Academic literature on the topic 'Computer security – Government policy – South Africa'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security – Government policy – South Africa.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security – Government policy – South Africa"

1

Malatji, Masike, Annlizé L. Marnewick, and Suné von Solms. "Cybersecurity Policy and the Legislative Context of the Water and Wastewater Sector in South Africa." Sustainability 13, no. 1 (December 30, 2020): 291. http://dx.doi.org/10.3390/su13010291.

Full text
Abstract:
The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has an overarching national cybersecurity strategy aimed at addressing cyber terrorism, cybercriminal activities, cyber vandalism, and cyber sabotage. The aim of this study is to contextualise the water and wastewater sector’s cybersecurity responsibilities within the national cybersecurity legislative and policy environment. This is achieved by conducting a detailed analysis of the international, national and sector cybersecurity stakeholders; legislation and policies; and challenges pertaining to the protection of the water and wastewater sector. The study found some concerning challenges and improvement gaps regarding the complex manner in which the national government is implementing the cybersecurity strategy. The study also found that, along with the National Cybersecurity Policy Framework (the national cybersecurity strategy of South Africa), the Electronic Communications and Transactions Act, Critical Infrastructure Protection Act, and other supporting legislation and policies make provision for the water and wastewater sector’s computer security incidents response team to be established without the need to propose any new laws or amend existing ones. This is conducive for the immediate development of the sector-specific cybersecurity governance framework and resilience strategy to protect the water and wastewater assets.
APA, Harvard, Vancouver, ISO, and other styles
2

Tyler, Emily, Michelle Du Toit, and Zelda Burchell. "Emissions trading as a policy option for greenhouse gas mitigation in South Africa." Journal of Energy in Southern Africa 22, no. 1 (February 1, 2011): 26–41. http://dx.doi.org/10.17159/2413-3051/2011/v22i1a3207.

Full text
Abstract:
Emissions trading is fast becoming one of the most popular policy instruments for reducing greenhouse gas emissions internationally. This hybrid instrument combines the certainty of mitigation volume delivered by regulation, whilst also harnessing the power of the market through an economic approach to deliver migitation price discovery and least cost mitigation opportunities. Theoretically, this is a powerful combination.However, the realities of uncertainty and lack of information result in international emissions trading experience deviating substantially from the instrument’s theoretical potential. This is of particular relevance in a developing country context. Scheme design is therefore very important to counter these market failures, and policymakers are required to strike a balance between this and introducing distortions. Given that the instrument is in its infancy, performance of the various schemes up and running internationally is inconclusive. Emissions trading proponents argue that the benefits will be realised over time, once the initial teething problems are overcome. The paper is the result of research conducted in 2008 and presented at the South African Climate Policy Summit in 2009. It considers theory and international experience in application to the potential establishment of an emissions trading scheme in South Africa. Lack of data, capacity and experience with markets in the energy sector present complications in the use of the instrument as a central part of the nation’s mitigation policy suite, as do market concentration issues. Should an emissions trading be proposed, the paper argues for ways in which its design could address these complications, and align with the current energy security imperative resulting from the electricity crisis in the country, the twin political objectives of poverty reduction and employment creation of the recently elected government, and the timeframes proposed by the Long Term Mitigation Scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Tinto, E. M., and K. G. Banda. "The Integrated National Electrification Programme and political democracy." Journal of Energy in Southern Africa 16, no. 4 (November 1, 2005): 26–33. http://dx.doi.org/10.17159/2413-3051/2005/v16i4a3077.

Full text
Abstract:
Since the coming of democracy in South Africa, the last decade has been marked by extraordinary, yet positive changes in policy development. Democratic organisation, both as a system of government and as a value system commanding the support of ordinary people, is of key importance in these developments and the implications for South Africa are still being analysed. Noticeable are the fundamental changes in the energy sector where there has been a shift from energy self-reliance and energy security to a more sustainable policy approach driven by economic efficiency, social equity and environment protection. Institutes of Democracy like IDEA (2004) concur with this trend that a strong democratic system must support poverty reduction for meaningful democratic change and, in practice; this is clearly the trend being defined. It is now a sustainable development issue, and voter’s confidence that is fast becoming the defining principle and drives for rapid policy change and service delivery in the form of an Integrated National Electrification Programme (INEP) in the energy sector. Policy makers in energy policy acknowledge this phenomenon as defining what is now seen as a ‘post-apartheid energy paradigm shift’. In this paper, it is suggested that the National Electrification Programme (NEP) has performed beyond expectation in increasing access to electricity for the poor in the country. It is also argued that, there is now an electrification and political democracy nexus exhibited in social and political development of this country. In this line of thought, the argument given is that one of the reasons why people voted for the ruling party in 1999 and 2000 was the NEP. Furthermore this identified linkage provides policy recommendations that suggest that the government should deliver other basic services in a similar manner in order to gain people’s confidence. In South Africa, because of the country’s unique social, economic and political history, a trade-off between basic social service delivery and linkage with democracy then becomes very crucial. Keywords
APA, Harvard, Vancouver, ISO, and other styles
4

Obagbuwa, Ibidun Christiana, and Ademola P. Abidoye. "South Africa Crime Visualization, Trends Analysis, and Prediction Using Machine Learning Linear Regression Technique." Applied Computational Intelligence and Soft Computing 2021 (June 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/5537902.

