Spelling suggestions: "subject:"privacy, light off -- south africa"" "subject:"privacy, light off -- south affrica""
1 |
The Law of privacy in South Africa.McQuoid-Mason, David Jan. January 1977 (has links)
No abstract available. / Thesis (LL.M.)-University of Natal, Durban, 1977.
|
2 |
South African consumers' information privacy concerns : an investigation in a commercial environmentJordaan, Yolanda 20 August 2007 (has links)
Please read the abstract (Synopsis) in the section 00front of this document / Thesis (DCom)--University of Pretoria, 2007. / Marketing Management / DCom / Unrestricted
|
3 |
'Privacy in the workplace' : striking a balance between the privacy concerns of employees and the operational requirements of employers.Kondiah, Sarisha Shanel. 04 November 2013 (has links)
The value underlying privacy lies in the fact that it mirrors the very idea of human dignity and the protection of the personal realm. However operational requirements of employers and advancements in science and technology continuously challenge the notion of privacy in the workplace. Employees all over the world are victims of a number of privacy invasive measures including, but not limited to drug testing, background checks, HIV/AIDS testing and polygraph testing. Present day advancements in technology and science make the recognition and protection of the right to privacy even more urgent. The concept of privacy in the workplace has grown in importance as technology has enabled sophisticated forms of testing and monitoring of employees. As a result of these advancements a deep tension has arisen between two conflicting sets of principles. Consequently the rationale for this study is to strike a balance between the employee’s right to privacy and the employers right to conduct his or her business as he or she deems fit. This will be done through an analysis of a number of practices adopted by the employer in the workplace of which contribute to the infringement. Further the admissibility of such evidence procured by the employer through these practices will be interrogated. This is a significant issue as scientific and technological advancements have a very tangible impact on the wellbeing of employees. / Thesis (LL.M.)-University of KwaZulu-Natal, Durban, 2012.
|
4 |
Compliance of health professionals with patient confidentiality when using PACS and RISMahlaola, Tintswalo Brenda 20 January 2015 (has links)
M.Tech. (Radiography) / The Radiology Information System and the Picture Archiving and Communication System have contributed to improved patient care by eradicating delays in the clinical management of patients. This is achieved by permitting access to instantaneous radiology interpretations and secondary consultations; creating a basis for teleradiology and reducing storage costs by replacing conventional archives with cheaper digital storage. However, the former has attributed to the recent rise in confidentiality breaches involving medical data in the United States of America. Yet, reports of this nature remain unknown in the South African context. Breaches by authorised users remain an under investigated issue and continue to threaten the confidentiality of data. This assumption was employed as the conceptual basis for this study while, the Theory of Planned Behaviour was utilised to generate probable causes of deviant behaviour. A sample of health professionals (n=115) and information technologists (n=2) was drawn to collect data. The extent of compliance was expressed as a percentage error of the discrepancy between the observed behaviour and the regulations stipulated by the Health Insurance Portability and Accountability Act. The independent variable (work practices) were categorised into access restriction, intrinsic security measures and the actual breach incidences. The non-parametric Chi-Square test was used to calculate statistical significance the correlational extent of which was determined using the phi coefficient. Both Research Settings indicated poor compliance (percentage errors of 67.3 and 70.37) with the mandated regulations. The study provides insight about the confidentiality status within the South African context. This is the kind of information sought by regulators to aid keep pace with the rapid advances in Information Technology.
|
5 |
A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South AfricaVisser, Diane 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of
database marketing. Database marketing involves the collection, processing and
dissemination of vast amounts of consumer information in order to compile detailed consumer
databases. The increasing popularity of database marketing can be attributed to various
factors. Consumer information can now be obtained easier, cheaper and faster due to the
availability of information technology. It has become easier to segment consumer markets
and it is possible to identify consumer trends. It is possible to make predictions of consumer
behaviour or buying patterns because consumer databases provide a more complete consumer
profile with information ranging from demographics, psycho graphics to life-style
information. Database technology improves the efficiency and effectiveness of marketing
campaigns because marketers can analyse the available information and select the most
appropriate marketing strategies and tactics, while concentrating efforts on the most profitable
consumer. Marketers therefore waste less effort, money, and other resources by not
promoting to individuals who are unlikely to react upon such offers. Widespread databases
assist marketers in offering products that are more reasonably priced and more precisely
tailored for smaller, more homogeneous market segments. Improved product and service
offerings as well as the availability of a wider variety of products and services will likely
result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers
use consumer information to improve the overall marketing strategy and individual customer
service.
