• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
561

An examination of the impact of residential security measures on the incidence of residential burglary in two selected northern suburbs of Johannesburg: a security risk management approach

Olckers, Casparus 30 June 2007 (has links)
Motivation This project was of specific importance to the private security industry, victims of residential burglary, community policing forums and the South African Police Service in providing detailed information regarding recommendations of how to manage and combat residential burglary in two selected northern suburbs of Johannesburg. Problem statement Residential burglary is categorised in the top three highest reported crimes according to the official South African Police Service statistics for the 2006/7 financial years. A series of victim interviews, docket analysis, case plotting and residential security audit surveys were conducted to determine the extent (or lack thereof) of security measures at a burgled residence in the selected area. Approach Field data was collected through docket analysis, plotting crime scenes (descriptive mapping), victim interviews and residential security audit surveys. Results The majority of victims of burglary interviewed did not have the minimum security system (integrated measures) in place. Those victims, who had security measures, appeared not to have made or implemented effective use of them. Conclusion Security at a residence extends beyond just the immediate house area and the focus (security risk assessment) should start with the immediate neighbourhood (community) area working inwards towards the property perimeter (boundary), inner perimeter (garden area) and then finally the immediate house area. / CRIMINOLOGY / MTECH: SECURITY RISK MAN
562

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)
563

Implementation business-to-business electronic commerce website using active server pages

Teesri, Sumuscha 01 January 2000 (has links)
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
564

Awareness and training: the influence on end-user' attitude towards information security policy compliance

Snyman, Mmabatho Charity 02 1900 (has links)
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key concern for government just as it is for the private sector. Although awareness and training programmes are important factors impacting employees‘ intentions to comply with an organisation‘s ISP, it can be argued that there is insufficient empirical evidence to support this assertion. To address this gap, this study seeks to expand research on ISP compliance by focusing on attitudes as targets of change. A research model based on the Theory of Planned Behaviour was proposed to illustrate the influence of ISP awareness training on end-users‘ attitudes towards complying with their organisation‘s ISP. Relevant hypotheses were developed to test the research conceptualisation. A survey and an experiment was undertaken to collect the data from a sample of 173 end-users of a single government organisation in one province. The data was captured and analysed using a Statistical Package for Social Sciences (SPSS). Furthermore, Structural Equation Modelling (SEM) was used to test whether the overall model appears to be a good fit to support the hypotheses. The reliability, validity, and model fit were found to be statistically significant, and three out of five research hypotheses were supported. Overall this study contributes to the existing body of knowledge by providing an understanding of the methods that can be used to encourage end-users‘ ISP compliance behaviour through an attitudinal shift, thereby targeting end-users‘ attitude as a means to improve information security policy compliance. Implications of the findings are further discussed in the paper. / Information Technology / M. Tech. (Information Technology)
565

Safety and security of consumers at retail stores in the Gauteng province : an assesment of security measures

Mahambane, Misaveni Abel 27 July 2018 (has links)
Retail stores rely on consumers to maintain their businesses and growth. Much of their success depends on the safety and security of consumers. The more people come and buy the products, the more profitable the stores become. If the safety and security of consumers (or their perceptions thereof) at a shopping centre where a retail store is sited is in question, consumers may well stop frequenting such centres and do their shopping at other retail centres at which they perceive to be more safe and secure to do their shopping. Consumers’ ‘peace-of-mind’ plays a vital role in their selection of which retail store(s) to frequent and will often determine whether a repeat visit will occur. The extent of incidents of crime of whatever nature at a particular shopping centre will also impact negatively on shoppers’ perceptions of ‘how safe it is to shop’ at particular centres. Security measures differ from one retail store to another and also between the size and layout, as well as the location of the retail store. The rate at which criminal offences take place at retail stores is currently vague or unknown. Therefore, it is vital that specific risks confronting these retail stores should be identified and analysed with the intention of recommending specific security measures. Business crime and violence present significant threats to consumers’ safety and security in South Africa. High levels of business associated crimes have compelled communities and business bodies such as retail stores to provide their own security for the protection of their assets, as well as consumers. Effective security measures are a prerequisite at retail stores to ensure the safety and security of consumers whilst visiting retail stores. Precaution ought to be taken when dealing with any crime problem that affects consumers at any business environment, in this study more precisely: retail stores. The study explored the existing security measures at retail stores for the protection of consumers. The researcher employed qualitative methods: one-on-one interviews with participants and site observations at selected retail stores. There were 30 participants (20 consumers and 10 security officers). The study found the following:  Retail stores were exposed to security risks such as theft; shoplifting; common robbery; armed robbery; fraud; arson and assaults (grievous bodily harm) and burglary.  The security measures that are currently in place are not adequate to protect retail stores. These security measures differ from one retail store to the next.  In order to improve safety and security at retail stores there should be a security standard that is applicable to the retail stores. Based on the findings, some of the recommendations were as follows:  Retail stores should be protected in line with the level of risk of the area where the retail store is situated: low risk; medium risk; and high risk.  Security managers should conduct security awareness regularly.  Threat assessments should be conducted regularly as well.  Consumers are encouraged to report to the Security manager at the retail store any suspicious actions; persons; objects; and vehicles. / Criminology and Security Science / M. Tech. (Security Management)
566