Full text
Abstract:
South Africa has been classified as one of the most homicidal, violent, and dangerous places across the globe. However, the two elements that pushed South Africa high in the crime rank are the rates of social violence and homicide. It was reported by Business Insider that South Africa is among the most top 15 ferocious nations on earth. By 1995, South Africa was rated the second highest in terms of murder. However, the crime rate has reduced for some years and suddenly rose again in recent years. Due to social violence and crime rates in South Africa, foreign investors are no longer interested in continuing or starting a business with the nation, and hence, its economy is declining. South Africa’s government is looking for solutions to the crime issue and to redeem the image of the country in terms of high crime ranking and boost the confidence of the investors. Many traditional approaches to data analysis in crime-related studies have been done in South Africa, but the machine learning approach has not been adequately considered. The police station and many other agencies that deal with crime hold a lot of databases that can be used to predict or analyze criminal happenings across the provinces of South Africa. This research work aimed at offering a solution to the problem by building a model that can predict crime. The machine learning approach shall be used to extract useful information from South Africa's nine provinces' crime data. A crime prediction system that can analyze and predict crime is proposed. To accomplish this, South Africa crime data on 27 crime categories were obtained from the popular data repository “Kaggle.” Diverse data analytics steps were applied to preprocess the datasets, and a machine learning algorithm (linear regression) was used to build a predictive model to analyze data and predict future crime. The appropriate authorities and security agencies in South Africa can have insight into the crime trends and alleviate them to encourage the foreign stakeholders to continue their businesses.
APA, Harvard, Vancouver, ISO, and other styles
5

Motjoadi, Vinny, Pitshou N. Bokoro, and Moses O. Onibonoje. "A Review of Microgrid-Based Approach to Rural Electrification in South Africa: Architecture and Policy Framework." Energies 13, no. 9 (May 2, 2020): 2193. http://dx.doi.org/10.3390/en13092193.

Full text
Abstract:
Access to electricity for every South African citizen, including rural dwellers, is a human right issue guaranteed by the government’s laws and policies. However, many remote rural areas still suffer from a lack of this very important amenity, due to the expensive prospect of connecting them to the central national grid. The feasible approach to connecting the rural communities to electricity supply is suggestively through the use of microgrid solutions. The microgrid technology is a very recent and viable option for the energy revolution. Microgrids result from the incorporation of energy storage systems, distributed generators, and localized loads. The application of this technology requires deliberate and extensive work on the operational architecture and the policy framework to be adopted. The energy storage devices form an integral part of the microgrid configuration or architecture to make sure more maintainable and constant operation is attained. This paper presents a review of the architectures of the existing microgrid systems, as well as the policy framework for implementable solutions. The various architectures display the peculiarity of the systems based on the increased grid performance, stability, quality of electricity, and other comparative advantages. The microgrid architectures are fundamentally recognized according to their AC, DC, or hybrid distribution buses and the complexity inherent to them. In the Policy And Development Section, the problems are treated as ‘a search for the truth’—a truth being revealed by close and objective examination. The core of the problem to be solved is revealed clearly, thereby giving the basis for simplifying and solving it. The policies encourage the accomplishment of a zero-carbon dioxide (CO 2 ) emissions, energy security attainment, the meeting of the electricity demand, and, lastly, the promotion of access to electricity in rural areas. It is established that the returns through charges of the consumers are very insignificant. Although returns on investment always come in conflict with the human right demands of the local indigenes, the policy framework would be explicit on the mode of returns for the government, private partners, and the communities—a return that can be short, medium, or long term. Policymakers would be keen on the exhaustive analysis of issues, leading to optimal decision making.
APA, Harvard, Vancouver, ISO, and other styles
6

Jansen van Vuuren, Joey, Louise Leenen, Jackie Phahlamohlaka, and Jannie Zaaiman. "An Approach to Governance of CyberSecurity in South Africa." International Journal of Cyber Warfare and Terrorism 2, no. 4 (October 2012): 13–27. http://dx.doi.org/10.4018/ijcwt.2012100102.

Full text
Abstract:
A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
7

Maumbe, Blessing Mukabeta. "Mobile Agriculture in South Africa." International Journal of ICT Research and Development in Africa 1, no. 2 (April 2010): 35–59. http://dx.doi.org/10.4018/jictrda.2010040103.

