A context for the 2011 compilation of reviews on the biological control of invasive alien plants in South Africa
- Moran, V Clifford, Hoffmann, John C, Hill, Martin P
- Authors: Moran, V Clifford , Hoffmann, John C , Hill, Martin P
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451270 , vital:75035 , https://hdl.handle.net/10520/EJC32923
- Description: Besides this introduction, which gives a historical and contextual perspective, this compilation of reviews in African Entomology volume 19(2), comprises 28 papers, 24 of which provide accounts of recent (i.e. emphasising the period from 1999-2010) South African biological control projects against individual invasive alien plant species, or against taxonomically- or functionally-related groups of species. Three of the papers deal with issues related to research and implementation of biological control, namely: regulations and risk assessment; mapping; and cost-benefit analyses. The concluding paper is a complete catalogue, with summary statistics and key references, of all the target weeds and of the insect, mite and pathogen species (and subsidiary taxa) that have been implicated in biological control efforts against invasive alien plants in South Africa since 1913. This compilation is the third in a series of accounts of all the biological control programmes against invasive alien plants that have been undertaken in South Africa: the first, produced in 1991, reviewed progress to that date and the next, published in 1999, was a review of progress from 1990-1998. A comparison of the contents of these three review volumes is given in tabular form. The 2011 compilation contains reports on 13 novel programmes, in the sense that they have not been previously reviewed. Eight of these projects have focused on incipient weeds, or on rapidly-emerging weed species or groups of species, that have only recently been targeted for biological control. The increased scope and commitment to weed biological control research in South Africa has been largely the consequence of the sustained support provided by the Working for Water Programme of the South African Department of Water Affairs, over the last 15 years.
- Full Text:
- Date Issued: 2011
- Authors: Moran, V Clifford , Hoffmann, John C , Hill, Martin P
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/451270 , vital:75035 , https://hdl.handle.net/10520/EJC32923
- Description: Besides this introduction, which gives a historical and contextual perspective, this compilation of reviews in African Entomology volume 19(2), comprises 28 papers, 24 of which provide accounts of recent (i.e. emphasising the period from 1999-2010) South African biological control projects against individual invasive alien plant species, or against taxonomically- or functionally-related groups of species. Three of the papers deal with issues related to research and implementation of biological control, namely: regulations and risk assessment; mapping; and cost-benefit analyses. The concluding paper is a complete catalogue, with summary statistics and key references, of all the target weeds and of the insect, mite and pathogen species (and subsidiary taxa) that have been implicated in biological control efforts against invasive alien plants in South Africa since 1913. This compilation is the third in a series of accounts of all the biological control programmes against invasive alien plants that have been undertaken in South Africa: the first, produced in 1991, reviewed progress to that date and the next, published in 1999, was a review of progress from 1990-1998. A comparison of the contents of these three review volumes is given in tabular form. The 2011 compilation contains reports on 13 novel programmes, in the sense that they have not been previously reviewed. Eight of these projects have focused on incipient weeds, or on rapidly-emerging weed species or groups of species, that have only recently been targeted for biological control. The increased scope and commitment to weed biological control research in South Africa has been largely the consequence of the sustained support provided by the Working for Water Programme of the South African Department of Water Affairs, over the last 15 years.
- Full Text:
- Date Issued: 2011
A cox proportional hazard model for mid-point imputed interval censored data
- Authors: Gwaze, Arnold Rumosa
- Date: 2011
- Subjects: Statistics -- Econometric models , Survival analysis (Biometry) , Mathematical statistics -- Data processing , Nonparametric statistics , Sampling (Statistics) , Multiple imputation (Statistics)
- Language: English
- Type: Thesis , Masters , MSc (Biostatistics and Epidemiology)
- Identifier: vital:11780 , http://hdl.handle.net/10353/385 , http://hdl.handle.net/10353/d1001135 , Statistics -- Econometric models , Survival analysis (Biometry) , Mathematical statistics -- Data processing , Nonparametric statistics , Sampling (Statistics) , Multiple imputation (Statistics)
- Description: There has been an increasing interest in survival analysis with interval-censored data, where the event of interest (such as infection with a disease) is not observed exactly but only known to happen between two examination times. However, because so much research has been focused on right-censored data, so many statistical tests and techniques are available for right-censoring methods, hence interval-censoring methods are not as abundant as those for right-censored data. In this study, right-censoring methods are used to fit a proportional hazards model to some interval-censored data. Transformation of the interval-censored observations was done using a method called mid-point imputation, a method which assumes that an event occurs at some midpoint of its recorded interval. Results obtained gave conservative regression estimates but a comparison with the conventional methods showed that the estimates were not significantly different. However, the censoring mechanism and interval lengths should be given serious consideration before deciding on using mid-point imputation on interval-censored data.
- Full Text:
- Date Issued: 2011
- Authors: Gwaze, Arnold Rumosa
- Date: 2011
- Subjects: Statistics -- Econometric models , Survival analysis (Biometry) , Mathematical statistics -- Data processing , Nonparametric statistics , Sampling (Statistics) , Multiple imputation (Statistics)
- Language: English
- Type: Thesis , Masters , MSc (Biostatistics and Epidemiology)
- Identifier: vital:11780 , http://hdl.handle.net/10353/385 , http://hdl.handle.net/10353/d1001135 , Statistics -- Econometric models , Survival analysis (Biometry) , Mathematical statistics -- Data processing , Nonparametric statistics , Sampling (Statistics) , Multiple imputation (Statistics)
- Description: There has been an increasing interest in survival analysis with interval-censored data, where the event of interest (such as infection with a disease) is not observed exactly but only known to happen between two examination times. However, because so much research has been focused on right-censored data, so many statistical tests and techniques are available for right-censoring methods, hence interval-censoring methods are not as abundant as those for right-censored data. In this study, right-censoring methods are used to fit a proportional hazards model to some interval-censored data. Transformation of the interval-censored observations was done using a method called mid-point imputation, a method which assumes that an event occurs at some midpoint of its recorded interval. Results obtained gave conservative regression estimates but a comparison with the conventional methods showed that the estimates were not significantly different. However, the censoring mechanism and interval lengths should be given serious consideration before deciding on using mid-point imputation on interval-censored data.
- Full Text:
- Date Issued: 2011
A critical analysis of Global Warning coverage in the National Geographic (2000-2010)
- Authors: Apostolis, Juanita Joleen
- Date: 2011
- Subjects: National geographic magazine , Global warming , Climatic changes -- Environmental aspects , Global warming -- Political aspects , Discourse analysis
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8381 , http://hdl.handle.net/10948/1607 , National geographic magazine , Global warming , Climatic changes -- Environmental aspects , Global warming -- Political aspects , Discourse analysis
- Description: National Geographic is a magazine that inspires people to care about the planet through its articles of exploration, education, and conservation. Magazines are a significant source of knowledge and compete with a variety of other media, constantly rethinking where they can improve in comparison to other media. Research in this dissertation shows that some magazines offer high quality imagery for artwork, photos and advertisements, which remains critical for industries and readers. They often offer greater depth than radio, TV, or even newspapers, so that people interested in an analysis of news and events still depend on magazines for informative and general news. People often turn to media—such as television, newspapers, magazines, radio, and Internet—to help them make sense of the many complexities relating to environmental science and governance that (un)consciously shape our lives. Global warming, as a subject, demands both political and personal responses in all parts of the world, and effective decision making at both scales depends on timely, accurate information, according to Shanahan (2009:145). The quality and quantity of journalism about climate change will therefore be key in the coming years. National Geographic comprises a variety of themes, such as environment, science, wildlife, travel and photography. This study is an analysis of the writing and photography related to one theme - global warming. It provides a critical analysis of the coverage of the global warming discourse in one magazine, examined over an eleven-year period from 2000 to 2010. This theme is powerful in that it represents ethical responsibility and concern for nature and our world and the analysis attempts to define the objects of discourse within the coverage, thus, evaluating if the format of the coverage informs and educates the audience about global warming.
