Walking The Other Side: Doung Anwar Jahangeer
- Authors: Simbao, Ruth K
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147681 , vital:38660 , https://0-doi.org.wam.seals.ac.za/10.1080/09528822.2013.796204
- Description: While certain forms of mobility are romanticized in the privileged worlds of art and academia, the need to move is often triggered by vulnerability, and literal pathways on the ground reveal much about human engagement with place. This article considers the work of Mauritian-born architect/artist/performer Doung Anwar Jahangeer who is based in Durban, South Africa. Inspired by Michel de Certeau, Jahangeer argues that pathways reveal the characteristics of society and uses the act of walking to question the degree to which meaningful transformation has taken place in South Africa. His City Walk performances disclose to audiences how grounded ways of engaging with movement can challenge the metaphoric blindness that handicaps privileged movement. Focusing on his performances from the 2012 ‘Making Way’ exhibition the author interprets Jahangeer's work as challenging blind spots with regard to space, particularly partial spaces still marred by Apartheid. Through performative walking he encourages his audiences to read between the lines of road markings, cracks and signs, and to experience the power of corporeally engaging with the road by thoughtfully placing one foot in front of the other as a mode of seeing.
- Full Text:
- Date Issued: 2013
- Authors: Simbao, Ruth K
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147681 , vital:38660 , https://0-doi.org.wam.seals.ac.za/10.1080/09528822.2013.796204
- Description: While certain forms of mobility are romanticized in the privileged worlds of art and academia, the need to move is often triggered by vulnerability, and literal pathways on the ground reveal much about human engagement with place. This article considers the work of Mauritian-born architect/artist/performer Doung Anwar Jahangeer who is based in Durban, South Africa. Inspired by Michel de Certeau, Jahangeer argues that pathways reveal the characteristics of society and uses the act of walking to question the degree to which meaningful transformation has taken place in South Africa. His City Walk performances disclose to audiences how grounded ways of engaging with movement can challenge the metaphoric blindness that handicaps privileged movement. Focusing on his performances from the 2012 ‘Making Way’ exhibition the author interprets Jahangeer's work as challenging blind spots with regard to space, particularly partial spaces still marred by Apartheid. Through performative walking he encourages his audiences to read between the lines of road markings, cracks and signs, and to experience the power of corporeally engaging with the road by thoughtfully placing one foot in front of the other as a mode of seeing.
- Full Text:
- Date Issued: 2013
What to expect when you’re not expecting : child-freedom, social stigma, and online subjectivities
- Authors: Morison, Tracy
- Date: 2013
- Language: English
- Type: Conference paper , text
- Identifier: vital:6210 , http://hdl.handle.net/10962/d1003915
- Description: From Introduction: Today I’m presenting some of the preliminary findings of a study about voluntary childlessness conducted with Indian, Polish, and fellow South African collaborators. Voluntary childlessness is also frequently referred to as being childless by choice or childfree. The term childfree (as opposed to ‘childless’) is intended to show that not having children “can be an active and fulfilling choice”, and to indicate agency and freedom from social obligation. The distinguishing feature of voluntary childlessness is the deliberate avoidance of parenthood, and this is precisely what opens up childfree people, especially married heterosexuals, to greater stigma than the temporarily or involuntarily childless, since it is seen as willing and deliberate deviation from the norm. Having children is seen as a natural consequence of being a “normal” heterosexual woman or man, as well as an expected outcome of marriage. Parenthood is therefore normalised by regulative discourses around sexuality and gender. This process of normalisation is reinforced by pronatalist discourse. According to Meyers, pronatalism rests upon twin strategies: The first is the valorisation or glorification of parenthood, which supports the belief that having children is the only true path to fulfilment. The second strategy is the denigration of non-reproduction in which childlessness is cast as horrific. The result of these dual strategies is to eliminate deliberate childlessness as a possibility. Parenthood, as the only truly viable option for a fulfilling life, is therefore a non-choice. This is compounded by nationalistic and religious rhetoric that constructs childbearing as an obligation or duty. Consequently, as my previous research showed, people often do not reflect on whether to have children or not, but see it more as a matter of timing.
