757 , vital:70203 , xlink:href="https://hdl.handle.net/10520/EJC167505"
- Description: False codling moth, Thaumatotibia leucotreta Meyrick (1912) (Lepidoptera: Tortricidae), can cause both pre- and post-harvest damage to citrus fruit. Not only can this result in reduced crop yield, but more importantly because of the moth's endemism to sub-Saharan Africa, it is classified as a phytosanitary pest by many export markets. An entire consignment of citrus may be rejected in the presence of a single moth (Moore 2012). Since the bulk of citrus fruit production in South Africa is exported, the control of T. leucotreta is critical (Citrus Growers Association, South Africa 2012). Traditionally, control has been achieved through the use of chemical insecticides; however, residue restrictions, resistance development and concerns about environmental pollution have substantially reduced the dependence on chemical pesticides in citrus. Research on T. leucotreta control has therefore focused on the use of biological organisms (e.g. parasitoids and viruses), which are used as control agents within an integrated pest management (IPM) programme in citrus. These biological control agents, however, only targeted the aboveground life stages of the pest, not the soil-dwelling life stages (late fifth instars, prepupae, pupae), which is the subject of this contribution (Moore 2012).
- Full Text:
- Date Issued: 2015
- Authors: Coombes, Candice A , Hill, Martin P , Moore, Sean D , Dames, Joanna F , Fullard, T
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/405757 , vital:70203 , xlink:href="https://hdl.handle.net/10520/EJC167505"
- Description: False codling moth, Thaumatotibia leucotreta Meyrick (1912) (Lepidoptera: Tortricidae), can cause both pre- and post-harvest damage to citrus fruit. Not only can this result in reduced crop yield, but more importantly because of the moth's endemism to sub-Saharan Africa, it is classified as a phytosanitary pest by many export markets. An entire consignment of citrus may be rejected in the presence of a single moth (Moore 2012). Since the bulk of citrus fruit production in South Africa is exported, the control of T. leucotreta is critical (Citrus Growers Association, South Africa 2012). Traditionally, control has been achieved through the use of chemical insecticides; however, residue restrictions, resistance development and concerns about environmental pollution have substantially reduced the dependence on chemical pesticides in citrus. Research on T. leucotreta control has therefore focused on the use of biological organisms (e.g. parasitoids and viruses), which are used as control agents within an integrated pest management (IPM) programme in citrus. These biological control agents, however, only targeted the aboveground life stages of the pest, not the soil-dwelling life stages (late fifth instars, prepupae, pupae), which is the subject of this contribution (Moore 2012).
- Full Text:
- Date Issued: 2015
Being a Born Free: the misunderstandings and missed opportunities facing young South Africans
- Authors: Malila, Vanessa
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158680 , vital:40220 , https://hdl.handle.net/10520/EJC175765
- Description: Young South Africans are often referred to as the Born Frees - a term which sometimes means people born after 1994, sometimes people born after 1990, or young people who came of age politically after 1994. I've come to really dislike the term Born Frees and particularly the way it is used by the media and the politicians. By calling young people Born Frees, society is using apartheid as a reference point to identify a post-apartheid generation. This reference point (the transition to a 'free' society) unfortunately does not resonate with many of the young people that I've encountered in my research and many feel insulted by the implications of this term, which does not apply to them in any way. Should South African society really be using the transition from apartheid to define its young people and how does it relate to the lives of real young people in South Africa today? Are they really Born Free, free from what, free to do what, free individuals or free as a collective? I will look at some of the stereotypes being used in the mainstream media of Born Frees, and then look at the reaction to this term by some real young South Africans.
- Full Text:
- Date Issued: 2015
- Authors: Malila, Vanessa
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158680 , vital:40220 , https://hdl.handle.net/10520/EJC175765
- Description: Young South Africans are often referred to as the Born Frees - a term which sometimes means people born after 1994, sometimes people born after 1990, or young people who came of age politically after 1994. I've come to really dislike the term Born Frees and particularly the way it is used by the media and the politicians. By calling young people Born Frees, society is using apartheid as a reference point to identify a post-apartheid generation. This reference point (the transition to a 'free' society) unfortunately does not resonate with many of the young people that I've encountered in my research and many feel insulted by the implications of this term, which does not apply to them in any way. Should South African society really be using the transition from apartheid to define its young people and how does it relate to the lives of real young people in South Africa today? Are they really Born Free, free from what, free to do what, free individuals or free as a collective? I will look at some of the stereotypes being used in the mainstream media of Born Frees, and then look at the reaction to this term by some real young South Africans.
- Full Text:
- Date Issued: 2015
Blind spots: trickery and the'opaque stickiness' of seeing
- Authors: Simbao, Ruth K
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147303 , vital:38624 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC176319
- Description: In a flash the spot will disappear, and in its place - and this is the interesting thing - there is nothing. According to experimental psychology, the eye does not fill in the blind spot, but tricks us into thinking that it has been filled. The blind spot is pure absence of vision, and cannot be experienced at all. The blind spot is an invisible absence : an absence whose invisibility is itself invisible (Elkins 1996 : 170).
