A framework for the integration of mobile technology into adventure sport for the purpose of increasing participant safety
- Authors: Mills, Craig John
- Date: 2018
- Subjects: Mobile communication systems , Health promotion -- Technological innovations Sports -- Technological innovations Cell phones -- Health aspects
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/32099 , vital:31958
- Description: The sporting industry has seen incredible advancements with the use of information technology. Technology is used in the sporting industry for training, coaching and even as a deciding factor of a game result. There are certain sports which require individuals to venture into isolated environments, these sports have been termed adventure or extreme sports. Due to the extreme environmental factors that can occur with adventure sport, it is possible for an individual to experience an emergency situation. Emergency situations can occur at any time, and this is especially true in adventure sport. Adventure sport such as ocean and river kayaking require individuals to venture into isolated environments, where if an emergency situation occurs could result in an individual left stranded waiting for emergency rescue. Adventure sport participants and Event Organizers are aware of the dangers associated with this type of adventure sport, but there is currently no requirement to have a mobile technology device present during kayaking events. The main purpose of this dissertation was to evaluate the current use of mobile technology in adventure sport in the Eastern Cape province of South Africa. To accomplish this two literature reviews were conducted which identi_ed information on the two main themes which are adventure sport and mobile technology. To produce information from the ocean and river kayaking community an online questionnaire was distributed to several kayaking clubs in the Eastern Cape province of South Africa. This dissertation also presents a framework that proposes the use of mobile technology hardware and software by participants and event organisers in an attempt to increase the safety of events in this form of adventure sport. It is hoped that the framework for using mobile technology to increase the safety of adventure sport proposed in this research, may provide clear guidance for the achievement of a safer sporting experience for the participants of ocean and river kayaking.
- Full Text:
- Date Issued: 2018
- Authors: Mills, Craig John
- Date: 2018
- Subjects: Mobile communication systems , Health promotion -- Technological innovations Sports -- Technological innovations Cell phones -- Health aspects
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/32099 , vital:31958
- Description: The sporting industry has seen incredible advancements with the use of information technology. Technology is used in the sporting industry for training, coaching and even as a deciding factor of a game result. There are certain sports which require individuals to venture into isolated environments, these sports have been termed adventure or extreme sports. Due to the extreme environmental factors that can occur with adventure sport, it is possible for an individual to experience an emergency situation. Emergency situations can occur at any time, and this is especially true in adventure sport. Adventure sport such as ocean and river kayaking require individuals to venture into isolated environments, where if an emergency situation occurs could result in an individual left stranded waiting for emergency rescue. Adventure sport participants and Event Organizers are aware of the dangers associated with this type of adventure sport, but there is currently no requirement to have a mobile technology device present during kayaking events. The main purpose of this dissertation was to evaluate the current use of mobile technology in adventure sport in the Eastern Cape province of South Africa. To accomplish this two literature reviews were conducted which identi_ed information on the two main themes which are adventure sport and mobile technology. To produce information from the ocean and river kayaking community an online questionnaire was distributed to several kayaking clubs in the Eastern Cape province of South Africa. This dissertation also presents a framework that proposes the use of mobile technology hardware and software by participants and event organisers in an attempt to increase the safety of events in this form of adventure sport. It is hoped that the framework for using mobile technology to increase the safety of adventure sport proposed in this research, may provide clear guidance for the achievement of a safer sporting experience for the participants of ocean and river kayaking.
