• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 4
  • 2
  • 1
  • Tagged with
  • 64
  • 64
  • 64
  • 64
  • 27
  • 23
  • 22
  • 20
  • 19
  • 19
  • 10
  • 10
  • 9
  • 9
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

The adoption and challenges of electronic voting technologies within the South African context

Achieng, Mourine Sarah January 2013 (has links)
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: in Information Technology in the Faculty of Informatics and Design at the Cape Peninsula University of Technology Supervisor: Dr Ephias Ruhode Cape Town campus December 2013 / The use of ICTs such as computers, electronic databases and other technologies have been in use for a number of years within the public sector to organise, manage and disseminate information to the public as well as to facilitate day-to-day communication in government offices. In this context, the value of the use of ICTs has been to assist and streamline government operations. The technological development in South Africa has opened up the possibilities of the use of ICTs in the democratic and governance process. E-democracy has been defined as a tool for abandoning the representative system for one with more direct citizen engagement. This study sets out to explore the challenges of the current electoral process, and also determine the factors that could influence the adoption and diffusion of e-voting technologies within the South African context. Literature has shown that countries such as Brazil and India have successfully implemented electronic voting systems and other countries are at various piloting stages to address many challenges and problems associated with manual paper based system such as costs of physical ballot paper and other overheads, electoral delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in this context that the study also seeks to determine whether the South African electoral management body can leverage on the opportunities that e-voting presents. However, with all the benefits that e-voting presents, there are countries such Germany, the Netherlands etc. that have tried and tested e-voting systems and decided to abandon these system to go back to the manual paper ballot voting systems because of various reasons ranging from cost, security and verifiability. This research is exploratory in nature and adopts qualitative research approach and it is within the interpretivism paradigm. Survey and interview strategies were used to collect data. A purposive sampling method was used to select the participants for the survey. To gain an understanding of the views of voters and electoral management body (IEC) about the current electoral process and e-voting technologies, literature was explored, a questionnaire was distributed online to voters and an in-depth semi-structured interview was conducted with the IEC. The study targeted voters who had access to the internet since the survey questionnaire was distributed online. The analysis is based on thematic analysis and diffusion of innovation (DoI) theory was also used to provide an analytical framework for the study. Through this framework the aims and objectives of the study were conceptualized around three constructs from the theory (relative advantage, compatibility and complexity). The findings of the study revealed that the three constructs from the DoI framework are important factors that may influence the adoption process of e-voting technologies. The findings also revealed other factors such as availability of ICT enable infrastructure and resources, digital divide, trust in technology, awareness of the technology and environment could that also influence the adoption process. The contributions of this research are anticipated to be a better understanding of the adoption of e-voting technologies in South Africa. For the electoral management bodies, the contribution of this research is that the research to some extent portrays factors that could influence the adoption of e-voting technologies in South Africa. Therefore, findings such as availability of ICT infrastructure and accessibility of these infrastructures should be taken into consideration before introducing e-voting technologies. Keywords: DoI (diffusion of Innovation), e-voting (electronic voting) technologies, E-governance, e-participation.
62

Security of electronic personal health information in a public hospital in South Africa

Chuma, Kabelo Given 01 1900 (has links)
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks. / Information Science / M. Inf. (Information Security)
63

