851 |
F.C. Erasmus as Minister van Verdediging, 1948-1959Jooste, L. 11 1900 (has links)
Text in Afrikaans / Die portefeulje Verdediging het vanaf 1948 tot 1959 besondere eise aan F.C. Erasmus gestel. Hy moes
'n parate en doeltreffende Unieverdedigingsmag, wat Suid-Afrika teen moontlike kommunistiese aggressie
kon verdedig, daarstel. Hy moes ook die Nasionale Party se verdedigingsbeleid, tot nag toe abstrakte
beginsels vervat in die partyprogram, implementeer. Erasmus het die Mag d.m.v. 'n ingrypende
hervormingsprogram met 'n Suid-Afrikaanse identiteit beklee en Afrikaanssprekendes in groat getalle
daarheen gelok. Nieteenstaande die beperkte hulpbronne tot die land se beskikking en sterk kritiek teen
hom, het Erasmus Suid-Afrika se verdediging met rasse skrede laat vooruitgaan. Hy het die organisasie, opleiding en krygstuig van die Mag uitgebou en gemoderniseer, en ook die grondslag van 'n
onafhanklike, plaaslike krygstuigvervaardigingsbedryf gele. Voorts het Erasmus 'n prominente rol in
Suid-Afrika se internasionale militere strategie gespeel. Hy bet onvermoeid gepoog om die Europese
koloniale moondhede te oorreed om 'n Afrika-verdedigingsorganisasie op die been te bring. 'n
Hoogtepunt van sy dienstermyn aan die internasionale front was Brittanje se oordrag van Simonstad aan
Suid-Afrika. / The Defence portfolio placed heavy demands on F.C. Erasmus from 1948 to 1959. He had to transform
the South African armed forces into an efficient and combat ready Union Defence Force. He also had
to implement the National Party's defence policy, which hitherto consisted of abstract principles
contained in the party's political programme. Erasmus made far reaching changes to the Union Defence
Force, furnishing it with a distinct South African identity. Despite criticism against him and the
country's limited resources Erasmus improved South Africa's defence significantly. He modernized the
organization, training and equipment of the Union Defence Force and established the basis for an
independent local armaments industry. Erasmus also played a prominent role in South Africa's
international military strategy. He laboured unceasingly to persuade the European colonial powers to
enter into an African defence alli~nce. One of his greatest achievements is the transfer of Simonstown
to South Africa. / History / M.A. (Geskiedenis)
|
852 |
The effects of anxiety on visual attention for emotive stimuli in primary school childrenKelly, Lauren January 2014 (has links)
Anxiety can be advantageous in terms of survival and well-being, yet atypically high levels may be maladaptive and result in the clinical diagnosis of an anxiety disorder. Several risk factors have been implicated in the manifestation of clinical anxiety, including cognitive biases. In recent years, a plethora of research has emerged demonstrating that anxious adults exhibit biases of attention for threatening stimuli, especially that which is biologically relevant (e.g., facial expressions). Specific components of attentional bias have also been identified, namely facilitated engagement, impaired disengagement, and avoidance. However, the majority of studies have focused on the spatial domain of attention. Furthermore, the area is under-researched in children, despite research demonstrating that symptoms relating to clinical and non-clinical anxiety follow a stable course from childhood through to adolescence and adulthood. Consequently, the aim of this thesis was to investigate how anxiety affects children’s visual attention for emotive, particularly angry, faces. In order to provide a more comprehensive understanding, the current research involved examining the role of temporal and spatial attention utilising rapid serial visual presentation with the attentional blink, and the visual probe paradigm, respectively. The main hypothesis was that high state and/or trait anxiety would be associated with an attentional bias for angry, relative to positive or neutral faces in both the temporal and spatial domains. In relation to the temporal domain, key findings demonstrated that high levels of trait anxiety were associated with facilitated engagement towards both angry and neutral faces. It was further found that all children rapidly disengaged attention away from angry faces. Findings related to the processing of angry faces accorded with the main hypothesis stated in this thesis, as well as research and theory in the area. The finding that anxious children preferentially processed neutral faces in an attentional blink investigation was unexpected. This was argued to potentially reflect this stimulus type being interpreted as threatening. Key findings regarding the spatial domain were that high trait anxious children displayed an early covert bias of attention away from happy faces and a later, overt bias of attention away from angry faces. The finding that high trait anxiety was linked to an attentional bias away from happy faces in a visual probe task was also unexpected. This was argued to potentially reflect smiling faces being interpreted as signifying social dominance, thus resulting in the viewer experiencing feelings of subordination and becoming avoidant and/or submissive. To conclude, this thesis has enhanced current knowledge of attentional bias in both the temporal and spatial domains for emotive stimuli in anxious children. It has demonstrated that higher levels of trait anxiety moderate children’s allocation of attentional resources to different stimulus types, whether these are threatening, positive, or neutral. This has important implications for evaluating past research in adults and children, and for further developing theoretical models of attentional bias and anxiety. It also offers important clinical implications, since attending towards or away from specific stimuli may affect the development and maintenance of anxiety disorders. Recently, a treatment that aims to modify attentional bias in anxious individuals has begun to be developed. In light of the present findings, it may be necessary to review this treatment so that anxious children are re-trained in the specific biases of attention demonstrated here.