- Full Text:
- Date Issued: 2011
- Authors: Apostolis, Juanita Joleen
- Date: 2011
- Subjects: National geographic magazine , Global warming , Climatic changes -- Environmental aspects , Global warming -- Political aspects , Discourse analysis
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8381 , http://hdl.handle.net/10948/1607 , National geographic magazine , Global warming , Climatic changes -- Environmental aspects , Global warming -- Political aspects , Discourse analysis
- Description: National Geographic is a magazine that inspires people to care about the planet through its articles of exploration, education, and conservation. Magazines are a significant source of knowledge and compete with a variety of other media, constantly rethinking where they can improve in comparison to other media. Research in this dissertation shows that some magazines offer high quality imagery for artwork, photos and advertisements, which remains critical for industries and readers. They often offer greater depth than radio, TV, or even newspapers, so that people interested in an analysis of news and events still depend on magazines for informative and general news. People often turn to media—such as television, newspapers, magazines, radio, and Internet—to help them make sense of the many complexities relating to environmental science and governance that (un)consciously shape our lives. Global warming, as a subject, demands both political and personal responses in all parts of the world, and effective decision making at both scales depends on timely, accurate information, according to Shanahan (2009:145). The quality and quantity of journalism about climate change will therefore be key in the coming years. National Geographic comprises a variety of themes, such as environment, science, wildlife, travel and photography. This study is an analysis of the writing and photography related to one theme - global warming. It provides a critical analysis of the coverage of the global warming discourse in one magazine, examined over an eleven-year period from 2000 to 2010. This theme is powerful in that it represents ethical responsibility and concern for nature and our world and the analysis attempts to define the objects of discourse within the coverage, thus, evaluating if the format of the coverage informs and educates the audience about global warming.
- Full Text:
- Date Issued: 2011
A critical analysis of the contribution of a poverty alleviatioon programme for youth development
- Authors: Sinukela, Patuxolo Otto
- Date: 2011
- Subjects: Youth in development -- South Africa -- Eastern Cape , Economic assistance, Domestic , Economic development projects , Youth -- Services for , Poverty -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9099 , http://hdl.handle.net/10948/d1012081 , Youth in development -- South Africa -- Eastern Cape , Economic assistance, Domestic , Economic development projects , Youth -- Services for , Poverty -- South Africa -- Eastern Cape
- Description: Black youth in South Africa has for decades, been marginalized in development programmes and many young blacks are experiencing poverty. With the advent of the new South Africa in 1994, the government initiated poverty alleviation projects for youth development. These projects offered black youth an opportunity to participate in their own development. The current study aimed at critically analyzing the contribution of a „Poverty Alleviation‟ programme for youth development. The study was conducted at Cala in the Sakhisizwe local municipality in the Chris Hani District of the Eastern Cape. The study utilized qualitative and quantitative research methods and took the form of exploratory research. The study revealed factors that appear to contribute to the ineffectiveness of youth development projects. The identified factors include the lack of participation of project members, lack of a sense of ownership and commitment, insufficient skills and non-use of policy and guiding documents by project members during the implementation stage. Stakeholder participation and sharing of expertise was identified as another important factor in determining the contribution of poverty alleviation projects to youth development. Lastly, the study shows that monitoring and evaluation of the project functions are necessary to ensure that a project like this achieves the desired outcome. A key recommendation made is that project members must be involved and participate fully in all project phases to enhance a sense of ownership and commitment to fellow project members.
- Full Text:
- Date Issued: 2011
- Authors: Sinukela, Patuxolo Otto
- Date: 2011
- Subjects: Youth in development -- South Africa -- Eastern Cape , Economic assistance, Domestic , Economic development projects , Youth -- Services for , Poverty -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9099 , http://hdl.handle.net/10948/d1012081 , Youth in development -- South Africa -- Eastern Cape , Economic assistance, Domestic , Economic development projects , Youth -- Services for , Poverty -- South Africa -- Eastern Cape
- Description: Black youth in South Africa has for decades, been marginalized in development programmes and many young blacks are experiencing poverty. With the advent of the new South Africa in 1994, the government initiated poverty alleviation projects for youth development. These projects offered black youth an opportunity to participate in their own development. The current study aimed at critically analyzing the contribution of a „Poverty Alleviation‟ programme for youth development. The study was conducted at Cala in the Sakhisizwe local municipality in the Chris Hani District of the Eastern Cape. The study utilized qualitative and quantitative research methods and took the form of exploratory research. The study revealed factors that appear to contribute to the ineffectiveness of youth development projects. The identified factors include the lack of participation of project members, lack of a sense of ownership and commitment, insufficient skills and non-use of policy and guiding documents by project members during the implementation stage. Stakeholder participation and sharing of expertise was identified as another important factor in determining the contribution of poverty alleviation projects to youth development. Lastly, the study shows that monitoring and evaluation of the project functions are necessary to ensure that a project like this achieves the desired outcome. A key recommendation made is that project members must be involved and participate fully in all project phases to enhance a sense of ownership and commitment to fellow project members.