Full text
Abstract:
The rapid diffusion of mobile and wireless technologies is transforming agricultural development globally. In South Africa, rural e-government service delivery has been hampered by low Internet penetration. Mobile government offers a promising alternative to deliver public services to remote rural communities. In this regard, the author examines the potential of mobile and wireless technologies to deliver value-added services to rural communities in South Africa. An implementation framework comprising a multi-functional agro-portal and mobile agriculture services is proposed. The benefits and barriers of using mobile and wireless technologies in rural areas are examined, while key considerations and policy implications for mobile agriculture are discussed. The author advocates the development of “value-based” and “demand-driven” mobile agriculture services for the future growth and survival of mobile agriculture, which requires greater competition among service providers, use of multi-lingual e-content, integration of indigenous knowledge, mobile agriculture curriculum, mobile cyber-security, and customized value-added services for rural communities.
APA, Harvard, Vancouver, ISO, and other styles
8

Harris, HC, and DLW Krueger. "Implementing energy efficiency policy in housing in South Africa." Journal of Energy in Southern Africa 16, no. 3 (August 1, 2005): 38–44. http://dx.doi.org/10.17159/2413-3051/2005/v16i3a3114.

Full text
Abstract:
The Thermal Insulation Association of South Africa (TIASA) is supporting government measures to promote energy efficiency in South African buildings. The research document titled: ‘New standards of thermal design to provide comfort and energy efficiency in South African housing’, has been adopted by TIASA, and details an objective basis for a standard. The S.A.N.S. 283 titled: ‘Energy efficiency for naturally ventilated buildings’ has as its premise, the same assumptions and methodologies as the research document. The provision of comfort in all housing in South Africa, including the problematic 30/36 m2 subsidy house – can be a reality with the proposals.
APA, Harvard, Vancouver, ISO, and other styles
9

GARIDZIRAI, Rufaro, and Rufaro Emily CHIKURUWO. "An Economic Analysis of the Social Grant Policy in South Africa." Journal of Advanced Research in Law and Economics 11, no. 2 (March 31, 2020): 362. http://dx.doi.org/10.14505/jarle.v11.2(48).09.

Full text
Abstract:
South Africa`s economy is largely influenced by socio-economic challenges that need attention. These challenges include poverty, stagnant economic growth, unemployment and crime. In a bid to address these challenges, the Constitution of the Republic of South Africa established the social grant system as one of the solutions to the above entrenched challenges. Section 27 (1) (c) of the Constitution affords everyone the right to social security, including, appropriate social support for themselves and those that depend on them. The critical question is whether the social grant system can solve all the above-mentioned challenges? This question remains as one of the unanswered questions in South Africa’s policy space. Extensive examination of this conundrum is therefore necessary. Thus, the objective of this study is to investigate whether the social grants are economically sustainable in South Africa. The study utilized a combination of the doctrinal research methodology and literature review approach in achieving the objective of the study. The results of the study suggest that the social grant system is a short-term policy that presents long-run challenges, especially if the economic outlook of the country is not favorable. Therefore, although the social grant system is legally supported by the Constitution, it is nonetheless economically unsustainable considering the economic metrics of South Africa. Based on the results of the study, the paper proposes that the government introduces a new system of social grants that promotes small businesses for citizens so that they do not rely on the government for survival.
APA, Harvard, Vancouver, ISO, and other styles
10

Adom, Richard Kwame, and Mulala Danny Simatele. "Analysis of public policies and programmes towards water security in post-apartheid South Africa." Water Policy 23, no. 3 (March 25, 2021): 503–20. http://dx.doi.org/10.2166/wp.2021.017.

Full text
Abstract:
Abstract Many countries in the world, including South Africa, are water-stressed with increasing pressure on their water resources due to population growth, climate change, and inadequate funding. Post-independence in 1994, many policies and programmes were introduced by the government with the aim of promoting water management. While these policies and strategies achieved much in terms of water provision to communities and households, they failed to establish a water-conscious country with sufficient knowledge and expertise in water management. In addition, these policies and programmes are outdated, compartmentalised, complex, and lack robust water governance with resilient stakeholder partnerships that advance the more explicit second phase of the National Development Plan (NDP) to achieve water security under the threat of climate change. Using data collection tools inspired by the traditional method of participatory research, this paper analyses the structural and systematic factors hindering the implementation of comprehensive policies to achieve water security in South Africa. There is, therefore, an urgent need for South Africa to establish an independent water regulator to ensure coordination between different government departments, including the National Treasury, to strengthen weak governance capacity and to make it independent to attract private equity into the sector and to recover fiscal deficits in the water sector.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer security – Government policy – South Africa"

1

Swart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.