- Full Text:
- Date Issued: 2013
- Authors: Morison, Tracy
- Date: 2013
- Language: English
- Type: Conference paper , text
- Identifier: vital:6210 , http://hdl.handle.net/10962/d1003915
- Description: From Introduction: Today I’m presenting some of the preliminary findings of a study about voluntary childlessness conducted with Indian, Polish, and fellow South African collaborators. Voluntary childlessness is also frequently referred to as being childless by choice or childfree. The term childfree (as opposed to ‘childless’) is intended to show that not having children “can be an active and fulfilling choice”, and to indicate agency and freedom from social obligation. The distinguishing feature of voluntary childlessness is the deliberate avoidance of parenthood, and this is precisely what opens up childfree people, especially married heterosexuals, to greater stigma than the temporarily or involuntarily childless, since it is seen as willing and deliberate deviation from the norm. Having children is seen as a natural consequence of being a “normal” heterosexual woman or man, as well as an expected outcome of marriage. Parenthood is therefore normalised by regulative discourses around sexuality and gender. This process of normalisation is reinforced by pronatalist discourse. According to Meyers, pronatalism rests upon twin strategies: The first is the valorisation or glorification of parenthood, which supports the belief that having children is the only true path to fulfilment. The second strategy is the denigration of non-reproduction in which childlessness is cast as horrific. The result of these dual strategies is to eliminate deliberate childlessness as a possibility. Parenthood, as the only truly viable option for a fulfilling life, is therefore a non-choice. This is compounded by nationalistic and religious rhetoric that constructs childbearing as an obligation or duty. Consequently, as my previous research showed, people often do not reflect on whether to have children or not, but see it more as a matter of timing.
- Full Text:
- Date Issued: 2013
'God is my forest': Xhosa cultural values provide untapped opportunities for conservation
- Cocks, Michelle L, Dold, Anthony P, Vetter, Susan M
- Authors: Cocks, Michelle L , Dold, Anthony P , Vetter, Susan M
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141198 , vital:37952 , DOI: 10.4102/sajs.v108i5/6.880
- Description: In South Africa conservation is still largely framed in terms of Western scientific values, with a focus on material benefits to local communities, whilst little is known about the intangible values local people attach to nature and biodiversity. We explored the cultural, spiritual and emotional relationships with nature expressed by Xhosa people, within the MaputalandPondoland-Albany Hotspot, as well as the activities that mediate this relationship. A descriptive research approach was applied to document the emotions, meanings and values associated with landscape elements. This approach included group and individual interviews and ‘walk-in-the-woods’ interviews and participatory mapping exercises. Respondents portrayed a strong, although not always easily articulated, appreciation for nature, especially ihlathi lesiXhosa (‘Xhosa forest’, vegetation types within the Thicket Biome).
- Full Text:
- Date Issued: 2012
- Authors: Cocks, Michelle L , Dold, Anthony P , Vetter, Susan M
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141198 , vital:37952 , DOI: 10.4102/sajs.v108i5/6.880
- Description: In South Africa conservation is still largely framed in terms of Western scientific values, with a focus on material benefits to local communities, whilst little is known about the intangible values local people attach to nature and biodiversity. We explored the cultural, spiritual and emotional relationships with nature expressed by Xhosa people, within the MaputalandPondoland-Albany Hotspot, as well as the activities that mediate this relationship. A descriptive research approach was applied to document the emotions, meanings and values associated with landscape elements. This approach included group and individual interviews and ‘walk-in-the-woods’ interviews and participatory mapping exercises. Respondents portrayed a strong, although not always easily articulated, appreciation for nature, especially ihlathi lesiXhosa (‘Xhosa forest’, vegetation types within the Thicket Biome).
