301 |
The need for the harmonisation of provisional measures in international commercial arbitration in the European UnionMahabadi, Sadra January 2016 (has links)
International arbitration, as an essential part of any modern legal system, needs provisional measures to protect the rights and interests of the arbitration parties while they are awaiting the final decision of the tribunal. The existence of a legal framework enabling cross-border enforcement of such measures is of great importance in the EU, which allows free movement of citizens, assets and trade within its single European market. However, the enforcement of such measures within the EU lacks a legal framework. This is due, primarily, to two interrelated reasons. The first is the failure of international conventions to address the issue of the cross-border enforcement of provisional measures and to resolve jurisdictional uncertainties between arbitral tribunals and national courts. The second reason is that the EU's attempts to remedy the shortcomings created by international conventions -via the Judgment Regulation ("The Recast") and decisions of the CJEU- have ultimately subverted the very system it sought to enhance. The aggregate effect of this failure has been overall increased complexity. This thesis will try to answer three questions: 1) Is it possible to find a solution to deal with the uncertain positions of arbitration agreements and proceedings within the EU, and can the suggested solution be utilised to help the regulation and use of provisional measures?; 2) Is it possible to harmonise the different approaches taken by Member States’ arbitration rules on the jurisdictions of national courts and arbitral tribunals in respect of granting provisional measures?; 3) Is it possible to achieve a cross-border enforcement mechanism for tribunal-ordered and court–ordered provisional measures (in support of arbitration proceedings) in the EU?In order to answer these questions, the thesis proposes the following: (1) Recognising an exclusive jurisdiction for the seat court to decide on the existence of the arbitration agreement; (2) Providing an exclusive jurisdiction for the arbitral tribunal to rule on the existence of the arbitration agreement after its formation; (3) Recognition of a supervisory role for the seat court in granting provisional measures and (4) Enforcement of tribunal-ordered measures in the form of awards. It is hoped that these suggestions will help determine the jurisdictions of arbitration tribunals and national courts in respect of provisional measures and arbitration agreements. It will also create a viable framework for cross-border enforcement of tribunal-ordered and court–ordered provisional measures. It is hoped that these suggestions will consequently help improve the efficiency of arbitration as a valuable form of alternative dispute resolution.
|
302 |
An information security perspective on XML web services.Chetty, Jacqueline 29 May 2008 (has links)
The Internet has come a long way from its humble beginnings of being used as a simple way of transporting data within the US army and other academic organizations. With the exploding growth of the Internet and the World Wide Web or WWW more and more people and companies are not only providing services via the WWW but are also conducting business transactions. In today’s Web-based environment where individuals and organizations are conducting business online, it is imperative that the technologies that are being utilized are secure in every way. It is important that any individual or organization that wants to protect their data in one form or another adhere to the five (5) basic security services. These security services are Identification and Authentication, Authorization, Confidentiality, Integrity and Non-repudiation This study looks at two Web-based technologies, namely XML and XML Web services and provides an evaluation of whether or not the 5 security services form part of the security surrounding these Web-based technologies. Part 1 is divided into three chapters. Chapter 1, is an Introduction and roadmap to the dissertation. This chapter provides an introduction to the dissertation. Chapter 2 provides an Overview of XML. The reader must not view this chapter as a technical chapter. It is simply a chapter that provides the reader with an understanding of XML so that the reader is able to understand the chapter surrounding XML security. Chapter 3 provides an Overview of Web services. Again the reader must not view this chapter as a technical chapter and as in chapter 2 this chapter must be seen as an overview providing the reader with a broad picture of what Web services is. A lot of technical background and know how has not been included in these two chapters. Part 2 is divided into a further three chapters. Chapter 4 is titled Computer Security and provides the reader with a basic understanding surrounding security in general. The 5 security services are introduced in more detail and the important mechanisms and aspects surrounding security are explained. Chapter 5 looks at how XML and Web services are integrated. This is a short chapter with diagrams that illustrate how closely XML and Web services are interwoven. Chapter 6 is the most important chapter of the dissertation. This chapter is titled XML and Web services security. This chapter provides the reader with an understanding of the various XML mechanisms that form part of the Web services environment, thus providing security in the form of the 5 security services. Each XML mechanism is discussed and each security service is discussed in relation to these various mechanisms. This is all within the context of the Web services environment. The chapter concludes with a table that summarizes each security service along with its corresponding XML mechanism. Part 3 includes one chapter. Chapter 7 is titled Mapping XML and Web services against the 5 security services. This chapter makes use of the information from the previous chapter and provides a summary in the form of a table. This table identifies each security service and looks at the mechanisms that provide that service within a Web services environment. Part 4 provides a conclusion to the dissertation. Chapter 8 is titled Conclusion and provides a summary of each preceding chapter. This chapter also provides a conclusion and answers the question of whether or not the 5 information security services are integrated into XML and Web services. / von Solms, S.H., Prof.