- Full Text:
- Date Issued: 2011
A Critical Analysis of the Role of School Governing Bodies in the Recruitment, Selection and Transfer of Educators in the Butterworth District
- Authors: Sifuba, Mpilo
- Date: 2011
- Language: English
- Type: Masters theses , text
- Identifier: http://hdl.handle.net/11260/3495 , vital:43616
- Description: Recruitment, selection and transfer of educators were decentralized after South Africa became a democratic state in 1994 and shifted to School Governing Bodies. The legislation promoted a shared governance and participation of parents in issues that are related to recruitment, selection and transfer of educators, but parents are struggling and facing challenges in performing these tasks as School Governing Body members especially in the Butterworth district, as a result of that Butterworth district is experiencing problems with increasing number of disputes resulting from the appointment of educators after they have been recommended by the School Governing Bodies. This study focuses on the recruitment, selection and transfer of educators in the Butterworth district of the Eastern Cape Province of South Africa. The study sought to reveal the thinking behind government insistence on giving the School Governing Bodies a responsibility to recruit, select and transfer educators knowing fully well that they do not perform this responsibility. A qualitative approach was used to explore and challenge this phenomenon. This approach is concerned with understanding social phenomenon from the participant’s perspective. In depth semi – structured interviews with open ended questions were used to bring the researcher more closer to a more plausible perspective of this phenomenon. Moreover, they were used because they are the most appropriate method to capture the data. The findings revealed that School Governing Bodies are faced with challenges such as: high level of illiteracy, manipulation of School Governing Bodies by school management, unions and candidates, the issue of regionalism and kickbacks, capacity building and empowerment and role played by the Departmental Officials. By conducting this study, we hope that the findings might contribute in identifying the disjuncture between the policy and the practice in issues pertaining to educator recruitment, selection and transfers. , Thesis (MMED) -- Faculty of Educational Sciences, 2011
- Full Text:
- Date Issued: 2011
- Authors: Sifuba, Mpilo
- Date: 2011
- Language: English
- Type: Masters theses , text
- Identifier: http://hdl.handle.net/11260/3495 , vital:43616
- Description: Recruitment, selection and transfer of educators were decentralized after South Africa became a democratic state in 1994 and shifted to School Governing Bodies. The legislation promoted a shared governance and participation of parents in issues that are related to recruitment, selection and transfer of educators, but parents are struggling and facing challenges in performing these tasks as School Governing Body members especially in the Butterworth district, as a result of that Butterworth district is experiencing problems with increasing number of disputes resulting from the appointment of educators after they have been recommended by the School Governing Bodies. This study focuses on the recruitment, selection and transfer of educators in the Butterworth district of the Eastern Cape Province of South Africa. The study sought to reveal the thinking behind government insistence on giving the School Governing Bodies a responsibility to recruit, select and transfer educators knowing fully well that they do not perform this responsibility. A qualitative approach was used to explore and challenge this phenomenon. This approach is concerned with understanding social phenomenon from the participant’s perspective. In depth semi – structured interviews with open ended questions were used to bring the researcher more closer to a more plausible perspective of this phenomenon. Moreover, they were used because they are the most appropriate method to capture the data. The findings revealed that School Governing Bodies are faced with challenges such as: high level of illiteracy, manipulation of School Governing Bodies by school management, unions and candidates, the issue of regionalism and kickbacks, capacity building and empowerment and role played by the Departmental Officials. By conducting this study, we hope that the findings might contribute in identifying the disjuncture between the policy and the practice in issues pertaining to educator recruitment, selection and transfers. , Thesis (MMED) -- Faculty of Educational Sciences, 2011
- Full Text:
- Date Issued: 2011
A critical analysis of the socioeconomic impact assessments of the Addo Elephant National Park
- Authors: Rose, Matthew Calvin
- Date: 2011
- Subjects: Addo Elephant National Park (South Africa) South African National Parks Economic impact analysis -- South Africa -- Addo Elephant National Park Environmental impact analysis -- South Africa -- Addo Elephant National Park
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:964 , http://hdl.handle.net/10962/d1002698
- Description: Impact assessment is a requirement for development in many countries across the globe, seeking to inform the decision-maker as to the environmental, social and economic impact of an ongoing or proposed project. Socioeconomic impact assessment (SEIA) is a means of informing decision-makers as to the socioeconomic effects a project could have, or is having, thus contributing to informing adaptive management practices. However, the tendency of socioeconomic impact assessment to highly quantitative economic methods of analysis raises the question of whether the desired results are achieved by the process. The purpose of the research was to determine whether highly quantitative forms of economic analysis are suitable for measurement of impacts in a social context where distributive as well as net impact is important; to critically analyze the method utilized in achieving highly quantitative economic impact assessment results; and lastly to draw conclusions and make recommendations regarding the efficacy of monitoring processes used to inform adaptive management practices. The research was conducted by means of a case study focusing on three SEIAs carried out on the same entity, namely the Addo Elephant National Park. Managed by South African National Parks (SANP), it began expanding its borders in the early 2000s. Funded by the World Bank, SANP was required to carry out a comprehensive Strategic Environmental Assessment (SEA) in 2003 to ensure the expansion did not have negative environmental, social and economic repercussions, and where such consequences were unavoidable, to ensure that mitigation and management thereof was informed by useful monitoring exercises. Given the need for resettlement and issues of economic distributive concern raised in the 2003 SEA, the three socioeconomic impact assessments conducted from 2005 – 2010 as part of the ongoing monitoring exercises formed an ideal framework for answering the primary research questions. The findings indicate that despite consistent terms of reference, different assessors interpret mandates from the commissioning body in different ways, leading to varied applications of the same theory, some methodologically better than others. Economic multiplier analysis was found to be inadequate as a measure of the distributive effects of economic impact. Moreover, a lack of consistency, accountability and transparency in the monitoring process led to three sets of results that were incomparable over time and thus inadequate as a means to inform adaptive management practices. Asymmetries of and between power and expertise in the commissioning body and the assessors led to breakdowns of the assessment process in terms of accountability and integrity and resulted in a failure to properly define the scope of the study and measure the relevant indicators. The following recommendations were made: that the economic multiplier method be complemented by additional methods of analysis when utilized in disparate social contexts where distribution of economic benefit is important; that monitoring practices be systematized at an early stage of the process to ensure comparable results useful in informing ongoing management practices; and that what an assessment measures and how it measures it be clarified with reference to an objective source. Finally, the number of factors for consideration in any impact assessment means that measurement of the full picture suffers resource constraints, emphasizing the need for impact assessment oversight to recognize the deficiencies of the process whilst still acknowledging that ‘some number is better than no number’.
- Full Text:
- Date Issued: 2011
- Authors: Rose, Matthew Calvin
- Date: 2011
- Subjects: Addo Elephant National Park (South Africa) South African National Parks Economic impact analysis -- South Africa -- Addo Elephant National Park Environmental impact analysis -- South Africa -- Addo Elephant National Park
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:964 , http://hdl.handle.net/10962/d1002698
- Description: Impact assessment is a requirement for development in many countries across the globe, seeking to inform the decision-maker as to the environmental, social and economic impact of an ongoing or proposed project. Socioeconomic impact assessment (SEIA) is a means of informing decision-makers as to the socioeconomic effects a project could have, or is having, thus contributing to informing adaptive management practices. However, the tendency of socioeconomic impact assessment to highly quantitative economic methods of analysis raises the question of whether the desired results are achieved by the process. The purpose of the research was to determine whether highly quantitative forms of economic analysis are suitable for measurement of impacts in a social context where distributive as well as net impact is important; to critically analyze the method utilized in achieving highly quantitative economic impact assessment results; and lastly to draw conclusions and make recommendations regarding the efficacy of monitoring processes used to inform adaptive management practices. The research was conducted by means of a case study focusing on three SEIAs carried out on the same entity, namely the Addo Elephant National Park. Managed by South African National Parks (SANP), it began expanding its borders in the early 2000s. Funded by the World Bank, SANP was required to carry out a comprehensive Strategic Environmental Assessment (SEA) in 2003 to ensure the expansion did not have negative environmental, social and economic repercussions, and where such consequences were unavoidable, to ensure that mitigation and management thereof was informed by useful monitoring exercises. Given the need for resettlement and issues of economic distributive concern raised in the 2003 SEA, the three socioeconomic impact assessments conducted from 2005 – 2010 as part of the ongoing monitoring exercises formed an ideal framework for answering the primary research questions. The findings indicate that despite consistent terms of reference, different assessors interpret mandates from the commissioning body in different ways, leading to varied applications of the same theory, some methodologically better than others. Economic multiplier analysis was found to be inadequate as a measure of the distributive effects of economic impact. Moreover, a lack of consistency, accountability and transparency in the monitoring process led to three sets of results that were incomparable over time and thus inadequate as a means to inform adaptive management practices. Asymmetries of and between power and expertise in the commissioning body and the assessors led to breakdowns of the assessment process in terms of accountability and integrity and resulted in a failure to properly define the scope of the study and measure the relevant indicators. The following recommendations were made: that the economic multiplier method be complemented by additional methods of analysis when utilized in disparate social contexts where distribution of economic benefit is important; that monitoring practices be systematized at an early stage of the process to ensure comparable results useful in informing ongoing management practices; and that what an assessment measures and how it measures it be clarified with reference to an objective source. Finally, the number of factors for consideration in any impact assessment means that measurement of the full picture suffers resource constraints, emphasizing the need for impact assessment oversight to recognize the deficiencies of the process whilst still acknowledging that ‘some number is better than no number’.