- Full Text:
- Date Issued: 2012
A model for the analysis of small group interaction–and beyond?:
- Authors: Hunt, Sally
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/139171 , vital:37711 , DOI: 10.1080/10118063.1997.9724122
- Description: This article describes a branching model developed for the analysis of interaction in small teaching groups in a tertiary setting. Based within Conversation Analysis, the model constitutes a set of justifications for the validity of utterances in terms of their place on the conversational floor. Examples of the classifications included in the model are provided from a broader study of interaction in tutorials at an Eastern Cape university. It is suggested that while the model was developed for a specific context, it could be adapted for use in a variety of contexts.
- Full Text:
- Date Issued: 2012
- Authors: Hunt, Sally
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/139171 , vital:37711 , DOI: 10.1080/10118063.1997.9724122
- Description: This article describes a branching model developed for the analysis of interaction in small teaching groups in a tertiary setting. Based within Conversation Analysis, the model constitutes a set of justifications for the validity of utterances in terms of their place on the conversational floor. Examples of the classifications included in the model are provided from a broader study of interaction in tutorials at an Eastern Cape university. It is suggested that while the model was developed for a specific context, it could be adapted for use in a variety of contexts.
- Full Text:
- Date Issued: 2012
A network telescope perspective of the Conficker outbreak
- Authors: Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429728 , vital:72635 , 10.1109/ISSA.2012.6320455
- Description: This paper discusses a dataset of some 16 million packets targeting port 445/tcp collected by a network telescope utilising a /24 netblock in South African IP address space. An initial overview of the collected data is provided. This is followed by a detailed analysis of the packet characteristics observed, including size and TTL. The peculiarities of the observed target selection and the results of the flaw in the Conficker worm's propagation algorithm are presented. An analysis of the 4 million observed source hosts is reported by grouped by both packet counts and the number of distinct hosts per network address block. Address blocks of size /8, 16 and 24 are used for groupings. The localisation, by geographic region and numerical proximity, of high ranking aggregate netblocks is highlighted. The paper concludes with some overall analyses, and consideration of the application of network telescopes to the monitoring of such outbreaks in the future.
- Full Text:
- Date Issued: 2012
- Authors: Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429728 , vital:72635 , 10.1109/ISSA.2012.6320455
- Description: This paper discusses a dataset of some 16 million packets targeting port 445/tcp collected by a network telescope utilising a /24 netblock in South African IP address space. An initial overview of the collected data is provided. This is followed by a detailed analysis of the packet characteristics observed, including size and TTL. The peculiarities of the observed target selection and the results of the flaw in the Conficker worm's propagation algorithm are presented. An analysis of the 4 million observed source hosts is reported by grouped by both packet counts and the number of distinct hosts per network address block. Address blocks of size /8, 16 and 24 are used for groupings. The localisation, by geographic region and numerical proximity, of high ranking aggregate netblocks is highlighted. The paper concludes with some overall analyses, and consideration of the application of network telescopes to the monitoring of such outbreaks in the future.
- Full Text:
- Date Issued: 2012
An Analysis and Implementation of Methods for High Speed Lexical Classification of Malicious URLs
- Egan, Shaun P, Irwin, Barry V W
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
Building a Graphical Fuzzing Framework
- Zeisberger, Sascha, Irwin, Barry V W
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
China-Africa relations: research approaches
- Authors: Simbao, Ruth K
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147503 , vital:38644 , https://doi.org/10.1162/afar.2012.45.2.1
- Description: About to board a plane in Johannesburg, I handed my temporary boarding pass to the flight attendant who exclaimed,“Simbao, you have a fong kong boarding pass!” Fong kong is a slang term used in South Africa meaning fake, cheap, or low quality and is often associated with Chinese imports. In this case, the term was used to refer to a temporary pass issued earlier on my journey that needed to be replaced with a new boarding pass in Johannesburg.