Consumers are concerned about database marketing practices because consumers believe
some data practices invade personal privacy. The need for privacy has always been inherent
to human nature and the concept of privacy dates back to early mankind. One should
however differentiate between an individual's basic need for privacy from a general
perspective and privacy within a consumer-marketer context. Privacy from a general
perspective refers to one's territoriality and need for physical seclusion, whereas consumer
privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and
Stone proposed that a state of privacy exist when a consumer can control social interaction,
unwanted external stimuli, and the dissemination of personal information as well as being
able to make independent decisions without outside interference. Consumers' need for
privacy is however, in conflict with the need for social interaction and the need to participate
in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that
when consumers participate in a business transaction, or where an exchange relationship
exists between the database marketer and consumer, consumers could expect that a degree of
privacy will be lost.
Consumer groups however, argue that some marketing practices invade the reasonable
amount of privacy consumers should be able to expect. The raising consumer concern for
privacy is attributable to several reasons. The primary driver of consumer concern is the
general lack of knowledge on data collection and use. Other reasons for the raising privacy
concern include the type of information collected and the amount of control consumers have
over subsequent use of data; the use of personal information to identify specific individuals;
collection and use of sensitive information, such as medical and financial data; the volume of
information collected and used; secondary information use; the use and dissemination of
inaccurate databases; the collection and use of children's data; the lack of tangible benefits
received in exchange for information provided; and the use of consumer information for
financial gain. Consumers have also expressed concern about electronic database marketing
practices because of the secrecy in data collection and use. However, privacy concerns may
vary depending on consumers' cultural orientation, age, perception on what constitutes good
marketing ethics or the specific methods employed to obtain consumer data. One could
distinguish between several consumer clusters when considering consumers" attitudes on
database marketing practices and personal privacy. In this regard the typical South African
consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent
they are exposed to database marketing activities. The South African database marketing
industry is still in its infancy phase and as the industry progress, and consumers become more
knowledgeable, privacy concerns are likely to increase.
It is important to address the issues that raise consumer privacy concerns and to find solutions
for ensuring sustainable database marketing practice in future. Marketers' information needs
and consumers' privacy needs should somehow be balanced in order to withhold government
intervention. Compromises from both sides are necessary to reach a more balanced
relationship between the two parties. The successful outcome of the privacy debate will
depend on marketers' understanding of consumer privacy issues and by addressing these
accordingly.Several approaches exist for regulating database marketing practices that invade consumer
privacy: the implementation of information technology, self-regulation and government
intervention. Self-regulation is preferred for regulating database marketing practices, whereas
privacy-enhancing information technology is recommended as a supplemental tool for
protecting consumer privacy. Government regulating seems to be the last resort because of
unnecessary restrictions that might be imposed on database marketing activities.
Recommended models for regulating database marketing activities and for protecting
consumer privacy in South Africa are the Registration Model, together with elements of the
Data Commissioner Model. These models were proposed after careful consideration of
characteristics, unique to the South African database marketing industry. The models place
the responsibility for data protection with the database marketer and the South African
government, rather than with the consumer. The Registration Model and the Data
Commissioner Model seems a viable combination for implementation in South Africa
because these models acknowledge the fact that South African pragmatic consumers are not
well educated and informed enough on privacy invading database marketing practices. This
combination rarely involves any consumer participation and therefore suits the typical
apathetic nature of South African consumers.
The Registration Model acts like a notice system where an agency, currently the Direct
Marketing Association of South Africa, develops principles of fair information practices to
which registered marketers need to comply with. A commission, an element of the Data
Commissioner Model, has power to investigate consumer complaints, constrain development
of databases, review data practices and advise on improvements on data collectors' systems.
The commission could also monitor advancements in information technology that may
enhance consumer privacy. The only problem with these models seems to be that the agency
and or the commission have no authoritative power to enforce compliance with principles and
codes of conduct.
Industry self-regulation in conjunction with some governmental control and the application of
information technology seems to be useful in providing adequate levels of consumer privacy
and data protection. Such a combination might strike a balance between South African
consumers' need for privacy and South African marketers' need for consumer information. / AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die
toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling,
prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom
gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van
databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit
baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe
makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te
identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en
aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf
demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige
verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit
van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees
gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op
die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander
hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel
waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help
bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer
homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die
beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik
hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus,
bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele
diens aan verbruikers te verbeter.
Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige
data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was
nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot
vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se
basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n
verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n
individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor
verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike
inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers
wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite
te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik
met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële
transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap,
hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat
wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan
tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van
privaatheid verlore sal gaan.
Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe
argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting
van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan
verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan
kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by
privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor
die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke
individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos
byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik
word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate
databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel
daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis
bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die
belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie,
ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik
om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie
verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en
persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse
verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die
mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse
databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer
ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem.
Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan
te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en
verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging
te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding
tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat
sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit
dienooreenkomstig aan te spreek.
Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid
kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en
owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke
te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word
as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word
gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op
databasisbemarkingsaktiwitei te.
Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die
beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met
elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe,
uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die
modelle plaas die verantwoordelikheid van data beskerming in die hande van die
databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die
Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir
implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid
Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die
databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie
behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid
Afrikaanse verbruikers.
Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte
Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke
ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n
element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die
ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee
oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem
met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te
verseker dat beginsels en kodes van goeie gedrag afgedwing word nie.
Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van
inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en
data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid
Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte
aan verbruikersinligting.
|
6 |
Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.Donald, Katherine Faye January 2017 (has links)
A research report submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Arts, Johannesburg, 2017 / This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms. / XL2018
|
7 |
A sociological study of employees' perceptions of electronic surveillance in public FET institutions in the Eastern Cape Province, South AfricaJonas, Randolph Patrick January 2014 (has links)
The perceptions of employees regarding electronic surveillance in the workplace were studied using a mixed method approach. The change that permeates society and organisations have not escaped public FET institutions in South Africa. These changes such as computerisation of work and the employment of electronic surveillance, have implications for management, control, privacy, productivity and trust in the workplace. Yet, public FET institutions are not performing to the expected standards. Surveillance of work and employees at these institutions are interventions of management to ensure organisational goals are achieved. Despite the prevalence of electronic surveillance in the workplace, employee perceptions and their lived experiences thereof are seldom reported. Published research barely focuses on employees’ perceptions of electronic surveillance in the workplace, and instead offers a perfunctory look at the perceptual dimensions. Employees’ perceptions reflects their lived experiences in the workplace and yield a foundational understanding of workplace dynamics and organisational behaviour. The perceptions of employees regarding electronic surveillance were viewed through the lens of quantitative and qualitative analysis to give statistical and thick descriptions respectively to augment better understanding. The study therefore provides a descriptive account of employees’ perceptions of electronic surveillance and its effects. Specifically the study examined employee perceptions of electronic surveillance as a control measure of management, as an intrusion of employee privacy and impacting on the trust relationship and productivity. An extensive review of the literature provided the basis for the research questions and eight hypotheses were proposed. A survey, by means of an electronic questionnaire, was conducted to test the hypotheses using a random sample of employees at three public FET institutions in the Eastern Cape Province, South Africa. The results are presented followed by a discussion, conclusions and limitations. Suggestions and recommendations for future research are also indicated. The central thesis of the study is presented, namely that electronic surveillance is experienced as a measure of management to control workers and that privacy as well trust, as an element of the employment relationship, are influenced by it. Further findings indicated that there are no statistically significant differences in the responses of the three job categories namely lecturers, managers and administration and support staff. Interviews were also conducted and the data from the interviews reported the depth and breadth of the perceptions of a small sample of employees who related their experiences and situations in terms of the key themes of electronic surveillance as control and an intrusion of their right to privacy, trust and productivity. The findings indicate that acceptance of electronic surveillance is contingent upon contextual factors and the meaning people assign to their situations. Privacy concerns were limited to personal information, fairness and dignity. The link between electronic surveillance and control and discipline is reported in the responses. The findings indicate that perceptions of electronic surveillance as managerial control is related to the lived experiences of employees. Employees voiced positive perceptions of electronic surveillance in cases where management clearly communicates the purpose to the employees. The study of the subjective experiences of employees in workplaces under electronic surveillance thus helped to illuminate the intricacies of employment relationships in the changing world of work. The study findings widen the knowledge base on organisational behaviour and is essential for human resources management and organisational development interventions. Human rights and ethics are part of the sense making process when employees construct social reality. Management and control is redefined in various terms and has implications for change management strategies and organisational development practises in globalising and network society. The study raises the critical question whether electronic surveillance as an adjunct for bureaucratic control is still relevant in a changing world of work where good faith, trust and confidence are still highly valued. The insights into the role of trust in the employment relationship is important for managing public institutions in complex settings. Management must be aware of the differences in the lived experiences of employees when dealing with workplace issues.
|
8 |
Electronic communication in the workplace : employer vs employee legal rightsBarnardt, Gerard Louis 04 1900 (has links)
Thesis (LLM)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or
later. The rapid advancement in technology aimed at helping to monitor electronic
communication, makes it easier than ever before for employers to monitor the
electronic communications of their employees.