Full text
Abstract:
The need for increased national cyber security situational awareness is evident from the growing number of published national cyber security strategies. Governments are progressively seen as responsible for cyber security, but at the same time increasingly constrained by legal, privacy and resource considerations. Infrastructure and services that form part of the national cyber domain are often not under the control of government, necessitating the need for information sharing between governments and commercial partners. While sharing of security information is necessary, it typically requires considerable time to be implemented effectively. In an effort to decrease the time and effort required for cyber security situational awareness, this study considered commercially available data sources relating to a national cyber domain. Open source information is typically used by attackers to gather information with great success. An understanding of the data provided by these sources can also afford decision makers the opportunity to set priorities more effectively. Through the use of an adapted Joint Directors of Laboratories (JDL) fusion model, an experimental system was implemented that visualized the potential that open source intelligence could have on cyber situational awareness. Datasets used in the validation of the model contained information obtained from eight different data sources over a two year period with a focus on the South African .co.za sub domain. Over a million infrastructure devices were examined in this study along with information pertaining to a potential 88 million vulnerabilities on these devices. During the examination of data sources, a severe lack of information regarding the human aspect in cyber security was identified that led to the creation of a novel Personally Identifiable Information detection sensor (PII). The resultant two million records pertaining to PII in the South African domain were incorporated into the data fusion experiment for processing. The results of this processing are discussed in the three case studies. The results offered in this study aim to highlight how data fusion and effective visualization can serve to move national cyber security from a primarily reactive undertaking to a more pro-active model.
APA, Harvard, Vancouver, ISO, and other styles
2

Kgatla, Itumeleng Peter. "Social security and retirement reforms in South Africa : prospects and challenges." Thesis, University of Limpopo, Turfloop Campus, 2013. http://hdl.handle.net/10386/1114.

Full text
Abstract:
Thesis (LLM. (Development and Management Law)) -- University of Limpopo, 2013
This mini-dissertation discusses South African social security and retirement reforms that will be used as guidelines towards promulgation of the new Pension Funds Act which will incorporate both private and public pensions. These proposals have been highlighted in the Retirement Reform Discussion Paper issued by National Treasury in 2004 and the Social Security and Retirement Reform paper, issued by both National Treasury and Department of Social Development, 2007. Further, the recent discussion papers entitled ‘Strengthening Retirement Savings and a Safer Financial Sector to Serve South Africa Better’ published in 2011 and 2012 respectively have strengthened social security and retirement reforms debate in South Africa. This mini-dissertation will incorporate both social security and retirement reforms.
APA, Harvard, Vancouver, ISO, and other styles
3

Mungwashu, Sthembiso Handinawangu. "A learning state?: a case study of the post-1994 South African welfare regime." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1003113.

Full text
Abstract:
This thesis examines the processes of policymaking in South Africa, as expressed through the shifts in income maintenance policy. The thesis focuses on the processes leading to the establishment of the South African Social Security Agency (SASSA), as its case study. SASSA is the institutional framework for the delivery of social grants. Our intention is to test the efficacy of what we have called ‘state learning’ in the South African context. Therefore, the overall aim of the study is to assess the capacity of the ‘state to learn’ in the process of policymaking as expressed through the shifts in social grant administration and the institutional framework of social welfare in South Africa. The subsidiary goals of the research includes mapping changes in the system of social grants administration since 1994 in order to assess the sources of the shifts in its institutional framework; to assess processes and responses within the state that result in policy shifts and the extent to which these can be considered dimensions of state learning; to assess the power of ideas in the policymaking process and to assess the influence of non-state agencies/actors in policy contestation and learning processes. This is essential, because social policy, especially welfare policy research in post-apartheid South Africa, has focused on the economic value of policies and not the political processes in policymaking. For the framework of analysis the study draws on theories of learning, especially at the organizational or institutional level. We start from the perspective that policymaking and implementation cannot be reduced to a neatly ordered schema (Lamb: 1987:6). Further, that policy change and policymaking are “iterative, haphazard, and highly political processes, in which the apparently logical sequences of decision-making, may turn out to be the reverse” (Lamb, 1987:6). This is mainly because state building is a complex affair and a contested terrain; policy learning and making are neither benign nor do they involve the state working in isolation (Sabatier, 1998). To understand processes of policymaking in South Africa, we rely on content analysis of primary and secondary materials or documents and in-depth interviews with key informants involved in the policy process. The documentary sources include records of parliamentary debates, green and white papers on social welfare, ANC party documents, presidential task force reports, newspapers, magazines and court judgments. The study reveals that the establishment of SASSA lends itself to the idea of ‘state learning’. Learning is indicated in South Africa by the capacity and ability of the state to stimulate ideas, debate ideas to establish ideational matrixes as well as paradigms that have informed the development of policy, take ideas and implement them to try and solve mismatches between the intention of the state and the outcomes and the ability of the state to produce policy.
APA, Harvard, Vancouver, ISO, and other styles
4

Pedzisa, Beatrice. "The implementation of deportation laws against the right to security and liberty of migrants workers : a case study of South Africa." Thesis, University of Fort Hare, 2016. http://hdl.handle.net/10353/2533.