- Full Text:
- Date Issued: 2015
- Authors: Simbao, Ruth K
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147303 , vital:38624 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC176319
- Description: In a flash the spot will disappear, and in its place - and this is the interesting thing - there is nothing. According to experimental psychology, the eye does not fill in the blind spot, but tricks us into thinking that it has been filled. The blind spot is pure absence of vision, and cannot be experienced at all. The blind spot is an invisible absence : an absence whose invisibility is itself invisible (Elkins 1996 : 170).
- Full Text:
- Date Issued: 2015
Book Review Growing the next generation of researchers: A handbook for emerging researchers and their mentors, Holness, L
- Motshoane, Puleng, Muthama, Evelyn, McKenna, Sioux
- Authors: Motshoane, Puleng , Muthama, Evelyn , McKenna, Sioux
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/187205 , vital:44579 , xlink:href="https://doi.org/10.14426/cristal.v3i2.56"
- Description: South Africa urgently needs more researchers (NRF, 2008; NDP, 2011). We also need a transformation in the demographics of our researchers. One indicator of this is that currently only 14% of university professors are black African, and only 2% are black African females (DHET, 2012). The Staffing South Africa's Universities Framework includes a number of initiatives to drive the process of growing the next generation of academics. For example, the nGAP project has inserted 125 new posts into the higher education system in 2015, with more to follow. This project allows for new academics to undertake postgraduate study and develop as teachers and researchers through mentorship, a reduced teaching load and so on.
- Full Text:
- Date Issued: 2015
- Authors: Motshoane, Puleng , Muthama, Evelyn , McKenna, Sioux
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/187205 , vital:44579 , xlink:href="https://doi.org/10.14426/cristal.v3i2.56"
- Description: South Africa urgently needs more researchers (NRF, 2008; NDP, 2011). We also need a transformation in the demographics of our researchers. One indicator of this is that currently only 14% of university professors are black African, and only 2% are black African females (DHET, 2012). The Staffing South Africa's Universities Framework includes a number of initiatives to drive the process of growing the next generation of academics. For example, the nGAP project has inserted 125 new posts into the higher education system in 2015, with more to follow. This project allows for new academics to undertake postgraduate study and develop as teachers and researchers through mentorship, a reduced teaching load and so on.
- Full Text:
- Date Issued: 2015
Book Review: A Renegade called Simphiwe
- Authors: Magadla, Siphokazi
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/298595 , vital:57719 , xlink:href="https://doi.org/10.1177/0021909614533638"
- Description: A Renegade called Simphiwe is a “creative-intellectual portrait” of the public (and private) life of the musician Simphiwe Dana (p. 150). Gqola defines the book as “one writer’s engagement with the Simphiwe Dana of the South African public imagination [who]… troubles many categories of belonging in the South African public imagination in remarkable ways” (pp. 17, 32). The book comes at a poignant time as South Africa reflects on the success and challenges of the first 20 years of democracy. Fittingly, Gqola positions Dana within a long tradition of griots in Africa whose art always spoke truth to power.
- Full Text:
- Date Issued: 2015
- Authors: Magadla, Siphokazi
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/298595 , vital:57719 , xlink:href="https://doi.org/10.1177/0021909614533638"
- Description: A Renegade called Simphiwe is a “creative-intellectual portrait” of the public (and private) life of the musician Simphiwe Dana (p. 150). Gqola defines the book as “one writer’s engagement with the Simphiwe Dana of the South African public imagination [who]… troubles many categories of belonging in the South African public imagination in remarkable ways” (pp. 17, 32). The book comes at a poignant time as South Africa reflects on the success and challenges of the first 20 years of democracy. Fittingly, Gqola positions Dana within a long tradition of griots in Africa whose art always spoke truth to power.
- Full Text:
- Date Issued: 2015
Book Review: Global Governance and the New Wars
- Authors: Magadla, Siphokazi
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/298640 , vital:57723 , xlink:href="https://doi.org/10.1080/02589346.2015.1008676"
- Description: Mark Duffield's second edition of ‘Global Governance and the New Wars’ offers an important and biting critique of how different actors within the security and development discourse have adapted to the various transformations of war in the post-cold war era. In this picture drawn by Duffield, the power of states in the South continues to be eroded by an exclusionary market that is driven by the global political economy wherein state's development and security responsibilities are increasingly assumed by non-state actors (predominately constituted by Western aid agencies). Those who fall outside the bounds of the state, development and humanitarian aid agencies can be found operating in an expanding shadow economy that is also shaped by a global dynamics which make the conditions for ‘network war' possible. In this context, the lines between ‘war' and peace” are difficult to distinguish. Overall, the book paints a depressing picture on the lack of substantive changes in the livelihoods of the poor as attention has been directed to discussions about ‘new wars' or altered forms of violence that have characterized the post-cold war era. The book unforgivingly exposes the failures of the discursive changes post-cold war to reconceptualize development and security in terms that move beyond description and into substantive change especially regarding shifting the development discourse from its historic modernizing impulses.
