Visualization of a data leak
- Swart, Ignus, Grobler, Marthie, Irwin, Barry V W
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428584 , vital:72522 , 10.1109/ISSA.2013.6641046
- Description: The potential impact that data leakage can have on a country, both on a national level as well as on an individual level, can be wide reaching and potentially catastrophic. In January 2013, several South African companies became the target of a hack attack, resulting in the breach of security measures and the leaking of a claimed 700000 records. The affected companies are spread across a number of domains, thus making the leak a very wide impact area. The aim of this paper is to analyze the data released from the South African breach and to visualize the extent of the loss by the companies affected. The value of this work lies in its connection to and interpretation of related South African legislation. The data extracted during the analysis is primarily personally identifiable information, such as defined by the Electronic Communications and Transactions Act of 2002 and the Protection of Personal Information Bill of 2009.
- Full Text:
- Date Issued: 2013
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428584 , vital:72522 , 10.1109/ISSA.2013.6641046
- Description: The potential impact that data leakage can have on a country, both on a national level as well as on an individual level, can be wide reaching and potentially catastrophic. In January 2013, several South African companies became the target of a hack attack, resulting in the breach of security measures and the leaking of a claimed 700000 records. The affected companies are spread across a number of domains, thus making the leak a very wide impact area. The aim of this paper is to analyze the data released from the South African breach and to visualize the extent of the loss by the companies affected. The value of this work lies in its connection to and interpretation of related South African legislation. The data extracted during the analysis is primarily personally identifiable information, such as defined by the Electronic Communications and Transactions Act of 2002 and the Protection of Personal Information Bill of 2009.
- Full Text:
- Date Issued: 2013
Voice and agency in post-apartheid South African media: young and mediated
- Wasserman, Herman, Garman, Anthea
- Authors: Wasserman, Herman , Garman, Anthea
- Date: 2013
- Language: English
- Type: text , article
- Identifier: vital:38361 , http://hdl.handle.net/10520/EJC141607
- Description: What does the rising number of service delivery protests tell us about who gets to speak and who gets to listen in South African politics? Do politicians listen to the youth, especially the vast numbers of the un- and under-employed? What role do the youth play in social cohesion, civic action and the future of our young democracy?
- Full Text:
- Date Issued: 2013
- Authors: Wasserman, Herman , Garman, Anthea
- Date: 2013
- Language: English
- Type: text , article
- Identifier: vital:38361 , http://hdl.handle.net/10520/EJC141607
- Description: What does the rising number of service delivery protests tell us about who gets to speak and who gets to listen in South African politics? Do politicians listen to the youth, especially the vast numbers of the un- and under-employed? What role do the youth play in social cohesion, civic action and the future of our young democracy?
- Full Text:
- Date Issued: 2013
Voices of the hungry: a qualitative measure of household food access and food insecurity in South Africa
- Chakona, Gamuchirai, Shackleton, Charlie M
- Authors: Chakona, Gamuchirai , Shackleton, Charlie M
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67277 , vital:29066 , https://doi.org/10.1186/s40066-017-0149-x
- Description: publisher version , Background: South Africa is rated a food secure nation, but large numbers of households within the country have inadequate access to nutrient-rich diverse foods. The study sought to investigate households’ physical and economic access and availability of food, in relation to local context which influences households’ access to and ability to grow food which may affect the dietary quality. We sought to understand self-reported healthy diets, food insecurity from the perspective of people who experienced it, barriers to household food security and perceptions and feelings on food access as well as strategies households use to cope with food shortages and their perceptions on improving household food security. Methods: Focus group discussions were conducted along a rural–urban continuum in three South African towns situated along an agro-ecological gradient. Participants were asked about their knowledge of healthy diets, factors influencing their food consumption, their perceptions regarding food insecurity, barriers to food security, coping strategies and solutions to improve access to nutrient-rich foods. Results: A total of 91 people participated in 11 focus groups, with 76% females. The majority of participants aged between 31 and 50 years. Participants were knowledgeable about healthy diets but had limited access to it hence consumed monotonous diets. The perceptions provided insights into the pressing issues of inadequate access to food, food insecurity, coping strategies and ideas on improving food security. The majority of participants reported on experiencing food insecurity and female-headed households, unemployed and orphaned children were most vulnerable. Focus group participants highlighted the complexity of the food system in their communities which relies on own production, collecting from open spaces, donations and to a larger extent purchase, in the context of unemployment, low income, water and land shortages as well as theft. Conclusion: The results provide a significant contribution from a needs assessment perspective from the communities, identify “hidden” constrains in household food access and provide effective future solutions for improving food security in the communities. Government should assist with capacity building, employment creation and providing resources (especially, land and water) for communities to practise agriculture which they all agreed can improve food security.
