• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
711

Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university

Maguraushe, Kudakwashe 05 1900 (has links)
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementation of the ZPDA. Problem Statement: The current constitution and the ZDPA are not sufficient to give organisations guidelines on ensuring personal information privacy. There is need for guidelines to help organisations and institutions to implement and comply with the provisions of the ZDPA in the context of Zimbabwe. The privacy regulations, regarded as the three concepts (awareness, expectations and confidence), were used to determine the student perceptions. These three concepts have not been researched before in the privacy context and the relationship between the three concepts has not as yet been established. Research purpose: The main aim of the study was to develop and validate an Information Privacy Perception Survey (IPPS) diagnostic tool and a Student Personal Information Privacy Perception (SPIPP) model to give guidelines to universities on how they can implement the ZDPA and aid universities in comprehending student privacy perceptions to safeguard personal information and assist in giving effect to their privacy constitutional right. Research Methodology: A quantitative research method was used in a deductive research approach where a survey research strategy was applied using the IPPS instrument for data collection. The IPPS instrument was designed with 54 items that were developed from the literature. The preliminary instrument was taken through both the expert review and pilot study. Using the non-probability convenience sampling method, 287 students participated in the final survey. SPSS version 25 was used for data analysis. Both descriptive and inferential statistics were done. Exploratory factor analysis (EFA) was used to validate the instrument while confirmatory factor analysis (CFA) and the structural equation modelling (SEM) were used to validate the model. Main findings: diagnostic instrument was validated and resulted in seven new factors, namely university confidence (UC), privacy expectations (PE), individual awareness (IA), external awareness (EA), privacy awareness (PA), practice confidence (PC) and correctness expectations (CE). Students indicated that they had high expectations of the university on privacy. The new factors showed a high level of awareness of privacy and had low confidence in the university safeguarding their personal information privacy. A SPIPP empirical model was also validated using structural equation modelling (SEM) and it indicated an average overall good fit between the proposed SPIPP conceptual model and the empirically derived SPIPP model Contribution: A diagnostic instrument that measures the perceptions (privacy awareness, expectations and confidence of students) was developed and validated. This study further contributed a model for information privacy perceptions that illustrates the relationship between the three concepts (awareness, expectations and confidence). Other universities can use the model to ascertain the perceptions of students on privacy. This research also contributes to improvement in the personal information protection of students processed by universities. The results will aid university management and information regulators to implement measures to create a culture of privacy and to protect student data in line with regulatory requirements and best practice. / School of Computing / Ph. D. (Information Systems)
712

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
713

Policing mechanisms to counter terrorist attacks in South Africa

Kalidheen, Rufus 31 March 2008 (has links)
Terrorism remains a cardinal threat to national, regional, and international peace and security. It violates the fundamental principles of law, order, human rights and freedom and remains an affront to the Global Charter of the United Nations (UN) and the values and principles enunciated in Africa's Constitutive Act of the African Union (AU). Moreover, it presents a grave and direct threat to the territorial integrity, security and stability of States. In this regard, effective counter terrorism mechanisms and approaches remain fundamental tools in curbing the threats and devastating effects of terrorism. Since the advent of the 'war on terror', issues regarding terrorism and counter-terrorism have become pronounced norms within the international realm. Yet, while an abundance of literature has been focussed and analyzed on counter terrorism approaches within the United States (US), the United Kingdom (UK), Russia and India; little has been documented on effective counter terrorism approaches in South Africa post-2001. Given emerging trends of terrorist camps within the country and the fact that South Africa will be hosting the international event of the 2010 FIFA Soccer World Cup, it is imperative that South Africa improves the overall direction of its counter terrorism strategy. Essentially, this study offers recommendations for the most effective counterterrorism mechanism, which will aid policing in South Africa. History and current events indicate that South African Police Service (SAPS) has the capacity and capability to successfully deal with threats of terrorism. What is lacking is a concrete proactive counter terrorism approach that makes SAPS stand out as the lead department in countering terrorism. Yet, it should be borne in mind that the most important principle of any counter terrorism operational concept is to co-ordinate an operation with an integrated approach. Bearing this in mind, this study includes an assessment of the counterterrorism methodologies of various agencies responsible for counter terrorism within South Africa, with SAPS being the focal point. To establish the most effective counter terrorism strategy applicable to the South African context, this study considers a comparative analysis of counter terrorism strategies adopted within specified developed (Russia, US and UK) and developing countries (India and Algeria) as well as a conceptual analysis of relevant policing mechanisms that are currently considered as appropriate mechanisms to counter terrorism within specified countries. The synopsis of best-case practices of counter terrorism in developed and developing countries as well as the relevant literature on policing mechanism are then synthesized and interrogated into conceptualising an effective policing mechanism to counter terrorism in South Africa. / Criminology / M. Tech. (Policing)
714