- Full Text:
- Date Issued: 2015
- Authors: Magadla, Siphokazi
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/298640 , vital:57723 , xlink:href="https://doi.org/10.1080/02589346.2015.1008676"
- Description: Mark Duffield's second edition of ‘Global Governance and the New Wars’ offers an important and biting critique of how different actors within the security and development discourse have adapted to the various transformations of war in the post-cold war era. In this picture drawn by Duffield, the power of states in the South continues to be eroded by an exclusionary market that is driven by the global political economy wherein state's development and security responsibilities are increasingly assumed by non-state actors (predominately constituted by Western aid agencies). Those who fall outside the bounds of the state, development and humanitarian aid agencies can be found operating in an expanding shadow economy that is also shaped by a global dynamics which make the conditions for ‘network war' possible. In this context, the lines between ‘war' and peace” are difficult to distinguish. Overall, the book paints a depressing picture on the lack of substantive changes in the livelihoods of the poor as attention has been directed to discussions about ‘new wars' or altered forms of violence that have characterized the post-cold war era. The book unforgivingly exposes the failures of the discursive changes post-cold war to reconceptualize development and security in terms that move beyond description and into substantive change especially regarding shifting the development discourse from its historic modernizing impulses.
- Full Text:
- Date Issued: 2015
Brown hyena habitat selection varies among sites in a semi-arid region of southern Africa
- Welch, Rebecca J, Tambling, Craig J, Bissett, Charlene, Gaylard, Angela, Müller, Konrad, Slater, Kerry, Strauss, W Maartin, Parker, Daniel M
- Authors: Welch, Rebecca J , Tambling, Craig J , Bissett, Charlene , Gaylard, Angela , Müller, Konrad , Slater, Kerry , Strauss, W Maartin , Parker, Daniel M
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123277 , vital:35423 , https://doi.10.1093/jmammal/gyv189
- Description: In the last 50 years, the human impact on ecosystems has been greater than during any other time period in human history (Millennium Ecosystem Assessment 2003). Large carnivores face anthropogenic threats worldwide, specifically persecution, habitat degradation, and habitat fragmentation (Everatt et al. 2014; Groom et al. 2014; Ripple et al. 2014; Wolfe et al. 2015). Because large carnivores often occupy high trophic levels, their presence influences species at lower levels through trophic cascades (Ripple et al. 2014). Natural experiments, taking advantage of large carnivore management, have shown that large predators provide fundamental ecosystem and economic services that help maintain healthy and diverse ecosystems (Ripple et al. 2014). Additionally, carnivores play an important role in other ecosystem processes, for example, scavenging carnivores may provide regulatory services, such as waste removal, nutrient cycling, and disease regulation. Such services add stability to ecosystems and ensure energy flow through multiple trophic levels (DeVault et al. 2003; Wilson and Wolkovich 2011).
- Full Text:
- Date Issued: 2015
- Authors: Welch, Rebecca J , Tambling, Craig J , Bissett, Charlene , Gaylard, Angela , Müller, Konrad , Slater, Kerry , Strauss, W Maartin , Parker, Daniel M
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123277 , vital:35423 , https://doi.10.1093/jmammal/gyv189
- Description: In the last 50 years, the human impact on ecosystems has been greater than during any other time period in human history (Millennium Ecosystem Assessment 2003). Large carnivores face anthropogenic threats worldwide, specifically persecution, habitat degradation, and habitat fragmentation (Everatt et al. 2014; Groom et al. 2014; Ripple et al. 2014; Wolfe et al. 2015). Because large carnivores often occupy high trophic levels, their presence influences species at lower levels through trophic cascades (Ripple et al. 2014). Natural experiments, taking advantage of large carnivore management, have shown that large predators provide fundamental ecosystem and economic services that help maintain healthy and diverse ecosystems (Ripple et al. 2014). Additionally, carnivores play an important role in other ecosystem processes, for example, scavenging carnivores may provide regulatory services, such as waste removal, nutrient cycling, and disease regulation. Such services add stability to ecosystems and ensure energy flow through multiple trophic levels (DeVault et al. 2003; Wilson and Wolkovich 2011).
- Full Text:
- Date Issued: 2015
Can perceptions of environmental and climate change in island communities assist in adaptation planning locally?
- Aswani, Shankar, Vaccaro, Ismael, Abernethy, Kirsten Elizabeth, Albert, Simon, de Pablo, Javier Fernández-López
- Authors: Aswani, Shankar , Vaccaro, Ismael , Abernethy, Kirsten Elizabeth , Albert, Simon , de Pablo, Javier Fernández-López
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123310 , vital:35426 , https://doi.10.1007/s00267-015-0572-3
- Description: Local perceptions of environmental and climate change, as well as associated adaptations made by local populations, are fundamental for designing comprehensive and inclusive mitigation and adaptation plans both locally and nationally. In this paper, we analyze people’s perceptions of environmental and climate-related transformations in communities across the Western Solomon Islands through ethnographic and geospatial methods. Specifically, we documented people’s observed changes over the past decades across various environmental domains, and for each change, we asked respondents to identify the causes, timing, and people’s adaptive responses. We also incorporated this information into a geographical information system database to produce broad-scale base maps of local perceptions of environmental change. Results suggest that people detected changes that tended to be acute (e.g., water clarity, logging intensity, and agricultural diseases). We inferred from these results that most local observations of and adaptations to change were related to parts of environment/ecosystem that are most directly or indirectly related to harvesting strategies. On the other hand, people were less aware of slower insidious/chronic changes identified by scientific studies. For the Solomon Islands and similar contexts in the insular tropics, a broader anticipatory adaptation planning strategy to climate change should include a mix of local scientific studies and local observations of ongoing ecological changes.