Spatial technology as a tool to analyse and combat crime

Eloff, Corné 30 November 2006 (has links)
This study explores the utilisation of spatial technologies as a tool to analyse and combat crime. The study deals specifically with remote sensing and its potential for being integrated with geographical information systems (GIS). The integrated spatial approach resulted in the understanding of land use class behaviour over time and its relationship to specific crime incidents per police precinct area. The incorporation of spatial technologies to test criminological theories in practice, such as the ecological theories of criminology, provides the science with strategic value. It proves the value of combining multi-disciplinary scientific fields to create a more advanced platform to understand land use behaviour and its relationship to crime. Crime in South Africa is a serious concern and it impacts negatively on so many lives. The fear of crime, the loss of life, the socio-economic impact of crime, etc. create the impression that the battle against crime has been lost. The limited knowledge base within the law enforcement agencies, limited logistical resources and low retention rate of critical staff all contribute to making the reduction of crime more difficult to achieve. A practical procedure of using remote sensing technology integrated with geographical information systems (GIS), overlaid with geo-coded crime data to provide a spatial technological basis to analyse and combat crime, is illustrated by a practical study of the Tshwane municipality area. The methodology applied in this study required multi-skilled resources incorporating GIS and the understanding of crime to integrate the diverse scientific fields into a consolidated process that can contribute to the combating of crime in general. The existence of informal settlement areas in South Africa stresses the socio-economic problems that need to be addressed as there is a clear correlation of land use data with serious crime incidents in these areas. The fact that no formal cadastre exists for these areas, combined with a great diversity in densification and growth of the periphery, makes analysis very difficult without remote sensing imagery. Revisits over time to assess changes in these areas in order to adapt policing strategies will create an improved information layer for responding to crime. Final computerised maps generated from remote sensing and GIS layers are not the only information that can be used to prevent and combat crime. An important recipe for ultimately successfully managing and controlling crime in South Africa is to strategically combine training of the law enforcement agencies in the use of spatial information with police science. The researcher concludes with the hope that this study will contribute to the improved utilisation of spatial technology to analyse and combat crime in South Africa. The ultimate vision is the expansion of the science of criminology by adding an advanced spatial technology module to its curriculum. / Criminology / D.Litt. et Phil. (Criminology)
64

Spatial technology as a tool to analyse and combat crime

Eloff, Corné 30 November 2006 (has links)
This study explores the utilisation of spatial technologies as a tool to analyse and combat crime. The study deals specifically with remote sensing and its potential for being integrated with geographical information systems (GIS). The integrated spatial approach resulted in the understanding of land use class behaviour over time and its relationship to specific crime incidents per police precinct area. The incorporation of spatial technologies to test criminological theories in practice, such as the ecological theories of criminology, provides the science with strategic value. It proves the value of combining multi-disciplinary scientific fields to create a more advanced platform to understand land use behaviour and its relationship to crime. Crime in South Africa is a serious concern and it impacts negatively on so many lives. The fear of crime, the loss of life, the socio-economic impact of crime, etc. create the impression that the battle against crime has been lost. The limited knowledge base within the law enforcement agencies, limited logistical resources and low retention rate of critical staff all contribute to making the reduction of crime more difficult to achieve. A practical procedure of using remote sensing technology integrated with geographical information systems (GIS), overlaid with geo-coded crime data to provide a spatial technological basis to analyse and combat crime, is illustrated by a practical study of the Tshwane municipality area. The methodology applied in this study required multi-skilled resources incorporating GIS and the understanding of crime to integrate the diverse scientific fields into a consolidated process that can contribute to the combating of crime in general. The existence of informal settlement areas in South Africa stresses the socio-economic problems that need to be addressed as there is a clear correlation of land use data with serious crime incidents in these areas. The fact that no formal cadastre exists for these areas, combined with a great diversity in densification and growth of the periphery, makes analysis very difficult without remote sensing imagery. Revisits over time to assess changes in these areas in order to adapt policing strategies will create an improved information layer for responding to crime. Final computerised maps generated from remote sensing and GIS layers are not the only information that can be used to prevent and combat crime. An important recipe for ultimately successfully managing and controlling crime in South Africa is to strategically combine training of the law enforcement agencies in the use of spatial information with police science. The researcher concludes with the hope that this study will contribute to the improved utilisation of spatial technology to analyse and combat crime in South Africa. The ultimate vision is the expansion of the science of criminology by adding an advanced spatial technology module to its curriculum. / Criminology and Security Science / D.Litt. et Phil. (Criminology)

Page generated in 0.3878 seconds