The role of inventory control in service quality in a South African academic library

Retief, Esther 30 June 2005 (has links)
Service quality has always been a tacit assumption within the delivery of academic library services, but since the 1990s demands for accountability from different stakeholders, including the clients, made service quality a highly debated and researched focus in academic libraries all over the world. The scope of the study covers a wide-ranging analysis of discourses underpinning service quality and its accompanying performance indicators in academic libraries. Using the academic library of the University of South Africa as an illustrative case study, this study examines the possible impact of inventory control on the service quality of the academic library in three areas, namely access to information resources, retrieval of information resources and positive implications for sound financial management. The study's findings all point to a positive enhancement of service quality in regard to the three areas mentioned. / Information Science / M. Inf.
715

Legal and policy aspects to consider when providing information security in the corporate environment

Dagada, Rabelani 11 1900 (has links)
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment. This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis. The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad. Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area. / School of Computing / D. Phil. (Information Systems)
716

Improving the adoption of cloud computing by Small & Medium Scale Enterprise (SMEs in Nigeria

Young, Destiny Assian 08 1900 (has links)
In a traditional business environment, companies set up their organisation’s IT data infrastructure, install their applications and carry out the maintenance and management of their infrastructures. Whereas Cloud computing removes the need for companies to set up own data centers and run enterprise applications. Cloud computing technology provides businesses with the advantage of on-demand access, agility, scalability, flexibility and reduced cost of computing. An appreciable increase is being observed in the acceptance and migration to this new IT model in developing economies. In Nigeria, it has been observed that there is a somewhat unimpressive rate of adoption of Cloud computing by the microfinance operators. This research investigates the reason for the slow adoption of Cloud computing by SMEs in Nigeria with special consideration to the Microfinance subsector and to develop a model for improving the adoption of cloud computing by microfinance organisations. The research was conducted using a qualitative research design method. Interview was the main data collection instrument and data collected was analysed using thematic content analysis method. The analysis of the study revealed that SMEs in Nigeria, with particular reference to microfinance subsector in Akwa Ibom State are yet fully to embrace cloud technology. It was discovered that most of the SMEs studied, has some level of reservation about cloud computing arising from not having appropriate education and enlightenment about the cloud economic offerings and potentials. From the outcome of the research, the researcher identified that most people’s concerns are as a result of lack of knowledge about cloud computing and so the researcher concluded that appropriate enlightenment by industry stakeholders, cloud service providers, cloud enthusiasts and even the government on the risks and overwhelming economic incentives of cloud computing as well as the provision of a monitored free trial services will encourage the adoption of cloud computing by SMEs. / College of Engineering, Science and Technology / M.Tech. (Information Technology)
717

A criminological analysis of copper cable theft in Gauteng

Pretorius, William Lyon 02 October 2013 (has links)
This dissertation focuses on the phenomenon of copper cable theft within the Gauteng Province of South Africa. Data was collected from literature sources as well as from security professionals combating copper theft. There are five primary objectives in this research: 1. To explore and to describe the extent and the impact of copper cable theft. 2. To gain insight into the profile and the modus operandi of the offender. 3. To evaluate current intervention measures used to combat the copper cable theft. 4. To describe the general factors limiting the success of combating copper cable theft. 5. To recommend probable intervention measures with which to combat copper cable theft. Semi-structured interviews were conducted with responsible security officials of victim stakeholder groups in Gauteng. It was established that copper cable theft is currently a very serious crime that deserves both attention and quick intervention before it does irreparable damage to the utility infrastructure of Gauteng, in particular, and in fact to all these infrastructures in South Africa. / Criminology / M.A. (Criminology)
718

