• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2595
  • 1642
  • 1321
  • 1038
  • 381
  • 226
  • 192
  • 138
  • 110
  • 101
  • 101
  • 100
  • 55
  • 49
  • 49
  • Tagged with
  • 9690
  • 1740
  • 1150
  • 1135
  • 1074
  • 1049
  • 773
  • 661
  • 616
  • 602
  • 567
  • 526
  • 490
  • 470
  • 467
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
731

Verborge gebreke : gister, vandag en more

Visser, E. (Eileen) January 2014 (has links)
The Consumer Protection Act 68 of 2008 is far-reaching, ambitious and the first of its kind in the Republic of South Africa. Before and even after the Act has come into force it still has many jurists scratching heads. The focus of this discussion will be on the effects of the Consumer Protection Act on the common law warranty against latent defects given by the seller as well as the effect of the Consumer Protection Act on the exclusion of the seller’s warranty in terms of a voetstoots clause. The consumer’s right to fair value, goods quality and safety (section 55) as well as the consumer’s implied warrant of quality (section 56) is discussed. The position as it stands in terms of English Law is also discussed with regards to latent defects. / Dissertation (LLM)--University of Pretoria, 2014. / lmchunu2014 / Private Law / unrestricted
732

The effect of the consumer protection act on contractual freedom

Fritz, M. (Maud) January 2014 (has links)
The purpose of this mini-dissertation is to determine whether and to what extent contractual freedom are infringed and/or obviated by the Consumer Protection Act and to establish if the limitation created by the CPA is the answer to the problem of inequality of bargaining powers of contracting parties. A fundamental concept of law of contract is freedom of contract: the idea that the parties are free to decide whether or not to contract; with whom to contract; and on what terms to contract. Despite the fact that freedom of contract is deeply engrained in our society it has a rather shaky foundation based on multiple assumptions and when objectively viewed the truth is that when making a contract there is always social and economical pressure that is implied in negotiating each and every contract. Having regard to the above it can be said that realistically speaking the fundamental concept of equality in the bargaining powers of contacting parties is the exception rather than the rule and that this unequal position has without a doubt undermined the true notion of freedom of contract. Our Common law has developed many rules and principles to curb this unfairness in the making of contracts. The CPA has praiseworthy intentions such as the promotion of fair business practice and the protection of the vulnerable from exploitation and unsafe and hazardous goods and/or products. Despite the good intentions of the CPA and every other aspect that might have an influence the problem remains enforcement of these principles. Thus despite the infringement of contractual freedom by the regulations of the CPA it appears not to be the answer to the problem of inequality in the bargaining power of parties negotiating a contract. / Dissertation (LLM)--University of Pretoria, 2014. / lmchunu2014 / Mercantile Law / unrestricted
733

The effect of the consumer protection act on the "voetstoots" clause in the South African law and comparison to the Belgium law

Mattheus, I. (Ilze) January 2014 (has links)
No Abstract Available / Dissertation (LLM)--University of Pretoria, 2014. / lmchunu2014 / Mercantile Law / unrestricted
734

Characterisation of the proteolytic activity in the digestive system of the field slug Deroceras reticulatum as a target for novel methods of control

Walker, Anthony John January 1997 (has links)
No description available.
735

The impact of Bedouin agricultural gardens on biodiversity in South Sinai, Egypt

Norfolk, Olivia January 2015 (has links)
This project assesses the impact of traditional Bedouin agricultural gardens on biodiversity within the St Katherine Protectorate, South Sinai, Egypt. The Bedouin harvest rainwater from intermittent flash floods, allowing them to cultivate a wide range of trees and crops throughout the year. Rainwater harvesting techniques such as these can improve crop yields and enhance food security in arid regions, but this is one of the first studies to address the impact upon dependent wildlife. The results showed that the irrigated gardens support a more diverse plant community than the surrounding unmanaged habitat, providing an abundance of floral resources which in-turn enhance pollinator abundance and species richness. The inclusion of a diversity of culturally important minority crops had a dramatic effect upon the structure of plant-pollinator visitation networks, with cultivated plants supplementing the resources provided by wild flowers. The presence of simultaneously flowering crops also had a positive effect upon pollination services to the primary crop (almond), by attracting higher densities of wild pollinators into the gardens and facilitating enhanced fruit set. The higher abundance of resources within the gardens also had a positive impact upon birds in the region, with gardens supporting higher densities and species richness than the unmanaged habitat. Gardens were particularly important for migratory species, providing an important stop-over for numerous small passerines. In conclusion this study provides evidence that irrigated agriculture in arid environments has the potential to increase biodiversity above that found in the un-managed environment. The implications on a local scale are that traditional Bedouin practices can have a positive influence on wildlife within the Protectorate, thus initiatives to fund and support gardeners should be encouraged. On a wider scale the results suggest that rainwater harvesting may provide a sustainable mechanism for increasing food security in arid regions, offering a low-cost strategy for increasing agricultural productivity that does not undermine the biodiversity on which it depends.
736