There are important questions to consider when dealing with the topic of monitoring
electronic communication. Examples include "mayan employer legally monitor
electronic communications?" and "how does monitoring affect the employee's right to
privacy?"
This thesis is an attempt to answer these and other related questions by analysing,
inter alia, South African legislation, the Constitution and case law, as well as
comparing the law as it applies in the United Kingdom and the United States of
America.
The analysis and conclusion offered in this thesis aim to provide theoretical
consideration to academics and practical application for employers that are faced with
the reality of monitoring electronic communications. / AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van
elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie
wat daarop gemik is om te help met die monitering van elektroniese kommunikasie,
maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van
hulle werknemers te monitor.
Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van
monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is
"mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak
monitering die werknemer se reg tot privaatheid?"
Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die
ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg
soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van
toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika.
Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die
verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir
werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies
gekonfronteer word.
|
9 |
Cybersecurity framework for cloud computing adoption in rural based tertiary institutionsPatala, Najiyabanu Noormohmed 18 May 2019 (has links)
MCom (Business Information Systems) / Department of Business Information Systems / Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a cybersecurity framework for adoption of cloud computing cybersecurity. The research questions focused on determining the drivers for cloud cybersecurity usage; the current adoption issues; how cybersecurity challenges, benefits, and quality affects cloud usage; the adoption perceptions and awareness of key stakeholders and identifying a cloud cybersecurity adoption framework. A quantitative approach was applied with data collected from a simple random sample of students, lecturers, admin and IT staff within the tertiary institutions through structured questionnaires.
The results suggested compliance with legal law as a critical driver for cloud cybersecurity adoption. The study also found a lack of physical control of data and harmful activities executed on the internet as challenges hampering the adoption. Prevention of identity fraud and cheaper security costs were identified as benefits of adoption. Respondents found cloud cybersecurity to be accurate and effective, although most of the students and employees have not used it. However, respondents were aware of the value of cybersecurity adoption and perceive for it to be useful and convenient, hence have shown the intention of adopting it. There were no significant elements identified to differentiate the perceptions of usage at rural and urban-based tertiary institutions. The results of the study are to be used for clarifying the cybersecurity aspects of cloud computing and forecasting the suitability cloud cybersecurity within the tertiary institutions. Recommendations were made on how tertiary institutions and management can promote cloud cybersecurity adoption and how students, lecturers, and staff can effectively use cloud cybersecurity. / NRF
|
10 |
A validated information privacy governance questionnaire to measure the perception of how effective privacy is governed in a financial institution in the South African contextSwartz, Paulus 04 1900 (has links)
The general aim of this research is to develop a conceptual privacy governance framework (CPGF) that can be used to develop a valid and reliable information privacy governance questionnaire (IPGQ) to assess the perception of employees of how effective the organisation governs privacy.
The CPGF was developed to incorporate a comprehensive set of privacy components that could assist management in governing privacy across an organisation. IPGQ statements were derived from the theory of the sub-components of CPGF, evaluated by an expert panel and pre-tested by a pilot group. A quantitative mono method research was followed using a survey questionnaire to collect data in a financial institution in South Africa. Exploratory Factor Analysis (EFA) was used to determine the underlying factorial structure and the Cronbach Alpha was used to establish the internal reliability of the factors. From the initial item reduction of the constructs, four factors were derived to test the privacy perception of employees. The IPGQ consisted of 49 valid and reliable questions. One-way Analysis of Variance (ANOVA) was used, and three significant differences were discovered among the demographical groups for the age groups and two for the employment status groups (organisational commitment and privacy controls).
The CPGF and IPGQ can aid organisations to determine if organisations are effectively governing the privacy in the organisations in order to assist them in meeting the accountability condition of the Protection of Personal Information Act (POPIA). / Computing / M. Sc. (Information Systems)
|
Page generated in 0.0966 seconds