- Full Text:
- Date Issued: 2011
A critical analysis of the tax implications for small and micro businesses
- Authors: Mkhize, Vukani
- Date: 2011
- Subjects: Small business -- Taxation -- Law and legislation , Taxation -- Law and legislation
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:8953 , http://hdl.handle.net/10948/1338 , Small business -- Taxation -- Law and legislation , Taxation -- Law and legislation
- Description: The South African economy has seen an increase in small businesses since 1994. This increase has been caused by an increase in unemployment rate and government interventions to promote small businesses. The government has through the National Treasury introduced various tax legislations to simplify and facilitate the tax processes that small businesses have to comply with. The discussion contained in this treatise seeks to critically analyse the tax implications for small and micro businesses. One of the small business tax legislations, Small Business Corporations, is discussed in chapter 2. The Small Business Corporation legislation provides for two key concessions to qualifying small businesses. The first concession is the progressive tax rates that are lower than normal tax rates at taxable income level below R300 000. The second concession is the special capital allowances that the qualifying small business is entitled to. The tax amnesty for small businesses was introduced in July 2006 to provide an opportunity to small businesses which were not up to date with their tax affairs, to regularise their tax affairs. Small businesses had to meet certain requirements and pay an amnesty levy ranging from 2 to 5 percent of their taxable income. The tax amnesty on small businesses was not as effective as intended, however a slight increase in the South African taxpayer base was achieved. The voluntary disclosure programme has recently been introduced in November 2010, to provide an opportunity for all businesses to voluntarily disclose their previous defaults without being subjected to criminal prosecution and penalties. The government further attempted to simplify the tax compliance process by introducing turnover tax legislation. The turnover tax provides for a single tax system that does away with the need to account for normal tax, capital gains tax, secondary tax on companies and value added tax. The turnover tax system is optional to qualifying small businesses. The turnover tax is calculated by simply applying a tax rate to taxable turnover. Small businesses need carefully consider whether turnover tax will be beneficial to them. It is not advisable for small businesses that are making losses to adopt turnover tax. Another small business tax legislation that promises to be effective is the venture capital incentive. This legislation provides for deduction of expenditure actually incurred in the acquisition of shares by qualifying businesses. It appears that, given the challenges that small businesses still face, the government still has a lot more to do to simplify the tax process for small businesses.
- Full Text:
- Date Issued: 2011
- Authors: Mkhize, Vukani
- Date: 2011
- Subjects: Small business -- Taxation -- Law and legislation , Taxation -- Law and legislation
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:8953 , http://hdl.handle.net/10948/1338 , Small business -- Taxation -- Law and legislation , Taxation -- Law and legislation
- Description: The South African economy has seen an increase in small businesses since 1994. This increase has been caused by an increase in unemployment rate and government interventions to promote small businesses. The government has through the National Treasury introduced various tax legislations to simplify and facilitate the tax processes that small businesses have to comply with. The discussion contained in this treatise seeks to critically analyse the tax implications for small and micro businesses. One of the small business tax legislations, Small Business Corporations, is discussed in chapter 2. The Small Business Corporation legislation provides for two key concessions to qualifying small businesses. The first concession is the progressive tax rates that are lower than normal tax rates at taxable income level below R300 000. The second concession is the special capital allowances that the qualifying small business is entitled to. The tax amnesty for small businesses was introduced in July 2006 to provide an opportunity to small businesses which were not up to date with their tax affairs, to regularise their tax affairs. Small businesses had to meet certain requirements and pay an amnesty levy ranging from 2 to 5 percent of their taxable income. The tax amnesty on small businesses was not as effective as intended, however a slight increase in the South African taxpayer base was achieved. The voluntary disclosure programme has recently been introduced in November 2010, to provide an opportunity for all businesses to voluntarily disclose their previous defaults without being subjected to criminal prosecution and penalties. The government further attempted to simplify the tax compliance process by introducing turnover tax legislation. The turnover tax provides for a single tax system that does away with the need to account for normal tax, capital gains tax, secondary tax on companies and value added tax. The turnover tax system is optional to qualifying small businesses. The turnover tax is calculated by simply applying a tax rate to taxable turnover. Small businesses need carefully consider whether turnover tax will be beneficial to them. It is not advisable for small businesses that are making losses to adopt turnover tax. Another small business tax legislation that promises to be effective is the venture capital incentive. This legislation provides for deduction of expenditure actually incurred in the acquisition of shares by qualifying businesses. It appears that, given the challenges that small businesses still face, the government still has a lot more to do to simplify the tax process for small businesses.
- Full Text:
- Date Issued: 2011
A critical analysis on how policy and legislation influence the implementation of renewable energy in the Nelson Mandela Bay Municipality
- Mkhonta, Gcebekile Tikhokhile
- Authors: Mkhonta, Gcebekile Tikhokhile
- Date: 2011
- Subjects: Environmental policy -- South Africa , Renewable energy sources -- Law and legislation -- South Africa -- Nelson Mandela Bay Municipality , Energy policy -- Law and legislation -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/8683 , vital:26420
- Description: Development in this century is facing the critical dilemma brought about by Climate Change and the misuse of natural resources which are being depleted faster than they are being reproduced. Sustainable development offers an on-going call for global action towards mitigating the impact of these changes to ensure that current generations live equitably without infringing on the needs of future generations. Ensuing from Sustainable Development are a variety of initiatives such as Renewable Energy, which are aimed at reducing the amount of greenhouse gases, the main culprits of Climate Change. Many countries around the globe have further tailored Sustainable Development principles into policy and legislation to ensure that development initiatives meet the needs of current generations without compromising those of future generations. This study embarked on a process to evaluate how such policies influence the implementation of Renewable Energy projects in the Nelson Mandela Bay Municipality in Port Elizabeth, South Africa.
- Full Text:
- Date Issued: 2011
- Authors: Mkhonta, Gcebekile Tikhokhile
- Date: 2011
- Subjects: Environmental policy -- South Africa , Renewable energy sources -- Law and legislation -- South Africa -- Nelson Mandela Bay Municipality , Energy policy -- Law and legislation -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/8683 , vital:26420
- Description: Development in this century is facing the critical dilemma brought about by Climate Change and the misuse of natural resources which are being depleted faster than they are being reproduced. Sustainable development offers an on-going call for global action towards mitigating the impact of these changes to ensure that current generations live equitably without infringing on the needs of future generations. Ensuing from Sustainable Development are a variety of initiatives such as Renewable Energy, which are aimed at reducing the amount of greenhouse gases, the main culprits of Climate Change. Many countries around the globe have further tailored Sustainable Development principles into policy and legislation to ensure that development initiatives meet the needs of current generations without compromising those of future generations. This study embarked on a process to evaluate how such policies influence the implementation of Renewable Energy projects in the Nelson Mandela Bay Municipality in Port Elizabeth, South Africa.