- Full Text:
- Date Issued: 2013
- Authors: Chakona, Gamuchirai , Shackleton, Charlie M
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/67277 , vital:29066 , https://doi.org/10.1186/s40066-017-0149-x
- Description: publisher version , Background: South Africa is rated a food secure nation, but large numbers of households within the country have inadequate access to nutrient-rich diverse foods. The study sought to investigate households’ physical and economic access and availability of food, in relation to local context which influences households’ access to and ability to grow food which may affect the dietary quality. We sought to understand self-reported healthy diets, food insecurity from the perspective of people who experienced it, barriers to household food security and perceptions and feelings on food access as well as strategies households use to cope with food shortages and their perceptions on improving household food security. Methods: Focus group discussions were conducted along a rural–urban continuum in three South African towns situated along an agro-ecological gradient. Participants were asked about their knowledge of healthy diets, factors influencing their food consumption, their perceptions regarding food insecurity, barriers to food security, coping strategies and solutions to improve access to nutrient-rich foods. Results: A total of 91 people participated in 11 focus groups, with 76% females. The majority of participants aged between 31 and 50 years. Participants were knowledgeable about healthy diets but had limited access to it hence consumed monotonous diets. The perceptions provided insights into the pressing issues of inadequate access to food, food insecurity, coping strategies and ideas on improving food security. The majority of participants reported on experiencing food insecurity and female-headed households, unemployed and orphaned children were most vulnerable. Focus group participants highlighted the complexity of the food system in their communities which relies on own production, collecting from open spaces, donations and to a larger extent purchase, in the context of unemployment, low income, water and land shortages as well as theft. Conclusion: The results provide a significant contribution from a needs assessment perspective from the communities, identify “hidden” constrains in household food access and provide effective future solutions for improving food security in the communities. Government should assist with capacity building, employment creation and providing resources (especially, land and water) for communities to practise agriculture which they all agreed can improve food security.
- Full Text:
- Date Issued: 2013
Walking the (social media) line: regulations, ethics, accountability
- Authors: Mathurine, Jude
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158576 , vital:40208 , https://hdl.handle.net/10520/EJC141581
- Description: Journalists are moving from the margins to the mainstream. While media organisations wrap their heads around social media strategies, editors and reporters struggle to keep pace with changing policies, laws and practice.
- Full Text:
- Date Issued: 2013
- Authors: Mathurine, Jude
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158576 , vital:40208 , https://hdl.handle.net/10520/EJC141581
- Description: Journalists are moving from the margins to the mainstream. While media organisations wrap their heads around social media strategies, editors and reporters struggle to keep pace with changing policies, laws and practice.