Full text
Abstract:
Globalisation has resulted in the increase of migrant workers who cross borders in search of better opportunities and greener pastures. Migrant workers, wherever they decide to relocate, are at the risk of arbitrary arrests and illegal deportations which infringe their right to liberty and security. Many unreported cases show that migrant workers in South Africa have to endure inhuman treatment every day, through the implementation of deportation laws by law enforcement agencies. This is however, done in a manner which disregards their possession of necessary documentation authorising them to be in the country. The Constitution of South Africa, legislation and other related policies provide for the protection of the right to liberty and security of migrant workers. It is against the above that this mini dissertation examines and analyses how the implementation of deportation laws impacts on the right to liberty and security of migrant workers. This mini dissertation points out that there is a dire need to ensure that the implementation of deportation laws complies with the requirements of the right to security and liberty of persons accorded to the status of migrant workers by the Constitution and other related legislation or policies. The methodology made use of in this research is qualitative. This research used legislative texts, case law, journal articles and other academic commentary to acquire information on the right of migrant workers and their plight in South Africa. The study also makes recommendations for appropriate domestic law reform in respect to how deportation laws can be implemented in a bid to protect the right to liberty and security of migrant workers. These recommendations are designed to ensure that law enforcement agencies adhere to the law and procedure which protect migrant workers from arbitrary arrests, and illegal deportations.
APA, Harvard, Vancouver, ISO, and other styles
5

Vermeulen, Cornel. "Evaluation of the determinants of improved food security in South Africa by 2030." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17472.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2011.
Africa is the continent where home sapiens was born and with its worn out soils, fitful rain and rising population could very well provide a glimpse of our species’ future. The trends that are behind the current deterioration in food security go far beyond agriculture itself. South Africa is food secure at a national level and has been meeting its food needs from domestic sources in the past twenty years. However, in spite of its food secure status, 35% or 14.3 million South Africans are vulnerable to food insecurity. Food security challenges appear to be considerable against a backdrop of a South Africa being a net importer of wheat together with local cereal production that can fluctuate by up to 36% between years. It is unknown to what extend the true impact of climate change might affect this and other agricultural activity; a declining indigenous population as the HIV/AIDS pandemic takes effect; a population poorly endowed with an entitlement to gain access to sufficient food and nutrition; a dependency on oil for energy resulting in an outflow of foreign exchange, expensive agriculture and agricultural crops changed into fuel crops and markets that allocates the limited resources, but not feeding the needy poor. Considering the above, the determinants of food security for South Africa were grouped under the following headings: - Entitlement - Demography - Agriculture - Energy - Climate change - Markets. Nobody who has money to pay for food is starving therefore, given the pervasiveness of malnutrition, the money made by merchants in the food trade does seem an affront to common notions of economic justice. The economic and political point is missed when merchants are blamed for conditions that promoted huge food imports and malnutrition. Merchants are not interested in famine but in commercial markets. These merchants thrive upon a system that excludes the hungry. Recent protectionist behaviour by food export countries and the structural shift in the demand of food require South Africa to evaluate its food security determinants. South Africa requires accurate policies to guide its food security efforts towards 2030.
APA, Harvard, Vancouver, ISO, and other styles
6

Gerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.

Full text
Abstract:
Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementation, an organization should implement the technology with knowledge of the potential risk of civil liability. This is further highlighted by the King III Report which indicates that the Directors of an organization should be ultimately responsible for Corporate Governance and, therefore, IT Governance and Information Security Governance. The report goes further to say that any newly implemented technology, such as VoIP, should comply with all South African legislation and regulations. This responsibility encourages the practice of both due care and due diligence. However, recent trends exercised by Information Security professionals, responsible for drafting Information Security policies and related procedures, often neglect the regulatory requirements and choose to only implement international best practices with no consideration of the risk of civil liability. Although these best practice frameworks may inadvertently comply with existing local legislation, a chance of an oversight is possible. Oversights may not only result in criminal sanctions, but also civil action due to losses or damages suffered. With regard to implementing VoIP, good Corporate Governance could potentially be ensured through the use of both identified regulations and relevant international best practices. This dissertation aims to aid organizations in avoiding or at least mitigating the risk of civil liability to better leverage VoIP’s value, through good Corporate Governance practices. This should aid in the exercise of due care and due diligence when implementing VoIP as a means of conducting business communication.
APA, Harvard, Vancouver, ISO, and other styles
7

Moffat, Craig Vincent. "Securitisation of HIV and AIDS in Southern African policy processes : an investigation of Botswana, South Africa and Swaziland, 2000-2008." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/95864.