- Full Text:
- Date Issued: 2011
A cut and paste identity : an investigation of reality TV's role in postmodern identity construction with special reference to ordinary people as celebrities
- Authors: Le Roux, Janell
- Date: 2011
- Subjects: Reality television programs -- Social aspects , Identity (Psychology) -- South Africa , Television personalities -- Psychological aspects
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8383 , http://hdl.handle.net/10948/1462 , Reality television programs -- Social aspects , Identity (Psychology) -- South Africa , Television personalities -- Psychological aspects
- Description: This study aimed to examine the construction of the identity of the participants within the reality TV programmes (Style Her Famous, My Celebrity Home and How Do I Look) as well as examined the representation of that identity as reflected in the change in participants from the beginning to the end of the program. Drawing on literature from fields such as postmodernism and its influence on culture, identity constructions and ordinary people as celebrities, an analysis of the three American reality TV shows Style Her Famous, My Celebrity Home and How Do I Look was conducted. An indepth content analysis with specific reference to comparative analysis further aided this study. A total of 18 episodes (six episodes for each programme) were collected and thoroughly analyzed where the ‘cut and paste identity’ of ordinary people as ‘celebrities’ constituted the hermeneutical key of the study. The episodes and programs have been scrutinized and have been systematically classified to enable an analysis of the observations. This study attempted to not only describe, but also to foster change in the representation of the identity of the participants of the above mentioned reality TV programmes. The study found that reality television plays a role in shaping the postmodern identity of ordinary people as celebrities. The study also found that the participants involved in the above mentioned programmes found it easy to make someone else’s identity their own. It appeared that the postmodern mind is easily influenced and willing to adopt an identity especially that of a celebrity. The participants involved in these programs claimed this identity as their own and then believed that the new identity was in fact who they ‘really are’ but in actual fact it is a beginning of a new sameness with somebody else. Hence the participants possessed a ‘cut and paste identity.’
- Full Text:
- Date Issued: 2011
- Authors: Le Roux, Janell
- Date: 2011
- Subjects: Reality television programs -- Social aspects , Identity (Psychology) -- South Africa , Television personalities -- Psychological aspects
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:8383 , http://hdl.handle.net/10948/1462 , Reality television programs -- Social aspects , Identity (Psychology) -- South Africa , Television personalities -- Psychological aspects
- Description: This study aimed to examine the construction of the identity of the participants within the reality TV programmes (Style Her Famous, My Celebrity Home and How Do I Look) as well as examined the representation of that identity as reflected in the change in participants from the beginning to the end of the program. Drawing on literature from fields such as postmodernism and its influence on culture, identity constructions and ordinary people as celebrities, an analysis of the three American reality TV shows Style Her Famous, My Celebrity Home and How Do I Look was conducted. An indepth content analysis with specific reference to comparative analysis further aided this study. A total of 18 episodes (six episodes for each programme) were collected and thoroughly analyzed where the ‘cut and paste identity’ of ordinary people as ‘celebrities’ constituted the hermeneutical key of the study. The episodes and programs have been scrutinized and have been systematically classified to enable an analysis of the observations. This study attempted to not only describe, but also to foster change in the representation of the identity of the participants of the above mentioned reality TV programmes. The study found that reality television plays a role in shaping the postmodern identity of ordinary people as celebrities. The study also found that the participants involved in the above mentioned programmes found it easy to make someone else’s identity their own. It appeared that the postmodern mind is easily influenced and willing to adopt an identity especially that of a celebrity. The participants involved in these programs claimed this identity as their own and then believed that the new identity was in fact who they ‘really are’ but in actual fact it is a beginning of a new sameness with somebody else. Hence the participants possessed a ‘cut and paste identity.’
- Full Text:
- Date Issued: 2011
A factor analysis of the career adapt-abilities inventory
- Authors: Olivier, Ilze
- Date: 2011
- Subjects: Adaptability (Psychology) -- South Africa , Career Assessment Inventory , Curiosity
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9950 , http://hdl.handle.net/10948/d1015687
- Description: In understanding the importance of career adaptability in an individual‟s career development, career counsellors require a valid assessment technique for measuring career adaptability. The Career Adapt-Abilities Inventory (CAI) was originally developed by Mark Savickas (2008) as a measure of career adapt-abilities. The present study forms part of an international collaboration investigating the psychometric properties and construct validity of the CAI. The aims of the present study involved the following: conducting exploratory factor analysis in order to determine whether interrelationships within the items of the CAI can be explained by the presence of unobserved variables; conducting confirmatory factor analysis in an attempt to confirm the hypothesised factor structures of the CAI; and to explore and describe South African university students‟ perceptions of the underlying constructs of the CAI in terms of the language usage and comprehension of the inventory‟s item content. A sample of South African first-year university students were employed in this current study. In an exploratory factor analysis of the CAI, preference was given to the a priori criterion forcing the extraction of five factors. The oblique rotation method was employed using the OBLIMIN method provided by the statistical package in order to derive the simplest and most interpretable factor structure. Exploratory factor analysis supported a five factor solution after the fourth iteration, reflecting the underlying dimensions of Curiosity, Concern, Confidence, Cooperation and Control. These factors support the five scales presented by Savickas (2008). Confirmatory factor analyses were subsequently performed in order to test both the original CAI factor model as well as the factor model that emerged through exploratory factor analysis. After using several goodness-of-fit indices, it can be concluded that the inventory items adequately represent the five CAI scales based on the value obtained using the Root Mean Square Error of Approximation index. The factor model derived through EFA demonstrated a slightly better fit when compared to the original CAI factor model using other fit indices. In terms of the qualitative findings of this current study, participants indicated that the meaning of several items were unclear to them causing comprehension difficulty. Items 8 and 50 were marked by participants several times and can be viewed as the items causing most difficulty with regard to comprehension, with participants pointing out the words „keeping upbeat‟ (item 8) and „conscientious‟ (item 50). Participants were also asked to provide additional comments with regard to the readability, comprehension and applicability of the CAI. On investigation of these comments, three main themes were generated relating to: the comprehension and clarity of the CAI; the CAI enhancing participants‟ understanding of themselves; and the structure, length and general layout of the CAI. In essence, the current study provided useful information regarding the psychometric properties of the CAI using a sample of South African first-year university students. Factor analyses provided some support for the validity of the CAI while the qualitative results provided aspects for consideration in making the CAI more applicable for South African usage. Moreover, a foundation has been laid for further research to be conducted in South Africa regarding the validity and applicability of the CAI for South African populations.