- Full Text:
- Date Issued: 2015
- Authors: Aswani, Shankar , Vaccaro, Ismael , Abernethy, Kirsten Elizabeth , Albert, Simon , de Pablo, Javier Fernández-López
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123310 , vital:35426 , https://doi.10.1007/s00267-015-0572-3
- Description: Local perceptions of environmental and climate change, as well as associated adaptations made by local populations, are fundamental for designing comprehensive and inclusive mitigation and adaptation plans both locally and nationally. In this paper, we analyze people’s perceptions of environmental and climate-related transformations in communities across the Western Solomon Islands through ethnographic and geospatial methods. Specifically, we documented people’s observed changes over the past decades across various environmental domains, and for each change, we asked respondents to identify the causes, timing, and people’s adaptive responses. We also incorporated this information into a geographical information system database to produce broad-scale base maps of local perceptions of environmental change. Results suggest that people detected changes that tended to be acute (e.g., water clarity, logging intensity, and agricultural diseases). We inferred from these results that most local observations of and adaptations to change were related to parts of environment/ecosystem that are most directly or indirectly related to harvesting strategies. On the other hand, people were less aware of slower insidious/chronic changes identified by scientific studies. For the Solomon Islands and similar contexts in the insular tropics, a broader anticipatory adaptation planning strategy to climate change should include a mix of local scientific studies and local observations of ongoing ecological changes.
- Full Text:
- Date Issued: 2015
Caring for a child with disabilities: a psychosocial case study
- Saville Young, Lisa, Berry, Jessie
- Authors: Saville Young, Lisa , Berry, Jessie
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143860 , vital:38289 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: This paper presents a psychosocial analysis of an interview with a mother of a child with disabilities. A psychosocial perspective (conceptualizing the subject as both discursively and psychically constituted) has been argued for recently in critical disability studies by Goodley (2011) who advocates for psychoanalysis’ rich vocabulary for affective processes to explore the emotional elements of disablism, where disablism refers to ways in which society discriminates against people with disabilities (‘barriers out there’). While rejecting the use of psychoanalytic theory to pathologise and individualise people with disabilities, Goodley argues that how “oppression is felt psychically, subjectively and emotionally” (p.716) (‘barriers in here’) should not be overlooked, alongside subjectivity as always socially, politically, culturally and economically produced. This psychosocial analysis of a carer’s perspective thickens our understanding of how the caregiver is a social being, both not disabled but at the receiving end of disablism, and an interpersonal subject who may also be an ‘agent’ or ‘carrier’ of disablism.
- Full Text:
- Date Issued: 2015
- Authors: Saville Young, Lisa , Berry, Jessie
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143860 , vital:38289 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: This paper presents a psychosocial analysis of an interview with a mother of a child with disabilities. A psychosocial perspective (conceptualizing the subject as both discursively and psychically constituted) has been argued for recently in critical disability studies by Goodley (2011) who advocates for psychoanalysis’ rich vocabulary for affective processes to explore the emotional elements of disablism, where disablism refers to ways in which society discriminates against people with disabilities (‘barriers out there’). While rejecting the use of psychoanalytic theory to pathologise and individualise people with disabilities, Goodley argues that how “oppression is felt psychically, subjectively and emotionally” (p.716) (‘barriers in here’) should not be overlooked, alongside subjectivity as always socially, politically, culturally and economically produced. This psychosocial analysis of a carer’s perspective thickens our understanding of how the caregiver is a social being, both not disabled but at the receiving end of disablism, and an interpersonal subject who may also be an ‘agent’ or ‘carrier’ of disablism.
- Full Text:
- Date Issued: 2015
Characterization and analysis of NTP amplification based DDoS attacks
- Rudman, Lauren, Irwin, Barry V W
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429285 , vital:72573 , 10.1109/ISSA.2015.7335069
- Description: Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.
- Full Text:
- Date Issued: 2015
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429285 , vital:72573 , 10.1109/ISSA.2015.7335069
- Description: Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.
