• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 3
  • 2
  • 1
  • Tagged with
  • 24
  • 15
  • 14
  • 8
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Wetgewing teen elektroniese betreding

Ulrich, Neil. 11 1900 (has links)
Text in Afrikaans / Parralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar / Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised / Criminal and Procedural Law / LL.M. (Criminal & Procedural Law)
12

Structured professional judgement approach to risk assessment : generalisability across patient groups for the prediction of adverse outcomes in secure mental health care

O'Shea, Laura E. January 2016 (has links)
This thesis comprises a rigorous and coherent body of work related to the use of the HCR-20 and the START to inform risk assessment and management of secure mental health inpatients. The thesis contributes significant theoretical and applied knowledge by: 1) investigating the extent to which these tools can be generalised beyond restricted validation samples to the full range of individuals in contact with secure services, 2) determining whether they can aid assessment and management of adverse outcomes beyond aggression, and 3) offering practical, empirically-derived advice for clinicians regarding management strategies that may reduce the occurrence of adverse events. This collection of papers has used considerably novel methods, such as rocreg analysis in risk assessment of behavioural outcomes, and high quality, routinely collected data to gain a more realistic representation of what occurs in clinical practice. Further, the papers draw on larger sample sizes than have previously been reported in this area, allowing for more complex statistical analysis. This thesis has helped clarify the contexts in which these instruments perform effectively and therefore has important implications for clinical risk assessment in inpatient settings. Specifically, there is evidence that the HCR-20 and the START may aid assessment and management of aggression for the majority of groups examined, and that both tools have some efficacy for predicting self-harm among female populations. However, the HCR-20 should not be used to inform prediction and management of aggression and self-harm for individuals with developmental and organic disorders and is unlikely to be beneficial at informing risk management strategies targeting self-harm among males; the START should not be used to inform prediction and management of substance abuse, victimisation, or unauthorised leave. Finally, this thesis highlights a number of directions for future research to continue advancement in this area.
13

The policing of undocumented foreign nationals in South Africa

Mabudusha, Sekgololo Angel 06 1900 (has links)
The increasing numbers of undocumented foreign nationals in South Africa not only has affected the provision of services provided by the local municipalities and the Department of Home Affairs but is also a huge challenge to the services provided by the South African police. The aim of this study was to explore the police experiences of dealing with undocumented foreign nationals in South Africa. A literature review was conducted to provide an overview of this problem nationally and internationally. Interviews, observations and document analysis were also considered to explore police experiences of dealing with undocumented foreign nationals. The findings of this study show that the South African police are “caught between a rock and a hard place” when dealing with undocumented foreign nationals within the constitutional framework of this country. They receive little support from the government and the relevant stakeholders on this matter, while on the other hand they are exposed to constant threats and lack of compliance from the undocumented foreign nationals and the criminal syndicates that facilitate illegal cross-border movements and the pressure from advocates of human rights principles and the media. These factors lead to increased frustrations among police officials and self-protective measures such as turning a blind eye to this problem. To deal with the problem the Inclusive and Interactive Refugee Management Model, which focuses on constant interaction among stakeholders, is recommended. Inclusive strategies are also recommended for dealing with undocumented foreign nationals. This model supports a Left Realism perspective, which advocates collective responsibility towards human concerns / Police Practice / D. Litt. et Phil. (Police Science)
14

The policing of undocumented foreign nationals in South Africa

Mabudusha, Sekgololo Angel 06 1900 (has links)
The increasing numbers of undocumented foreign nationals in South Africa not only has affected the provision of services provided by the local municipalities and the Department of Home Affairs but is also a huge challenge to the services provided by the South African police. The aim of this study was to explore the police experiences of dealing with undocumented foreign nationals in South Africa. A literature review was conducted to provide an overview of this problem nationally and internationally. Interviews, observations and document analysis were also considered to explore police experiences of dealing with undocumented foreign nationals. The findings of this study show that the South African police are “caught between a rock and a hard place” when dealing with undocumented foreign nationals within the constitutional framework of this country. They receive little support from the government and the relevant stakeholders on this matter, while on the other hand they are exposed to constant threats and lack of compliance from the undocumented foreign nationals and the criminal syndicates that facilitate illegal cross-border movements and the pressure from advocates of human rights principles and the media. These factors lead to increased frustrations among police officials and self-protective measures such as turning a blind eye to this problem. To deal with the problem the Inclusive and Interactive Refugee Management Model, which focuses on constant interaction among stakeholders, is recommended. Inclusive strategies are also recommended for dealing with undocumented foreign nationals. This model supports a Left Realism perspective, which advocates collective responsibility towards human concerns / Police Practice / D. Litt. et Phil. (Police Science)
15

Cyber crime: a comparative law analysis

Maat, Sandra Mariana 11 1900 (has links)
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. / Jurisprudence / L. L. M.
16