Application of the access path model with specific reference to the SAP R/3 environment

Pretorius, Maria Rebecca 07 October 2014 (has links)
M.Com. (Computer Auditing) / The management and control of modern day computer systems are becoming more and more trying due to the complexity of systems. This renders the traditional approach to evaluating controls in complex computer systems, inadequate and heightens the need for an alternative audit approach. The complex SAP R/3 environment will be evaluated in terms of security and validity of users and processes. This will be achieved through the use of an alternative audit approach namely, the application of the Access Path and Path Context Models (Boshoff 1985, 1990). The research methodology used during this research may indicate universal application implications for similar complex environments, although this has not yet been proved. The research showed that there are many control features available in the different software c.omponents of the SAP R/3 environment, that can be applied to control access and validity of users and processes. The duplication of control features provided by the software components, requires a global approach to security inthe defined environment. Only when evaluating the environment as a whole, will it be able to make the most effective security decisions. The use of the control matrices developed during this research will ease the global evaluation of the SAP R/3 environment. Although further research is required, the above has proven the usefulness of both the research methodology and the resultant model and matrices.
737

The automatic generation of information security profiles

Pottas, Dalenca 07 October 2014 (has links)
D.Phil. (Computer Science) / Security needs have changed considerably in the past decade as the economics of computer usage necessitates increased business reliance on computers. As more individuals need computers to perform their jobs, more detailed security controls are needed to offset the risk inherent in granting more people access to computer systems. Traditionally, computer security administrators have been tasked with configuring' , security systems by setting controls on the actions of users. This basically entails the compilation of access rules (contained in security profiles), which state who can access what resources in what way. The task of building these rules is of considerable magnitude and is in general not well understood. Adhoc approaches, characterized by exhaustive interviewing and endless printouts of organizational data repositories, are usually followed. In the end, too much is left to the discretion of the security administrators...
738

Packaged software : security and controls audit review

Van Heerden, Chris 15 September 2015 (has links)
M.Com. / In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate a high level of integration and include security and control features to ensure that the integrity of input, processing, output and storage are maintained. Computer auditors are required to evaluate these advanced packaged software to ensure that the security and control features are adequate and comply with organisational standards. Furthermore, they must ensure that the integrity of information systems programs and data are maintained ...
739

Design and implementation of a prototype to include security activities as part of application systems design

Kasselman, André 20 November 2014 (has links)
M.Com. (Information systems) / This study has its origin in the growing need for information systems to be classified as 'secure'. With the increasing use of Computer Aided Software Engineering (CASE) tools in the design of application systems for commercial use, the risks that exist in terms of information security have become more prominent. The importance of considering security during the analysis and design of an information system, in other words, on a logical level, is increasing daily. Usually security features are added to existing application systems on an ad hoc basis. Security design activities should become such an integrated part of systems analysis and design activities on a logical level, that a complete integration of the two fields, security and computer aided software engineering, can be achieved. The aim of this dissertation is to study the literature to discover existing approaches to this integration, and to extract the strengths from them and expand on those strengths in order to compile an approach that is completely implementable in the form of a prototype data flow design tool (DFD tool). The proposed approach to the secure analysis and design of an application system of a logical level, which is presented in Chapter 4, is designed in conjunction with H.A.S. Booysen [Booysen, Kasselman, Eloff - 1994]. Existing CASE-tools have also been studied by the author to determine their current capabilities, especially in terms of security definition activities, but also in terms of their support to the systems analyst during the analysis and design phases of the project life cycle when developing a target application system.
740

'n Model vir inligtingsekerheidsdokumentasie

Du Toit, Louisa Maria 20 November 2014 (has links)
M.Sc. (Informatics) / A need has been identified for guidelines to Top Management on the implementation of an Information Security Policy and its associated documentation. In this dissertation, the Model for Information Security Documentation (lSD-model) for the organisation and content of documentation on information security is proposed. The proposed model is divided into three distinct levels respectively containing the Information Security Policy Document, the Goal Documents and the Application Guideline Documents. A document is placed on the different levels of the ISO-model according to the amount of detailed information it contains and the management level mainly concerned with that document. Guidelines are given regarding the content and format of each of the levels. Particular emphasis is laid on the Information Security Policy Document, which is the highest level, and a number of existing Information Security Policy Documents are evaluated according to the guidelines given for the lSD-model. Finally, a comparison is made between C. C. Wood's guidelines on Information Security Policies and those given for the ISO-model.

Page generated in 0.0989 seconds