- Full Text:
- Date Issued: 2015
Characterization of porphyrin nanorods on fluorine doped tin oxide glass sheet
- George, Reama C, Falgenhauer, Jane, Geis, Clemens, Nyokong, Tebello, Schlettwein, Derck
- Authors: George, Reama C , Falgenhauer, Jane , Geis, Clemens , Nyokong, Tebello , Schlettwein, Derck
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/193542 , vital:45344 , xlink:href="https://doi.org/10.1142/S1088424615500923"
- Description: Porphyrin nanorods (PNR) have been fabricated by electrostatic self-assembly of two oppositely charged porphyrin molecules. The free base meso-tetra-(4-phenylsulphonate) porphyrin (TPPS4)4) served as negatively charged counterpart for the positively charged metallo meso-tetra(4-NN-methylpyridyl) porphyrins (MTM’PyP) with either Sn, Co, Mn or In as central metal M. Films of PNR were prepared on fluorine doped tin oxide glass sheets (FTO) by using a drop-dry method. The electronic spectra revealed J-aggregation of the charged molecules for the colloid PNR as well as for the films. Transmission electron microscopy confirmed the formation of porphyrin nanorods. The laser microscope and scanning electron microscope (SEM) images of the PNR/FTO films showed the formation of three kinds of structures in the films which consist of differently branched or linear needles with their main axis grown in the direction of the solvent flow during preparation. During cyclic voltammetry either applying negative potentials from 0.0 V to -1.0 V or positive potentials from 0.0 V to ++2.2 V irreversible reduction or oxidation reactions were detected for the films. Consistently, SEM images taken following cyclic voltammetry showed the disintegration of the PNR on the films into smaller subunits. Spectroelectrochemical measurements showed the formation of porphyrin anionic radicals during oxidation by a decrease in the absorption intensities and broadening of spectra with an additional band appearing around 900 nm. A similar trend was observed when negative potentials were applied but in this case the cationic radical was produced. In both cases the decrease of the intensity of the J-aggregate confirms a loss of intermolecular coupling, again consistent with the smaller subunits observed in SEM analysis.
- Full Text:
- Date Issued: 2015
- Authors: George, Reama C , Falgenhauer, Jane , Geis, Clemens , Nyokong, Tebello , Schlettwein, Derck
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/193542 , vital:45344 , xlink:href="https://doi.org/10.1142/S1088424615500923"
- Description: Porphyrin nanorods (PNR) have been fabricated by electrostatic self-assembly of two oppositely charged porphyrin molecules. The free base meso-tetra-(4-phenylsulphonate) porphyrin (TPPS4)4) served as negatively charged counterpart for the positively charged metallo meso-tetra(4-NN-methylpyridyl) porphyrins (MTM’PyP) with either Sn, Co, Mn or In as central metal M. Films of PNR were prepared on fluorine doped tin oxide glass sheets (FTO) by using a drop-dry method. The electronic spectra revealed J-aggregation of the charged molecules for the colloid PNR as well as for the films. Transmission electron microscopy confirmed the formation of porphyrin nanorods. The laser microscope and scanning electron microscope (SEM) images of the PNR/FTO films showed the formation of three kinds of structures in the films which consist of differently branched or linear needles with their main axis grown in the direction of the solvent flow during preparation. During cyclic voltammetry either applying negative potentials from 0.0 V to -1.0 V or positive potentials from 0.0 V to ++2.2 V irreversible reduction or oxidation reactions were detected for the films. Consistently, SEM images taken following cyclic voltammetry showed the disintegration of the PNR on the films into smaller subunits. Spectroelectrochemical measurements showed the formation of porphyrin anionic radicals during oxidation by a decrease in the absorption intensities and broadening of spectra with an additional band appearing around 900 nm. A similar trend was observed when negative potentials were applied but in this case the cationic radical was produced. In both cases the decrease of the intensity of the J-aggregate confirms a loss of intermolecular coupling, again consistent with the smaller subunits observed in SEM analysis.
- Full Text:
- Date Issued: 2015
Classification System for Wetlands and Other Aquatic Ecosystems in South Africa:
- Authors: Ellery, William F N
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144454 , vital:38347 , https://doi.org/10.2989/10220119.2015.1025843
- Description: There have been several attempts to develop a wetland classification for South Africa, with merit in each, but a system that satisfies the needs of a wide range of professionals has been elusive. This is partly to be expected since classification systems are often user-specific. Nevertheless, and at last, the authors of Classification System for Wetlands and Other Aquatic Ecosystems in South Africa. User Manual: Inland Systems (SANBI Biodiversity Series 22) have developed a robust and comprehensive wetland classification system for South Africa that likely will have broad appeal and be widely used. Working for Wetlands, the Water Research Commission (WRC) and SANBI provided considerable support for the development of this system and there was expert input from a wide range of stakeholders.
- Full Text:
- Date Issued: 2015
- Authors: Ellery, William F N
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144454 , vital:38347 , https://doi.org/10.2989/10220119.2015.1025843
- Description: There have been several attempts to develop a wetland classification for South Africa, with merit in each, but a system that satisfies the needs of a wide range of professionals has been elusive. This is partly to be expected since classification systems are often user-specific. Nevertheless, and at last, the authors of Classification System for Wetlands and Other Aquatic Ecosystems in South Africa. User Manual: Inland Systems (SANBI Biodiversity Series 22) have developed a robust and comprehensive wetland classification system for South Africa that likely will have broad appeal and be widely used. Working for Wetlands, the Water Research Commission (WRC) and SANBI provided considerable support for the development of this system and there was expert input from a wide range of stakeholders.