|
303 |
Design and analysis of an energy absorbing mechanism for mine cagesRosslee, Frank 06 September 2012 (has links)
M.Ing. / In the mining industry safety is a primary concern. Especially so when it comes to the large conveyances transporting people, equipment and ore up and down the shaft. Even though it has occurred seldomly, a so-called "slack rope event" - when the conveyance gets stuck in its guides - is extremely dangerous. If the conveyance should become freed it will fall freely until all the slack rope has been taken up and then whiplash. The immense strain could lead to complete failure of the rope or suspension mechanisms. The large deceleration rates experienced could in itself be sufficient to cause serious injury or even death to passengers. A strategy to alleviate this danger, originated by Greenway and Hymers (41), is to have passive energy absorber units in parallel to the suspension mechanism of the conveyance. In the event of an emergency the suspension mechanism will be detached and the absorbers will then be activated, safely absorbing the kinetic energy the conveyance has gained. The dynamic behaviour of the system with and without the energy absorbers in a free fall situation was studied and it was clear that the hazards associated with a slack rope event could be successfully alleviated using the energy absorbers. The question that now presented itself was, which energy absorbing mechanism should be used in this application. An encompassing set of qualifying criteria was subsequently set and after extensive research and evaluation the cyclic plastic bending energy absorber was deemed to be most suitable for this application, as also suggested by Greenway and Hymers (41). The device uses a metal element being bent and unbent while being pulled through a set of rollers. The kinetic energy is transformed to plastic metal deformation and dissipated as low grade heat. Further research was then done on this energy absorbtion device. It revealed a substantial amount of background information and two approximate equations for prediction of the resistive force delivered by the device. It was subsequently attempted to find an analytical solution from first principles, to predict the resistive force and characteristic behaviour of the device. Two solutions were obtained, using different approaches to the problem. A number of experiments were then conducted to study the actual characteristics and behaviour of the device. After manipulation of the results it was found that non-dimensional parameters could be formulated which would make it possible to predict the behaviour of full-scale prototypes using small-scale models. Upon comparing the experimental results with the analytical solutions it was found that the two analytical solutions provide an upper and lower bound to the experimental results. Finite element analysis was also utilized to characterize the behaviour of the device and to attempt to predict the resistive force the device delivers. The finite element models revealed some interesting characteristics of the device and mimicked the behaviour of the actual device. However, the resistive force values obtained, deviated slightly more from the experimental values than the scaling method or the analytical solutions. It is thus possible to predict the behaviour of the cyclicplastic- bending energy absorber by utilizing scaling techniques, analytical solutions or the finite element method. The cyclic-plastic-bending energy absorber has a wide spectrum of applications as it is a very versatile and reliable energy absorber.
|
304 |
Using virtualisation to create a more secure online banking infrastructureDu Toit, Jaco Louis 09 December 2013 (has links)
M.Sc. (Computer Science) / Sim swop, Phishing, Zeus and SpyEye are all terms that may be found in articles concerning online banking fraud. Home users are unsure of how the configuration of their computers affects the risk profile for conducting online banking. Software installed by a home user on their computer may be malware designed to steal banking details. Customers expect banks to provide a safe online banking system. The challenge that banks have is that they cannot control the configuration that exists on a client operating system. The V-Bank system was designed to determine whether virtualisation can be used as a means to increase the security for online banking. The V-Bank system uses a virtual machine that is run from a guest that is single purpose, read-only and fulfils the configuration requirements that the bank has for a client system. The V-Bank system also utilises public and private key encryption for identification, authentication and authorisation mechanisms in the online banking system. The architecture of the V-Bank system defines online banking as an end-to-end system. It approaches online banking as a system that consists of three major components. The three major components is a client-side component, network and server-side environment. The V-Bank system gives banks the ability to provide customers with a system that is controlled from the client, through the network to the server. The V-Bank system demonstrates that virtualisation can be used to increase the security of online banking.