- Full Text:
- Date Issued: 2018
Users’ perceptions regarding password policies
- Authors: Fredericks, Damian Todd
- Date: 2018
- Subjects: Computers -- Access control , Computer networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/30205 , vital:30896
- Description: Information is considered a valuable asset to most organisations and is often exposed to various threats which exploit its confidentiality, integrity and availability (CIA). Identification and Authentication are commonly used to help ensure the CIA of information. This research study specifically focused on password-based authentication. Passwords are used to log into personal computers, company computers, email accounts, bank accounts and various software systems and mobile applications. Passwords act like a protective barrier between a user and their personal and company information, and remain the most cost-effective and most efficient method to control access to computer systems. An extensive content analysis was conducted regarding the security of passwords, as well as users’ password management coping strategies. It was determined that very little research has been conducted in relation to users’ perceptions towards password policies. The problem identified by this research is that organisations often implement password policy guidelines without taking into consideration users’ perceptions regarding such guidelines. This could result in users adopting various password management coping strategies. This research therefore aimed to determine users’ perceptions with regard to current password-related standards and best practices (password policy guidelines). Standards and best practices such as ISO/IEC 27002 (2013), NIST SP 800-118 (2009), NIST SP 800-63-2 (2013), NIST SP 800-63B (2016) and the SANS Password Protection Policy (2014b) were studied in order to determine the common elements of password policies. This research argued that before organisations implement password policy guidelines, they need to determine users’ perceptions towards such guidelines. It was identified that certain human factors such as human memory, attitude and apathy often cause users to adopt insecure coping strategies such as Reusing Passwords, Writing Down Passwords and Not Changing Passwords. This research included a survey which took the form of a questionnaire. The aim of the survey was to determine users’ perceptions towards common elements of password policies and to determine the coping strategies users commonly adopt. The survey included questions related to the new NIST SP 800-63B (2016) that sought to determine users’ perceptions towards these new NIST password policy iii guidelines. Findings from the survey indicated that respondents found the new NIST guidelines to be helpful, secure and easier to adhere to. Finally, recommendations regarding password policies were presented based on the common elements of password policies and users’ perceptions of the new NIST password guidelines. These recommendations could help policy makers in the implementation of new password policies or the revision of current password policies.
- Full Text:
- Date Issued: 2018
- Authors: Fredericks, Damian Todd
- Date: 2018
- Subjects: Computers -- Access control , Computer networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/30205 , vital:30896
- Description: Information is considered a valuable asset to most organisations and is often exposed to various threats which exploit its confidentiality, integrity and availability (CIA). Identification and Authentication are commonly used to help ensure the CIA of information. This research study specifically focused on password-based authentication. Passwords are used to log into personal computers, company computers, email accounts, bank accounts and various software systems and mobile applications. Passwords act like a protective barrier between a user and their personal and company information, and remain the most cost-effective and most efficient method to control access to computer systems. An extensive content analysis was conducted regarding the security of passwords, as well as users’ password management coping strategies. It was determined that very little research has been conducted in relation to users’ perceptions towards password policies. The problem identified by this research is that organisations often implement password policy guidelines without taking into consideration users’ perceptions regarding such guidelines. This could result in users adopting various password management coping strategies. This research therefore aimed to determine users’ perceptions with regard to current password-related standards and best practices (password policy guidelines). Standards and best practices such as ISO/IEC 27002 (2013), NIST SP 800-118 (2009), NIST SP 800-63-2 (2013), NIST SP 800-63B (2016) and the SANS Password Protection Policy (2014b) were studied in order to determine the common elements of password policies. This research argued that before organisations implement password policy guidelines, they need to determine users’ perceptions towards such guidelines. It was identified that certain human factors such as human memory, attitude and apathy often cause users to adopt insecure coping strategies such as Reusing Passwords, Writing Down Passwords and Not Changing Passwords. This research included a survey which took the form of a questionnaire. The aim of the survey was to determine users’ perceptions towards common elements of password policies and to determine the coping strategies users commonly adopt. The survey included questions related to the new NIST SP 800-63B (2016) that sought to determine users’ perceptions towards these new NIST password policy iii guidelines. Findings from the survey indicated that respondents found the new NIST guidelines to be helpful, secure and easier to adhere to. Finally, recommendations regarding password policies were presented based on the common elements of password policies and users’ perceptions of the new NIST password guidelines. These recommendations could help policy makers in the implementation of new password policies or the revision of current password policies.
- Full Text:
- Date Issued: 2018
- «
- ‹
- 1
- ›
- »