- Full Text:
- Date Issued: 2015
Comparative electrocatalytic studies of nanocomposites of mixed and covalently linked multiwalled carbon nanotubes and 4-(4, 6-diaminopyrimidin-2-ylthio) phthalocyaninato cobalt (II)
- Nyoni, Stephen, Nyokong, Tebello
- Authors: Nyoni, Stephen , Nyokong, Tebello
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/189285 , vital:44834 , xlink:href="https://doi.org/10.1016/j.poly.2015.05.038"
- Description: Electrocatalytic behavior of 4-(4,6-diaminopyrimidin-2-ylthio) phthalocyaninato cobalt(II) (CoPyPc) when mixed or covalently mixed to multiwalled carbon nanotubes (MWCNTs) is reported. Infra-red spectroscopy was used to confirm amide linkage of the covalently linked nanocomposite. Rotating disk electrode (RDE) and cyclic (CV) voltammetry studies were used for the electrochemical characterization of the prepared phthalocyanine and MWCNT nanocomposite. The electrocatalytic effects of the nanocomposites of the cobalt phthalocyanine derivative were then investigated towards L-cysteine oxidation using both RDE and CV experiments, and the electrocatalytic performance of the covalently linked cobalt phthalocyanine-MWCNT was found to be superior over the mixed nanocomposite.
- Full Text:
- Date Issued: 2015
- Authors: Nyoni, Stephen , Nyokong, Tebello
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/189285 , vital:44834 , xlink:href="https://doi.org/10.1016/j.poly.2015.05.038"
- Description: Electrocatalytic behavior of 4-(4,6-diaminopyrimidin-2-ylthio) phthalocyaninato cobalt(II) (CoPyPc) when mixed or covalently mixed to multiwalled carbon nanotubes (MWCNTs) is reported. Infra-red spectroscopy was used to confirm amide linkage of the covalently linked nanocomposite. Rotating disk electrode (RDE) and cyclic (CV) voltammetry studies were used for the electrochemical characterization of the prepared phthalocyanine and MWCNT nanocomposite. The electrocatalytic effects of the nanocomposites of the cobalt phthalocyanine derivative were then investigated towards L-cysteine oxidation using both RDE and CV experiments, and the electrocatalytic performance of the covalently linked cobalt phthalocyanine-MWCNT was found to be superior over the mixed nanocomposite.
- Full Text:
- Date Issued: 2015
Comparisons of isotopic niche widths of some invasive and indigenous fauna in a South African river
- Hill, Jaclyn M, Jones, Roy W, Hill, Martin P, Weyl, Olaf L F
- Authors: Hill, Jaclyn M , Jones, Roy W , Hill, Martin P , Weyl, Olaf L F
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423711 , vital:72088 , xlink:href="https://doi.org/10.1111/fwb.12542"
- Description: Biological invasions threaten ecosystem integrity and bio-diversity, with numerous adverse implications for native flora and fauna. Established populations of two notorious freshwater invaders, the snail Tarebia granifera and the fish Pterygoplichthys disjunctivus, have been reported on three continents and are frequently predicted to be in di-rect competition with native species for dietary resources.
- Full Text:
- Date Issued: 2015
- Authors: Hill, Jaclyn M , Jones, Roy W , Hill, Martin P , Weyl, Olaf L F
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423711 , vital:72088 , xlink:href="https://doi.org/10.1111/fwb.12542"
- Description: Biological invasions threaten ecosystem integrity and bio-diversity, with numerous adverse implications for native flora and fauna. Established populations of two notorious freshwater invaders, the snail Tarebia granifera and the fish Pterygoplichthys disjunctivus, have been reported on three continents and are frequently predicted to be in di-rect competition with native species for dietary resources.
- Full Text:
- Date Issued: 2015
Condoms in pockets and HIV-free certificates: mother-daughter communication about sex and risk in a time of AIDS epidemic in South Africa
- Authors: Wilbraham, Lindy
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143693 , vital:38274 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: Responsive to the perceived high risks of sexual coercion, unwanted pregnancy and HIV-infection of girls in particular, several South African sexual health promotion campaigns have used media targeting parents (mothers in particular) to instruct them on how sex should be talked about with young people to ‘risk-proof’ them. Such an instrumentalist public health discourse posits this intergenerational communication as an ‘ongoing discussion’ of events, feelings, issues and risk-safe practices around heterosexual sex negotiation. A Foucauldian view finds these conversational imperatives pitched against much-talked-about resistances to talking about sex; and the saturation with risk of ambivalent mothers and silent daughters. Mother-daughter communication about sex and sexualities – as an uneasy western ideal of attachment parenting – has tangled roots in psychoanalytic theory and feminisms where sex as the core of modern subjectivity is normalized, capacities for intimacy are trained, and affiliative sexuality is modelled in ways that balance the rights and responsibilities of sexual agency/citizenship. This paper begins with two narrative fragments from a sexual health campaign that addressed mothers and daughters, and recounts how these ‘stories’ produced derisive laughter when introduced into group discussions with young/older women. The paper follows two lines of exploration. Firstly, is western idealized fabrication of inter-subjectivity between mothers and daughters desirable and feasible in post-apartheid conditions of epidemic in South Africa? And secondly, what if the narratives of lives and experiences we offer by way of health education materials provoke uncertainties, gaps and interrogations about sex, mothering and communication, instead of offering homilies and solutions?