|
305 |
Factors impacting the adoption of biometric authentication in the local banking sectorPooe, Antonio 08 November 2011 (has links)
M.Tech. / This research is concerned with establishing the causes for the slow adoption of biometric authentication in the South African banking sector and constitutes exploratory research. It looks at the widely accepted means of authentication and delves deeper into why these modes may not be sufficient to protect sensitive data. The scope of the research is limited to the banking sector only. The first sections of the study establish what the biometric authentication norms are amongst international banking institutions. This is then followed by an environmental study of the South African approach to biometric authentication. Owing to the limited number of banks in South Africa compared to developed countries, the study is limited to the four major banking institutions in South Africa, namely ABSA, Standard Bank, Nedbank and First National Bank. An online survey was used to gather the required data for analysis. The general approach adopted to investigate the extent to which biometric authentication is used by the said four banks was to first measure the respondents’ knowledge of biometrics and to establish the level of exposure the respondents had to the said technology. The next step was then to establish the extent to which the participating banks had investigated the use of biometric authentication. This was followed by consideration of the current use of biometric authentication and lastly, the future use and user perceptions regarding various aspects of biometric authentication in the financial services sector. A matrix that identifies the factors perceived to be impacting the adoption of biometric authentication concludes the last chapter on user perception.
|
306 |
Biometriese enkelaantekening tot IT stelselsTait, Bobby Laubscher 21 April 2009 (has links)
M.Comm.
|
307 |
The Neuropsychological Application of the WAIS-IV over the WAIS-IIIRobbins, Jessica 01 January 2014 (has links)
The current study examined the WAIS-IV and how the changes to the test may impact the measure's usefulness in neuropsychological evaluations. It was hypothesized that the WAIS-IV would be a significantly better predictor of performance on the neuropsychological measures of the Category Test, Finger Tapping Test, Trail Making Test, and Wisconsin Card Sorting Test over the WAIS-III. The mixed clinical sample came from an archival database of volunteer research participants and individuals clinically referred to a university outpatient facility. A total of 91 participants were administered the WAIS-III and WAIS-IV as part of a larger neuropsychological battery. The results of the current study found that both the WAIS-III and the WAIS-IV were able to account for a significant amount of the variance in performance on the neuropsychological measures, with the exception of the FTT dominant and non-dominant hands, where only the WAIS-IV was able to significantly account for the variance in performance on the measures. Using the Alf and Graf (1999) model, there were no significant R2 differences between the WAIS-III subtests and WAIS-IV at the .01 significance level. Thus, the WAIS-IV did not provide a better model for predicting performance on any of the neuropsychological measures. It should be noted that the small sample size of the current study may have inflated the R2, particularly in the WAIS-III models, which could have masked greater R2 differences between the two models. While the publishers endeavored to make the WAIS-IV a better measure of processing speed, working memory, and fluid reasoning, these goals were largely unmet. The analyses of the WAIS-IV working memory subtests, showed that the sequencing component added to the Digit Span subtest did not add to the relationship with neuropsychological measures with working memory components. The analyses of the WAIS-IV processing speed subtests showed that the Coding subtest of the WAIS-IV was a better measure of processing speed than the WAIS-III version, but this was not found for the PSI as a whole. Changes to Symbol Search did not show any improvement in the relationship to neuropsychological measures. One interesting finding was that the new subtest of Visual Puzzles does appear to add to the relationship with neuropsychological measures over the other subtests of the WAIS-IV. Visual Puzzles was consistently the highest correlated PRI subtest with the neuropsychological measures, with the exception of the WCST. The subtest appears to assess a wide range of abilities outside of the spatial reasoning skills purported by the test publishers. Specifically, the subtest was correlated with measures of processing speed, executive skills, and motor speed/reaction time. Thus, clinicians should use caution and examine all possible options when evaluating poor performance on this new subtest. Since none of the WAIS-IV models were able to significantly predict performance on any of the neuropsychological measures over the WAIS-III models, it would appear that the WAIS-IV as a whole is not a better neuropsychological measure than its predecessor. Despite being the gold standard for intellectual assessment, the WAIS-IV appears to add little to clinical utility over the WAIS-III outside of shorter administrative time. Clinicians are advised to continue using neuropsychological measures to assess processing speed, working memory, and higher order cognitive skills in conjunction with the WAIS.