Full text
Abstract:
Thesis (PhD)--Stellenbosch University, 2014.
ENGLISH ABSTRACT: This study aims to understand the processes and factors that explain the framing of HIV and AIDS policy in Botswana, South Africa and Swaziland. Africa remains the global epicentre of the HIV and AIDS epidemic with Southern Africa remaining the most affected region in the world. The investigation centres on the HIV and AIDS policymaking discourses and dynamics leading to the securitisation of the epidemic in the three countries. The central focus of the study covers the timeframe of the leadership of President Mogae in Botswana, President Mbeki in South Africa and King Mswati III in Swaziland. This period is important as it characterises the HIV and AIDS epidemic being elevated onto the political agenda of the respective countries. This dissertation relies on two strands of theoretical literature namely, public policy theory and securitisation theory to help explain the framing of policy decision-making that leads to the process of securitisation of the HIV and AIDS epidemic in the three countries. This study is a multiple case study within the qualitative research paradigm. This research is based on three case studies: Botswana, South Africa and Swaziland. As far as data collection is concerned, this study drew on primary sources of data, which consisted of documents obtained during the fieldwork from various stakeholders such as such as official government documents, as well as official documents from international and domestic HIV and AIDS organisations. Twenty semi-structured interviews were also conducted between 2007 and 2008 with various stakeholders including government officials, representatives of domestic and international HIV and AIDS organisations operating in the respective countries, researchers from think tanks and academics. In addition, eleven exploratory interviews were also conducted as part of the fieldwork process. Furthermore this study also relied on various secondary sources of data such as scholarly articles and books, official documents and legislation and newspaper articles. The preliminary results collected and analysed in this study suggest that Botswana, South Africa and Swaziland have all demonstrated a degree of formal commitment to adopting international guidelines to combat the epidemic. The thesis shows that while all three countries may share the burden of the epidemic, each presents a different political, social and cultural identity with different institutional architects (both foreign and domestic) that determined the nature of the response policy to the epidemic. The study shows that each of the three case studies presents an example of differing degrees of securitisation attempts: i) Botswana - successful securitisation; ii) South Africa - unsuccessful securitisation; and iii) Swaziland - partial securitisation because different actors and audiences are positioned at varying points along a spectrum of securitisation. This degree of securitisation can be linked to the acceptance of international ideas and the prevailing global discourse regarding the HIV and AIDS epidemic and the openness to forming collaborative agreements between state and non-state actors in each of the three countries.
AFRIKAANSE OPSOMMING: Hierdie studie poog om ’n begrip te ontwikkel van die prosesse en faktore wat verklaar hoe beleid rondom MIV en VIGS in Botswana, Suid-Afrika en Swaziland geraam word. Die Afrikavasteland is nog steeds die wêreld se MIV en VIGS-episentrum en die Suider-Afrika-streek loop die mees gebuk onder die epidemie. Die ontleding sentreer op die MIV en VIGS beleidsdiskoerse en die dinamieke wat aanleiding gee tot die beveiliging van die epidemie in die drie lande. Die kollig val op die tyd toe President Mogae van Botswana, President Mbeki van Suid-Afrika en Koning Mswati III van Swaziland aan bewind was. Hierdie periode is van belang omdat dit die tyd was toe MIV en VIGS op die drie lande se politieke agendas geplaas is. Die proefskrif gebruik literatuur uit twee teoretiese velde, naamlik openbare beleidsteorie en sekuriteitsteorie, om te verklaar hoe daar op bepaalde beleide besluit word, hoe dit geraam word, en die proses waarvolgens MIV en VIGS gevolglik in die drie lande beveilig word. Die studie is ’n meervuldige gevallestudie binne die kwalitatiewe navorsingsparadigma. Die navorsing is op drie gevallestudies gebaseer, te wete Botswana, Suid-Afrika en Swaziland. Ten opsigte van data-insameling, het die studie van primêre databronne gebruik gemaak bestaande uit bewysstukke wat van verskeie belangegroepe verkry is. Hierdie stukke beslaan amptelike regeringsdokumente en amptelike dokumentasie van internasionale sowel as nasionale MIV en VIGS-organisasies. Daar is ook met verskeie belangegroepe onderhoude gevoer. Die belangegroepe het bestaan uit regeringsamptenare, die verteenwoordigers van nasionale en internasionale MIV en VIGS-organisasies betrokke in die drie lande, akademici, en kundiges by navorsingsinstansies. Twintig semi-gestruktureerde onderhoude is in 2007 en 2008 gevoer. Boonop is daar as deel van die empiriese navorsing 11 verkenningsonderhoude gevoer. Die studie het ook van verskeie sekondêre databronne soos vakwetenskaplike artikels en boeke, amptelike dokumentasie, wetaktes en koerantartikels gebruik gemaak. Die voorlopige bevindinge dui dat Botswana, Suid-Afrika en Swaziland elkeen hulself tot ’n mate formeel tot internasionale riglyne verbind het om die epidemie te beveg. Die proefskrif bewys dat ofskoon al drie lande swaar aan die las van die epidemie dra, daar by elkeen verskillende politieke, maatskaplike en kulturele identiteite, asook institusionele argitekte (plaaslik sowel as buitelands) bestaan wat die aard van die beleidsrespons bepaal het. Die studie dui verskillende grade van beveiliging by elkeen van die gevallestudies: i) Botswana – suksesvolle beveiliging; ii) Suid-Afrika – onsuksesvolle beveiliging; en iii) Swaziland – gedeeltelike beveiliging. Hierdie grade van beveiliging kan verklaar word aan die hand van die mate waartoe daar by elkeen van die lande aanvaarding was van internasionale denke en diskoers oor die MIV en VIGS-epidemie en of samewerking tussen staats- en nie-staatsakteurs bewerkstellig is.
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Ferdinand. "Model closure and price formation under switching grain market regimes in South Africa." Thesis, Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-12082006-105715.

