24 research outputs found

    Investigating Secure Agile Requirements Engineering Practices in Software Development

    Get PDF
    The aim of this research study was to assess Agile RE practices in the South African software development industry and investigate secure Agile RE initiatives towards developing secure products. This qualitative research study was contextualized in seventeen South African software development companies. The researchers used structured interviews and document reviews as the primary data collection instruments. Qualitative data was analyzed inductively using content analysis. Emanating from the research were recommendations to guide a regular software developer on good Agile RE practices. The study concluded that although Agile Software Development is practiced in the South African software industry, there needs to be stricter adherences to the Agile Manifesto and Agile Security Manifesto in requirements engineering

    Mobile Malware Implications for IT Management

    Get PDF
    Since the turn of the century malicious software, called malware, has been generated to infect not only computer systems but also ‘smart’ mobile phones. This malicious code is designed specifically to infect the mobile devices and disrupt the operation of the device or to send messages or make calls, resulting in financial loss to the user. The paper analyses trends in mobile malware from the listings of the malware descriptions. These trends show the increasing severity of the mobile malware problem, the introduction of new malware types, and the changing focus on the malware objectives; predictions of possible future trends are made. The implications of these trends for organisational management are discussed, and possible countermeasures to the risks are suggested

    Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries

    Get PDF
    Background: Many Southern African Development Community (SADC) countries are adopting and implementing e-government systems to improve the efficiency and effectiveness of their service delivery systems, and Zimbabwe and Zambia are not an exception. However, scholars have noted that the acceptance and utilisation of e-government systems by citizens in Zimbabwe and Zambia is affected by many factors, among others, perceived privacy, perceived security, perceived trust, perceived risk and optimism bias. Objectives: The aim of this study was to investigate the effect of privacy, security, trust, optimism bias and perceived risk on citizens’ use behaviour of e-government systems in the SADC. Method: This study proposes an e-government utilisation model. A quantitative design was employed to collect data from a survey of 489 e-government users in Zambia and Zimbabwe to test the model fit using structural equation modelling. Results: Perceived lack of privacy, security, trust; perceived risk and optimism bias were all confirmed as salient factors affecting the utilisation of e-government systems by citizens in Zambia and Zimbabwe. The structural equation model results confirmed the model fit of the proposed e-government research model. All eight hypotheses for this study were confirmed. Conclusion: The findings of this study provide pointers to practitioners, decision-makers and policymakers on e-government matters on the need to seriously consider privacy, security, risk and trust issues of e-government systems to encourage the utilisation of such systems by citizens

    INFORMATION-BASED CONFLICT IN AFRICA

    Get PDF
    For a long time, the African continent was regarded as the ‘Dark Continent’. The rapid assimilation of information technologies into the African economies has placed Africa firmly on a trajectory that will see it compete and integrate with the developed world. As nations and organisations become more information-centric, it is natural that conflicts and competition amongst the various nations or organisations will become increasingly information-based. In this article, the authors reflect upon information-based conflict in Africa. Areas of information conflict that are discussed include censorship, communications intercepts, the use of information and communications to instigate violence and uprisings, and the possibility of cyberwarfare. The article shows that the use of technology to conduct information conflict in Africa is prevalent, and that it is likely to increase

    Uncovering Web search tactics in South African higher education

    Get PDF
    Background: The potential of the World Wide Web (‘the Web’) as a tool for information retrieval in higher education is beyond question. Harnessing this potential, however, remains a challenge, particularly in the context of developing countries, where students are drawn from diverse socio-economic, educational and technological backgrounds. Objectives: The purpose of this study is to identify the Web search tactics used by postgraduate students in order to address the weaknesses of undergraduate students with regard to their Web searching tactics. This article forms part of a wider study into postgraduate students’ information retrieval strategies at the University of KwaZulu-Natal, Pietermaritzburg campus, South Africa. Method: The study utilised the mixed methods approach, employing both questionnaires (Phase 1) and structured interviews (Phase 2), and was largely underpinned by Bates’s model of information search tactics. This article reports and reflects on the findings of Phase 1, which focused on identifying the Web search tactics employed by postgraduate students. Results: Findings indicated a preference for lower-level Web search tactics, despite respondents largely self-reporting as intermediate or expert users. Moreover, the majority of respondents gained their knowledge on Web searching through experience and only a quarter of respondents have been given formal training on Web searching. Conclusion: In addition to contributing to theory, it is envisaged that this article will contribute to practice by informing the design of undergraduate training interventions to proactively address the information retrieval challenges faced by novice users. Subsequent papers will report on Phase 2 of the study

