• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 3
  • 2
  • Tagged with
  • 22
  • 22
  • 22
  • 22
  • 13
  • 11
  • 10
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Law of privacy in South Africa.

McQuoid-Mason, David Jan. January 1977 (has links)
No abstract available. / Thesis (LL.M.)-University of Natal, Durban, 1977.
2

South African consumers' information privacy concerns : an investigation in a commercial environment

Jordaan, Yolanda 20 August 2007 (has links)
Please read the abstract (Synopsis) in the section 00front of this document / Thesis (DCom)--University of Pretoria, 2007. / Marketing Management / DCom / Unrestricted
3

'Privacy in the workplace' : striking a balance between the privacy concerns of employees and the operational requirements of employers.

Kondiah, Sarisha Shanel. 04 November 2013 (has links)
The value underlying privacy lies in the fact that it mirrors the very idea of human dignity and the protection of the personal realm. However operational requirements of employers and advancements in science and technology continuously challenge the notion of privacy in the workplace. Employees all over the world are victims of a number of privacy invasive measures including, but not limited to drug testing, background checks, HIV/AIDS testing and polygraph testing. Present day advancements in technology and science make the recognition and protection of the right to privacy even more urgent. The concept of privacy in the workplace has grown in importance as technology has enabled sophisticated forms of testing and monitoring of employees. As a result of these advancements a deep tension has arisen between two conflicting sets of principles. Consequently the rationale for this study is to strike a balance between the employee’s right to privacy and the employers right to conduct his or her business as he or she deems fit. This will be done through an analysis of a number of practices adopted by the employer in the workplace of which contribute to the infringement. Further the admissibility of such evidence procured by the employer through these practices will be interrogated. This is a significant issue as scientific and technological advancements have a very tangible impact on the wellbeing of employees. / Thesis (LL.M.)-University of KwaZulu-Natal, Durban, 2012.
4

Compliance of health professionals with patient confidentiality when using PACS and RIS

Mahlaola, Tintswalo Brenda 20 January 2015 (has links)
M.Tech. (Radiography) / The Radiology Information System and the Picture Archiving and Communication System have contributed to improved patient care by eradicating delays in the clinical management of patients. This is achieved by permitting access to instantaneous radiology interpretations and secondary consultations; creating a basis for teleradiology and reducing storage costs by replacing conventional archives with cheaper digital storage. However, the former has attributed to the recent rise in confidentiality breaches involving medical data in the United States of America. Yet, reports of this nature remain unknown in the South African context. Breaches by authorised users remain an under investigated issue and continue to threaten the confidentiality of data. This assumption was employed as the conceptual basis for this study while, the Theory of Planned Behaviour was utilised to generate probable causes of deviant behaviour. A sample of health professionals (n=115) and information technologists (n=2) was drawn to collect data. The extent of compliance was expressed as a percentage error of the discrepancy between the observed behaviour and the regulations stipulated by the Health Insurance Portability and Accountability Act. The independent variable (work practices) were categorised into access restriction, intrinsic security measures and the actual breach incidences. The non-parametric Chi-Square test was used to calculate statistical significance the correlational extent of which was determined using the phi coefficient. Both Research Settings indicated poor compliance (percentage errors of 67.3 and 70.37) with the mandated regulations. The study provides insight about the confidentiality status within the South African context. This is the kind of information sought by regulators to aid keep pace with the rapid advances in Information Technology.
5