The combating of unauthorised electrical connections in Kwazulu-Natal, South Africa

Chetty, Vanisha Gonasagaree 07 1900 (has links)
Text in English, with English, Afrikaans and Zulu summaries / This study was conducted owing to the protracted problem and challenges that unauthorised electrical connections pose to electricity utilities. This study sought to contribute to the combating of unauthorised electrical connections in KwaZulu-Natal, South Africa, which has never before been studied in this manner. Considerable revenue is stolen from utilities because of unauthorised electrical connections, by-passing of electrical meters and tampering with electricity networks. This contributes to public safety risks, fatalities, property damage and overloading of electrical networks. This in turn causes transformer and electricity network overload and power supply failure, prolonged unplanned power cuts, loss of jobs, food security risk, serious poor economic development, damaged electrical infrastructure, loss of revenue, electricity disruptions, electric shock, and the burning of dwellings. This leads to the interruption of supply to legal and compliant customers, all with disastrous effects. It is therefore difficult to manage the supply and demand of electricity under these circumstances, more especially in this period when South Africa faces a tight electricity supply. In this dissertation, the international and national perspectives reveal the nature and extent of unauthorised electrical connections. It was explored how unauthorised electrical connections are presently being combated and what specific security measures may be implemented to enhance the combating of unauthorised electrical connections. A case study design was used to investigate in greater detail the opinions, views, perceptions and experiences of the targeted interviewees using interviewing, site observation and case docket analysis. This design guided the use of specific sample groups, procedures and techniques used for data collection and analysis. The design and development of the different data collection instruments and the piloting of the instruments were implemented to ensure validity, reliability, accuracy and trustworthiness of the collected information. The study produced findings to assist electricity utilities to better manage this phenomenon. Recommendations were formulated to assist stakeholders to improve their roles in the combating of unauthorised electrical connections. / Hierdie studie is uitgevoer na aanleiding van die uitgerekte probleem en uitdagings van onwettige elektrisiteitsverbindings vir elektrisiteitsvoorsieners. Hierdie studie poog om by te dra om onwettige elektrisiteitsverbindings in KwaZulu-Natal, Suid-Afrika te beveg; dit is nog nooit tevore op hierdie wyse ondersoek nie. Beduidende inkomste word van diensmaatskappye gesteel as gevolg van onwettige elektrisiteitsverbindings, die wat elektriese meters omseil en met elektrisiteitsnetwerke peuter. Dit dra tot openbare veiligheidsrisiko's, fataliteite, skade aan eiendom, en oorlading van elektrisiteitsnetwerke by. Dit lei weer tot oorlading van transformators en elektrisiteitsnetwerke, gebrek aan kragvoorsiening, verlengde onbeplande kragonderbrekings, werksverlies, voedselsekuriteitrisiko, ernstige swak ekonomiese ontwikkeling, skade aan elektrisiteitinfrastruktuur, verlies aan inkomste, elektriese skok, en huise wat afbrand. Dit lei tot die onderbreking van voorsiening aan wetlike en inskiklike klante met rampspoedige gevolge. Dit is dus moeilik om voorsiening en vraag na elektrisiteit in hierdie omstandighede te bestuur, veral in hierdie tyd wat Suid-Afrika drukkende elektrisiteitvoorsiening beleef. In hierdie verhandeling onthul die internasionale en nasionale perspektiewe die aard en mate van onwettige elektrisiteitsverbindings. Dit was ondersoek hoe onwettige elektrisiteitsverbindings tans beveg word en watter spesifieke veiligheidsmaatreëls geïmplementeer kan word om die bevegting van onwettige elektrisiteitsverbindings te bevorder. Die gevallestudie-ontwerp is gebruik om