- Full Text:
- Date Issued: 2015
- Authors: Wilbraham, Lindy
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143693 , vital:38274 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: Responsive to the perceived high risks of sexual coercion, unwanted pregnancy and HIV-infection of girls in particular, several South African sexual health promotion campaigns have used media targeting parents (mothers in particular) to instruct them on how sex should be talked about with young people to ‘risk-proof’ them. Such an instrumentalist public health discourse posits this intergenerational communication as an ‘ongoing discussion’ of events, feelings, issues and risk-safe practices around heterosexual sex negotiation. A Foucauldian view finds these conversational imperatives pitched against much-talked-about resistances to talking about sex; and the saturation with risk of ambivalent mothers and silent daughters. Mother-daughter communication about sex and sexualities – as an uneasy western ideal of attachment parenting – has tangled roots in psychoanalytic theory and feminisms where sex as the core of modern subjectivity is normalized, capacities for intimacy are trained, and affiliative sexuality is modelled in ways that balance the rights and responsibilities of sexual agency/citizenship. This paper begins with two narrative fragments from a sexual health campaign that addressed mothers and daughters, and recounts how these ‘stories’ produced derisive laughter when introduced into group discussions with young/older women. The paper follows two lines of exploration. Firstly, is western idealized fabrication of inter-subjectivity between mothers and daughters desirable and feasible in post-apartheid conditions of epidemic in South Africa? And secondly, what if the narratives of lives and experiences we offer by way of health education materials provoke uncertainties, gaps and interrogations about sex, mothering and communication, instead of offering homilies and solutions?
- Full Text:
- Date Issued: 2015
Constructing sexualities: a critical overview of articles published in Feminism and Psychology
- Marx, Jacqueline, Donaldson, Natalie
- Authors: Marx, Jacqueline , Donaldson, Natalie
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142040 , vital:38044 , DOI: 10.1177/0959353515572704
- Description: How have sexualities been dealt with in articles published in Feminism and Psychology since the inception of the journal in 1991? The idea for this overview arose from our experience of designing a critical sexualities course for graduate students in psychology. The articles featured in this overview form part of a Virtual Special Issue that can be located on the Feminism and Psychology website. Virtual Special Issues (VSI) are collections of previously published articles, which have been compiled by guest editors who are experts in the field. VSIs provide readers with an overview of feminist thought about a topic or theme, as well as an easy way to locate pertinent articles. Scholars who are approaching a new topic may find a VSI especially useful, as will instructors who are preparing course syllabi. This article introduces the Constructing Sexualities VSI.
- Full Text:
- Date Issued: 2015
- Authors: Marx, Jacqueline , Donaldson, Natalie
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/142040 , vital:38044 , DOI: 10.1177/0959353515572704
- Description: How have sexualities been dealt with in articles published in Feminism and Psychology since the inception of the journal in 1991? The idea for this overview arose from our experience of designing a critical sexualities course for graduate students in psychology. The articles featured in this overview form part of a Virtual Special Issue that can be located on the Feminism and Psychology website. Virtual Special Issues (VSI) are collections of previously published articles, which have been compiled by guest editors who are experts in the field. VSIs provide readers with an overview of feminist thought about a topic or theme, as well as an easy way to locate pertinent articles. Scholars who are approaching a new topic may find a VSI especially useful, as will instructors who are preparing course syllabi. This article introduces the Constructing Sexualities VSI.
- Full Text:
- Date Issued: 2015
Counsellors’ constructions of intimate partner violence (IPV) during pregnancy and their interventions with women suffering such IPV:
- Fleischack, Annie, Macleod, Catriona I, Böhmke, Werner
- Authors: Fleischack, Annie , Macleod, Catriona I , Böhmke, Werner
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143716 , vital:38276 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: South African research reveals a high prevalence of intimate partner violence (IPV) yet little research exists regarding IPV during pregnancy. In this paper we present data collected through narrative interviews with eight counsellors from two NGOs working with women experiencing IPV during pregnancy. Using a narrative-discursive analytical lens, attention was given to the construction of subject positions and power relations between the men and women in the counsellors’ narratives. Men were largely positioned as subscribing to violent patriarchal behaviour whilst women were mostly positioned as nurturing, and as victims. The counsellors saw IPV during pregnancy as occurring for a variety of reasons, including conflicts around abortion, and male partners finding the women physically unattractive. It was noted that IPV during pregnancy is managed by women in complex ways. Counsellors’ emphasis on individual counselling and leaving the IPV relationship suggests that women are ultimately responsible for their own wellbeing and success.