- Full Text:
- Date Issued: 2012
- Authors: Simbao, Ruth K
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147503 , vital:38644 , https://doi.org/10.1162/afar.2012.45.2.1
- Description: About to board a plane in Johannesburg, I handed my temporary boarding pass to the flight attendant who exclaimed,“Simbao, you have a fong kong boarding pass!” Fong kong is a slang term used in South Africa meaning fake, cheap, or low quality and is often associated with Chinese imports. In this case, the term was used to refer to a temporary pass issued earlier on my journey that needed to be replaced with a new boarding pass in Johannesburg.
- Full Text:
- Date Issued: 2012
Computer-aided identification of coelacanths, latimeria chalumnae, using scale patterns
- Thornycroft, Rosanne E, Booth, Anthony J
- Authors: Thornycroft, Rosanne E , Booth, Anthony J
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124013 , vital:35526 , https://doi.10.1080/17451000.2011.628679
- Description: Despite coelacanths, Latimeria chalumnae, being listed as either endangered by CITES or critically endangered by the IUCN, their population size within South Africa is unknown and still needs to be estimated. Their conservation status unfortunately excludes the use of conventional tagging to mark individual animals for a possible mark-recapture experiment. This study shows that because coelacanths have a unique spot patterning it is possible to quickly and accurately identify specific individuals photographically using computer-aided identification software. Without any manual intervention by an operator, the software accurately identified between 56 and 92% of the individuals. Indentification success increased to 100% if the operator could also manually select from other potential matching photographs. It was also shown that fish exhibiting a yaw angle not exceeding 60˚ could be accurately identified in photographs, although the percentage of fish correctly identified without operator-intervention decreased rapidly with increasing yaw angle. Computer-aided identification should therefore facilitate future coelacanth research as it is both efficient and accurate while also reducing potential stress on the animals observed.
- Full Text:
- Date Issued: 2012
- Authors: Thornycroft, Rosanne E , Booth, Anthony J
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124013 , vital:35526 , https://doi.10.1080/17451000.2011.628679
- Description: Despite coelacanths, Latimeria chalumnae, being listed as either endangered by CITES or critically endangered by the IUCN, their population size within South Africa is unknown and still needs to be estimated. Their conservation status unfortunately excludes the use of conventional tagging to mark individual animals for a possible mark-recapture experiment. This study shows that because coelacanths have a unique spot patterning it is possible to quickly and accurately identify specific individuals photographically using computer-aided identification software. Without any manual intervention by an operator, the software accurately identified between 56 and 92% of the individuals. Indentification success increased to 100% if the operator could also manually select from other potential matching photographs. It was also shown that fish exhibiting a yaw angle not exceeding 60˚ could be accurately identified in photographs, although the percentage of fish correctly identified without operator-intervention decreased rapidly with increasing yaw angle. Computer-aided identification should therefore facilitate future coelacanth research as it is both efficient and accurate while also reducing potential stress on the animals observed.
- Full Text:
- Date Issued: 2012
Remote fingerprinting and multisensor data fusion
- Hunter, Samuel O, Stalmans, Etienne, Irwin, Barry V W, Richter, John
- Authors: Hunter, Samuel O , Stalmans, Etienne , Irwin, Barry V W , Richter, John
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429813 , vital:72641 , 10.1109/ISSA.2012.6320449
- Description: Network fingerprinting is the technique by which a device or service is enumerated in order to determine the hardware, software or application characteristics of a targeted attribute. Although fingerprinting can be achieved by a variety of means, the most common technique is the extraction of characteristics from an entity and the correlation thereof against known signatures for verification. In this paper we identify multiple host-defining metrics and propose a process of unique host tracking through the use of two novel fingerprinting techniques. We then illustrate the application of host fingerprinting and tracking for increasing situational awareness of potentially malicious hosts. In order to achieve this we provide an outline of an adapted multisensor data fusion model with the goal of increasing situational awareness through observation of unsolicited network traffic.