Full text
Abstract:
Thesis (D.Phil.(Agricultural Economics, Extension, and Rural Development))--University of Pretoria, 2006.
Includes summary. Includes bibliographical references. Available on the Internet via the World Wide Web.
APA, Harvard, Vancouver, ISO, and other styles
9

Haywood, Ashley. "Exploring plausible futures and its implications for the governance of local food systems using local actors’ expertise in the Witzenberg region." University of Western Cape, 2020. http://hdl.handle.net/11394/7303.

Full text
Abstract:
Masters of Commerce
Despite having a significant agri-food sector, South Africa is faced with strong food security issues related to high inequalities and the legacy of the apartheid regime. The South African food system finds itself at risk of alienating the majority of its citizens from realizing their right to access food granted by the South African Constitution (1996) Section 27(1)(b). Increasing poverty, unemployment and poor governance are making it harder for ordinary South African citizens to put safe and nutritious food on the table. Part of the food security issue in South Africa is that there is an inefficiency in public policies. It can be explained by the extreme segmentation of public action between departments and also by the limitations and ineffectiveness of decentralization resulting in little to no involvement from local governments. Like most socio-economic issues, the effects of food insecurity are first experienced on the ground at the local level where municipalities are at the forefront. The absence of effective policy around food security and food systems at the local level in South Africa leaves room for research on improved local food governance. Municipalities should be best suited to understand the consequences of food insecurity and could therefore use some of their constitutional mandate which provides some room for manoeuvre with regard to food issues. The aim of this study is to raise awareness of food security issues at the municipal level and to identify ways to facilitate engagement by municipalities. Its main objective was to adopt a foresight approach, using scenarios with local actors, and to understand how it can help improve the engagement of municipalities and citizens in the food security debate and take possible action. This research has made use of an existing collaboration between the Centre of Excellence in Food Security (CoE-FS) and the South African Local Government Association (SALGA) developed in the Western Cape. The collaboration focuses on the understanding of the food policy space in South Africa, the results of existing policies, and how the co-production of knowledge between stakeholders, notably at the local level, can contribute to policy improvement.
APA, Harvard, Vancouver, ISO, and other styles
10

Ntombovuyo, Klaas. "An investigation of the effective use of information and communication technologies (ICT) for primary school teachers in the transfer of knowledge." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/1052.

Full text
Abstract:
Thesis (MPhil (Information Science))--University of Stellenbosch, 2006.
ENGLISH ABSTRACT: We are in the era where Information and Communication Technologies (ICTs) are increasingly becoming as common as desks and chalkboard in our classrooms. Government, students, parents and the community at large are now expecting ICTs to be integrated in the school curriculum and to be used as tools of instruction.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer security – Government policy – South Africa"

1

Kenneth, Mokoena, and National Security Archive (U.S.), eds. South Africa: The making of U.S. policy, 1962-1989. Alexandria, Va: Chadwyck-Healey, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hentschel, Christine. Security in the Bubble: Navigating Crime in Urban South Africa. University of Minnesota Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Security in the Bubble: Navigating Crime in Urban South Africa. University of Minnesota Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Library of Congress. Congressional Research Service. and United States. Congress. Senate. Committee on Foreign Relations., eds. China's foreign policy and "soft power" in South America, Asia, and Africa: A study prepared for the Committee on Foreign Relations, United States Senate. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Britain, Great. Agreement between the Government of the United Kingdom of Great Britain and Northern Ireland and the Government of the Republic of South Africa regarding mutual administrative assistance between their customs administrations, Cape Town, 27 August 1997. London: Stationery Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer security – Government policy – South Africa"

1

Ngoqo, Bukelwa, and Kennedy Njenga. "The State of e-Government Security in South Africa: Analysing the National Information Security Policy." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 29–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98827-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maumbe, Blessing M., and Vesper T. Owei. "Understanding the Information Security Landscape in South Africa." In Standards and Standardization, 1018–31. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch048.