|
853 |
F.C. Erasmus as Minister van Verdediging, 1948-1959Jooste, L. 11 1900 (has links)
Text in Afrikaans / Die portefeulje Verdediging het vanaf 1948 tot 1959 besondere eise aan F.C. Erasmus gestel. Hy moes
'n parate en doeltreffende Unieverdedigingsmag, wat Suid-Afrika teen moontlike kommunistiese aggressie
kon verdedig, daarstel. Hy moes ook die Nasionale Party se verdedigingsbeleid, tot nag toe abstrakte
beginsels vervat in die partyprogram, implementeer. Erasmus het die Mag d.m.v. 'n ingrypende
hervormingsprogram met 'n Suid-Afrikaanse identiteit beklee en Afrikaanssprekendes in groat getalle
daarheen gelok. Nieteenstaande die beperkte hulpbronne tot die land se beskikking en sterk kritiek teen
hom, het Erasmus Suid-Afrika se verdediging met rasse skrede laat vooruitgaan. Hy het die organisasie, opleiding en krygstuig van die Mag uitgebou en gemoderniseer, en ook die grondslag van 'n
onafhanklike, plaaslike krygstuigvervaardigingsbedryf gele. Voorts het Erasmus 'n prominente rol in
Suid-Afrika se internasionale militere strategie gespeel. Hy bet onvermoeid gepoog om die Europese
koloniale moondhede te oorreed om 'n Afrika-verdedigingsorganisasie op die been te bring. 'n
Hoogtepunt van sy dienstermyn aan die internasionale front was Brittanje se oordrag van Simonstad aan
Suid-Afrika. / The Defence portfolio placed heavy demands on F.C. Erasmus from 1948 to 1959. He had to transform
the South African armed forces into an efficient and combat ready Union Defence Force. He also had
to implement the National Party's defence policy, which hitherto consisted of abstract principles
contained in the party's political programme. Erasmus made far reaching changes to the Union Defence
Force, furnishing it with a distinct South African identity. Despite criticism against him and the
country's limited resources Erasmus improved South Africa's defence significantly. He modernized the
organization, training and equipment of the Union Defence Force and established the basis for an
independent local armaments industry. Erasmus also played a prominent role in South Africa's
international military strategy. He laboured unceasingly to persuade the European colonial powers to
enter into an African defence alli~nce. One of his greatest achievements is the transfer of Simonstown
to South Africa. / History / M.A. (Geskiedenis)
|
854 |
A Framework for Secure Structural AdaptationSaman Nariman, Goran January 2018 (has links)
A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment or the system itself. From a security standpoint, there has been some research pertaining to (self-) adaptive systems in general but not enough care has been shown towards the adaptation itself. Security of systems can be reasoned about using threat models to discover security issues in the system. Essentially that entails abstracting away details not relevant to the security of the system in order to focus on the important aspects related to security. Threat models often enable us to reason about the security of a system quantitatively using security metrics. The structural adaptation process of a (self-) adaptive system occurs based on a reconfiguration plan, a set of steps to follow from the initial state (configuration) to the final state. Usually, the reconfiguration plan consists of multiple strategies for the structural adaptation process and each strategy consists of several steps steps with each step representing a specific configuration of the (self-) adaptive system. Different reconfiguration strategies have different security levels as each strategy consists of a different sequence configuration with different security levels. To the best of our knowledge, there exist no approaches which aim to guide the reconfiguration process in order to select the most secure available reconfiguration strategy, and the explicit security of the issues associated with the structural reconfiguration process itself has not been studied. In this work, based on an in-depth literature survey, we aim to propose several metrics to measure the security of configurations, reconfiguration strategies and reconfiguration plans based on graph-based threat models. Additionally, we have implemented a prototype to demonstrate our approach and automate the process. Finally, we have evaluated our approach based on a case study of our making. The preliminary results tend to expose certain security issues during the structural adaptation process and exhibit the effectiveness of our proposed metrics.
|
855 |
The Power of Values in Determining Interstate Threat PerceptionSitniece, Katrīna Marija January 2021 (has links)
Interstate threat perception plays a vital role in peace and conflict, having the potential to lead to pre-emptive war. Despite the significance of the theme, little is known about the elements and mechanisms at play guiding threat perception at the state level. This study contributes to said gap by focusing on values as the driver of threat perception. The argument explores the regional constraints of threat perception, focusing on regional military interventions and their effects on the threat perception of the states within said region. Thus, the paper addresses the question of what role value congruence plays in interstate threat perception following a regional military intervention. The paper hypothesises that a higher perceived value congruence between the perceiving state and the intervening state lowers the degree of threat perception. Noting data limitations and isolation challenges, the study finds support for this hypothesis by exploring the case of 2014 Russian intervention in Ukraine and its effects on Belarus, Poland, and Sweden.
|
856 |
Identity and Death Threats: An Investigation of Social Identity and Terror Management Processes in Online NewsVang-Corne, Mao H. 09 June 2016 (has links)
No description available.
|
857 |
Management of security information in the security industryGovender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following:
• establishing the “status quo” of the collection and analysis of security
information and the implementation of security risk control measures in practice;
• identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the
• discovery of a new Security Information Management Model (SIMM).
Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information.
The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security
Information Management Model for the management of security information in the security industry. / Criminology / D. Litt. et Phil. (Criminology)
|
858 |
The use of physical surveillance in forensic investigationKnoesen, Andre Leon 11 1900 (has links)
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic.
To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool. / Police Practice / M. Tech. (Forensic Investigation)
|
859 |
Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted PositionsGray, John Max 01 January 2015 (has links)
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s character strengths have been linked to positive personal development, but there has been very little research into how the positive characteristics of virtue ethics, exhibited through the character development of information systems workers, can contribute to improving system security. This research aimed to address this gap by examining factors that affect and shape the ethical perspectives of individuals entrusted with privileged access to information.
This study builds upon prior research and theoretical frameworks on institutionalizing ethics into organizations and Information Ethics to propose a new theoretical model which demonstrates the influences on Information Systems Security (ISS) trusted worker ethical behavior within an organization. Components of the research model include ISS virtue ethics based constructs, organizational based internal influences, societal based external influences, and trusted worker ethical behavior. This study used data collected from 395 professionals in an ISS organization to empirically assess the model. Partial Least Squares Structural Equation Modeling was employed to analyze the indicators, constructs, and path relationships. Various statistical tests determined validity and reliability, with mixed but adequate results. All of the relationships between constructs were positive, although some were stronger and more significant.
The expectation of the researcher in this study was to better understand the character of individuals who pose an insider threat by validating the proposed model, thereby providing a conceptual analysis of the character traits which influence the ethical behavior of trusted workers and ultimately information system security.
|
860 |
廿一世紀中國大陸能源安全戰略之研究—以中亞地區為例 / China’S Energy Security Strategy of the 21st Century:Acase Study of Central Asia李鑑舉, Li, Chien Chu Unknown Date (has links)
當二十一世紀時序進入全球化時代之後,在全球氣候變遷與石化燃料價格高漲的影響之下,世界各國為了保障本身經濟發展所需的能源,即在世界範圍內展開激烈的鬥爭,甚至因此而導致了嚴重衝突和戰爭。當今全球能源消費結構中,石化能源仍居主導地位,存量的有限與需求增長之間矛盾日益顯著,因此,能源短缺已成為國家經濟發展的巨大瓶頸,全球性的能源爭奪態勢愈演愈烈。隨著全球化時代的到來,大部分發展中國家(尤其是亞太地區)工業化和現代化的進程相對加速,面對世界能源的需求也不斷增加,中國大陸就是最典型的例子。
大陸的能源戰略和海外投資,通常都是一個足以為外界激烈辯論的主題(例如「中國能源威脅論」)。中國大陸緊鄰著中亞區域,蘊藏著豐富的石油和天然氣儲備量,在這個區域發揮高度的能源戰略,似乎是中國大陸最可能的重要手段,另一方面亦藉以減輕其對來自中東的能源供應的依賴,若能掌握該區,大陸就可以減少對中東油源供應的依賴,種種徵候都明確顯示大陸積極鞏固國土疆域與追求能源安全戰略的全般優勢。 / When the timing to enter the twenty-first century era of globalization, under the global climate change and the impact of rising fossil fuel prices, the international community in order to protect its own economic development needed energy that fierce struggle, and even lead to serious conflicts and wars . Today's global energy consumption structure, petrochemical and energy continued to hold a dominant position, the contradiction between the finite and the demand for stock grew increasingly significant, therefore, the energy shortage has become a huge bottleneck in socio-economic development, global energy muddied intensified. With the advent of the era of globalization, (especially in the Asia-Pacific region) industrialization and modernization process in most developing countries relative acceleration, facing the world's energy demands are increasing, China is the most typical example.
China's overseas energy strategy and investments are usually sufficient for the outside world a hotly debated topic (such as "China energy threat"). China close to the Central Asian region, rich in oil and natural gas reserves in the region to play a highly energy strategy, China seems to be the most important means possible, on the other hand also so as to reduce its dependence on energy supplies from the Middle East , if we grasp this area, China can reduce its dependence on Middle East oil supply source, various incidents have clearly demonstrated China's active pursuit of the full consolidation of Land and territory advantages like energy security strategy.
|
Page generated in 0.065 seconds