- Full Text:
- Date Issued: 2015
- Authors: Fleischack, Annie , Macleod, Catriona I , Böhmke, Werner
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143716 , vital:38276 , https://ischp.files.wordpress.com/2015/08/ischp_2015_abstract_booklet.pdf
- Description: South African research reveals a high prevalence of intimate partner violence (IPV) yet little research exists regarding IPV during pregnancy. In this paper we present data collected through narrative interviews with eight counsellors from two NGOs working with women experiencing IPV during pregnancy. Using a narrative-discursive analytical lens, attention was given to the construction of subject positions and power relations between the men and women in the counsellors’ narratives. Men were largely positioned as subscribing to violent patriarchal behaviour whilst women were mostly positioned as nurturing, and as victims. The counsellors saw IPV during pregnancy as occurring for a variety of reasons, including conflicts around abortion, and male partners finding the women physically unattractive. It was noted that IPV during pregnancy is managed by women in complex ways. Counsellors’ emphasis on individual counselling and leaving the IPV relationship suggests that women are ultimately responsible for their own wellbeing and success.
- Full Text:
- Date Issued: 2015
Cultural values of natural resources among the San people neighbouring Kgalagadi Transfrontier Park, South Africa
- Thondhlana, Gladman, Shackleton, Sheona E
- Authors: Thondhlana, Gladman , Shackleton, Sheona E
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67699 , vital:29131 , https://doi.org/10.1080/13549839.2013.818950
- Description: Publisher version , Globally, cultural values of natural resources are increasingly recognised as important for local natural resource management and conservation in and beyond parks. The tendency has been to focus on the direct-use rather than the cultural values and importance of natural resources. The cultural values underlying natural resources (directly or indirectly used) and various natural resource-based activities, and the implications for conservation, remain little explored. Drawing from household surveys, in-depth qualitative interviews, observations and secondary data, we explore the cultural significance of natural resources and different land-use practices among the San people bordering Kgalagadi Transfrontier Park in South Africa. Our findings illustrate that though cultural values are inextricably linked to resource use, they are not recognised by all community members. Further, cultural values arise from a diverse and sometimes conflicting array of values that punctuate individuals' lifestyles. A better understanding of context-specific cultural settings and the linkages between the cultural and material dimensions of resource use can lead to the development of interventions that can ensure effective conservation of both natural resources and culture.
- Full Text: false
- Date Issued: 2015
- Authors: Thondhlana, Gladman , Shackleton, Sheona E
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67699 , vital:29131 , https://doi.org/10.1080/13549839.2013.818950
- Description: Publisher version , Globally, cultural values of natural resources are increasingly recognised as important for local natural resource management and conservation in and beyond parks. The tendency has been to focus on the direct-use rather than the cultural values and importance of natural resources. The cultural values underlying natural resources (directly or indirectly used) and various natural resource-based activities, and the implications for conservation, remain little explored. Drawing from household surveys, in-depth qualitative interviews, observations and secondary data, we explore the cultural significance of natural resources and different land-use practices among the San people bordering Kgalagadi Transfrontier Park in South Africa. Our findings illustrate that though cultural values are inextricably linked to resource use, they are not recognised by all community members. Further, cultural values arise from a diverse and sometimes conflicting array of values that punctuate individuals' lifestyles. A better understanding of context-specific cultural settings and the linkages between the cultural and material dimensions of resource use can lead to the development of interventions that can ensure effective conservation of both natural resources and culture.
- Full Text: false
- Date Issued: 2015
Cyber Vulnerability Assessment: Case Study of Malawi and Tanzania
- Chindipha, Stones, D, Irwin, Barry V W
- Authors: Chindipha, Stones, D , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428558 , vital:72520 , https://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
- Date Issued: 2015
- Authors: Chindipha, Stones, D , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428558 , vital:72520 , https://accconference.mandela.ac.za/ACCConference/media/Store/images/Proceedings-2015.pdf#page=105
- Description: Much as the Internet is beneficial to our daily activities, with each passing day it also brings along with it information security concerns for the users be they at company or national level. Each year the number of Internet users keeps growing, particularly in Africa, and this means only one thing, more cyber-attacks. Governments have become a focal point of this data leakage problem making this a matter of national security. Looking at the current state of affairs, cyber-based incidents are more likely to increase in Africa, mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. A drop in the cost of broadband connection means more people will be able to afford Internet connectivity. With open Source Intelligence (OSINT), this paper aims to perform a vulnerability analysis for states in Eastern Africa building from prior research by Swart et al. which showed that there are vulnerabilities in the information systems, using the case of South Africa as an example. States in East Africa are to be considered as candidates, with the final decision being determined by access to suitable resources, and availability of information. A comparative analysis to assess the factors that affect the degree of security susceptibilities in various states will also be made and information security measures used by various governments to ascertain the extent of their contribution to this vulnerability will be assessed. This pilot study will be extended to other Southern and Eastern African states like Botswana, Kenya, Uganda and Namibia in future work.
- Full Text:
- Date Issued: 2015
Data Centre vulnerabilities physical, logical and trusted entity security
- Swart, Ignus, Grobler, Marthie, Irwin, Barry V W
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
- Date Issued: 2015
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
- Date Issued: 2015