Transinstitucionalização: caminhos e descaminhos na dinâmica de internações e desinternações de pessoas com transtorno mental em conflito com a Lei no Estado de São Paulo / Transinstitutionalization: paths and misalignments in the dynamics of hospitalization and disinternation of people with mental disorder in conflict with the law in the State of São Paulo

Lhacer, Patricia Maria Villa 26 September 2019 (has links)
O início do século XXI é marcado por diversas questões que correlacionam os problemas da privação da liberdade e sua interface com a Saúde Pública, como nas discussões sobre o uso problemático de álcool e outras drogas e o aumento do encarceramento desses indivíduos, assim como na temática do denominado \"louco infrator\", que, apesar da Reforma Psiquiátrica, continua sem acesso aos seus direitos fundamentais. O presente trabalho tem como problemática central investigar, à luz dos princípios da Reforma Psiquiátrica, como se processa a dinâmica das transferências de pessoas internadas nos Hospitais de Custódia e Tratamento Psiquiátrico do Estado de São Paulo para os Hospitais Psiquiátricos Comuns, Centros de Atenção Psicossocial e Residências Terapêuticas, sob ordem judicial. Tem como objetivos identificar os motivos que determinam transferências, sua legalidade, assim como os discursos das áreas jurídicas, psiquiátricas e de saúde mental que se constituem em torno da pessoa com transtorno mental em conflito com a lei e caracterizar como se apresenta a relação Justiça e Saúde na dinâmica dessas transferências como mecanismo jurídico-sanitário, identificando implicações, alcances e limitações e o lugar da transinstitucionalização nesse processo. Do ponto de vista metodológico, trata-se de pesquisa de natureza documental e qualitativa. Como documentos foram identificados acórdãos, processos de execução criminal de medida de segurança e processos de internação compulsória, entre outros de natureza cível, relacionados a pessoas com transtorno mental em conflito com a lei, que tramitam ou tramitavam no Tribunal de Justiça do Estado de São Paulo. Articula-se a questões emergentes da pesquisa documental, a realização de entrevistas, em profundidade, via Roteiro Temático, com dois grupos de sujeitos de pesquisa, profissionais da área jurídica, assim como, profissionais da área da saúde, com experiência de trabalho relacionada à temática. A discussão e interpretação de dados e narrativas revelam que a noção da periculosidade se apresentou como eixo central para a determinação das transferências. A prática da Internação Compulsória com Interdição, após a extinção da medida de segurança, apresenta-se como forma de continuidade do cumprimento da medida de segurança. A desinternação condicional, como medida exclusivamente jurídica, onde os cuidados em saúde ocupam aspecto secundário, fazendo com que a área da Saúde atue sob a égide da Justiça, representa um aspecto limitador para o processo de transinstitucionalização, com vistas a desinstitucionalização. A desinternação e a imposição de suas condições meramente punitivas representa um grande desafio para o cenário das execuções da medida de segurança com o aumento do número de reinternações, caracterizando o fenômeno do \"revolving door\" ou \"porta giratória\", como forma de gestão em \"circuitos\", que geram \"novos crônicos\". Diante de tal prática, a atuação autônoma dos Centros de Atenção Psicossocial, a expansão das Residências Terapêuticas, assim como o investimento em políticas públicas de inclusão social apresentam-se como condições necessárias para a desinstitucionalização das pessoas com transtorno mental em conflito com a lei. / The beginning of the 21st century is marked by several issues that correlate the problems of deprivation of liberty and its interface with Public Health, such as discussions about the problematic use of alcohol and other drugs and the increasing incarceration of these individuals, as well as the theme. the so-called \"insane offender\" who, despite the Psychiatric Reform, still has no access to his fundamental rights. The present work has as its central problem to investigate, in the light of the principles of Psychiatric Reform, how the dynamics of the transference of hospitalized people in the Custody and Psychiatric Treatment Hospitals of the State of São Paulo to the Common Psychiatric Hospitals, Psychosocial Care Centers and Therapeutic Residences, under court order. It aims to identify the motives that determine transfers, their legality, as well as the discourses of the legal, psychiatric and mental health areas that constitute around the person with mental disorder in conflict with the law and to characterize how the relationship between Justice and Health in the dynamics of these transfers as a legal-health mechanism, identifying implications, scope and limitations and the place of transinstitutionalization in this process. From the methodological point of view, this is a documentary and qualitative research. As documents were identified judgments, proceedings for criminal enforcement of security measure and cases of compulsory detention, among others of a civil nature, related to people with mental disorder in conflict with the law, who are processing or proceeding in the Court of Justice of the State of São Paulo. It is linked to emerging issues of documentary research, conducting in-depth interviews via Thematic Roadmap, with two groups of research subjects, legal professionals, as well as health professionals, with work experience related to thematic. The discussion and interpretation of data and narratives reveal that the notion of dangerousness was presented as the central axis for the determination of transfers. The practice of Compulsory Detention with Interdiction, after the safety measure has been extinguished, is presented as a way of continuing compliance with the safety measure. Conditional withdrawal, as an exclusively legal measure, where health care occupies a secondary aspect, making the Health area act under the aegis of Justice, represents a limiting aspect for the transinstitutionalization process, with a view to deinstitutionalization. The disinternation and imposition of its merely punitive conditions represents a major challenge for the scenario of executions of the security measure with the increase in the number of readmissions, characterizing the phenomenon of revolving door as a form of management in \"Circuits\" that generate \"new chronicles\". Given this practice, the autonomous performance of the Psychosocial Care Centers, the expansion of Therapeutic Residences, as well as the investment in public policies for social inclusion are necessary conditions for the deinstitutionalization of people with mental disorders in conflict with the law.
719