A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa

Visser, Diane 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer markets and it is possible to identify consumer trends. It is possible to make predictions of consumer behaviour or buying patterns because consumer databases provide a more complete consumer profile with information ranging from demographics, psycho graphics to life-style information. Database technology improves the efficiency and effectiveness of marketing campaigns because marketers can analyse the available information and select the most appropriate marketing strategies and tactics, while concentrating efforts on the most profitable consumer. Marketers therefore waste less effort, money, and other resources by not promoting to individuals who are unlikely to react upon such offers. Widespread databases assist marketers in offering products that are more reasonably priced and more precisely tailored for smaller, more homogeneous market segments. Improved product and service offerings as well as the availability of a wider variety of products and services will likely result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers use consumer information to improve the overall marketing strategy and individual customer service. Consumers are concerned about database marketing practices because consumers believe some data practices invade personal privacy. The need for privacy has always been inherent to human nature and the concept of privacy dates back to early mankind. One should however differentiate between an individual's basic need for privacy from a general perspective and privacy within a consumer-marketer context. Privacy from a general perspective refers to one's territoriality and need for physical seclusion, whereas consumer privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and Stone proposed that a state of privacy exist when a consumer can control social interaction, unwanted external stimuli, and the dissemination of personal information as well as being able to make independent decisions without outside interference. Consumers' need for privacy is however, in conflict with the need for social interaction and the need to participate in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that when consumers participate in a business transaction, or where an exchange relationship exists between the database marketer and consumer, consumers could expect that a degree of privacy will be lost. Consumer groups however, argue that some marketing practices invade the reasonable amount of privacy consumers should be able to expect. The raising consumer concern for privacy is attributable to several reasons. The primary driver of consumer concern is the general lack of knowledge on data collection and use. Other reasons for the raising privacy concern include the type of information collected and the amount of control consumers have over subsequent use of data; the use of personal information to identify specific individuals; collection and use of sensitive information, such as medical and financial data; the volume of information collected and used; secondary information use; the use and dissemination of inaccurate databases; the collection and use of children's data; the lack of tangible benefits received in exchange for information provided; and the use of consumer information for financial gain. Consumers have also expressed concern about electronic database marketing practices because of the secrecy in data collection and use. However, privacy concerns may vary depending on consumers' cultural orientation, age, perception on what constitutes good marketing ethics or the specific methods employed to obtain consumer data. One could distinguish between several consumer clusters when considering consumers" attitudes on database marketing practices and personal privacy. In this regard the typical South African consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent they are exposed to database marketing activities. The South African database marketing industry is still in its infancy phase and as the industry progress, and consumers become more knowledgeable, privacy concerns are likely to increase. It is important to address the issues that raise consumer privacy concerns and to find solutions for ensuring sustainable database marketing practice in future. Marketers' information needs and consumers' privacy needs should somehow be balanced in order to withhold government intervention. Compromises from both sides are necessary to reach a more balanced relationship between the two parties. The successful outcome of the privacy debate will depend on marketers' understanding of consumer privacy issues and by addressing these accordingly.Several approaches exist for regulating database marketing practices that invade consumer privacy: the implementation of information technology, self-regulation and government intervention. Self-regulation is preferred for regulating database marketing practices, whereas privacy-enhancing information technology is recommended as a supplemental tool for protecting consumer privacy. Government regulating seems to be the last resort because of unnecessary restrictions that might be imposed on database marketing activities. Recommended models for regulating database marketing activities and for protecting consumer privacy in South Africa are the Registration Model, together with elements of the Data Commissioner Model. These models were proposed after careful consideration of characteristics, unique to the South African database marketing industry. The models place the responsibility for data protection with the database marketer and the South African government, rather than with the consumer. The Registration Model and the Data Commissioner Model seems a viable combination for implementation in South Africa because these models acknowledge the fact that South African pragmatic consumers are not well educated and informed enough on privacy invading database marketing practices. This combination rarely involves any consumer participation and therefore suits the typical apathetic nature of South African consumers. The Registration Model acts like a notice system where an agency, currently the Direct Marketing Association of South Africa, develops principles of fair information practices to which registered marketers need to comply with. A commission, an element of the Data Commissioner Model, has power to investigate consumer complaints, constrain development of databases, review data practices and advise on improvements on data collectors' systems. The commission could also monitor advancements in information technology that may enhance consumer privacy. The only problem with these models seems to be that the agency and or the commission have no authoritative power to enforce compliance with principles and codes of conduct. Industry self-regulation in conjunction with some governmental control and the application of information technology seems to be useful in providing adequate levels of consumer privacy and data protection. Such a combination might strike a balance between South African consumers' need for privacy and South African marketers' need for consumer information. / AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling, prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus, bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele diens aan verbruikers te verbeter. Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap, hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van privaatheid verlore sal gaan. Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie, ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem. Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit dienooreenkomstig aan te spreek. Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op databasisbemarkingsaktiwitei te. Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe, uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die modelle plaas die verantwoordelikheid van data beskerming in die hande van die databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid Afrikaanse verbruikers. Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te verseker dat beginsels en kodes van goeie gedrag afgedwing word nie. Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte aan verbruikersinligting.
6

Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.

Donald, Katherine Faye January 2017 (has links)
A research report submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Arts, Johannesburg, 2017 / This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms. / XL2018
7

A sociological study of employees' perceptions of electronic surveillance in public FET institutions in the Eastern Cape Province, South Africa

Jonas, Randolph Patrick January 2014 (has links)
The perceptions of employees regarding electronic surveillance in the workplace were studied using a mixed method approach. The change that permeates society and organisations have not escaped public FET institutions in South Africa. These changes such as computerisation of work and the employment of electronic surveillance, have implications for management, control, privacy, productivity and trust in the workplace. Yet, public FET institutions are not performing to the expected standards. Surveillance of work and employees at these institutions are interventions of management to ensure organisational goals are achieved. Despite the prevalence of electronic surveillance in the workplace, employee perceptions and their lived experiences thereof are seldom reported. Published research barely focuses on employees’ perceptions of electronic surveillance in the workplace, and instead offers a perfunctory look at the perceptual dimensions. Employees’ perceptions reflects their lived experiences in the workplace and yield a foundational understanding of workplace dynamics and organisational behaviour. The perceptions of employees regarding electronic surveillance were viewed through the lens of quantitative and qualitative analysis to give statistical and thick descriptions respectively to augment better understanding. The study therefore provides a descriptive account of employees’ perceptions of electronic surveillance and its effects. Specifically the study examined employee perceptions of electronic surveillance as a control measure of management, as an intrusion of employee privacy and impacting on the trust relationship and productivity. An extensive review of the literature provided the basis for the research questions and eight hypotheses were proposed. A survey, by means of an electronic questionnaire, was conducted to test the hypotheses using a random sample of employees at three public FET institutions in the Eastern Cape Province, South Africa. The results are presented followed by a discussion, conclusions and limitations. Suggestions and recommendations for future research are also indicated. The central thesis of the study is presented, namely that electronic surveillance is experienced as a measure of management to control workers and that privacy as well trust, as an element of the employment relationship, are influenced by it. Further findings indicated that there are no statistically significant differences in the responses of the three job categories namely lecturers, managers and administration and support staff. Interviews were also conducted and the data from the interviews reported the depth and breadth of the perceptions of a small sample of employees who related their experiences and situations in terms of the key themes of electronic surveillance as control and an intrusion of their right to privacy, trust and productivity. The findings indicate that acceptance of electronic surveillance is contingent upon contextual factors and the meaning people assign to their situations. Privacy concerns were limited to personal information, fairness and dignity. The link between electronic surveillance and control and discipline is reported in the responses. The findings indicate that perceptions of electronic surveillance as managerial control is related to the lived experiences of employees. Employees voiced positive perceptions of electronic surveillance in cases where management clearly communicates the purpose to the employees. The study of the subjective experiences of employees in workplaces under electronic surveillance thus helped to illuminate the intricacies of employment relationships in the changing world of work. The study findings widen the knowledge base on organisational behaviour and is essential for human resources management and organisational development interventions. Human rights and ethics are part of the sense making process when employees construct social reality. Management and control is redefined in various terms and has implications for change management strategies and organisational development practises in globalising and network society. The study raises the critical question whether electronic surveillance as an adjunct for bureaucratic control is still relevant in a changing world of work where good faith, trust and confidence are still highly valued. The insights into the role of trust in the employment relationship is important for managing public institutions in complex settings. Management must be aware of the differences in the lived experiences of employees when dealing with workplace issues.
8