- Full Text:
- Date Issued: 2013
Walking The Other Side: Doung Anwar Jahangeer
- Authors: Simbao, Ruth K
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147681 , vital:38660 , https://0-doi.org.wam.seals.ac.za/10.1080/09528822.2013.796204
- Description: While certain forms of mobility are romanticized in the privileged worlds of art and academia, the need to move is often triggered by vulnerability, and literal pathways on the ground reveal much about human engagement with place. This article considers the work of Mauritian-born architect/artist/performer Doung Anwar Jahangeer who is based in Durban, South Africa. Inspired by Michel de Certeau, Jahangeer argues that pathways reveal the characteristics of society and uses the act of walking to question the degree to which meaningful transformation has taken place in South Africa. His City Walk performances disclose to audiences how grounded ways of engaging with movement can challenge the metaphoric blindness that handicaps privileged movement. Focusing on his performances from the 2012 ‘Making Way’ exhibition the author interprets Jahangeer's work as challenging blind spots with regard to space, particularly partial spaces still marred by Apartheid. Through performative walking he encourages his audiences to read between the lines of road markings, cracks and signs, and to experience the power of corporeally engaging with the road by thoughtfully placing one foot in front of the other as a mode of seeing.
- Full Text:
- Date Issued: 2013
- Authors: Simbao, Ruth K
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147681 , vital:38660 , https://0-doi.org.wam.seals.ac.za/10.1080/09528822.2013.796204
- Description: While certain forms of mobility are romanticized in the privileged worlds of art and academia, the need to move is often triggered by vulnerability, and literal pathways on the ground reveal much about human engagement with place. This article considers the work of Mauritian-born architect/artist/performer Doung Anwar Jahangeer who is based in Durban, South Africa. Inspired by Michel de Certeau, Jahangeer argues that pathways reveal the characteristics of society and uses the act of walking to question the degree to which meaningful transformation has taken place in South Africa. His City Walk performances disclose to audiences how grounded ways of engaging with movement can challenge the metaphoric blindness that handicaps privileged movement. Focusing on his performances from the 2012 ‘Making Way’ exhibition the author interprets Jahangeer's work as challenging blind spots with regard to space, particularly partial spaces still marred by Apartheid. Through performative walking he encourages his audiences to read between the lines of road markings, cracks and signs, and to experience the power of corporeally engaging with the road by thoughtfully placing one foot in front of the other as a mode of seeing.
- Full Text:
- Date Issued: 2013
Weevil borne microbes contribute as much to the reduction of photosynthesis in water hyacinth as does herbivory
- Venter, Nic, Hill, Martin P, Hutchinson, Sarah-Leigh, Ripley, Brad S
- Authors: Venter, Nic , Hill, Martin P , Hutchinson, Sarah-Leigh , Ripley, Brad S
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423573 , vital:72073 , xlink:href="https://doi.org/10.1016/j.biocontrol.2012.10.011"
- Description: Arthropods released for weed biocontrol can have effects other than simply removing biomass and frequently decrease photosynthetic rate more than can be attributed to the mere loss of photosynthetic surface area. Some of this effect may result because biological control agents facilitate the transfer and ingress of deleterious microbes into plant tissues on which they feed. We evaluated this facilitation effect using water hyacinth (Eichhornia crassipes) and a weevil (Neochetina eichhorniae) and compared the reductions in photosynthetic rates between leaves subject to herbivory by adult weevils sterilized with 3.5% chlorine bleach, to those that were unsterilized. The results showed that weevils carried both fungi and bacteria, transferred these to leaves on which they fed, and that microbes and biomass removal contributed almost equally to the 37% decrease in photosynthetic productivity. Hence, maximising the effectiveness of using arthropods that damage leaf surfaces for biocontrol requires the presence of microorganisms that are deleterious to plants.
- Full Text:
- Date Issued: 2013
- Authors: Venter, Nic , Hill, Martin P , Hutchinson, Sarah-Leigh , Ripley, Brad S
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/423573 , vital:72073 , xlink:href="https://doi.org/10.1016/j.biocontrol.2012.10.011"
- Description: Arthropods released for weed biocontrol can have effects other than simply removing biomass and frequently decrease photosynthetic rate more than can be attributed to the mere loss of photosynthetic surface area. Some of this effect may result because biological control agents facilitate the transfer and ingress of deleterious microbes into plant tissues on which they feed. We evaluated this facilitation effect using water hyacinth (Eichhornia crassipes) and a weevil (Neochetina eichhorniae) and compared the reductions in photosynthetic rates between leaves subject to herbivory by adult weevils sterilized with 3.5% chlorine bleach, to those that were unsterilized. The results showed that weevils carried both fungi and bacteria, transferred these to leaves on which they fed, and that microbes and biomass removal contributed almost equally to the 37% decrease in photosynthetic productivity. Hence, maximising the effectiveness of using arthropods that damage leaf surfaces for biocontrol requires the presence of microorganisms that are deleterious to plants.