die onderhoudgewers se menings, sienings, perspektiewe en ervarings in meer besonderhede te ondersoek deur onderhoude, waarnemings en saakdossierontledings te gebruik. Die ontwerp het die gebruik van spesifieke steekproefgroepe, prosedures en tegnieke wat vir dataversamelings en -ontleding gebruik is, gerig Die ontwerp en ontwikkeling van die verskillende dataversamelinginstrumente en die bestuur van die instrumente is geïmplementeer om geldigheid, betroubaarheid, akkuraatheid en geloofwaardigheid van die versamelde inligting te verseker. Die studie se bevindings help elektrisiteitsdienste om hierdie verskynsel beter te bestuur. Aanbevelings is geformuleer om belanghebbers te help om hul rolle te bevorder in die stryd om onwettige elektrisiteitsverbindings te beveg. / Ucwaningo lwenziwa ngenxa yokubona inkinga egxilile neqhubekela phambili kanye nezinselele ezibangelwa ukuzixhumela ama-connection kagesi (i-elektrisithi) maqondana nezinkampani zikagesi. Ucwaningo belufuna ukufaka esivivaneni kudaba lokuvimbela ukuzixhumela kogesi ngendlela engekho emthethweni eKwaZulu-Natali, eNingizimu Afrika, yona okungakaze kwenziwe ucwaningo ngayo ngale ndlela. Kunengeniso eliningi lemali entshontshwa ngale ndlela kwizinkampani noma izinhlangano zikagesi ngoba kunokuzixhomela ugesi okungekho emthethweni, ukungasetshenziswa kwamamitha ogesi, kanye nokuphazamisa ama-network kagesi. Lokhu kubangela izingozi nokungavikeleki kubantu bonke, ukulimala, ukulinyazwa nokonakala kwempahla noma iprophathi kanye nokuthi ama-network kagesi agxisheleke nokucindezeleka ngokweqile. Kanti futhi lokhu kubanga ukuthi ama-transformer kanye nama-network kagesi acindezeleke ngokweqile nokwenza ukuthi isaplayi kagesi ihluleke nokufeyila, lokhu okubangela ukuthi kube nama-power cuts noma ukucishwa kukagesi okungahleliwe, ukulahleka kwemisebenzi, ingozi yokuphazamiseka kokuvikeleka kokudla, ukuthi ukuthuthuka komnotho kuphazamiseke kakhulu, ukulahleka kwengeniso lemali, ukuphazamiseka kokuphakelwa kukagesi, ukulinyazwa kwabantu ngokubanjwa ugesi, kanye nokusha kwemizi eshiswa ugesi. Lokhu kuholela ekutheni kuphazamiseke isaplayi kagesi kumakhastama akhokha kahle nenza izinto ngokulandela umthetho, lokhu okubanga imiphumela yezinhlekelele ezimbi. Ngakho-ke kuba nzima ukubhekana kanye nezinto zesaplayi kanye nokudingeka kukagesi ngaphansi kwalezi simo, ikakhulukazi lapho iNingizimu Afrika ibhekene nokuncipha noma izinga eliphansi lesaplayi kagesi. Kule dissertation isimo sikazwelonke kanye nesamazwe omhlaba, siveze inhlobo kanye nezinga lokuxhunyelwa kukagesi okungekho emthethweni. Kubuye kwabheka nokuthi ukuxhunyelwa kukagesi okungekho emthethweni kubhekwana kanye nokuvinjelwa kanjani, nokuthi yiziphi izindlela eziqondene ezisetshenziswayo zokuvikeleka ezingasetshenziswa ukuthuthukisa izinqubo zokuvimbela ukuxhunyelwa kukagesi nama-connection angekho emthethweni angavinjelwa kanjani . Kusetshenziswe idizayini ye-case study ukuphenyisisa ngokujulile imininingwane, imibono, izinqubo zokubheka isimo kanye nezipiliyoni zalabo obekuqondiswe kubo ama-interview ngesikhathi kwenziwa ama-interview, ukuyobheka ngamehlo esimo ezindaweni, kanye nokuhlaziya amadokhethi amacala ngokwenzekayo. Le dizayini yiyona eholele ekusetshenzisweni kwamasampuli amaqembu athize, izinqubo noma amaprosija athize kanye namathekniki athize asetshenzisiwe ekuqoqeni kwe-data kanye nohlaziyo lwayo. Idizayini nokwenziwa kwama-instrumenti okuqoqwa kwe-data ehlukene, kanye nokwenza ama-instrumenti okulinga noma e-piloting, kusetshenzisiwe ukuqinisekisa i-validity, ukuthembeka (reliability), ukuqondana ncamashi kwama-instrumenti (accuracy) kanye nokuqiniseka okubizwa ngokuthi yi-trustworthiness yolwazi noma i-infomeshini eqoqiwe. Ucwaningo, lukhiphe imiphumela yokusiza izinkampani noma izinhlangano zikagesi ekuphatheni kangcono le nkinga noma ifenominoni (phenomenon) yenkinga. Kwenziwe izincomo zokusiza ababambe iqhaza (stakeholders) ukuthuthukisa indima yabo ekulwiseni ukuxhunyelwa kanye nama-connection kagesi angekho emthethweni. / Criminology and Security Science / M. Tech. (Security Management)
567