Full text
Abstract:
Information security risks are a major threat to South Africa's bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa's readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa's information security landscape and describes how institutional and agency coordination could help improve information security in e-government.
APA, Harvard, Vancouver, ISO, and other styles
3

Maumbe, Blessing. "Mobile Agriculture in South Africa." In Technology, Sustainability, and Rural Development in Africa, 298–322. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3607-1.ch019.

Full text
Abstract:
The rapid diffusion of mobile and wireless technologies is transforming agricultural development globally. In South Africa, rural e-government service delivery has been hampered by low Internet penetration. Mobile government offers a promising alternative to deliver public services to remote rural communities. In this regard, the author examines the potential of mobile and wireless technologies to deliver value-added services to rural communities in South Africa. An implementation framework comprising a multi-functional agro-portal and mobile agriculture services is proposed. The benefits and barriers of using mobile and wireless technologies in rural areas are examined, while key considerations and policy implications for mobile agriculture are discussed. The author advocates the development of “value-based” and “demand-driven” mobile agriculture services for the future growth and survival of mobile agriculture, which requires greater competition among service providers, use of multi-lingual e-content, integration of indigenous knowledge, mobile agriculture curriculum, mobile cyber-security, and customized value-added services for rural communities.
APA, Harvard, Vancouver, ISO, and other styles
4

Maumbe, Blessing. "Mobile Agriculture in South Africa." In Wireless Technologies, 1186–210. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch506.

Full text
Abstract:
The rapid diffusion of mobile and wireless technologies is transforming agricultural development globally. In South Africa, rural e-government service delivery has been hampered by low Internet penetration. Mobile government offers a promising alternative to deliver public services to remote rural communities. In this regard, the author examines the potential of mobile and wireless technologies to deliver value-added services to rural communities in South Africa. An implementation framework comprising a multi-functional agro-portal and mobile agriculture services is proposed. The benefits and barriers of using mobile and wireless technologies in rural areas are examined, while key considerations and policy implications for mobile agriculture are discussed. The author advocates the development of “value-based” and “demand-driven” mobile agriculture services for the future growth and survival of mobile agriculture, which requires greater competition among service providers, use of multi-lingual e-content, integration of indigenous knowledge, mobile agriculture curriculum, mobile cyber-security, and customized value-added services for rural communities.
APA, Harvard, Vancouver, ISO, and other styles
5

Jansen van Vuuren, Joey, Louise Leenen, Jackie Phahlamohlaka, and Jannie Zaaiman. "An Approach to Governance of CyberSecurity in South Africa." In Cyber Behavior, 1583–97. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5942-1.ch082.

Full text
Abstract:
A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
6

Baguma, Rehema. "Rwanda as a Knowledge Society." In Developing Knowledge Societies for Distinct Country Contexts, 63–84. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-5225-8873-3.ch003.

Full text
Abstract:
Generating and developing knowledge societies is a key element for sustainable development as defined in the 2030 Agenda for Sustainable Development Goals adopted by the United Nations in 2015. Based on a limited natural resource base, Rwanda chose to take an approach to development that differs from that of its neighbours by making ICTs the cornerstone of its development. With this focus, government of Rwanda (GoR) took a Pro-ICT led public policy that has led to several public reforms such as but not limited to liberalization of the telecom sector, enactment of laws to govern electronic messages, signatures, transactions, data protection, cyber-security and ICT usage, development of relevant infrastructure and establishment of key institutions such as the Rwanda Utilities and Regulatory Agency (RURA) and Rwanda Information Society Authority (RISA). These reforms have in turn led to a fast-growing ICT sector in Rwanda compared to that of the neighbours. To-date, Rwanda is one of the fastest growing African countries in ICT. In 2015, Rwanda emerged as the third best ICT country in Sub-Saharan Africa behind South Africa and Seychelles. In 2016, it moved one position up and emerged 2nd behind Seychelles. The fast-growing ICT sector has stimulated entrepreneurial creativity and growth across the economy. This chapter examines the best practices that Rwanda has applied in her journey to a knowledge society that could possibly help other countries in the region pursuing the same objective. The chapter also briefly reviews challenges and gaps in Rwanda's journey to a knowledge society and suggests recommendations for further improvement.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer security – Government policy – South Africa"

1

Bayaga, Anass. "Examining the Challenges of Integration and Interoperability of a Security and Privacy Policy Framework for e-Government Services: The Case of South Africa." In 2020 Conference on Information Communications Technology and Society (ICTAS). IEEE, 2020. http://dx.doi.org/10.1109/ictas47918.2020.233974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography