scispace - formally typeset
Search or ask a question

Showing papers by "University of Johannesburg published in 2002"


Book ChapterDOI
07 May 2002
TL;DR: The concept of information security culture and a assessment approach developed to implement and improve such a culture are discussed.
Abstract: In every organisation an information security culture emerges from the way in which people behave towards information and the security thereof. The procedures that employees use in their daily work could represent the weakest link in the information security chain. It is therefore importanr to develop and improve information security culture through a structured model that addresses employees behaviour. This article will discuss the concept of information security culture and a assessment approach developed to implement and improve such a culture.

141 citations


01 Apr 2002
TL;DR: In this paper, the authors present a comparative analysis of the findings of three independent studies aimed at identifying and describing teachers' attitudes to and experiences in implementing inclusive education in South Africa.
Abstract: The central argument is that the creation of inclusive schools will require more than merely the implementation of new policies. Practising teachers are the key to the successful implementation of an inclusive system and they will need time, ongoing support and in-service training. Real change therefore requires a long-term commitment to professional development. This article presents a comparative analysis of the findings of three independent studies aimed at identifying and describing teachers' attitudes to and experiences in implementing inclusive education in South Africa. The main themes identified in all three studies include inadequate knowledge, skills and training for the implementation of inclusive education; lack of educational and teacher support; insufficient facilities and resources, and the potential effects of inclusive education on learners. Die implementering van insluitende onderwys in Suid-Afrika : onderwysers se houdings daarteenoor en ervaring daarvan Die sentrale argument is dat die ontwikkeling van insluitende skole omvattende verandering vereis wat meer behels as die blote implementering van die nuwe onder-wysbeleid. Onderwysers speel 'n beslissende rol in die suksesvolle implementering van 'n insluitende onderwyssisteem, mits voldoende tyd, ondersteuning en indiensopleiding aan hulle beskikbaar is. Daadwerklike verandering vereis dus langtermyn professionele ontwikkeling van onderwysers. Hierdie artikel vergelyk die bevindinge van drie onafhanklike voorstudies wat fokus op die identifisering en beskrywing van onderwysers se houdings teenoor die nuwe stelsel en hulle ervarings van die implementering van insluitende onderwys in Suid-Afrika. Die hooftemas van hierdie studies sluit in: ontoereikende kennis aangaande die nuwe stelsel; vaardighede en opleiding benodig om insluiting te implementeer; ontoereikende steun aan onderwysers in hierdie verband; onvoldoende fasiliteite en bronne om die nuwe stelsel te implementeer; en die potensiele invloed van insluiting op die leerders.

94 citations


Journal Article
TL;DR: This paper introduced discourse analysis as a poststructuralist and social constructionist approach to educational research developing within the post-modern line of thought, which could serve as a valuable approach in educational research as it challenges current dominant ways of understanding or viewing the objects of study.
Abstract: This article serves as an introduction to discourse analysis. Due to logistical reasons, because this is a relatively new and multifaceted approach in research, this article involves only introductory remarks about discourse analysis as approach to qualitative, reflexive educational research. Different postmodern “approaches” to qualitative nursing research derived from other disciplines are being rooted in nursing as epistemology. Discourse analysis is introduced as a Poststructuralist and Social Constructionist “approach” to educational research developing within the postmodern line of thought. The ideas on discourse analysis as a research “approach” of Parker (1992: 6-20) and Terre Blanche & Durrheim (1999: 154-167) are discussed. Discourse analysis could serve as a valuable “approach” in educational research as it challenges current dominant ways of understanding or viewing the objects of study. This process opens up space for alternative reflections that could lead to change.

52 citations


01 Jan 2002
TL;DR: Fourie et al. as mentioned in this paper used human security as the conceptual looking glass through which to ascertain the causes and effects of the unfolding disaster of HIV/AIDS in Southern Africa, focusing specifically on the implications for demographic, food, political and macroeconomic security.
Abstract: The altered conception of “security” and the introduction of its “human” angle specifically in the post-Cold War context implies cogent reassessments of issues pertaining to sustainable development and international politics. HIV/AIDS is one such an issue that has and will continue to have a significant impact on the dynamics of “who gets what, where, when and how” in Southern Africa. This article addresses the socio-political impact of this disease in the region, using “human security” as the conceptual looking glass through which to ascertain the causes and effects of the unfolding disaster. This is achieved by focusing specifically on the implications for demographic, food, political and macro-economic security, and the effect this has on governments’ ability to provide essential services. The article concludes by enjoining specifically political and other social scientists to redouble their intellectual efforts at analysing and addressing the origin, prevalence and social consequences of HIV/AIDS. HUMAN SECURITY AND HIV/AIDS Traditionally, the concept of ‘security’ has been interpreted in militaristic terms as the military defence of the state, involving ‘structured violence manifest in state warfare’ (MacLean, 1998:2; see also Bedelsky, 1999:1). Since the end of the Cold War this narrow definition of security has become less relevant (Hadingham, 2000:113). The term ‘human security’ was first officially used in the 1994 Human Development Report of the United Nations (UN) Development Programme. According to the report, the intention of human security is ‘... to capture the post-Cold War peace dividend and redirect those resources towards the development agenda’ (Axworthy, 1999:2). Hubert (1999) expands this conceptualisation, stating that ....in essence, human security means safety for people from both violent and non-violent threats. It is a condition of state of being characterised by freedom from pervasive threats to people’s rights, their safety or even their lives... It is an alternative way of seeing the world, taking people as its point of reference, rather than focusing exclusively on the security or territory of governments. Like other security concepts – national security, economic security, food security – it is about protection. Human security entails taking preventative measures to reduce vulnerability and minimise risk, and taking remedial action where prevention fails. HIV/AIDS does not fit into the traditional definition of security. However, as Hadingham (2000:120) argues, in terms of the post-Cold War human security regime, HIV/AIDS poses a ‘pervasive and non-violent threat to the existence of individuals, as the virus significantly shortens life expectancy, undermined quality of 1 Pieter Fourie (pf@lw.rau.ac.za) lectures Politics at the Rand Afrikaans University in Johannesburg, and Martin Schonteich (martin.s@iss.co.za) is a Senior Researcher with the Institute for Security Studies in Pretoria, South Africa.

18 citations


Proceedings Article
01 Jan 2002
TL;DR: The proposed The Delegation Authorization Model (DAM) will work within the security constraints imposed by the WAM when deciding whether delegations will be approved or denied, and will also take into account the dynamically determined constraints impose by the DAM itself.
Abstract: A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Tasks that comprise the workflow process are typically dependent on one another. Security, in a workflow context, involves the implementation of access control security mechanismsto ensure that task dependencies are coordinated and that tasks are performed by authorized subjects only. A Workflow Authorization Model (WAM) [AH96b] has already been developed to enforce security principles on workflows, by addressing the granting and revoking of authorizations in a Workflow Management System (WFMS). This WAM satisfies most criteria required for an optimal access control model for workflows, some of which cannot be met through pure role-based access control (RBAC) mechanisms. This paper addresses the delegation of task authorizations within a workflow process by subjects in the organizational structure. The proposed The Delegation Authorization Model (DAM) will work within the security constraints imposed by the WAM when deciding whether delegations will be approved or denied. It will also take into account the dynamically determined constraints imposed by the DAM itself.

18 citations


Journal ArticleDOI
TL;DR: In this article, the requirements for a state in the Hilbert space C m ⊙ C n for m, n ∈ N to be entangled and a solution to the corresponding "factorization" problem if this is not the case were determined.
Abstract: Entangled quantum states are an important component of quantum computing techniques such as quantum error-correction, dense coding and quantum teleportation. We determine the requirements for a state in the Hilbert space C m ⊙ C n for m, n ∈ N to be entangled and a solution to the corresponding "factorization" problem if this is not the case. We consider the implications of these criteria for computer algebra applications.

5 citations


Proceedings Article
01 Jan 2002
TL;DR: This Web of Trust is examined and it is shown that it may not be adequate when one considers the nature of the Web today.
Abstract: In a recent paper by Berners-Lee et al [2] the World Wide Web of the future is proposed. It is a Web where data is de ned in a manner that allows machines to \understand" the content that is available on the Web. No longer will the content of documents be understood by humans alone. The Web of which we speak promises a plethora of features and functionality not yet possible using the World Wide Web of today. Berners-Lee et al speak of giving meaning to data in the Web of the future, the Semantic Web. The security model of the Semantic Web per se is dependent on a Web of Trust, as proposed by Swartz et al [13]. This Web of Trust is similar to the Web of Trust implemented by PGP [8] in that A (who trusts B) will trust C if B trusts C. In this paper we examine this Web of Trust and show that it may not be adequate when one considers the nature of the Web today.

1 citations


Proceedings Article
01 Jan 2002
TL;DR: The method of using generic vulnerability categories, which may act as a standard in comparing IDS tools, is suggested, which is likely to be popular and effective in the field of intrusion detection.
Abstract: Any organisation connected to the Internet that is serious about security cannot be without an intrusion detection system (IDS) these days. Is one IDS sufficient to cover all possible vulnerabilities in a network? In a sea of security products available today, which IDS tool(s) will be sufficient for your organisation’s needs? The only way to find out is to compare various IDS tools with each other. But how? Each IDS tool has a vulnerability database containing hundreds of known vulnerabilities it scans for to resolve the vulnerabilities it has found. Not one IDS tool contains the same number of vulnerabilities it scans for. In addition, many vulnerabilities that are present in the vulnerability database of a specific IDS are also present in the vulnerability databases of other IDS tools. In other words, many IDS tools scan for the same vulnerabilities. On the other hand, certain IDS tools scan for unique vulnerabilities. This paper suggests the method of using generic vulnerability categories, which may act as a standard in comparing IDS tools. 2 H.S. VENTER (heins@adam.rau.ac.za) J.H.P. ELOFF (eloff@rkw.rau.ac.za)

1 citations


01 Jan 2002
TL;DR: In this article, the implementation of IT Project Risk Management during the course of a proof-of-concept implementation of an electronic document management system (EDMS) for a large petrochemical company in South Africa is discussed.
Abstract: This article focuses on the implementation of IT Project Risk Management during the course of a proof-of-concept implementation of an electronic document management system (EDMS) for a large petro-chemical company in South Africa. The article starts off with a high-level overview of the project followed by the steps taken to progress the project risk management initiative from idea, to implementation, to use. The following section focuses on the closing phase of the project with some lessons learnt and conclusions by the author.

01 Jan 2002
TL;DR: In this paper, the authors investigated the economic savings potential of using a cogeneration system made of microturbines, heat pumps and heat exchangers for large residential units.
Abstract: Currently, electrical resistance heaters are used to produce most of the hot water in South Africa. Increasing electricity tariffs make these devices very expensive. This paper investigates the economic savings potential of using a cogeneration system made of microturbines, heat pumps and heat exchangers. Specifically the heating of water for large residential units is investigated. Different economic parameters are used to compare microturbine heat pump systems with electrical resistance heaters, natural gas boilers and heat pumps. For different main centres in South Africa, the amount of hot water is determined where a cogeneration system is economically more viable than other types of water heaters. It has been concluded that the most important influence factor is the electricity tariff. The higher the electricity tariff in a city, the smaller the number of domestic consumers where a cogeneration system becomes viable.

01 Jan 2002
TL;DR: In this paper, an experimental investigation is described in which an experimental set-up and measuring technique is developed to evaluate a permanent magnet for the decrease of scale formation in tubes, which relies on the basic principle that the friction pressure drop increases if scaling takes place.
Abstract: An experimental investigation is described in which an experimental set-up and measuring technique is developed. It is used to evaluate a permanent magnet for the decrease of scale formation in tubes. The volumetric flow rate is used as the indicator of scale formation, which relies on the basic principle that the friction pressure drop increases if scaling takes place. The test section consists of three soft drawn copper tubes in which water with a velocity of ± 2 m/s flows. One of the tubes is used to evaluate the Physical Water Treatment (PWT) device and the other two tubes are used as a control. With the experimental set-up described it is possible to detect a change in the friction factor of 1% which represents a flow rate change of 22 m f !min. Experiments are conducted in different phases in which the PWT device is attached onto one of the tubes and then removed to determine if any change in the scale formation rate takes place. It follows from the results obtained that a very sensitive experimental set-up was designed and built with which very small amounts of scale can be detected. However, contradictions in the experimental results makes the set-up unusable for the evaluation of the efficiency of PWT devices.

01 Jan 2002
TL;DR: In this article, the authors report on the condensation heat transfer and pressure drop performance of a heat pump water heater operating with R-22 at an average saturation temperature of 40°C with mass fluxes ranging from 300 - 800kg/m 2 s.
Abstract: This paper reports on the condensation heat transfer and pressure drop performance of a heat pump water heater operating with R-22 at an average saturation temperature of 40°C with mass fluxes ranging from 300 - 800kg/m 2 s. The purpose of the experimental work was to validate the effectiveness of a computerized data acquisition system, as well as to establish a sound experimental procedure. Experimental flow regimes were determined using a well-known flow regime predictor. This showed that the experimental data points lay mainly in the annular flow region. The experimental heat transfer coefficients and pressure drops were compared with widely used correlations, and good agreement was obtained.