An examination of the impact of residential security measures on the incidence of residential burglary in two selected northern suburbs of Johannesburg: a security risk management approach

Olckers, Casparus 30 June 2007 (has links)
Motivation This project was of specific importance to the private security industry, victims of residential burglary, community policing forums and the South African Police Service in providing detailed information regarding recommendations of how to manage and combat residential burglary in two selected northern suburbs of Johannesburg. Problem statement Residential burglary is categorised in the top three highest reported crimes according to the official South African Police Service statistics for the 2006/7 financial years. A series of victim interviews, docket analysis, case plotting and residential security audit surveys were conducted to determine the extent (or lack thereof) of security measures at a burgled residence in the selected area. Approach Field data was collected through docket analysis, plotting crime scenes (descriptive mapping), victim interviews and residential security audit surveys. Results The majority of victims of burglary interviewed did not have the minimum security system (integrated measures) in place. Those victims, who had security measures, appeared not to have made or implemented effective use of them. Conclusion Security at a residence extends beyond just the immediate house area and the focus (security risk assessment) should start with the immediate neighbourhood (community) area working inwards towards the property perimeter (boundary), inner perimeter (garden area) and then finally the immediate house area. / CRIMINOLOGY / MTECH: SECURITY RISK MAN
568

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)
569

Implementation business-to-business electronic commerce website using active server pages

Teesri, Sumuscha 01 January 2000 (has links)
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
570

Assessing information security compliant behaviour using the self-determination theory

Gangire, Yotamu 02 1900 (has links)
Information security research shows that employees are a source of some of the security incidents in the organisation. This often results from failure to comply with the Information Security Policies (ISPs). The question is, therefore, how to improve information security behaviour of employees so that it complies with the ISPs. This study aims to contribute to the understanding of information security behaviour, especially how it can be improved, from an intrinsic motivation perspective. A review of the literature suggested that research in information security behaviour is still predominantly based on the extrinsic perspective, while the intrinsic perspective has not received as much attention. This resulted in the study being carried out from the perspective of the self-determination theory (SDT) since this theory has also not received as much attention in the study of information security behaviour. The study then proposed an information security compliant behaviour conceptual model based on the self-determination theory, (ISCBMSDT). Based on this model, a questionnaire, the ISCBMSDT questionnaire, was developed using the Human Aspects of Information Security Questionnaire and SDT. Using this questionnaire, a survey (n = 263) was carried out at a South African university and responses were received from the academic, administrative and operational staff. The following statistical analysis of the data was carried out: exploratory factor analysis, reliability analysis, analysis of variance (ANOVA), independent samples test (t-tests) and Pearson correlation analysis. The responses to the survey questions suggest that autonomy questions received positive perception followed by competence questions and relatedness questions. The correlation analysis results show the existence of a statistically significant relationship between competence and autonomy factors. Also, a partial significant relationship between autonomy and relatedness factors as well as between competence and relatedness factors was observed. The exploratory factor analysis that was performed on the questionnaire produced 11 factors. Cronbach alpha was then computed for the eleven factors and all were found to be above 0.7, thus suggesting that the questionnaire is valid and reliable. The results of the research study also suggest that competence and autonomy could be more important than relatedness in directing information security behaviour among employees. / School of Computing / M. Tech. (Information Technology)

Page generated in 0.0475 seconds