Factors influencing high school learner's acceptance of marketing messages via short message service (sms)
- Authors: Wang, Hui
- Date: 2007
- Subjects: Direct marketing -- South Africa -- Port Elizabeth , High school students -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9353 , http://hdl.handle.net/10948/641 , Direct marketing -- South Africa -- Port Elizabeth , High school students -- South Africa -- Port Elizabeth
- Description: Cell-phones and the Short Message Service (SMS) have become an important part of people's lives, with significant implications for communication and information transmission. The SMS, based on its versatility as a personal and direct medium of communication, provides an excellent means of marketing and also a possible avenue to the Nelson Mandela Metropolitan University (NMMU) for marketing its programmes. However, the success of such mobile (SMS) marketing depends largely on its acceptance by high school learners. The objective of this study was to determine whether Port Elizabeth’s high school learners are likely to accept marketing messages of the NMMU via SMS. This objective was achieved with the relevant literature study and empirical study. The literature study provided an overview of mobile marketing, mobile advertising and a detailed discussion of the SMS as a marketing tool. The various factors that might influence cell-phone users’ acceptance of mobile marketing were also reviewed. The relevance of these factors to mobile (SMS) marketing was tested using a model developed by Bauer, Barnes, Reichardt and Neumann (2005: 186) as the basis. (ii) The empirical data were collected by means of a survey, and using a self-administered questionnaire. Based on a systematic sampling, 480 respondents from 17 feeder schools of the NMMU in Port Elizabeth were selected, 417 completed the questionnaire. The empirical findings showed that most Port Elizabeth’s high school learners owned a cell-phone, their most used form of SMS was text messaging and that they are keen to receive study information from the NMMU. The data of the current study did not fit the model proposed by Bauer et al (2005: 186, as shown in Figure 1.1), and also did not fit a modified model (see Figure 3.1). Hence, further analysis and manipulation of the data resulted in a more appropriate model (see Figure 5.7). The study proposes that, Port Elizabeth’s high school learners currently display some acceptance of mobile marketing. The NMMU can consider developing and using mobile (SMS) marketing for promoting its study programmes to high school learners, although it can still not be used as the major marketing instrument. It should be effective if used with push advertising, in conjunction with other media and through capitalizing on the influence of reference groups.
- Full Text:
- Date Issued: 2007
- Authors: Wang, Hui
- Date: 2007
- Subjects: Direct marketing -- South Africa -- Port Elizabeth , High school students -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9353 , http://hdl.handle.net/10948/641 , Direct marketing -- South Africa -- Port Elizabeth , High school students -- South Africa -- Port Elizabeth
- Description: Cell-phones and the Short Message Service (SMS) have become an important part of people's lives, with significant implications for communication and information transmission. The SMS, based on its versatility as a personal and direct medium of communication, provides an excellent means of marketing and also a possible avenue to the Nelson Mandela Metropolitan University (NMMU) for marketing its programmes. However, the success of such mobile (SMS) marketing depends largely on its acceptance by high school learners. The objective of this study was to determine whether Port Elizabeth’s high school learners are likely to accept marketing messages of the NMMU via SMS. This objective was achieved with the relevant literature study and empirical study. The literature study provided an overview of mobile marketing, mobile advertising and a detailed discussion of the SMS as a marketing tool. The various factors that might influence cell-phone users’ acceptance of mobile marketing were also reviewed. The relevance of these factors to mobile (SMS) marketing was tested using a model developed by Bauer, Barnes, Reichardt and Neumann (2005: 186) as the basis. (ii) The empirical data were collected by means of a survey, and using a self-administered questionnaire. Based on a systematic sampling, 480 respondents from 17 feeder schools of the NMMU in Port Elizabeth were selected, 417 completed the questionnaire. The empirical findings showed that most Port Elizabeth’s high school learners owned a cell-phone, their most used form of SMS was text messaging and that they are keen to receive study information from the NMMU. The data of the current study did not fit the model proposed by Bauer et al (2005: 186, as shown in Figure 1.1), and also did not fit a modified model (see Figure 3.1). Hence, further analysis and manipulation of the data resulted in a more appropriate model (see Figure 5.7). The study proposes that, Port Elizabeth’s high school learners currently display some acceptance of mobile marketing. The NMMU can consider developing and using mobile (SMS) marketing for promoting its study programmes to high school learners, although it can still not be used as the major marketing instrument. It should be effective if used with push advertising, in conjunction with other media and through capitalizing on the influence of reference groups.