- Full Text:
- Date Issued: 2012
- Authors: Hunter, Samuel O , Stalmans, Etienne , Irwin, Barry V W , Richter, John
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429813 , vital:72641 , 10.1109/ISSA.2012.6320449
- Description: Network fingerprinting is the technique by which a device or service is enumerated in order to determine the hardware, software or application characteristics of a targeted attribute. Although fingerprinting can be achieved by a variety of means, the most common technique is the extraction of characteristics from an entity and the correlation thereof against known signatures for verification. In this paper we identify multiple host-defining metrics and propose a process of unique host tracking through the use of two novel fingerprinting techniques. We then illustrate the application of host fingerprinting and tracking for increasing situational awareness of potentially malicious hosts. In order to achieve this we provide an outline of an adapted multisensor data fusion model with the goal of increasing situational awareness through observation of unsolicited network traffic.
- Full Text:
- Date Issued: 2012
Rhodes University 2012 Graduation Ceremonies Address
- Authors: Badat, Saleem
- Date: 2012
- Language: English
- Type: text
- Identifier: vital:7588 , http://hdl.handle.net/10962/d1006579
- Description: From introduction: We take pride in our striving to ensure that we are an environment in which knowledge, understanding and the intellect can flower; in being a leading postgraduate and research university that takes undergraduate studies seriously; in enjoying among the best pass and graduation rates in South Africa; in our increasing engagement with local communities; in the pursuit of equity and excellence, and in being a cosmopolitan institution with students from some 56 countries.
- Full Text:
- Date Issued: 2012
- Authors: Badat, Saleem
- Date: 2012
- Language: English
- Type: text
- Identifier: vital:7588 , http://hdl.handle.net/10962/d1006579
- Description: From introduction: We take pride in our striving to ensure that we are an environment in which knowledge, understanding and the intellect can flower; in being a leading postgraduate and research university that takes undergraduate studies seriously; in enjoying among the best pass and graduation rates in South Africa; in our increasing engagement with local communities; in the pursuit of equity and excellence, and in being a cosmopolitan institution with students from some 56 countries.
- Full Text:
- Date Issued: 2012
SADSAWU - International workers day
- SADSAWU
- Authors: SADSAWU
- Date: June 2012
- Subjects: SADSAWU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/117975 , vital:34581
- Description: A year has gone by, after the adoption of International Labour Organisation's (ILO) Convention 189 for Domestic Workers. We have worked so hard for nearly four years, to ensure that our work is recognised as decent work! On 16th June 2011 we made history when Convention 189 was adopted. In this year gone by, only one government has signed the ratification of Convention 189. We set ourselves a goal: We want at least 12 governments to sign, one each month as part of the international 12 to 12 Campaign with the International Trade Union Congress (ITUC) and International Domestic Workers' Network (IDWN). South Africa shcAild be the second government to sign and ratify 189, meaning it becomes labour law, as South Africa was the most supportive and vocal government leading the campaign for Convention 189 at the International Labour Conference.
- Full Text:
- Date Issued: June 2012
- Authors: SADSAWU
- Date: June 2012
- Subjects: SADSAWU
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/117975 , vital:34581
- Description: A year has gone by, after the adoption of International Labour Organisation's (ILO) Convention 189 for Domestic Workers. We have worked so hard for nearly four years, to ensure that our work is recognised as decent work! On 16th June 2011 we made history when Convention 189 was adopted. In this year gone by, only one government has signed the ratification of Convention 189. We set ourselves a goal: We want at least 12 governments to sign, one each month as part of the international 12 to 12 Campaign with the International Trade Union Congress (ITUC) and International Domestic Workers' Network (IDWN). South Africa shcAild be the second government to sign and ratify 189, meaning it becomes labour law, as South Africa was the most supportive and vocal government leading the campaign for Convention 189 at the International Labour Conference.
- Full Text:
- Date Issued: June 2012
Service discovery using open sound control
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426890 , vital:72398 , https://www.aes.org/e-lib/online/browse.cfm?elib=16432
- Description: The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application. The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application.