- Full Text:
- Date Issued: 2011
- Authors: Olivier, Ilze
- Date: 2011
- Subjects: Adaptability (Psychology) -- South Africa , Career Assessment Inventory , Curiosity
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9950 , http://hdl.handle.net/10948/d1015687
- Description: In understanding the importance of career adaptability in an individual‟s career development, career counsellors require a valid assessment technique for measuring career adaptability. The Career Adapt-Abilities Inventory (CAI) was originally developed by Mark Savickas (2008) as a measure of career adapt-abilities. The present study forms part of an international collaboration investigating the psychometric properties and construct validity of the CAI. The aims of the present study involved the following: conducting exploratory factor analysis in order to determine whether interrelationships within the items of the CAI can be explained by the presence of unobserved variables; conducting confirmatory factor analysis in an attempt to confirm the hypothesised factor structures of the CAI; and to explore and describe South African university students‟ perceptions of the underlying constructs of the CAI in terms of the language usage and comprehension of the inventory‟s item content. A sample of South African first-year university students were employed in this current study. In an exploratory factor analysis of the CAI, preference was given to the a priori criterion forcing the extraction of five factors. The oblique rotation method was employed using the OBLIMIN method provided by the statistical package in order to derive the simplest and most interpretable factor structure. Exploratory factor analysis supported a five factor solution after the fourth iteration, reflecting the underlying dimensions of Curiosity, Concern, Confidence, Cooperation and Control. These factors support the five scales presented by Savickas (2008). Confirmatory factor analyses were subsequently performed in order to test both the original CAI factor model as well as the factor model that emerged through exploratory factor analysis. After using several goodness-of-fit indices, it can be concluded that the inventory items adequately represent the five CAI scales based on the value obtained using the Root Mean Square Error of Approximation index. The factor model derived through EFA demonstrated a slightly better fit when compared to the original CAI factor model using other fit indices. In terms of the qualitative findings of this current study, participants indicated that the meaning of several items were unclear to them causing comprehension difficulty. Items 8 and 50 were marked by participants several times and can be viewed as the items causing most difficulty with regard to comprehension, with participants pointing out the words „keeping upbeat‟ (item 8) and „conscientious‟ (item 50). Participants were also asked to provide additional comments with regard to the readability, comprehension and applicability of the CAI. On investigation of these comments, three main themes were generated relating to: the comprehension and clarity of the CAI; the CAI enhancing participants‟ understanding of themselves; and the structure, length and general layout of the CAI. In essence, the current study provided useful information regarding the psychometric properties of the CAI using a sample of South African first-year university students. Factor analyses provided some support for the validity of the CAI while the qualitative results provided aspects for consideration in making the CAI more applicable for South African usage. Moreover, a foundation has been laid for further research to be conducted in South Africa regarding the validity and applicability of the CAI for South African populations.
- Full Text:
- Date Issued: 2011
A forecasting model for photovoltaic module energy production
- Authors: Swanepoel, Paul
- Date: 2011
- Subjects: Photovoltaic power systems -- Forecasting
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10563 , http://hdl.handle.net/10948/1420 , Photovoltaic power systems -- Forecasting
- Description: Energy is of concern for governments and economies all over the world. As conventional methods of energy production are facing the prospect of depleting fossil fuel reserves, economies are facing energy risks. With this tension, various threats arise in terms of energy supply security. A shift from intensive fossil fuel consumption to alternative energy consumption combined with the calculated use of fossil fuels needs to be implemented. Using the energy radiated from the sun and converted to electricity through photovoltaic energy conversion is one of the alternative and renewable sources to address the limited fossil fuel dilemma. South Africa receives an abundance of sunlight irradiance, but limited knowledge of the implementation and possible energy yield of photovoltaic energy production in South Africa is available. Photovoltaic energy yield knowledge is vital in applications for farms, rural areas and remote transmitting devices where the construction of electricity grids are not cost effective. In this study various meteorological and energy parameters about photovoltaics were captured in Port Elizabeth (South Africa) and analyzed, with data being recorded every few seconds. A model for mean daily photovoltaic power output was developed and the relationships between the independent variables analyzed. A model was developed that can forecast mean daily photovoltaic power output using only temperature derived variables and time. The mean daily photovoltaic power model can then easily be used to forecast daily photovoltaic energy output using the number of sunlight seconds in a given day.
- Full Text:
- Date Issued: 2011
- Authors: Swanepoel, Paul
- Date: 2011
- Subjects: Photovoltaic power systems -- Forecasting
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:10563 , http://hdl.handle.net/10948/1420 , Photovoltaic power systems -- Forecasting
- Description: Energy is of concern for governments and economies all over the world. As conventional methods of energy production are facing the prospect of depleting fossil fuel reserves, economies are facing energy risks. With this tension, various threats arise in terms of energy supply security. A shift from intensive fossil fuel consumption to alternative energy consumption combined with the calculated use of fossil fuels needs to be implemented. Using the energy radiated from the sun and converted to electricity through photovoltaic energy conversion is one of the alternative and renewable sources to address the limited fossil fuel dilemma. South Africa receives an abundance of sunlight irradiance, but limited knowledge of the implementation and possible energy yield of photovoltaic energy production in South Africa is available. Photovoltaic energy yield knowledge is vital in applications for farms, rural areas and remote transmitting devices where the construction of electricity grids are not cost effective. In this study various meteorological and energy parameters about photovoltaics were captured in Port Elizabeth (South Africa) and analyzed, with data being recorded every few seconds. A model for mean daily photovoltaic power output was developed and the relationships between the independent variables analyzed. A model was developed that can forecast mean daily photovoltaic power output using only temperature derived variables and time. The mean daily photovoltaic power model can then easily be used to forecast daily photovoltaic energy output using the number of sunlight seconds in a given day.
- Full Text:
- Date Issued: 2011
A formative evaluation of the implementation process of the supply chain management policy framework in Eastern Cape Provincial Administration
- Authors: Sandler, Jeanette Louise
- Date: 2011
- Subjects: Business logistics -- Management -- South Africa -- Eastern Cape Public administration -- South Africa -- Eastern Cape Materials management -- South Africa -- Eastern Cape Industrial procurement -- Management -- South Africa -- Eastern Cape Administrative law -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:746 , http://hdl.handle.net/10962/d1003867
- Description: The Eastern Cape Provincial Administration has, since the promulgation of the Supply Chain Management Policy Framework in 2003, been challenged with the implementation of the said Policy.Some departments have progressed better than others, but all of the provincial departments have been challenged in one way or another.It was therefore, necessary to research the reasons for the erratic implementation process by the different departments. An analysis, based on answers provided by senior officials of the Eastern Cape Provincial Administration in an interviewing process, was needed to get an understanding of the challenges the departments are faced within the implementation process. In order to provide quality goods and services, this dissertation aims to evaluate the implementation process, provide insight to the challenges that the departments are faced with and offer recommendations on how to remedy these challenges. The lessons learned from this research study will assist the provincial departments to re-engineer their implementation processes and move forward to greater success and embracement of the Supply Chain Management policy Framework.