- Full Text:
- Date Issued: 2013
When does a nation-level analysis make sense? ESD and educational governance in Brazil, South Africa, and the USA
- Feinstein, Noah W, Jacobi, Pedro R, Lotz-Sisitka, Heila
- Authors: Feinstein, Noah W , Jacobi, Pedro R , Lotz-Sisitka, Heila
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/131645 , vital:36707 , http://dx.doi.org/10.1080/13504622.2013.767321
- Description: International policy analysis tends to simplify the nation state, portraying countries as coherent units that can be described by one statistic or placed into one category. As scholars from Brazil, South Africa, and the USA, we find the nation-centric research perspective particularly challenging. In each of our home countries, the effective influence of the national government on education is quite limited, particularly in fringe and emerging areas of education such as Education for Sustainable Development (ESD) and Climate Change Education (CCE). This essay explores how nation-level comparisons are and are not useful for international research on ESD and CCE. We consider several layers of decentralized governance, but ultimately come to the conclusion that ESD governance in our respective countries is polycentric rather than decentralized. We discuss the implications of this idea for cross-national policy research on ESD and CCE.
- Full Text:
- Date Issued: 2013
- Authors: Feinstein, Noah W , Jacobi, Pedro R , Lotz-Sisitka, Heila
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/131645 , vital:36707 , http://dx.doi.org/10.1080/13504622.2013.767321
- Description: International policy analysis tends to simplify the nation state, portraying countries as coherent units that can be described by one statistic or placed into one category. As scholars from Brazil, South Africa, and the USA, we find the nation-centric research perspective particularly challenging. In each of our home countries, the effective influence of the national government on education is quite limited, particularly in fringe and emerging areas of education such as Education for Sustainable Development (ESD) and Climate Change Education (CCE). This essay explores how nation-level comparisons are and are not useful for international research on ESD and CCE. We consider several layers of decentralized governance, but ultimately come to the conclusion that ESD governance in our respective countries is polycentric rather than decentralized. We discuss the implications of this idea for cross-national policy research on ESD and CCE.
- Full Text:
- Date Issued: 2013
X-ray photoelectron spectroscopy analysis of the effect of alkyl-and arylthio substituents on manganese phthalocyanines for self-assembled monolayer formation on gold
- Coates, Megan, Nyokong, Tebello
- Authors: Coates, Megan , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/190490 , vital:44999 , xlink:href="https://doi.org/10.1016/j.elecom.2013.03.019"
- Description: Self-assembled monolayers of an octa-substituted alkylthio and arylthio manganese phthalocyanines were formed on gold. X-ray photoelectron spectroscopy was used to analyse both of the phthalocyanine layers on gold. Approximately 60% of the sulphur groups in the aryl substituted-SAM surface were bound to gold through the cleavage of the C S bond, as opposed to only 37% for the alkyl substituted-SAM.
- Full Text:
- Date Issued: 2013
- Authors: Coates, Megan , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/190490 , vital:44999 , xlink:href="https://doi.org/10.1016/j.elecom.2013.03.019"
- Description: Self-assembled monolayers of an octa-substituted alkylthio and arylthio manganese phthalocyanines were formed on gold. X-ray photoelectron spectroscopy was used to analyse both of the phthalocyanine layers on gold. Approximately 60% of the sulphur groups in the aryl substituted-SAM surface were bound to gold through the cleavage of the C S bond, as opposed to only 37% for the alkyl substituted-SAM.