- Full Text:
- Date Issued: 2012
- Authors: Eales, Andrew , Foss, Richard
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426890 , vital:72398 , https://www.aes.org/e-lib/online/browse.cfm?elib=16432
- Description: The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application. The Open Sound Control (OSC) control protocol does not have service discovery capabilities. The approach to adding service discovery to OSC proposed in this paper uses the OSC address space to represent services within the context of a logical device model. This model allows services to be represented in a context-sensitive manner by relating parameters representing services to the logical organization of a device. Implementation of service discovery is done using standard OSC messages and requires that the OSC address space be designed to support these messages. This paper illustrates how these enhancements to OSC allow a device to advertise its services. Controller applications can then explore the device’s address space to discover services and retrieve the services required by the application.
- Full Text:
- Date Issued: 2012
Social recruiting: a next generation social engineering attack
- Schoeman, A H B, Irwin, Barry V W
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
- Authors: Schoeman, A H B , Irwin, Barry V W
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428600 , vital:72523 , https://www.jstor.org/stable/26486876
- Description: Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
- Full Text:
- Date Issued: 2012
STAT3 interacts directly with Hsp90:
- Prinsloo, Earl, Kramer, Adam H, Edkins, Adrienne L, Blatch, Gregory L
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
- Authors: Prinsloo, Earl , Kramer, Adam H , Edkins, Adrienne L , Blatch, Gregory L
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/165142 , vital:41212 , DOI: 10.1002/iub.607
- Description: Heat shock protein 90 (Hsp90) functionally modulates signal transduction. The signal transducer and activator of transcription 3 (STAT3) mediates interleukin‐6 family cytokine signaling. Aberrant activation and mutation of STAT3 is associated with oncogenesis and immune disorders, respectively. Hsp90 and STAT3 have previously been shown to colocalize and coimmunoprecipitate in common complexes.
- Full Text:
- Date Issued: 2012
A framework for DNS based detection and mitigation of malware infections on a network
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429827 , vital:72642 , 10.1109/ISSA.2011.6027531
- Description: Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. The Domain Name Service (DNS) is one of the most prevalent protocols on modern networks and is essential for the correct operation of many network activities, including botnet activity. For this reason DNS forms the ideal candidate for monitoring, detecting and mit-igating botnet activity. In this paper a system placed at the network edge is developed with the capability to detect fast-flux domains using DNS queries. Multiple domain features were examined to determine which would be most effective in the classification of domains. This is achieved using a C5.0 decision tree classifier and Bayesian statistics, with positive samples being labeled as potentially malicious and nega-tive samples as legitimate domains. The system detects malicious do-main names with a high degree of accuracy, minimising the need for blacklists. Statistical methods, namely Naive Bayesian, Bayesian, Total Variation distance and Probability distribution are applied to detect mali-cious domain names. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low false positive rates.
- Full Text:
- Date Issued: 2011
African Languages And ICT Education
- Dalvit, Lorenzo, Murray, Sarah, Terzoli, Alfredo
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
- Authors: Dalvit, Lorenzo , Murray, Sarah , Terzoli, Alfredo
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431166 , vital:72750 , https://www.scitepress.org/Papers/2011/33507/33507.pdf
- Description: In South Africa, English plays a dominant role compared to African lan-guages in empowering domain. Better access to Education through the use of African languages is an object of heated debate. This paper shows that an intervention involving the use of an African language in the domain of ICT Education can change the attitudes of Black universi-ty students. The methodology used included a survey with preliminary and follow-up questionnaires and interviews and an intervention involv-ing the use of localised software and of an on-line glossary of computer terms translated, explained and exemplified in an African language (isiXhosa). This experience increased the support for the use of African languages as additional LoLT, even in the English-dominated field of study of Computer Science. This is an initial step towards promoting linguistic equality between English and African languages and social equality between their speakers.