Whistle blowing and whistle blower protection in the South African public sector

Holtzhausen, Natasja 30 June 2007 (has links)
The objective of this study was mainly to describe, analyse and evaluate the determinants of the phenomenon of whistle blowing that influences the protection of employees making authorised and/or unauthorised disclosures. It was also a purpose of the study to evaluate the specific role of the Protected Disclosures Act 2000 (Act 26 of 2000) (PDA) in fulfilling its mandate to protect authorised disclosures on wrongdoing in public and private sector organisations. The PDA seeks to combat crime and corruption through the disclosing of wrongdoing. The intention is to create a culture which will facilitate the disclosure of information by employees relating to criminal and other irregular conduct in the workplace in a responsible manner, by providing comprehensive statutory guidelines through the PDA for the disclosure of such information, and protection against any retaliation as a result of such disclosures. An important aspect that this study dealt with was the provision, as a prerequisite to the PDA to be implemented successfully, that individual members of the private and public sectors have to act responsibly and in good faith in making disclosures in order to be protected by the PDA. In order to provide clarity on the conceptualisation of whistle blowing, the study explored the conceptual knowledge of the variables influencing the determinants of whistle blowing and the whistle blower through the application of a literature study of the concept and theories of ethics, values, morals, loyalty, trust and whistle blowing, in order to describe and analyse the variables influencing the whistle blower, the whistle blowing process, the characteristics of whistle blowers and the strategies and procedures employed to blow the whistle in an organisation. The study explored the organisational determinants influencing a whistle blower's decision to blow the whistle in the social context of an organisation in order to determine the influence of organisational culture and organisational trust as internal social factors that may facilitate the effective management of whistle blowing resulting in no whistle blowing taking place. The study objectives, appropriate conclusions and proposals are addressed based on the role that the PDA, the ethical determinants of the work environment, the determinants influencing the individual whistle blower and the organisational determinants influencing effective whistle blowing, can fulfil, in order to serve as a mechanism to combat corruption. / Public Administration / D. Litt. et Phil. (Public Administration)
17

The management of patial absenteeism and late coming at four public secondary schools of the Tshwane west (D15) / Management of partial absenteeism and late coming at four public secondary schools of the Tshwane West (D15)

Boshego, Lepono Peter 01 1900 (has links)
The main purpose of this study was to determine the management of the phenomenon of learners’ partial absenteeism and late coming at four public secondary schools of the Tshwane West (D15), in the light of the Gauteng Department of Education (GDE) Circular 13 of 2002. Respondents targeted for data collection were members of the School Management Teams (SMTs) of the four public secondary schools (n35). To address the initial propositions of this study, a qualitative case study research design and its techniques for data collection and analysis were used. The emergent findings indicated that: absenteeism during school hours (partial absenteeism) and late coming, which also applies to educators, are rife across the four participating public schools. SMT members’ limited knowledge of school management in general, and the GDE’s Circular 13 in particular, were found to be the main barrier to the effective management of partial absenteeism and late coming. Additional contributory factors were learner’s attitude and conduct and poor school infrastructure. Recommendations to help address the problem under inestigation are also made. / Educational Leadership and Management / M. Ed. (Educational Management and Leadership)
18

Cyber crime: a comparative law analysis

Maat, Sandra Mariana 11 1900 (has links)
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. / Jurisprudence / L. L. M.
19

Whistle blowing and whistle blower protection in the South African public sector

Holtzhausen, Natasja 30 June 2007 (has links)
The objective of this study was mainly to describe, analyse and evaluate the determinants of the phenomenon of whistle blowing that influences the protection of employees making authorised and/or unauthorised disclosures. It was also a purpose of the study to evaluate the specific role of the Protected Disclosures Act 2000 (Act 26 of 2000) (PDA) in fulfilling its mandate to protect authorised disclosures on wrongdoing in public and private sector organisations. The PDA seeks to combat crime and corruption through the disclosing of wrongdoing. The intention is to create a culture which will facilitate the disclosure of information by employees relating to criminal and other irregular conduct in the workplace in a responsible manner, by providing comprehensive statutory guidelines through the PDA for the disclosure of such information, and protection against any retaliation as a result of such disclosures. An important aspect that this study dealt with was the provision, as a prerequisite to the PDA to be implemented successfully, that individual members of the private and public sectors have to act responsibly and in good faith in making disclosures in order to be protected by the PDA. In order to provide clarity on the conceptualisation of whistle blowing, the study explored the conceptual knowledge of the variables influencing the determinants of whistle blowing and the whistle blower through the application of a literature study of the concept and theories of ethics, values, morals, loyalty, trust and whistle blowing, in order to describe and analyse the variables influencing the whistle blower, the whistle blowing process, the characteristics of whistle blowers and the strategies and procedures employed to blow the whistle in an organisation. The study explored the organisational determinants influencing a whistle blower's decision to blow the whistle in the social context of an organisation in order to determine the influence of organisational culture and organisational trust as internal social factors that may facilitate the effective management of whistle blowing resulting in no whistle blowing taking place. The study objectives, appropriate conclusions and proposals are addressed based on the role that the PDA, the ethical determinants of the work environment, the determinants influencing the individual whistle blower and the organisational determinants influencing effective whistle blowing, can fulfil, in order to serve as a mechanism to combat corruption. / Public Administration and Management / D. Litt. et Phil. (Public Administration)
20