Legal and policy aspects to consider when providing information security in the corporate environment

Dagada, Rabelani 11 1900 (has links)
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment. This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis. The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad. Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area. / School of Computing / D. Phil. (Information Systems)
720

Policing mechanisms to counter terrorist attacks in South Africa

Kalidheen, Rufus 31 March 2008 (has links)
Terrorism remains a cardinal threat to national, regional, and international peace and security. It violates the fundamental principles of law, order, human rights and freedom and remains an affront to the Global Charter of the United Nations (UN) and the values and principles enunciated in Africa's Constitutive Act of the African Union (AU). Moreover, it presents a grave and direct threat to the territorial integrity, security and stability of States. In this regard, effective counter terrorism mechanisms and approaches remain fundamental tools in curbing the threats and devastating effects of terrorism. Since the advent of the 'war on terror', issues regarding terrorism and counter-terrorism have become pronounced norms within the international realm. Yet, while an abundance of literature has been focussed and analyzed on counter terrorism approaches within the United States (US), the United Kingdom (UK), Russia and India; little has been documented on effective counter terrorism approaches in South Africa post-2001. Given emerging trends of terrorist camps within the country and the fact that South Africa will be hosting the international event of the 2010 FIFA Soccer World Cup, it is imperative that South Africa improves the overall direction of its counter terrorism strategy. Essentially, this study offers recommendations for the most effective counterterrorism mechanism, which will aid policing in South Africa. History and current events indicate that South African Police Service (SAPS) has the capacity and capability to successfully deal with threats of terrorism. What is lacking is a concrete proactive counter terrorism approach that makes SAPS stand out as the lead department in countering terrorism. Yet, it should be borne in mind that the most important principle of any counter terrorism operational concept is to co-ordinate an operation with an integrated approach. Bearing this in mind, this study includes an assessment of the counterterrorism methodologies of various agencies responsible for counter terrorism within South Africa, with SAPS being the focal point. To establish the most effective counter terrorism strategy applicable to the South African context, this study considers a comparative analysis of counter terrorism strategies adopted within specified developed (Russia, US and UK) and developing countries (India and Algeria) as well as a conceptual analysis of relevant policing mechanisms that are currently considered as appropriate mechanisms to counter terrorism within specified countries. The synopsis of best-case practices of counter terrorism in developed and developing countries as well as the relevant literature on policing mechanism are then synthesized and interrogated into conceptualising an effective policing mechanism to counter terrorism in South Africa. / Criminology and Security Science / M. Tech. (Policing)

Page generated in 0.0766 seconds