- Full Text:
- Date Issued: 2013
Zinc (II) 2, 9, 16, 23-tetrakis [4-(N-methylpyridyloxy)]-phthalocyanine anchored on an electrospun polysulfone polymer fiber: Application for photosensitized conversion of methyl orange
- Zugle, Ruphino, Nyokong, Tebello
- Authors: Zugle, Ruphino , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/232741 , vital:50020 , xlink:href="https://doi.org/10.1016/j.molcata.2012.10.001"
- Description: In this work, a comparative study of photodegradation of methyl orange, an azo dye, in homogeneous aqueous solution of a quarternized cationic zinc phthalocyanine and a heterogeneous catalytic system based on the same phthalocyanine anchored on polysulfone polymer fiber is presented. In both cases, conversion involved the azo bond of the dye with no detectable opening up of the aromatic benzene rings. The reaction kinetics in both cases were consistent with first order with the conversion occurring in the homogeneous system being faster than when the functionalized polymer fiber was used. The reaction products consisted of a coupling product as well as a series of oligopolymeric products.
- Full Text:
- Date Issued: 2013
- Authors: Zugle, Ruphino , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/232741 , vital:50020 , xlink:href="https://doi.org/10.1016/j.molcata.2012.10.001"
- Description: In this work, a comparative study of photodegradation of methyl orange, an azo dye, in homogeneous aqueous solution of a quarternized cationic zinc phthalocyanine and a heterogeneous catalytic system based on the same phthalocyanine anchored on polysulfone polymer fiber is presented. In both cases, conversion involved the azo bond of the dye with no detectable opening up of the aromatic benzene rings. The reaction kinetics in both cases were consistent with first order with the conversion occurring in the homogeneous system being faster than when the functionalized polymer fiber was used. The reaction products consisted of a coupling product as well as a series of oligopolymeric products.
- Full Text:
- Date Issued: 2013
“A road that may lead nowhere”: JM Coetzee, Tayeb Salih, and the Hospitality of Vagrant Writing
- Authors: Marais, Mike
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144072 , vital:38308 , https://dialnet.unirioja.es/servlet/articulo?codigo=4568814
- Description: In this article, I argue that Coetzee's writing, being alienated from history but unable to transcend it, is forced to treat its own representations with a measure of suspicion. By extension, the Coetzee text is always divided against itself. It is, in the idiom of hospitality, never quite at home with itself because it is aware that home is premised on exclusion, on the existence of an outsider, one for whom home is not a home.
- Full Text:
- Date Issued: 2013
- Authors: Marais, Mike
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/144072 , vital:38308 , https://dialnet.unirioja.es/servlet/articulo?codigo=4568814
- Description: In this article, I argue that Coetzee's writing, being alienated from history but unable to transcend it, is forced to treat its own representations with a measure of suspicion. By extension, the Coetzee text is always divided against itself. It is, in the idiom of hospitality, never quite at home with itself because it is aware that home is premised on exclusion, on the existence of an outsider, one for whom home is not a home.
- Full Text:
- Date Issued: 2013
“As soon as the four sides are all equal, then the angles must be 90° each”: children's misconceptions in geometry
- Atebe, Humphrey U, Schäfer, Marc
- Authors: Atebe, Humphrey U , Schäfer, Marc
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140983 , vital:37934 , DOI: 10.1080/10288457.2008.10740634
- Description: This study describes Nigerian and South African students' conceptual understanding in high school geometry based on the van Hiele model of geometric thinking levels. The study further highlights students' misconceptions in school geometry. Concepts of triangles and quadrilaterals were investigated among 36 mathematics learners drawn from grades 10 through 12 who participated in this study. The tasks included identifying and naming shapes, sorting of shapes, stating the properties of shapes, defining of shapes and establishing class inclusions of shapes. The results indicated that many Nigerian and South African high school learners in Grade 10, 11 and 12 hold a number of misconceptions about geometric concepts of triangles and quadrilaterals.
- Full Text:
- Date Issued: 2013
- Authors: Atebe, Humphrey U , Schäfer, Marc
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/140983 , vital:37934 , DOI: 10.1080/10288457.2008.10740634
- Description: This study describes Nigerian and South African students' conceptual understanding in high school geometry based on the van Hiele model of geometric thinking levels. The study further highlights students' misconceptions in school geometry. Concepts of triangles and quadrilaterals were investigated among 36 mathematics learners drawn from grades 10 through 12 who participated in this study. The tasks included identifying and naming shapes, sorting of shapes, stating the properties of shapes, defining of shapes and establishing class inclusions of shapes. The results indicated that many Nigerian and South African high school learners in Grade 10, 11 and 12 hold a number of misconceptions about geometric concepts of triangles and quadrilaterals.
- Full Text:
- Date Issued: 2013
“Face the music!”: the Daily Sun's representation of adolescent sex in the Jules High sex scandal
- Boshoff, Priscilla A, Prinsloo, Jeanne
- Authors: Boshoff, Priscilla A , Prinsloo, Jeanne
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143483 , vital:38250 , DOI: 10.1080/10130950.2013.834660
- Description: Rather than being merely a physiological stage, adolescence is variously constructed through social institutions. The media plays a significant role in such constructions, including that of adolescent sexuality. In the recent past there have been several cases of sexual acts involving adolescents that have received prominent media coverage as they have been considered shocking. The Jules High School sex scandal related to sex acts between a single adolescent girl and two adolescent boys. It was recorded on mobile phones by their peers and circulated on their mobile networks, or ‘went viral’ as the media continuously noted. The press coverage surrounding this incident and the legal process that ensued is the focus of this Article which undertakes a critical textual analysis of the coverage in the popular tabloid, the Daily Sun, in order to make explicit the contesting sets of discourses around adolescence and sexuality that were articulated in this popular public sphere. The Article uses a Foucauldian framework in order to probe the discourses of sexuality that are articulated and contested in this space. As the most widely read newspaper in South Africa it serves as a powerful site of definition of teen sexuality. The analysis suggests that, rather than allowing for teen sexuality, it is disavowed by villainising teen sex and responsibility for such ‘deviance’ is directed to various adult and social adult actors.
- Full Text:
- Date Issued: 2013
- Authors: Boshoff, Priscilla A , Prinsloo, Jeanne
- Date: 2013
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/143483 , vital:38250 , DOI: 10.1080/10130950.2013.834660
- Description: Rather than being merely a physiological stage, adolescence is variously constructed through social institutions. The media plays a significant role in such constructions, including that of adolescent sexuality. In the recent past there have been several cases of sexual acts involving adolescents that have received prominent media coverage as they have been considered shocking. The Jules High School sex scandal related to sex acts between a single adolescent girl and two adolescent boys. It was recorded on mobile phones by their peers and circulated on their mobile networks, or ‘went viral’ as the media continuously noted. The press coverage surrounding this incident and the legal process that ensued is the focus of this Article which undertakes a critical textual analysis of the coverage in the popular tabloid, the Daily Sun, in order to make explicit the contesting sets of discourses around adolescence and sexuality that were articulated in this popular public sphere. The Article uses a Foucauldian framework in order to probe the discourses of sexuality that are articulated and contested in this space. As the most widely read newspaper in South Africa it serves as a powerful site of definition of teen sexuality. The analysis suggests that, rather than allowing for teen sexuality, it is disavowed by villainising teen sex and responsibility for such ‘deviance’ is directed to various adult and social adult actors.
- Full Text:
- Date Issued: 2013
An Analysis and Implementation of Methods for High Speed Lexical Classification of Malicious URLs
- Egan, Shaun P, Irwin, Barry V W
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
Building a Graphical Fuzzing Framework
- Zeisberger, Sascha, Irwin, Barry V W
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
Design of realistic hybrid marine resource management programs in Oceania
- Aswani, Shankar, Ruddle, Kenneth
- Authors: Aswani, Shankar , Ruddle, Kenneth
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70615 , vital:29681 , https://doi.org/10.2984/67.3.11
- Description: This review article synthesizes the authors' several decades of multidisciplinary natural and social science and applied marine resource management experience in the Asia-Pacific region to examine the strengthening of coastal and marine resource management and conservation using alliances between local communities and external institutions. The objective is to assist the design of resource management and conservation programs that enhance the capacity of coastal communities in Oceania to confront both diminishing marine resources and the effects of climate change by providing guidelines for protecting marine biodiversity and vulnerable ecosystem functions. This article describes a management framework that hybridizes local beliefs and institutions expressed in customary management (CM) with such modern management concepts as marine protected areas (MPAs) and ecosystem-based management (EBM). Hybrid management accommodates the social, political, economic, and cultural contexts of Oceanic communities and, compared with recent or conventional management approaches, can therefore better address fundamental local concerns such as coastal degradation, climate change, sea level rise, weak governance, corruption, limited resources and staff to manage and monitor marine resources, and increasing poverty. Research on the hybridization of management systems demonstrates opportunities to establish context-appropriate EBM and/or other managerial arrangements that include terrestrial and adjacent coastal-marine ecosystems. Formal and informal CM systems are widespread in Oceania and in some parts of Southeast Asia, and if appropriate strategies are employed rapid progress toward hybrid CM-EBM could be enabled.
- Full Text:
- Date Issued: 2012
- Authors: Aswani, Shankar , Ruddle, Kenneth
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/70615 , vital:29681 , https://doi.org/10.2984/67.3.11
- Description: This review article synthesizes the authors' several decades of multidisciplinary natural and social science and applied marine resource management experience in the Asia-Pacific region to examine the strengthening of coastal and marine resource management and conservation using alliances between local communities and external institutions. The objective is to assist the design of resource management and conservation programs that enhance the capacity of coastal communities in Oceania to confront both diminishing marine resources and the effects of climate change by providing guidelines for protecting marine biodiversity and vulnerable ecosystem functions. This article describes a management framework that hybridizes local beliefs and institutions expressed in customary management (CM) with such modern management concepts as marine protected areas (MPAs) and ecosystem-based management (EBM). Hybrid management accommodates the social, political, economic, and cultural contexts of Oceanic communities and, compared with recent or conventional management approaches, can therefore better address fundamental local concerns such as coastal degradation, climate change, sea level rise, weak governance, corruption, limited resources and staff to manage and monitor marine resources, and increasing poverty. Research on the hybridization of management systems demonstrates opportunities to establish context-appropriate EBM and/or other managerial arrangements that include terrestrial and adjacent coastal-marine ecosystems. Formal and informal CM systems are widespread in Oceania and in some parts of Southeast Asia, and if appropriate strategies are employed rapid progress toward hybrid CM-EBM could be enabled.
- Full Text:
- Date Issued: 2012
Life-history characteristics of an age-validated established invasive African sharptooth catfish, Clarias gariepinus, population in a warm–temperate African impoundment
- Wartenberg, Reece, Weyl, Olaf L F, Booth, Anthony J, Winker, A Henning
- Authors: Wartenberg, Reece , Weyl, Olaf L F , Booth, Anthony J , Winker, A Henning
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124921 , vital:35710 , https://doi.10.3377/004.048.0225
- Description: African sharptooth catfish Clarias gariepinus (Burchell, 1822) is a widely distributed fish that has now invaded water bodies in South America, Eastern Europe, Asia and South Africa (Cambray 2003). In South Africa it is native as far south as the Orange-Vaal river system, but inter-basin water transfer schemes (IBWTs), illegal stocking by anglers and from aquaculture has resulted in the establishment of extralimital populations in almost all river systems (van Rensburg et al. 2011). Within the Eastern Cape Province, C. gariepinus has invaded the Great Fish and Sundays rivers through IBWTs, that connect the Orange River to the Great Fish River and then to the Sundays River system which flows directly into Darlington Dam (Kadye & Booth 2013a) (Fig. 1). Soon after the completion of the IBWTs sharptooth catfish were recorded in Grassridge Dam in 1976 (Laurenson & Hocutt 1985), and later from Darlington Dam in 1981 (Scott et al. 2006). Although Cambray & Jubb (1977) are of the opinion that the species was translocated prior to the IBWT connection, there is now a permanent corridor between the Orange River and its receiving river systems that can facilitate the continued introduction of non-native Orange River fishes and other aquatic biota.
- Full Text:
- Date Issued: 2012
- Authors: Wartenberg, Reece , Weyl, Olaf L F , Booth, Anthony J , Winker, A Henning
- Date: 2012
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124921 , vital:35710 , https://doi.10.3377/004.048.0225
- Description: African sharptooth catfish Clarias gariepinus (Burchell, 1822) is a widely distributed fish that has now invaded water bodies in South America, Eastern Europe, Asia and South Africa (Cambray 2003). In South Africa it is native as far south as the Orange-Vaal river system, but inter-basin water transfer schemes (IBWTs), illegal stocking by anglers and from aquaculture has resulted in the establishment of extralimital populations in almost all river systems (van Rensburg et al. 2011). Within the Eastern Cape Province, C. gariepinus has invaded the Great Fish and Sundays rivers through IBWTs, that connect the Orange River to the Great Fish River and then to the Sundays River system which flows directly into Darlington Dam (Kadye & Booth 2013a) (Fig. 1). Soon after the completion of the IBWTs sharptooth catfish were recorded in Grassridge Dam in 1976 (Laurenson & Hocutt 1985), and later from Darlington Dam in 1981 (Scott et al. 2006). Although Cambray & Jubb (1977) are of the opinion that the species was translocated prior to the IBWT connection, there is now a permanent corridor between the Orange River and its receiving river systems that can facilitate the continued introduction of non-native Orange River fishes and other aquatic biota.
- Full Text:
- Date Issued: 2012
Aspects of the biology and fisheries of an economically important sparid Dentex macrophthalmus (Bloch 1791) in the Namibe province, Angola
- Potts, Warren M, Inácio, L A, Santos, Carmen V D, Richardson, Timothy J, Sauer, Warwick H H
- Authors: Potts, Warren M , Inácio, L A , Santos, Carmen V D , Richardson, Timothy J , Sauer, Warwick H H
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123096 , vital:35405 , https://doi.org/10.2989/1814232X.2010.538160
- Description: Dentex macrophthalmus is a small, commercially important sparid fish that is abundant in the deeper waters (range 50–500 m) of the Mediterranean Sea (Trunov 1970), the North-West African shelf (Goode and Bean 1896, Fowler 1936), including the Cape Verde and Canary Islands, and the south-eastern Atlantic from the Equator to just south of Lüderitz (27°40′ S) (Trunov 1970). Because of its high abundance, it is of considerable economic importance and is captured in large numbers in both artisanal and commercial fisheries in many countries. Although it is the most important artisanal species along the entire Angolan coast, it is most abundant in the southern region (Kilongo et al. 2007). Despite its economic importance in Angola and elsewhere, relatively little is known on its abundance, fisheries and biology.
- Full Text:
- Date Issued: 2010
- Authors: Potts, Warren M , Inácio, L A , Santos, Carmen V D , Richardson, Timothy J , Sauer, Warwick H H
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123096 , vital:35405 , https://doi.org/10.2989/1814232X.2010.538160
- Description: Dentex macrophthalmus is a small, commercially important sparid fish that is abundant in the deeper waters (range 50–500 m) of the Mediterranean Sea (Trunov 1970), the North-West African shelf (Goode and Bean 1896, Fowler 1936), including the Cape Verde and Canary Islands, and the south-eastern Atlantic from the Equator to just south of Lüderitz (27°40′ S) (Trunov 1970). Because of its high abundance, it is of considerable economic importance and is captured in large numbers in both artisanal and commercial fisheries in many countries. Although it is the most important artisanal species along the entire Angolan coast, it is most abundant in the southern region (Kilongo et al. 2007). Despite its economic importance in Angola and elsewhere, relatively little is known on its abundance, fisheries and biology.
- Full Text:
- Date Issued: 2010