- Full Text:
- Date Issued: 2007
Governing information security using organisational information security profiles
- Authors: Tyukala, Mkhululi
- Date: 2007
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9788 , http://hdl.handle.net/10948/626 , Data protection , Computer security -- Management , Computer networks -- Security measures
- Description: The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
- Full Text:
- Date Issued: 2007
- Authors: Tyukala, Mkhululi
- Date: 2007
- Subjects: Data protection , Computer security -- Management , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9788 , http://hdl.handle.net/10948/626 , Data protection , Computer security -- Management , Computer networks -- Security measures
- Description: The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
- Full Text:
- Date Issued: 2007
Improving certain high performance properties of natural fibres
- Authors: Chapple, Stephen Anthony
- Date: 2007
- Subjects: Textile chemistry , Fireproofing of fabrics
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10451 , http://hdl.handle.net/10948/815 , Textile chemistry , Fireproofing of fabrics
- Description: Cotton possesses many characteristics that make it desirable to the consumer, and this has resulted in its usage in a broad range of products. Cotton, however, is a flammable material that is easily ignited and rapidly consumed. The flame retardant treatment of cotton is, therefore, an important textile process that has received wide attention over many years. There are a number of commercial flame retardant treatments available for cotton, the most common being phosphate-based. These treatments, however, often have drawbacks or have a negative impact on the desirable properties of the fibre and the challenge still exists for designing better flame retardant products and systems that are durable and have limited impact on fibre properties. The study considers the application of the sol-gel as a coating on fabric that was pre-treated with a phosphate-based flame retardant or as a means for applying a phosphate-based flame retardant. Both treatment methods were found to be suitable for imparting flame resistance to the fabric. The effect of various phosphate-based flame retardants on flammability and fabric properties such as colour, handle and strength was investigated and it was shown that a diammonium phosphate and urea combination gave the best flame resistance. In this regard, a flame resistance was achieved with a lower amount of phosphorous than was used in similar conventional treatments. The durability of the coating to rinsing with water and soaping with a detergent was also investigated. It was found that the flame resistance was lost after rinsing or soaping but the prevention of afterglow combustion was retained. It was shown that the preparatory treatment of the fabric influenced the sol-gel coating process and the flammability of the fabric. Mercerisation and bleaching of the fabric increased the “wet pick-up” during the coating process and improved the flame resistance. The influence of various factors was also investigated in further detail. The ratio of the sol-gel components, the delay after coating prior to drying (hang time) and the curing time were investigated using an experimental design. The curing time and the ratio of components in the sol-gel were shown to have the greatest influence on fabric properties and fabric flammability. It was shown that there is a trade-off between the desired high level of fabric flame resistance and preserving the inherent properties of the fabric such as colour, handle and strength.
- Full Text:
- Date Issued: 2007
- Authors: Chapple, Stephen Anthony
- Date: 2007
- Subjects: Textile chemistry , Fireproofing of fabrics
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10451 , http://hdl.handle.net/10948/815 , Textile chemistry , Fireproofing of fabrics
- Description: Cotton possesses many characteristics that make it desirable to the consumer, and this has resulted in its usage in a broad range of products. Cotton, however, is a flammable material that is easily ignited and rapidly consumed. The flame retardant treatment of cotton is, therefore, an important textile process that has received wide attention over many years. There are a number of commercial flame retardant treatments available for cotton, the most common being phosphate-based. These treatments, however, often have drawbacks or have a negative impact on the desirable properties of the fibre and the challenge still exists for designing better flame retardant products and systems that are durable and have limited impact on fibre properties. The study considers the application of the sol-gel as a coating on fabric that was pre-treated with a phosphate-based flame retardant or as a means for applying a phosphate-based flame retardant. Both treatment methods were found to be suitable for imparting flame resistance to the fabric. The effect of various phosphate-based flame retardants on flammability and fabric properties such as colour, handle and strength was investigated and it was shown that a diammonium phosphate and urea combination gave the best flame resistance. In this regard, a flame resistance was achieved with a lower amount of phosphorous than was used in similar conventional treatments. The durability of the coating to rinsing with water and soaping with a detergent was also investigated. It was found that the flame resistance was lost after rinsing or soaping but the prevention of afterglow combustion was retained. It was shown that the preparatory treatment of the fabric influenced the sol-gel coating process and the flammability of the fabric. Mercerisation and bleaching of the fabric increased the “wet pick-up” during the coating process and improved the flame resistance. The influence of various factors was also investigated in further detail. The ratio of the sol-gel components, the delay after coating prior to drying (hang time) and the curing time were investigated using an experimental design. The curing time and the ratio of components in the sol-gel were shown to have the greatest influence on fabric properties and fabric flammability. It was shown that there is a trade-off between the desired high level of fabric flame resistance and preserving the inherent properties of the fabric such as colour, handle and strength.
- Full Text:
- Date Issued: 2007
Information security awareness: generic content, tools and techniques
- Authors: Mauwa, Hope
- Date: 2007
- Subjects: Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9733 , http://hdl.handle.net/10948/560 , Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Description: In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effective layer in an organization’s security defence. With the important role that these awareness programmes play in organizations’ complete information security programmes, it is a must that all organizations that are serious about information security must implement it. But though awareness programmes have become increasing important, the level of awareness in most organizations is still low. It seems that the current approach of developing these programmes does not satisfy the needs of most organizations. Therefore, another approach, which tries to meet the needs of most organizations, is proposed in this project as part of the solution of raising the level of awareness programmes in organizations.
- Full Text:
- Date Issued: 2007
- Authors: Mauwa, Hope
- Date: 2007
- Subjects: Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9733 , http://hdl.handle.net/10948/560 , Computer security , Data protection , Computers -- Safety measures , Information technology -- Security measures
- Description: In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effective layer in an organization’s security defence. With the important role that these awareness programmes play in organizations’ complete information security programmes, it is a must that all organizations that are serious about information security must implement it. But though awareness programmes have become increasing important, the level of awareness in most organizations is still low. It seems that the current approach of developing these programmes does not satisfy the needs of most organizations. Therefore, another approach, which tries to meet the needs of most organizations, is proposed in this project as part of the solution of raising the level of awareness programmes in organizations.