- Full Text:
- Date Issued: 2011
- Authors: Sandler, Jeanette Louise
- Date: 2011
- Subjects: Business logistics -- Management -- South Africa -- Eastern Cape Public administration -- South Africa -- Eastern Cape Materials management -- South Africa -- Eastern Cape Industrial procurement -- Management -- South Africa -- Eastern Cape Administrative law -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:746 , http://hdl.handle.net/10962/d1003867
- Description: The Eastern Cape Provincial Administration has, since the promulgation of the Supply Chain Management Policy Framework in 2003, been challenged with the implementation of the said Policy.Some departments have progressed better than others, but all of the provincial departments have been challenged in one way or another.It was therefore, necessary to research the reasons for the erratic implementation process by the different departments. An analysis, based on answers provided by senior officials of the Eastern Cape Provincial Administration in an interviewing process, was needed to get an understanding of the challenges the departments are faced within the implementation process. In order to provide quality goods and services, this dissertation aims to evaluate the implementation process, provide insight to the challenges that the departments are faced with and offer recommendations on how to remedy these challenges. The lessons learned from this research study will assist the provincial departments to re-engineer their implementation processes and move forward to greater success and embracement of the Supply Chain Management policy Framework.
- Full Text:
- Date Issued: 2011
A framework for DNS based detection and mitigation of malware infections on a network
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
A Framework for DNS Based Detection of Botnets at the ISP Level
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
A framework for the adoption of enterprise resource planning (ERP) systems in higher education
- Authors: Scholtz, Brenda
- Date: 2011
- Subjects: Curriculum change , Enterprise resource planning.
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10485 , http://hdl.handle.net/10948/d1015961
- Description: Information Communication Technology (ICT) practitioners and Enterprise Resource Planning (ERP) specialists are highly sought after globally and in South Africa. In order to address this need for ERP specialists, several studies propose that ERP systems should be adopted in the Information Systems (IS) curricula in higher education institutions (HEIs) for instructional purposes. Whilst many HEIs in the United States, Australia and Europe have successfully adopted ERP systems into their curricula, less than 30% of South African HEIs have followed this trend. The adoption of ERP systems is a challenging process as such systems are resource-intensive, costly, complex, and have a steep learning curve. Educators are faced with resource problems and a dearth of options relating to the adoption process. In addition it is critical that the skills and knowledge competencies attained in these courses are industry-relevant. Several education frameworks have been recommended to assist educators with the process of adopting an ERP system in the curriculum, but these frameworks are not comprehensive since they do not consider all the factors relating to the adoption of an ERP system. In addition existing frameworks are not based on industry-relevant competencies but rather on educational objectives. This has resulted in a difference between the competencies required by organisations and those produced by higher education. Whilst there are several research studies on ERP education, empirical studies on frameworks supporting the adoption of ERP systems in HEIs for instructional purposes are limited, particularly on the impact of these frameworks on educational outcomes. The impact of the usability of the ERP system on educational outcomes has also not been fully explored. A survey of ERP consulting organisations in South Africa confirmed that these organisations struggle to obtain ERP specialists with the appropriate competencies. The survey results also contributed to a standardised, comprehensive, set of industry-relevant ERP competencies. The competency set forms part of a comprehensive Competency Framework for ERP System Adoption in IS Higher Education (ERPEd), which can assist educators with the decisions relating to the adoption of an ERP system into the IS curriculum. It includes all the categories of competencies relevant to industry and maps these onto a recommended ERP system adoption approach, an ERP learning tool, as well as the appropriate level of adoption. The application of the ERPEd framework to a case study, the Management Information Systems (MIS) course at the Nelson Mandela Metropolitan University (NMMU), resulted in the adoption of the SYSPRO medium-sized ERP system into the MIS course with the hands-on approach. The empirical results of the evaluation of the case study revealed that the hands-on use of a medium-sized ERP system, SYSPRO, can successfully contribute to the attainment of educational outcomes. These outcomes were mapped to the three core competencies addressed by the MIS course, which were ERP Theory and Concepts, ERP Transactions and Business Process Management (BPM). The educational outcomes evaluated were the measures of performance, self-efficacy and usability. Self-efficacy included satisfaction with the adoption approach. The results were positive in terms of all the metrics of performance, and all three competency categories had positive post-intervention self-efficacy ratings. In terms of growth in self-efficacy from pre-intervention to post-intervention, BPM was the only competency category that did not show a significant growth, however the satisfaction data indicated that students found that the use of SYSPRO improved their competencies in business process understanding. Usability was evaluated in terms of navigation, presentation and learnability. Learnability was the only usability measure in the neutral range, with the other measures falling in the positive range. This confirms related studies reporting that ERP systems are not designed for learning. Overall the students enjoyed the practical application of the theory by using SYSPRO. Several positive and negative features of the user interface were provided which can be used in the design of improved ERP systems for instructional purposes. The results of this investigation can assist in narrowing the gap between industry requirements and IS education programmes. The ERP competency set provides a standardised list of skills and knowledge which is the starting point for any skills improvement program. The ERPEd framework can improve the quality of ERP courses and the competencies of IS graduates. This in turn, can benefit the business community since it will improve the chances of ERP project success. This research is a major contribution to both government and academic initiatives in South Africa to address both the ICT skills problem as well as the need for ERP specialists.
- Full Text:
- Date Issued: 2011
- Authors: Scholtz, Brenda
- Date: 2011
- Subjects: Curriculum change , Enterprise resource planning.
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10485 , http://hdl.handle.net/10948/d1015961
- Description: Information Communication Technology (ICT) practitioners and Enterprise Resource Planning (ERP) specialists are highly sought after globally and in South Africa. In order to address this need for ERP specialists, several studies propose that ERP systems should be adopted in the Information Systems (IS) curricula in higher education institutions (HEIs) for instructional purposes. Whilst many HEIs in the United States, Australia and Europe have successfully adopted ERP systems into their curricula, less than 30% of South African HEIs have followed this trend. The adoption of ERP systems is a challenging process as such systems are resource-intensive, costly, complex, and have a steep learning curve. Educators are faced with resource problems and a dearth of options relating to the adoption process. In addition it is critical that the skills and knowledge competencies attained in these courses are industry-relevant. Several education frameworks have been recommended to assist educators with the process of adopting an ERP system in the curriculum, but these frameworks are not comprehensive since they do not consider all the factors relating to the adoption of an ERP system. In addition existing frameworks are not based on industry-relevant competencies but rather on educational objectives. This has resulted in a difference between the competencies required by organisations and those produced by higher education. Whilst there are several research studies on ERP education, empirical studies on frameworks supporting the adoption of ERP systems in HEIs for instructional purposes are limited, particularly on the impact of these frameworks on educational outcomes. The impact of the usability of the ERP system on educational outcomes has also not been fully explored. A survey of ERP consulting organisations in South Africa confirmed that these organisations struggle to obtain ERP specialists with the appropriate competencies. The survey results also contributed to a standardised, comprehensive, set of industry-relevant ERP competencies. The competency set forms part of a comprehensive Competency Framework for ERP System Adoption in IS Higher Education (ERPEd), which can assist educators with the decisions relating to the adoption of an ERP system into the IS curriculum. It includes all the categories of competencies relevant to industry and maps these onto a recommended ERP system adoption approach, an ERP learning tool, as well as the appropriate level of adoption. The application of the ERPEd framework to a case study, the Management Information Systems (MIS) course at the Nelson Mandela Metropolitan University (NMMU), resulted in the adoption of the SYSPRO medium-sized ERP system into the MIS course with the hands-on approach. The empirical results of the evaluation of the case study revealed that the hands-on use of a medium-sized ERP system, SYSPRO, can successfully contribute to the attainment of educational outcomes. These outcomes were mapped to the three core competencies addressed by the MIS course, which were ERP Theory and Concepts, ERP Transactions and Business Process Management (BPM). The educational outcomes evaluated were the measures of performance, self-efficacy and usability. Self-efficacy included satisfaction with the adoption approach. The results were positive in terms of all the metrics of performance, and all three competency categories had positive post-intervention self-efficacy ratings. In terms of growth in self-efficacy from pre-intervention to post-intervention, BPM was the only competency category that did not show a significant growth, however the satisfaction data indicated that students found that the use of SYSPRO improved their competencies in business process understanding. Usability was evaluated in terms of navigation, presentation and learnability. Learnability was the only usability measure in the neutral range, with the other measures falling in the positive range. This confirms related studies reporting that ERP systems are not designed for learning. Overall the students enjoyed the practical application of the theory by using SYSPRO. Several positive and negative features of the user interface were provided which can be used in the design of improved ERP systems for instructional purposes. The results of this investigation can assist in narrowing the gap between industry requirements and IS education programmes. The ERP competency set provides a standardised list of skills and knowledge which is the starting point for any skills improvement program. The ERPEd framework can improve the quality of ERP courses and the competencies of IS graduates. This in turn, can benefit the business community since it will improve the chances of ERP project success. This research is a major contribution to both government and academic initiatives in South Africa to address both the ICT skills problem as well as the need for ERP specialists.