|
308 |
Hostage incident management : preparedness and response of international non-governmental organisationsLauvik, Kjell Erik January 2014 (has links)
It is broadly accepted that there is a need for better security management and protocols for hostage incident management, there is currently a lack of basic empirical knowledge about the existing security management protocols with reference to existing policies, knowledge and the capability of International Non-Governmental Organisations (INGOs) to handle hostage incidents. Many INGOs have successfully managed high-profile hostage crises, but there is still a considerable level of uncertainty about the way these crises have been solved and the way their success can be seen in relation to other crises. This study aimed to understand how INGOs prepare themselves for hostage incidents, whether policies, procedures are in place, how they manage hostage situations, and also how INGO staff are trained and prepared. The methodology adopted for this study was qualitative and comprised of indepth interviews with sixteen INGOs and ten industry experts and a review of INGO documents, policies and plans. The study sheds light on some of the less talked-about aspects for INGO security management in general, as well as preparedness and responsibility towards their staff. The study suggests that while most organisations have a level of preparedness in place, enhancing each agency’s respective policies may assist the organisation in better management. The study also found that there is a higher use of ransom payment than expected, and that there is an increasing willingness to engage external expertise to assisting in managing a hostage crisis. The study makes several recommendations that may have policy implications, including pre-deployment hostile environment training, reviewing potential cooperation between INGOs and United Nations, and the use of external resources to assist in managing a hostage crisis. It also recommends a revision of existing negotiation models, as the current models are lacking in addressing protracted hostage cases. The establishment of an accurate database of incidents to allow for improved interpretation of trends and scope of hostage cases is also recommended.
|
309 |
Towards a user centric model for identity and access management within the online environmentDeas, Matthew Burns January 2008 (has links)
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication.
|
310 |
Determinants of household food security in the semi-arid areas of Zimbabwe: a case study of irrigation and non-irrigation farmers in Lupane and Hwange districtsSikwela, Misery Mpuzu January 2008 (has links)
Lupane and Hwange districts fall under natural region IV and V and lie in the semi-arid regions of Zimbabwe with low and erratic mean annual rainfall not exceeding 600mm. Seventy percent of Zimbabwe’s population lives in communal areas, whose livelihood is based on agriculture. The communities in these areas mainly practice mixed farming systems. However, crop production is constrained by water availability and suitable production techniques. As a result households in these areas are experiencing worsening levels of household food insecurity. Two irrigation schemes were identified for this study and these are located in these two districts. Tshongokwe irrigation scheme is located in Lupane district and Lukosi irrigation scheme is located in Hwange district and these irrigation schemes are about 25 hectares in size. Lupane and Hwange districts are considered to be one of the most food insecure areas in the country because of the frequent droughts and unreliable rainfall in the region. The major tool of enquiry in this study was the questionnaire which was used to collect data from the households that farm on irrigated land and those that farm on dryland farming. Household and farm characteristics were collected using structured questionnaires with the help of locally recruited and trained enumerators. Agricultural production, household consumption and marketing of agricultural produce were accessed using the questionnaire to establish problems experienced by farmers. The main objective of this study was to investigate the determinants of household food security using a logistic regression model. The model was initially fitted with thirteen variables, selected from factors identified by previous researchers that affect food security in communal areas. Six variables were found to be significant at 1, 5 and 10 percent significance level and all had the expected signs except farm size. These factors include access to irrigation, farm size, cattle ownership, fertilizer application, household size and per capita aggregate production. The results obtained were further analyzed to compute partial effects on continuous variables and change in probabilities on the discrete variables for the significant factors in the logistic regression model. Analysis of partial effects revealed that household size, farm size, cattle ownership and per capita aggregate production lead to a greater probability of household being food secure. Change in probability results showed that having access to irrigation and using fertilizer can increase the probability of household being food secure The findings of this study highlight a positive and significant relationship between access to irrigation, fertilizer application, cattle ownership, per capita aggregate production to household food security. Household size and farm size have a negative and significant relationship on household food security. This study shows the effectiveness of irrigated farming over dryland farming in the semi-arid areas. The results show increased agricultural production, crop diversification and higher incomes from irrigation farming as compared to dry land farming. Irrigation farming has enabled many households to diversify their source of income and generate more income. Irrigation has enabled households with irrigation not only to feed themselves throughout the year but also to invest on non-agricultural goods and services from incomes received from crop sales Based on the results from the logistic regression model, it can be concluded that household size, farm size, per capita aggregate production, cattle ownership, fertilizer application and access to irrigation have a positive effect on household food security and the magnitude of changes in conditional probabilities have an impact on household food security.
|
Page generated in 0.0607 seconds