Electronic communication in the workplace : employer vs employee legal rights

Barnardt, Gerard Louis 04 1900 (has links)
Thesis (LLM)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's right to privacy?" This thesis is an attempt to answer these and other related questions by analysing, inter alia, South African legislation, the Constitution and case law, as well as comparing the law as it applies in the United Kingdom and the United States of America. The analysis and conclusion offered in this thesis aim to provide theoretical consideration to academics and practical application for employers that are faced with the reality of monitoring electronic communications. / AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie wat daarop gemik is om te help met die monitering van elektroniese kommunikasie, maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van hulle werknemers te monitor. Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is "mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak monitering die werknemer se reg tot privaatheid?" Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika. Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies gekonfronteer word.
9

Cybersecurity framework for cloud computing adoption in rural based tertiary institutions

Patala, Najiyabanu Noormohmed 18 May 2019 (has links)
MCom (Business Information Systems) / Department of Business Information Systems / Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a cybersecurity framework for adoption of cloud computing cybersecurity. The research questions focused on determining the drivers for cloud cybersecurity usage; the current adoption issues; how cybersecurity challenges, benefits, and quality affects cloud usage; the adoption perceptions and awareness of key stakeholders and identifying a cloud cybersecurity adoption framework. A quantitative approach was applied with data collected from a simple random sample of students, lecturers, admin and IT staff within the tertiary institutions through structured questionnaires. The results suggested compliance with legal law as a critical driver for cloud cybersecurity adoption. The study also found a lack of physical control of data and harmful activities executed on the internet as challenges hampering the adoption. Prevention of identity fraud and cheaper security costs were identified as benefits of adoption. Respondents found cloud cybersecurity to be accurate and effective, although most of the students and employees have not used it. However, respondents were aware of the value of cybersecurity adoption and perceive for it to be useful and convenient, hence have shown the intention of adopting it. There were no significant elements identified to differentiate the perceptions of usage at rural and urban-based tertiary institutions. The results of the study are to be used for clarifying the cybersecurity aspects of cloud computing and forecasting the suitability cloud cybersecurity within the tertiary institutions. Recommendations were made on how tertiary institutions and management can promote cloud cybersecurity adoption and how students, lecturers, and staff can effectively use cloud cybersecurity. / NRF
10

A validated information privacy governance questionnaire to measure the perception of how effective privacy is governed in a financial institution in the South African context

Swartz, Paulus 04 1900 (has links)
The general aim of this research is to develop a conceptual privacy governance framework (CPGF) that can be used to develop a valid and reliable information privacy governance questionnaire (IPGQ) to assess the perception of employees of how effective the organisation governs privacy. The CPGF was developed to incorporate a comprehensive set of privacy components that could assist management in governing privacy across an organisation. IPGQ statements were derived from the theory of the sub-components of CPGF, evaluated by an expert panel and pre-tested by a pilot group. A quantitative mono method research was followed using a survey questionnaire to collect data in a financial institution in South Africa. Exploratory Factor Analysis (EFA) was used to determine the underlying factorial structure and the Cronbach Alpha was used to establish the internal reliability of the factors. From the initial item reduction of the constructs, four factors were derived to test the privacy perception of employees. The IPGQ consisted of 49 valid and reliable questions. One-way Analysis of Variance (ANOVA) was used, and three significant differences were discovered among the demographical groups for the age groups and two for the employment status groups (organisational commitment and privacy controls). The CPGF and IPGQ can aid organisations to determine if organisations are effectively governing the privacy in the organisations in order to assist them in meeting the accountability condition of the Protection of Personal Information Act (POPIA). / Computing / M. Sc. (Information Systems)

Page generated in 0.0587 seconds