- Full Text:
- Date Issued: 2011
A framework for the application of network telescope sensors in a global IP network
- Authors: Irwin, Barry Vivian William
- Date: 2011
- Subjects: Sensor networks Computer networks TCP/IP (Computer network protocol) Internet Computer security Computers -- Access control Computer networks -- Security measures Computer viruses Malware (Computer software)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4593 , http://hdl.handle.net/10962/d1004835
- Description: The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
- Full Text:
- Date Issued: 2011
- Authors: Irwin, Barry Vivian William
- Date: 2011
- Subjects: Sensor networks Computer networks TCP/IP (Computer network protocol) Internet Computer security Computers -- Access control Computer networks -- Security measures Computer viruses Malware (Computer software)
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4593 , http://hdl.handle.net/10962/d1004835
- Description: The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
- Full Text:
- Date Issued: 2011
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A Framework for the Management of Operator Policies and User Preferences for Service Compositions in the IP Multimedia Subsystem
- Tsietsi, Mosiuoa, Terzoli, Alfredo, Wells, George C
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430680 , vital:72708 , https://ieeexplore.ieee.org/abstract/document/6032212
- Description: The IP Multimedia Subsystem (IMS) is a telecommunication middleware platform with robust service features that enables the delivery of a wide range of services to mobile network subscribers. Network operators are encouraged to develop services from service building blocks in order to avoid redundancies by re-using existing functionality. In this environ-ment, operators must be able to control the service execution chain in order to prevent undesirable interactions from occurring between indi-vidual building blocks. It is also in their interests to provide subscribers with personalisation options so that they can modify service composi-tions and define their own preferences for how they would like their ser-vices to behave during live sessions. This paper describes a solution for these challenges that involves the storage of service information in an XDMS and allows operator staff and subscribers to manage this in-formation using the XCAP protocol. The ETSI-defined XCAP applica-tion usage named simservs was chosen to demonstrate an application usage that can be used to create service compositions in XML format. A prototype is described that uses components of the open source Mo-bicents project to verify the suitability of the design. This work is part of a larger effort aimed at modeling interaction management in the IMS through the use of a service broker that is part of an extended IMS ser-vice layer (EISL). The service broker's functional and structural architec-ture have not yet been standardised.
- Full Text:
- Date Issued: 2011
- Authors: Tsietsi, Mosiuoa , Terzoli, Alfredo , Wells, George C
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430680 , vital:72708 , https://ieeexplore.ieee.org/abstract/document/6032212
- Description: The IP Multimedia Subsystem (IMS) is a telecommunication middleware platform with robust service features that enables the delivery of a wide range of services to mobile network subscribers. Network operators are encouraged to develop services from service building blocks in order to avoid redundancies by re-using existing functionality. In this environ-ment, operators must be able to control the service execution chain in order to prevent undesirable interactions from occurring between indi-vidual building blocks. It is also in their interests to provide subscribers with personalisation options so that they can modify service composi-tions and define their own preferences for how they would like their ser-vices to behave during live sessions. This paper describes a solution for these challenges that involves the storage of service information in an XDMS and allows operator staff and subscribers to manage this in-formation using the XCAP protocol. The ETSI-defined XCAP applica-tion usage named simservs was chosen to demonstrate an application usage that can be used to create service compositions in XML format. A prototype is described that uses components of the open source Mo-bicents project to verify the suitability of the design. This work is part of a larger effort aimed at modeling interaction management in the IMS through the use of a service broker that is part of an extended IMS ser-vice layer (EISL). The service broker's functional and structural architec-ture have not yet been standardised.
- Full Text:
- Date Issued: 2011
A framework to enhance the mobile user experience in an Mlearning interaction
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
- Authors: Botha, Adele
- Date: 2011
- Subjects: Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9753 , http://hdl.handle.net/10948/d1008163 , Educational technology , Information technology , Educational innovations , Teaching -- Aids and devices
- Description: The new millennium is witness to a telecommunications world that is vastly different from even the recent past with developments in the mobile sector having dramatically changed the Information and Communication Technology (ICT) landscape. Mobile cellular technology has proliferated faster than any previous technology and is now the most ubiquitous technology in the world. The focus of this thesis is the development of a framework to enhance the Mobile User Experience in an Mlearning interaction. This research is contextualised by the goal-oriented use of mobile cellular technologies in a formal educational environment. As such the study, although residing in the field of Human-Computer Interaction (HCI), acknowledges issues arising in the Education Domain as a specific field of application. The aim of the research was to investigate the components of a framework to enhance the Mobile User Experience in an Mlearning interaction. The development of the framework was facilitated by the exploration of: the Mobile User Experience factors and their impact, on the Mobile User Experience of learners participating in a goal-oriented Mlearning interaction. These critical factors were documented in terms of the Mobile User Experience components, and the relationships of these components to each other as well as the Mobile User Experience of an Mlearning interaction. The research, grounded in a phenomenological research philosophy, applied an inductive reasoning approach, and was operationalised through a single case study methodology. A qualitative research strategy was considered appropriate, as the phenomenon of User Experience is linked to the hedonistic attributes of the interaction. This study was conducted in four phases with focus on three embedded units of analysis. The three units of analysis were identified as: The learner as end user in an Mlearning interaction; The educator as designer of the Mlearning interaction; and The Mlearning interaction. The research revealed that the Mobile User Experience of an Mlearning interaction is affected by the mobile user, mobile use, mobile device, mobile business practices, mobile networks, mobile interaction and mobile context. Within the Mlearning interaction the significant components are the learners as mobile users, the enhance interactions, removal of barriers to the interaction, goal-oriented nature of the interaction and the ducational context. Identifying these components and their associated Mobile User Experience factors and impacts, present the main contribution of this thesis. In conclusion, the limitations of the study are documented and topics for future research are outlined.
- Full Text:
- Date Issued: 2011
A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011