    On characteristic initial data for a star orbiting a black hole

    Full text link
    We take further steps in the development of the characteristic approach to enable handling the physical problem of a compact self-gravitating object, such as a neutron star, in close orbit around a black hole. We examine different options for setting the initial data for this problem and, in order to shed light on their physical relevance, we carry out short time evolution of this data. To this end we express the matter part of the characteristic gravity code so that the hydrodynamics are in conservation form. The resulting gravity plus matter relativity code provides a starting point for more refined future efforts at longer term evolution. In the present work we find that, independently of the details of the initial gravitational data, the system quickly flushes out spurious gravitational radiation and relaxes to a quasi-equilibrium state with an approximate helical symmetry corresponding to the circular orbit of the star.Comment: 20 pages, 10 figure

    High-powered Gravitational News

    Get PDF
    We describe the computation of the Bondi news for gravitational radiation. We have implemented a computer code for this problem. We discuss the theory behind it as well as the results of validation tests. Our approach uses the compactified null cone formalism, with the computational domain extending to future null infinity and with a worldtube as inner boundary. We calculate the appropriate full Einstein equations in computational eth form in (a) the interior of the computational domain and (b) on the inner boundary. At future null infinity, we transform the computed data into standard Bondi coordinates and so are able to express the news in terms of its standard N+N_{+} and N×N_{\times} polarization components. The resulting code is stable and second-order convergent. It runs successfully even in the highly nonlinear case, and has been tested with the news as high as 400, which represents a gravitational radiation power of about 1013M/sec10^{13}M_{\odot}/sec.Comment: 24 pages, 4 figures. To appear in Phys. Rev.

    Prevalence, associated factors and outcomes of pressure injuries in adult intensive care unit patients: the DecubICUs study

    Get PDF
    Funder: European Society of Intensive Care Medicine; doi: http://dx.doi.org/10.13039/501100013347Funder: Flemish Society for Critical Care NursesAbstract: Purpose: Intensive care unit (ICU) patients are particularly susceptible to developing pressure injuries. Epidemiologic data is however unavailable. We aimed to provide an international picture of the extent of pressure injuries and factors associated with ICU-acquired pressure injuries in adult ICU patients. Methods: International 1-day point-prevalence study; follow-up for outcome assessment until hospital discharge (maximum 12 weeks). Factors associated with ICU-acquired pressure injury and hospital mortality were assessed by generalised linear mixed-effects regression analysis. Results: Data from 13,254 patients in 1117 ICUs (90 countries) revealed 6747 pressure injuries; 3997 (59.2%) were ICU-acquired. Overall prevalence was 26.6% (95% confidence interval [CI] 25.9–27.3). ICU-acquired prevalence was 16.2% (95% CI 15.6–16.8). Sacrum (37%) and heels (19.5%) were most affected. Factors independently associated with ICU-acquired pressure injuries were older age, male sex, being underweight, emergency surgery, higher Simplified Acute Physiology Score II, Braden score 3 days, comorbidities (chronic obstructive pulmonary disease, immunodeficiency), organ support (renal replacement, mechanical ventilation on ICU admission), and being in a low or lower-middle income-economy. Gradually increasing associations with mortality were identified for increasing severity of pressure injury: stage I (odds ratio [OR] 1.5; 95% CI 1.2–1.8), stage II (OR 1.6; 95% CI 1.4–1.9), and stage III or worse (OR 2.8; 95% CI 2.3–3.3). Conclusion: Pressure injuries are common in adult ICU patients. ICU-acquired pressure injuries are associated with mainly intrinsic factors and mortality. Optimal care standards, increased awareness, appropriate resource allocation, and further research into optimal prevention are pivotal to tackle this important patient safety threat
    corecore