Towards a framework for identity verification of vulnerable children within the Eastern Cape
- Authors: Rautenbach, James
- Date: 2007
- Subjects: Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9792 , http://hdl.handle.net/10948/597 , http://hdl.handle.net/10948/d1011702 , Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Description: This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
- Full Text:
- Date Issued: 2007
- Authors: Rautenbach, James
- Date: 2007
- Subjects: Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9792 , http://hdl.handle.net/10948/597 , http://hdl.handle.net/10948/d1011702 , Biometric identification , Information storage and retrieval systems , Children -- Services for -- South Africa -- Eastern Cape
- Description: This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
- Full Text:
- Date Issued: 2007
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- «
- ‹
- 1
- ›
- »