- Full Text:
- Date Issued: 2011
An illustrated leaflet containing antiretroviral information targeted for low-literate readers: development and evaluation
- Dowse, Roslind, Ramela, Thato, Browne, Sara H
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
- Authors: Dowse, Roslind , Ramela, Thato , Browne, Sara H
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156731 , vital:40043 , https://doi.org/10.1016/j.pec.2011.01.013
- Description: To apply a dual visual/textual modal approach in developing and evaluating a medicine information leaflet with pictograms suitable for low-literate HIV/AIDS patients. To identify and recommend best practices in this type of information design.
- Full Text:
- Date Issued: 2011
Biphenyl sorption to different soil clay minerals
- Tandlich, Roman, Baláž, Štefan
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
- Authors: Tandlich, Roman , Baláž, Štefan
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/76869 , vital:30632 , https://doi.org/10.5897/AJAR10.1012
- Description: Only limited information is available in the literature on the role of soil mineral surfaces in the sorption of hydrophobic organic pollutants. This knowledge gap is addressed through the assessment of biphenyl sorption to kaolinite, illite and bentonite; using the batch equilibration technique with incubations lasting 6 or 21 days at 28 ± 2°C in the dark [RT1]. Sorption of biphenyl onto kaolinite followed the Freundlich sorption isotherm, whereas linear sorption isotherms were observed on illite and bentonite [RT2]. The biphenyl sorption partition coefficient on kaolinite ranged from 0.1 to 9.1 cm3.g-1 after 6 days and no sorption was observed after 21 days. This could have been caused by a completely reversible sorption or a loss of binding capacity after 21 days [RT3]. The respective values of the biphenyl sorption partition coefficient on illite and bentonite ranged from 20.3 ± 0.3 to 120 ± 8 cm3.g-1.Sorption equilibrium on the internal clay surfaces was reached after 6 days, as indicated by the sorption data for illite and bentonite [RT4]. Access of biphenyl molecules to the internal clay surfaces is a function of the ionic strength of soil solution and the soil organic matter is the dominant site for biphenyl sorption after 6 to 21 days.
- Full Text:
- Date Issued: 2011
Polygamy in the recognition of Customary Marriages Act:
- Authors: Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141809 , vital:38006 , DOI: 10.1080/10130950.2009.9676275
- Description: The Recognition of Customary Marriages Act (RCMA) 1998, recognises customary marriages which are “negotiated, celebrated or concluded according to any of the systems of indigenous African customary law which exist in South Africa” including polygamous marriages. The Act arises in the context of South Africa's Constitution which bans discrimination on grounds of culture and sexual orientation and allows for heterogeneity in its definitions of marriage and the family. A pluralist approach to family jurisprudence, however, is sometimes conceived of as setting up an irresolvable tension between the constitutional commitment to gender equality and protection for patriarchal prerogatives sanctioned by customary law. The fact that rights sometimes collide with one another is one of the reasons why it is impossible always to treat rights as absolute. When rights clash the question that arises is which of the rights that find themselves in tension with one another should give way and why?
- Full Text:
- Date Issued: 2011
- Authors: Vincent, Louise
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141809 , vital:38006 , DOI: 10.1080/10130950.2009.9676275
- Description: The Recognition of Customary Marriages Act (RCMA) 1998, recognises customary marriages which are “negotiated, celebrated or concluded according to any of the systems of indigenous African customary law which exist in South Africa” including polygamous marriages. The Act arises in the context of South Africa's Constitution which bans discrimination on grounds of culture and sexual orientation and allows for heterogeneity in its definitions of marriage and the family. A pluralist approach to family jurisprudence, however, is sometimes conceived of as setting up an irresolvable tension between the constitutional commitment to gender equality and protection for patriarchal prerogatives sanctioned by customary law. The fact that rights sometimes collide with one another is one of the reasons why it is impossible always to treat rights as absolute. When rights clash the question that arises is which of the rights that find themselves in tension with one another should give way and why?
- Full Text:
- Date Issued: 2011