- Full Text:
- Date Issued: 2007
Investigating the influences of validation on pharmaceutical manufacturing processes
- Authors: Muller, Damian Christian
- Date: 2007
- Subjects: Pharmaceutical industry -- Quality control , Pharmaceutical technology , Drugs -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10412 , http://hdl.handle.net/10948/566 , Pharmaceutical industry -- Quality control , Pharmaceutical technology , Drugs -- Standards
- Description: This investigation attempts to examine the influences of validation on pharmaceutical processes especially at a new manufacturing facility that has to meet international requirements, and fulfil a cost effective business strategy. At Aspen Pharmacare, a pharmaceutical organisation, there are two manufacturing facilities situated adjacent to each other, one new and one old. The new facility creates ideal opportunities to supply products to local and international markets. The investigation compares legal requirements from local and international regulatory authorities. Validation and qualification practices as well as the problems encountered during the different phases are discussed. Particular attention is given to the validation approach at the new Aspen facility. Problems and proposed solutions relating to the design review, installation, operational, and performance qualification are discussed. Validation of analytical methods for cleaning analysis, cleaning validation of equipment, and optimisation of some tablet manufacturing processes are described. Statistical evaluations of analytical results are included to find the optimum conditions for integrating new personnel with new processes and equipment. A business model reviews the cost of non-conformances of the enalapril maleate 10 mg tablets manufactured at the two manufacturing facilities. Finally the dissertation proves that validation is not only a regulatory requirement but that it also provides benefits such as adding value to the business, and ultimately reducing the cost of medicines.
- Full Text:
- Date Issued: 2007
- Authors: Muller, Damian Christian
- Date: 2007
- Subjects: Pharmaceutical industry -- Quality control , Pharmaceutical technology , Drugs -- Standards
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10412 , http://hdl.handle.net/10948/566 , Pharmaceutical industry -- Quality control , Pharmaceutical technology , Drugs -- Standards
- Description: This investigation attempts to examine the influences of validation on pharmaceutical processes especially at a new manufacturing facility that has to meet international requirements, and fulfil a cost effective business strategy. At Aspen Pharmacare, a pharmaceutical organisation, there are two manufacturing facilities situated adjacent to each other, one new and one old. The new facility creates ideal opportunities to supply products to local and international markets. The investigation compares legal requirements from local and international regulatory authorities. Validation and qualification practices as well as the problems encountered during the different phases are discussed. Particular attention is given to the validation approach at the new Aspen facility. Problems and proposed solutions relating to the design review, installation, operational, and performance qualification are discussed. Validation of analytical methods for cleaning analysis, cleaning validation of equipment, and optimisation of some tablet manufacturing processes are described. Statistical evaluations of analytical results are included to find the optimum conditions for integrating new personnel with new processes and equipment. A business model reviews the cost of non-conformances of the enalapril maleate 10 mg tablets manufactured at the two manufacturing facilities. Finally the dissertation proves that validation is not only a regulatory requirement but that it also provides benefits such as adding value to the business, and ultimately reducing the cost of medicines.
- Full Text:
- Date Issued: 2007
Ionic liquids as media for electro-organic synthesis
- Authors: Kruger, Elna
- Date: 2007
- Subjects: Ionic solutions , Inorganic compounds -- Synthesis , Electrochemistry
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10413 , http://hdl.handle.net/10948/538 , Ionic solutions , Inorganic compounds -- Synthesis , Electrochemistry
- Description: The IL’s used in this study were either synthesized or commercially available. Preparation of the IL’s involved 2 step processes: firstly the heating of distilled 1-methylimidazole with distilled 1-chlorobutane under reflux to obtain 1-butyl-3- methylimidazolium chloride; secondly, the metathesis reaction of sodium tetrafluoroborate with 1-butyl-3-methylimidazolium chloride to obtain 1-butyl-3- methylimidazolium tetrafluoroborate. The addition of sodium tetrafluoroborate, sodium hexafluorophosphate and lithium trifluoromethane sulfonamide with 1-butyl-3-methylimidazolium chloride produced good yields of 1-butyl-3-methylimidazolium tetrafluoroborate, 1-butyl-3-methylimidazolium hexafluorophosphate and 1-butyl-3-methylimidazolium bis(trifluoromethylsulfonyl)imide respectively. The IL’s are hygroscopic and must be stored under a nitrogen atmosphere. The IL’s were analyzed using 1H and 13C NMR analysis with CDCl3 as solvent. The physical and chemical properties of these IL’s were compared to commercial products. The physical and chemical properties compared well to reference values from the literature. The physical properties measured include the density, conductivity and electrochemical window. The electrochemical window is dependant primarily on the resistance of the cation to reduction and the resistance of the anion to oxidation. The electrochemical windows of the IL’s were very similar to the reference windows obtained from literature and it can be seen that some IL’s have a slightly lower window which can be due to water present. Water content in the IL’s was determined with the use of a Karl Fischer titrator, with Hydranal 5 Composite as titrant and HPLC grade methanol as the base. The concentration of halide in the IL’s was determined with a Perkin-Elmer ICP-MS.