The combating of unauthorised electrical connections in Kwazulu-Natal, South Africa

Chetty, Vanisha Gonasagaree 07 1900 (has links)
Text in English, with English, Afrikaans and Zulu summaries / This study was conducted owing to the protracted problem and challenges that unauthorised electrical connections pose to electricity utilities. This study sought to contribute to the combating of unauthorised electrical connections in KwaZulu-Natal, South Africa, which has never before been studied in this manner. Considerable revenue is stolen from utilities because of unauthorised electrical connections, by-passing of electrical meters and tampering with electricity networks. This contributes to public safety risks, fatalities, property damage and overloading of electrical networks. This in turn causes transformer and electricity network overload and power supply failure, prolonged unplanned power cuts, loss of jobs, food security risk, serious poor economic development, damaged electrical infrastructure, loss of revenue, electricity disruptions, electric shock, and the burning of dwellings. This leads to the interruption of supply to legal and compliant customers, all with disastrous effects. It is therefore difficult to manage the supply and demand of electricity under these circumstances, more especially in this period when South Africa faces a tight electricity supply. In this dissertation, the international and national perspectives reveal the nature and extent of unauthorised electrical connections. It was explored how unauthorised electrical connections are presently being combated and what specific security measures may be implemented to enhance the combating of unauthorised electrical connections. A case study design was used to investigate in greater detail the opinions, views, perceptions and experiences of the targeted interviewees using interviewing, site observation and case docket analysis. This design guided the use of specific sample groups, procedures and techniques used for data collection and analysis. The design and development of the different data collection instruments and the piloting of the instruments were implemented to ensure validity, reliability, accuracy and trustworthiness of the collected information. The study produced findings to assist electricity utilities to better manage this phenomenon. Recommendations were formulated to assist stakeholders to improve their roles in the combating of unauthorised electrical connections. / Hierdie studie is uitgevoer na aanleiding van die uitgerekte probleem en uitdagings van onwettige elektrisiteitsverbindings vir elektrisiteitsvoorsieners. Hierdie studie poog om by te dra om onwettige elektrisiteitsverbindings in KwaZulu-Natal, Suid-Afrika te beveg; dit is nog nooit tevore op hierdie wyse ondersoek nie. Beduidende inkomste word van diensmaatskappye gesteel as gevolg van onwettige elektrisiteitsverbindings, die wat elektriese meters omseil en met elektrisiteitsnetwerke peuter. Dit dra tot openbare veiligheidsrisiko's, fataliteite, skade aan eiendom, en oorlading van elektrisiteitsnetwerke by. Dit lei weer tot oorlading van transformators en elektrisiteitsnetwerke, gebrek aan kragvoorsiening, verlengde onbeplande kragonderbrekings, werksverlies, voedselsekuriteitrisiko, ernstige swak ekonomiese ontwikkeling, skade aan elektrisiteitinfrastruktuur, verlies aan inkomste, elektriese skok, en huise wat afbrand. Dit lei tot die onderbreking van voorsiening aan wetlike en inskiklike klante met rampspoedige gevolge. Dit is dus moeilik om voorsiening en vraag na elektrisiteit in hierdie omstandighede te bestuur, veral in hierdie tyd wat Suid-Afrika drukkende elektrisiteitvoorsiening beleef. In hierdie verhandeling onthul die internasionale en nasionale perspektiewe die aard en mate van onwettige elektrisiteitsverbindings. Dit was ondersoek hoe onwettige elektrisiteitsverbindings tans beveg word en watter spesifieke veiligheidsmaatreëls geïmplementeer kan word om die bevegting van onwettige elektrisiteitsverbindings te bevorder. Die gevallestudie-ontwerp is gebruik om die onderhoudgewers se menings, sienings, perspektiewe en ervarings in meer besonderhede te ondersoek deur onderhoude, waarnemings en saakdossierontledings te gebruik. Die ontwerp het die gebruik van spesifieke steekproefgroepe, prosedures en tegnieke wat vir dataversamelings en -ontleding gebruik is, gerig Die ontwerp en ontwikkeling van die verskillende dataversamelinginstrumente en die bestuur van die instrumente is geïmplementeer om geldigheid, betroubaarheid, akkuraatheid en geloofwaardigheid van die versamelde inligting te verseker. Die studie se bevindings help elektrisiteitsdienste om hierdie verskynsel beter te bestuur. Aanbevelings is geformuleer om belanghebbers te help om hul rolle te bevorder in die stryd om onwettige elektrisiteitsverbindings te beveg. / Ucwaningo lwenziwa ngenxa yokubona inkinga egxilile neqhubekela phambili kanye nezinselele ezibangelwa ukuzixhumela ama-connection kagesi (i-elektrisithi) maqondana nezinkampani zikagesi. Ucwaningo belufuna ukufaka esivivaneni kudaba lokuvimbela ukuzixhumela kogesi ngendlela engekho emthethweni eKwaZulu-Natali, eNingizimu Afrika, yona okungakaze kwenziwe ucwaningo ngayo ngale ndlela. Kunengeniso eliningi lemali entshontshwa ngale ndlela kwizinkampani noma izinhlangano zikagesi ngoba kunokuzixhomela ugesi okungekho emthethweni, ukungasetshenziswa kwamamitha ogesi, kanye nokuphazamisa ama-network kagesi. Lokhu kubangela izingozi nokungavikeleki kubantu bonke, ukulimala, ukulinyazwa nokonakala kwempahla noma iprophathi kanye nokuthi ama-network kagesi agxisheleke nokucindezeleka ngokweqile. Kanti futhi lokhu kubanga ukuthi ama-transformer kanye nama-network kagesi acindezeleke ngokweqile nokwenza ukuthi isaplayi kagesi ihluleke nokufeyila, lokhu okubangela ukuthi kube nama-power cuts noma ukucishwa kukagesi okungahleliwe, ukulahleka kwemisebenzi, ingozi yokuphazamiseka kokuvikeleka kokudla, ukuthi ukuthuthuka komnotho kuphazamiseke kakhulu, ukulahleka kwengeniso lemali, ukuphazamiseka kokuphakelwa kukagesi, ukulinyazwa kwabantu ngokubanjwa ugesi, kanye nokusha kwemizi eshiswa ugesi. Lokhu kuholela ekutheni kuphazamiseke isaplayi kagesi kumakhastama akhokha kahle nenza izinto ngokulandela umthetho, lokhu okubanga imiphumela yezinhlekelele ezimbi. Ngakho-ke kuba nzima ukubhekana kanye nezinto zesaplayi kanye nokudingeka kukagesi ngaphansi kwalezi simo, ikakhulukazi lapho iNingizimu Afrika ibhekene nokuncipha noma izinga eliphansi lesaplayi kagesi. Kule dissertation isimo sikazwelonke kanye nesamazwe omhlaba, siveze inhlobo kanye nezinga lokuxhunyelwa kukagesi okungekho emthethweni. Kubuye kwabheka nokuthi ukuxhunyelwa kukagesi okungekho emthethweni kubhekwana kanye nokuvinjelwa kanjani, nokuthi yiziphi izindlela eziqondene ezisetshenziswayo zokuvikeleka ezingasetshenziswa ukuthuthukisa izinqubo zokuvimbela ukuxhunyelwa kukagesi nama-connection angekho emthethweni angavinjelwa kanjani . Kusetshenziswe idizayini ye-case study ukuphenyisisa ngokujulile imininingwane, imibono, izinqubo zokubheka isimo kanye nezipiliyoni zalabo obekuqondiswe kubo ama-interview ngesikhathi kwenziwa ama-interview, ukuyobheka ngamehlo esimo ezindaweni, kanye nokuhlaziya amadokhethi amacala ngokwenzekayo. Le dizayini yiyona eholele ekusetshenzisweni kwamasampuli amaqembu athize, izinqubo noma amaprosija athize kanye namathekniki athize asetshenzisiwe ekuqoqeni kwe-data kanye nohlaziyo lwayo. Idizayini nokwenziwa kwama-instrumenti okuqoqwa kwe-data ehlukene, kanye nokwenza ama-instrumenti okulinga noma e-piloting, kusetshenzisiwe ukuqinisekisa i-validity, ukuthembeka (reliability), ukuqondana ncamashi kwama-instrumenti (accuracy) kanye nokuqiniseka okubizwa ngokuthi yi-trustworthiness yolwazi noma i-infomeshini eqoqiwe. Ucwaningo, lukhiphe imiphumela yokusiza izinkampani noma izinhlangano zikagesi ekuphatheni kangcono le nkinga noma ifenominoni (phenomenon) yenkinga. Kwenziwe izincomo zokusiza ababambe iqhaza (stakeholders) ukuthuthukisa indima yabo ekulwiseni ukuxhunyelwa kanye nama-connection kagesi angekho emthethweni. / Criminology and Security Science / M. Tech. (Security Management)

Page generated in 0.0514 seconds