- Full Text:
- Date Issued: 2007
- Authors: Kruger, Elna
- Date: 2007
- Subjects: Ionic solutions , Inorganic compounds -- Synthesis , Electrochemistry
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10413 , http://hdl.handle.net/10948/538 , Ionic solutions , Inorganic compounds -- Synthesis , Electrochemistry
- Description: The IL’s used in this study were either synthesized or commercially available. Preparation of the IL’s involved 2 step processes: firstly the heating of distilled 1-methylimidazole with distilled 1-chlorobutane under reflux to obtain 1-butyl-3- methylimidazolium chloride; secondly, the metathesis reaction of sodium tetrafluoroborate with 1-butyl-3-methylimidazolium chloride to obtain 1-butyl-3- methylimidazolium tetrafluoroborate. The addition of sodium tetrafluoroborate, sodium hexafluorophosphate and lithium trifluoromethane sulfonamide with 1-butyl-3-methylimidazolium chloride produced good yields of 1-butyl-3-methylimidazolium tetrafluoroborate, 1-butyl-3-methylimidazolium hexafluorophosphate and 1-butyl-3-methylimidazolium bis(trifluoromethylsulfonyl)imide respectively. The IL’s are hygroscopic and must be stored under a nitrogen atmosphere. The IL’s were analyzed using 1H and 13C NMR analysis with CDCl3 as solvent. The physical and chemical properties of these IL’s were compared to commercial products. The physical and chemical properties compared well to reference values from the literature. The physical properties measured include the density, conductivity and electrochemical window. The electrochemical window is dependant primarily on the resistance of the cation to reduction and the resistance of the anion to oxidation. The electrochemical windows of the IL’s were very similar to the reference windows obtained from literature and it can be seen that some IL’s have a slightly lower window which can be due to water present. Water content in the IL’s was determined with the use of a Karl Fischer titrator, with Hydranal 5 Composite as titrant and HPLC grade methanol as the base. The concentration of halide in the IL’s was determined with a Perkin-Elmer ICP-MS.
- Full Text:
- Date Issued: 2007
Micellar-enhanced ultrafiltration of palladium and platinum anions
- Authors: Gwicana, Sakumzi
- Date: 2007
- Subjects: Micelles , Ultrafiltration , Palladium catalysts
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10414 , http://hdl.handle.net/10948/518 , Micelles , Ultrafiltration , Palladium catalysts
- Description: The project was concerned with studying the capability of a micellar-enhanced ultrafiltration system (MEUF) to remove platinum group metal ions namely Pt (lV) and Pd (ll) chloro anions from aqueous industrial waste effluents. South Africa has the world’s largest reserves of platinum group metals (PGMs) and other valuable metals such as manganese, chrome ores, titanium minerals etc. which are required for new automotive and other technologies, including fuel cells, catalytic converters and lighter components. The consistent loss with the industrial waste stream and the toxicological effects of these precious metals led to the need to develop new and effective methods to recover them from industrial waste effluents. With such a wide variety of fields where these PGMs are used and the failure of the traditional techniques namely sedimentation, fermentation etc. to effectively reduce or recover these highly toxic and precious metal ions prior to discharging industrial waste effluents, it is necessary to explore other techniques such as membrane technology that can be used to recover these valuable species from industrial waste streams. The present study involved the use of a cationic surfactant, viz cetylpyridinium chloride, which was introduced into an aqueous solution containing palladium and platinum metal anions. The surfactant forms charged micelles above a certain critical concentration value. The metal anions adsorb onto the available oppositely charged sites on the micelle surfaces and are then able to be retained by a suitable membrane. Hollow fibre ultrafiltration membranes with the MWCO of +/- 10 kD and +/-30nm pore size were used as a filter component in this study. For this MEUF system to be effective, it was vital that the anionic metal ion species adsorbed sufficiently onto the available oppositely charged sites of the micelles and that the micelles were retained efficiently by the membrane. Results obtained during the investigation made it possible to make certain predictions about the micellisation process. It was also found that, it was not only the metal ion: surfactant (M:S) ratio that was critical, but the presence of other electrolytes in the aqueous stream proved to have a huge impact on the capability of the MEUF system. Findings of this research study showed that the MEUF system using cetylpyridinium chloride (CPC) can be used to recover or retain Pt (lV) and Pd (ll) anions from industrial waste effluents. It was also found that PtCl6 2-, due to its greater adsorption capabilities onto the micelle surface than PdCl4 2- or PdCl3(H2O)-, was preferentially retained in neutral medium. This may be exploited as a possible means of separating the two metal ions. The developed system offers the following advantages over some traditional and current methods: simplified unit operation line flow process, smaller amounts of chemical usage and no solid toxic sludge to be disposed of. Applications of this work could be of vital importance in catalytic converter recycling, especially in Port Elizabeth where extensive automobile parts manufacturing occurs.
- Full Text:
- Date Issued: 2007
- Authors: Gwicana, Sakumzi
- Date: 2007
- Subjects: Micelles , Ultrafiltration , Palladium catalysts
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10414 , http://hdl.handle.net/10948/518 , Micelles , Ultrafiltration , Palladium catalysts
- Description: The project was concerned with studying the capability of a micellar-enhanced ultrafiltration system (MEUF) to remove platinum group metal ions namely Pt (lV) and Pd (ll) chloro anions from aqueous industrial waste effluents. South Africa has the world’s largest reserves of platinum group metals (PGMs) and other valuable metals such as manganese, chrome ores, titanium minerals etc. which are required for new automotive and other technologies, including fuel cells, catalytic converters and lighter components. The consistent loss with the industrial waste stream and the toxicological effects of these precious metals led to the need to develop new and effective methods to recover them from industrial waste effluents. With such a wide variety of fields where these PGMs are used and the failure of the traditional techniques namely sedimentation, fermentation etc. to effectively reduce or recover these highly toxic and precious metal ions prior to discharging industrial waste effluents, it is necessary to explore other techniques such as membrane technology that can be used to recover these valuable species from industrial waste streams. The present study involved the use of a cationic surfactant, viz cetylpyridinium chloride, which was introduced into an aqueous solution containing palladium and platinum metal anions. The surfactant forms charged micelles above a certain critical concentration value. The metal anions adsorb onto the available oppositely charged sites on the micelle surfaces and are then able to be retained by a suitable membrane. Hollow fibre ultrafiltration membranes with the MWCO of +/- 10 kD and +/-30nm pore size were used as a filter component in this study. For this MEUF system to be effective, it was vital that the anionic metal ion species adsorbed sufficiently onto the available oppositely charged sites of the micelles and that the micelles were retained efficiently by the membrane. Results obtained during the investigation made it possible to make certain predictions about the micellisation process. It was also found that, it was not only the metal ion: surfactant (M:S) ratio that was critical, but the presence of other electrolytes in the aqueous stream proved to have a huge impact on the capability of the MEUF system. Findings of this research study showed that the MEUF system using cetylpyridinium chloride (CPC) can be used to recover or retain Pt (lV) and Pd (ll) anions from industrial waste effluents. It was also found that PtCl6 2-, due to its greater adsorption capabilities onto the micelle surface than PdCl4 2- or PdCl3(H2O)-, was preferentially retained in neutral medium. This may be exploited as a possible means of separating the two metal ions. The developed system offers the following advantages over some traditional and current methods: simplified unit operation line flow process, smaller amounts of chemical usage and no solid toxic sludge to be disposed of. Applications of this work could be of vital importance in catalytic converter recycling, especially in Port Elizabeth where extensive automobile parts manufacturing occurs.
- Full Text:
- Date Issued: 2007
Synthesis of P-Methane-3,8-Diol
- Authors: Mpuhlu, Batsho
- Date: 2007
- Subjects: Insect baits and repellents
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10411 , http://hdl.handle.net/10948/570 , http://hdl.handle.net/10948/d1011717 , Insect baits and repellents
- Description: The synthesis of para-menthane-3,8-diol in a batch reactor was investigated in some detail with the view to evaluate the potential of producing said p-menthane- 3,8-diol in a continuous-flow reactor from the results obtained from the batch process. The methodology used as base for this investigation was a published procedure by Takasago of Japan. The Takasago-method produced 92.3 percent Yield for the product para-menthane-3,8-diol, and 2.7 percent Yield of the by-product, acetal. The objective for this investigation was to produce a minimum p-menthane-3,8- diol content of 97.0 percent and a maximum content of 3.0 percent for the by-product acetal. The batch production process was evaluated in detail using statistical experimental design methodologies. Three process variables, namely catalyst loading, organic/aqueous phase ratio and reaction temperature were selected for the study. The experimental method was based on the Takasago procedure, however the substrate was added as a single slug as opposed to gradual addition method and the reaction period was reduced to 30 minutes. Apart from statistical analysis, mechanistic aspects were also used to interpret the following results. Using a central composite design, three response models (one for the conversion of citronellal, p-menthane-3,8-diol and acetal formation) were determined. An analysis of the response surfaces indicated that, to increase the citronellal conversion all three variables should be increased. To increase the amount of pmenthane- 3,8-diol, the reaction temperature and acid concentration should be increased, but the Aq/org ratio should be decreased as the acid catalyst concentration is increased. To minimize the amount of acetals formed during the reaction, the Aq/org ratio should be decreased; temperature and acid concentration can be decreased or increased. The reaction mechanism suggested that p-menthane-3,8-diol may be formed along two pathways: One pathway directly forms p-menthane-3,8-diol, whilst the second pathway forms the isopulegol first, then proceeds to form product by hydrolysis. The acetal is formed as result of the reaction between unreacted citronellal and p-menthane-3,8-diol. From the design experiments it was suggested that reaction time can be reduced to 8 minutes at reaction temperatures between, 80-85 0C The product and acetal were isolated by simple vacuum evaporation of the low boiling citronellal and isopulegol. Results from recycling the catalyst phase were similar to those of the initial process. The results of this investigation has clearly shown that with a proper understanding of the effect of process variables on the performance of the batch synthesis route, the conversion of this traditionally batch (actually semi-batch) process into a continuous process is quite feasible provided that suitable equipment is available. The most important features required for such equipment would be: Intense mixing throughout the reaction zone so as to maximise the surface area between the two immiscible phases, hence the rate of mass transfer between the two phases; and the ability to run reactions above the boiling point of water. Plans for the further study of the process are already well underway and sections of static mixing tubes have been acquired to build a continuous lab scale tubular reactor that would be capable of providing the level of mixing required.
- Full Text:
- Date Issued: 2007
- Authors: Mpuhlu, Batsho
- Date: 2007
- Subjects: Insect baits and repellents
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10411 , http://hdl.handle.net/10948/570 , http://hdl.handle.net/10948/d1011717 , Insect baits and repellents
- Description: The synthesis of para-menthane-3,8-diol in a batch reactor was investigated in some detail with the view to evaluate the potential of producing said p-menthane- 3,8-diol in a continuous-flow reactor from the results obtained from the batch process. The methodology used as base for this investigation was a published procedure by Takasago of Japan. The Takasago-method produced 92.3 percent Yield for the product para-menthane-3,8-diol, and 2.7 percent Yield of the by-product, acetal. The objective for this investigation was to produce a minimum p-menthane-3,8- diol content of 97.0 percent and a maximum content of 3.0 percent for the by-product acetal. The batch production process was evaluated in detail using statistical experimental design methodologies. Three process variables, namely catalyst loading, organic/aqueous phase ratio and reaction temperature were selected for the study. The experimental method was based on the Takasago procedure, however the substrate was added as a single slug as opposed to gradual addition method and the reaction period was reduced to 30 minutes. Apart from statistical analysis, mechanistic aspects were also used to interpret the following results. Using a central composite design, three response models (one for the conversion of citronellal, p-menthane-3,8-diol and acetal formation) were determined. An analysis of the response surfaces indicated that, to increase the citronellal conversion all three variables should be increased. To increase the amount of pmenthane- 3,8-diol, the reaction temperature and acid concentration should be increased, but the Aq/org ratio should be decreased as the acid catalyst concentration is increased. To minimize the amount of acetals formed during the reaction, the Aq/org ratio should be decreased; temperature and acid concentration can be decreased or increased. The reaction mechanism suggested that p-menthane-3,8-diol may be formed along two pathways: One pathway directly forms p-menthane-3,8-diol, whilst the second pathway forms the isopulegol first, then proceeds to form product by hydrolysis. The acetal is formed as result of the reaction between unreacted citronellal and p-menthane-3,8-diol. From the design experiments it was suggested that reaction time can be reduced to 8 minutes at reaction temperatures between, 80-85 0C The product and acetal were isolated by simple vacuum evaporation of the low boiling citronellal and isopulegol. Results from recycling the catalyst phase were similar to those of the initial process. The results of this investigation has clearly shown that with a proper understanding of the effect of process variables on the performance of the batch synthesis route, the conversion of this traditionally batch (actually semi-batch) process into a continuous process is quite feasible provided that suitable equipment is available. The most important features required for such equipment would be: Intense mixing throughout the reaction zone so as to maximise the surface area between the two immiscible phases, hence the rate of mass transfer between the two phases; and the ability to run reactions above the boiling point of water. Plans for the further study of the process are already well underway and sections of static mixing tubes have been acquired to build a continuous lab scale tubular reactor that would be capable of providing the level of mixing required.
- Full Text:
- Date Issued: 2007
The application of quality models and techniques in selected SMMEs in the Eastern Cape
- Authors: Murray, Andrew Thomas
- Date: 2007
- Subjects: Business enterprises -- South Africa -- Eastern Cape , Quality management -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9608 , http://hdl.handle.net/10948/832 , Business enterprises -- South Africa -- Eastern Cape , Quality management -- South Africa -- Eastern Cape
- Description: With the increase of imports from China and more pressure being put on the Small, Medium and Micro enterprises (SMME’s) from their larger customers, survival has become more and more difficult, quality is no longer being a choise but a prerequisite if the companies want to survive. This research evaluates the use of quality and productivity or the lack thereof in selected SMMEs in the Eastern Cape environment from both the SMME and Larger companies’ point of view. The research has focused on the effectiveness and understanding of what has been put in place by the SMMEs, what is available for the SMMEs to use, governmental support, and the requirements of the customers. Certain shortcomings have been highlighted as to the use and benefits of the processes that have been implemented. The researcher made use of both quantitative and qualitative data to determine the outcome of the research. The thesis concludes that the SMME sector knows the importance of the use of quality; it is the effectiveness and management thereof that is the concern.
- Full Text:
- Date Issued: 2007
- Authors: Murray, Andrew Thomas
- Date: 2007
- Subjects: Business enterprises -- South Africa -- Eastern Cape , Quality management -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9608 , http://hdl.handle.net/10948/832 , Business enterprises -- South Africa -- Eastern Cape , Quality management -- South Africa -- Eastern Cape
- Description: With the increase of imports from China and more pressure being put on the Small, Medium and Micro enterprises (SMME’s) from their larger customers, survival has become more and more difficult, quality is no longer being a choise but a prerequisite if the companies want to survive. This research evaluates the use of quality and productivity or the lack thereof in selected SMMEs in the Eastern Cape environment from both the SMME and Larger companies’ point of view. The research has focused on the effectiveness and understanding of what has been put in place by the SMMEs, what is available for the SMMEs to use, governmental support, and the requirements of the customers. Certain shortcomings have been highlighted as to the use and benefits of the processes that have been implemented. The researcher made use of both quantitative and qualitative data to determine the outcome of the research. The thesis concludes that the SMME sector knows the importance of the use of quality; it is the effectiveness and management thereof that is the concern.
- Full Text:
- Date Issued: 2007
The effective combating of intrusion attacks through fuzzy logic and neural networks
- Authors: Goss, Robert Melvin
- Date: 2007
- Subjects: Computer security , Fuzzy logic , Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9794 , http://hdl.handle.net/10948/512 , http://hdl.handle.net/10948/d1011917 , Computer security , Fuzzy logic , Neural networks (Computer science)
- Description: The importance of properly securing an organization’s information and computing resources has become paramount in modern business. Since the advent of the Internet, securing this organizational information has become increasingly difficult. Organizations deploy many security mechanisms in the protection of their data, intrusion detection systems in particular have an increasingly valuable role to play, and as networks grow, administrators need better ways to monitor their systems. Currently, many intrusion detection systems lack the means to accurately monitor and report on wireless segments within the corporate network. This dissertation proposes an extension to the NeGPAIM model, known as NeGPAIM-W, which allows for the accurate detection of attacks originating on wireless network segments. The NeGPAIM-W model is able to detect both wired and wireless based attacks, and with the extensions to the original model mentioned previously, also provide for correlation of intrusion attacks sourced on both wired and wireless network segments. This provides for a holistic detection strategy for an organization. This has been accomplished with the use of Fuzzy logic and neural networks utilized in the detection of attacks. The model works on the assumption that each user has, and leaves, a unique footprint on a computer system. Thus, all intrusive behaviour on the system and networks which support it, can be traced back to the user account which was used to perform the intrusive behavior.
- Full Text:
- Date Issued: 2007
- Authors: Goss, Robert Melvin
- Date: 2007
- Subjects: Computer security , Fuzzy logic , Neural networks (Computer science)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9794 , http://hdl.handle.net/10948/512 , http://hdl.handle.net/10948/d1011917 , Computer security , Fuzzy logic , Neural networks (Computer science)
- Description: The importance of properly securing an organization’s information and computing resources has become paramount in modern business. Since the advent of the Internet, securing this organizational information has become increasingly difficult. Organizations deploy many security mechanisms in the protection of their data, intrusion detection systems in particular have an increasingly valuable role to play, and as networks grow, administrators need better ways to monitor their systems. Currently, many intrusion detection systems lack the means to accurately monitor and report on wireless segments within the corporate network. This dissertation proposes an extension to the NeGPAIM model, known as NeGPAIM-W, which allows for the accurate detection of attacks originating on wireless network segments. The NeGPAIM-W model is able to detect both wired and wireless based attacks, and with the extensions to the original model mentioned previously, also provide for correlation of intrusion attacks sourced on both wired and wireless network segments. This provides for a holistic detection strategy for an organization. This has been accomplished with the use of Fuzzy logic and neural networks utilized in the detection of attacks. The model works on the assumption that each user has, and leaves, a unique footprint on a computer system. Thus, all intrusive behaviour on the system and networks which support it, can be traced back to the user account which was used to perform the intrusive behavior.
- Full Text:
- Date Issued: 2007
The electrochemical synthesis of 3-tert-Butyl-4-Methoxybenzaldehyde
- Authors: Qusheka, Sivuyile Emmanuel
- Date: 2007
- Subjects: Oxidation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10410 , http://hdl.handle.net/10948/595 , Oxidation
- Description: This project was concerned with the evaluation of three potential synthetic routes for 3-tert-butyl-4-methoxybenzaldehyde, a useful fine chemical intermediate and ingredient in many sunscreen agents. The three synthetic routes all involved the selective oxidation of the 3-tert-butyl-4-methoxytoluene to the desired benzaldehyde by (a) catalytic air oxidation, (b) direct electrochemical oxidation, and (c) indirect electrochemical oxidation. In order to decide whether catalytic oxidation should precede the alkylation of 4-methoxytoluene, the selective oxidation using the well-known cobalt(II)- bromide catalyst system in acetic acid solutions were investigated with the view to determine whether increased electron density on the aromatic ring improves selectivity to the desired benzaldehyde or not. In addition, the effect of various important reaction variables was also investigated. These studies showed that increased electron density, hence increased substitution, increases the desired benzaldehyde selectivity. In addition, while reaction conditions such as reaction temperature, catalyst concentration, water concentration, etc. may be optimised for maximum 3-tert-butyl-4- methoxybenzaldehyde yields (~80 percent), such yields can only be achieved at relatively low (<40 percent) alkoxytoluene conversions. The direct electrochemical oxidation of 3-tert-butyl-4-methoxytoluene was investigated in methanol solutions containing various supporting electrolytes and using constant current electrolysis with the intention of optimizing the production of 3-tert-butyl-4-methoxybenzyl dimethyl acetal which can later be hydrolyzed using sulfuric acid to the 3-tert-butyl-4-methoxybenzaldehyde. In this study, various parameters such as supporting electrolyte and electrodes were studied. Previous studies showed undoubtedly that methanol as a solvent gave better results amongst the rest of the solvents. Indirect route was also studied as a method of synthesizing 3-tert-butyl-4- methoxybenzaldehyde and compared to the direct electro synthesis.
- Full Text:
- Date Issued: 2007
- Authors: Qusheka, Sivuyile Emmanuel
- Date: 2007
- Subjects: Oxidation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10410 , http://hdl.handle.net/10948/595 , Oxidation
- Description: This project was concerned with the evaluation of three potential synthetic routes for 3-tert-butyl-4-methoxybenzaldehyde, a useful fine chemical intermediate and ingredient in many sunscreen agents. The three synthetic routes all involved the selective oxidation of the 3-tert-butyl-4-methoxytoluene to the desired benzaldehyde by (a) catalytic air oxidation, (b) direct electrochemical oxidation, and (c) indirect electrochemical oxidation. In order to decide whether catalytic oxidation should precede the alkylation of 4-methoxytoluene, the selective oxidation using the well-known cobalt(II)- bromide catalyst system in acetic acid solutions were investigated with the view to determine whether increased electron density on the aromatic ring improves selectivity to the desired benzaldehyde or not. In addition, the effect of various important reaction variables was also investigated. These studies showed that increased electron density, hence increased substitution, increases the desired benzaldehyde selectivity. In addition, while reaction conditions such as reaction temperature, catalyst concentration, water concentration, etc. may be optimised for maximum 3-tert-butyl-4- methoxybenzaldehyde yields (~80 percent), such yields can only be achieved at relatively low (<40 percent) alkoxytoluene conversions. The direct electrochemical oxidation of 3-tert-butyl-4-methoxytoluene was investigated in methanol solutions containing various supporting electrolytes and using constant current electrolysis with the intention of optimizing the production of 3-tert-butyl-4-methoxybenzyl dimethyl acetal which can later be hydrolyzed using sulfuric acid to the 3-tert-butyl-4-methoxybenzaldehyde. In this study, various parameters such as supporting electrolyte and electrodes were studied. Previous studies showed undoubtedly that methanol as a solvent gave better results amongst the rest of the solvents. Indirect route was also studied as a method of synthesizing 3-tert-butyl-4- methoxybenzaldehyde and compared to the direct electro synthesis.
- Full Text:
- Date Issued: 2007
Towards a framework for identity verification of vulnerable children within the Eastern Cape
- Authors: Rautenbach, James
- Date: 2007
- Subjects: Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9792 , http://hdl.handle.net/10948/597 , http://hdl.handle.net/10948/d1011702 , Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Description: This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
- Full Text:
- Date Issued: 2007
- Authors: Rautenbach, James
- Date: 2007
- Subjects: Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9792 , http://hdl.handle.net/10948/597 , http://hdl.handle.net/10948/d1011702 , Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Description: This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
- Full Text:
- Date Issued: 2007
Using agreements as an abstraction for access control administration
- Authors: Reyneke, André
- Date: 2007
- Subjects: Information -- control and access , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9791 , http://hdl.handle.net/10948/598 , http://hdl.handle.net/10948/d1011701 , Information -- control and access , Computer security -- Management
- Description: The last couple of decades saw lots of changes in the business world. Not only did technology change at a rapid pace, but businesses' views with respect to the role that information plays also changed drastically. Information is now seen as a strategic resource. This change paved the way for the so-called knowledge worker that not only consumes information, but actively participates in creating new knowledge from information. Employees must therefore be empowered to fulfill their new role as knowledge workers. Empowerment happens through job redefinition and by ensuring that the appropriate information is at hand. Although information is more readily available to employees, appropriate access controls must still be implemented. However, there is conflict between the need to share information and the need to keep information confidential. These conflicting needs must be reflected in the administration of access control. In order to resolve these conflicts, a finer granularity of access controls must be implemented. However, to implement a finer granularity of access control, an increase in the number of access controls and, therefore, the administrative burden is inevitable. Access control administrators must cater for a potentially large number of systems. These systems can not only be heterogenous as far as architecture and technology are concerned, but also with respect to access control paradigms. Vendors have realized that human involvement must be minimized, giving birth to so-called "provisioning systems". Provisioning systems, in principle, automate certain parts of access control administration. However, currently implementations are done in an ad hoc manner, that is, without a systematic process of identifying the real access control needs. This study aims to address this problem by proposing the "agreement abstraction" as a possible vehicle for systematically analyzing the access control requirements in a business. In essence, the agreement abstraction allows us to identify opportunities where access control can be automated. A specific methodological approach is suggested whereby the business is analysed in terms of business processes, as opposed to the more traditional resource perspective. Various business processes are used as examples to explain and motivate the proposed agreement abstraction further. This dissertation therefore contributes to the field of discourse by presenting a new abstraction that can be used systematically to analyse access control administration requirements.
- Full Text:
- Date Issued: 2007
- Authors: Reyneke, André
- Date: 2007
- Subjects: Information -- control and access , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9791 , http://hdl.handle.net/10948/598 , http://hdl.handle.net/10948/d1011701 , Information -- control and access , Computer security -- Management
- Description: The last couple of decades saw lots of changes in the business world. Not only did technology change at a rapid pace, but businesses' views with respect to the role that information plays also changed drastically. Information is now seen as a strategic resource. This change paved the way for the so-called knowledge worker that not only consumes information, but actively participates in creating new knowledge from information. Employees must therefore be empowered to fulfill their new role as knowledge workers. Empowerment happens through job redefinition and by ensuring that the appropriate information is at hand. Although information is more readily available to employees, appropriate access controls must still be implemented. However, there is conflict between the need to share information and the need to keep information confidential. These conflicting needs must be reflected in the administration of access control. In order to resolve these conflicts, a finer granularity of access controls must be implemented. However, to implement a finer granularity of access control, an increase in the number of access controls and, therefore, the administrative burden is inevitable. Access control administrators must cater for a potentially large number of systems. These systems can not only be heterogenous as far as architecture and technology are concerned, but also with respect to access control paradigms. Vendors have realized that human involvement must be minimized, giving birth to so-called "provisioning systems". Provisioning systems, in principle, automate certain parts of access control administration. However, currently implementations are done in an ad hoc manner, that is, without a systematic process of identifying the real access control needs. This study aims to address this problem by proposing the "agreement abstraction" as a possible vehicle for systematically analyzing the access control requirements in a business. In essence, the agreement abstraction allows us to identify opportunities where access control can be automated. A specific methodological approach is suggested whereby the business is analysed in terms of business processes, as opposed to the more traditional resource perspective. Various business processes are used as examples to explain and motivate the proposed agreement abstraction further. This dissertation therefore contributes to the field of discourse by presenting a new abstraction that can be used systematically to analyse access control administration requirements.
- Full Text:
- Date Issued: 2007