ETD Collection
Permanent URI for this collectionhttps://wiredspace.wits.ac.za/handle/10539/104
Please note: Digitised content is made available at the best possible quality range, taking into consideration file size and the condition of the original item. These restrictions may sometimes affect the quality of the final published item. For queries regarding content of ETD collection please contact IR specialists by email : IR specialists or Tel : 011 717 4652 / 1954
Follow the link below for important information about Electronic Theses and Dissertations (ETD)
Library Guide about ETD
Browse
3 results
Search Results
Item The legal risks in IoTs processing of personal information: a South African perspective(2019) Naidoo, AnolaThe technological and competitive landscape has undergone a significant change over the past decade, leading to cheaper processes, improved networking capabilities, smart devices, appliances, vehicles, security systems, machine learning and artificial intelligence that have exponentially enhanced the manner in which humans interact globally. While the Internet of Things has facilitated the Fourth Industrial Revolution, the push for universal access to the internet and the intelligent collaborations between various objects anywhere and at any time, requires the Internet of Things more often than not, to demand an extensive amount of an individual’s personal information be processed in order to perform its daily functions. This processing and increased complexity of these devices creates new safety, security, privacy, and usability challenges far beyond the difficult challenges’ individuals face just securing a single device. Furthermore, without the ability of manufacturers, internet service providers and/or government being able to guarantee an acceptable security level to protect the personal information being processed, this report aims to ascertain the legal risks to data privacy and security when these Internet of Things process a person’s personal information, the importance of one’s Constitutional right to privacy together with attempting to highlight possible ways industry and individuals can mitigate these risks1.Item Un-appointed Hackers: should they be compensated?(2019) Goliath, Yonnique FrancescaCybersecurity and data privacy have been prioritised by financial institutions due to legislative requirements, an increase in system security breaches, and in fulfilment of their obligations to their stakeholders. This paper discusses stakeholders’ interests, the moral duties of financial institutions, and the harm caused by hacking activities, in the context of data security. Specifically, the paper seeks to answer the question whether un-appointed hackers, who alert institutions to their security vulnerabilities and do not have malicious intent, should be compensated. Stakeholders’ interests and financial institutions’ moral duties are considered in the context of the stakeholder theory, and Kantian norms. I argue that financial institutions should not compensate un-appointed hackers, because hacking violates the principle of respect due to the data subject, and the financial institution’s moral duty to act in the interests of its stakeholders.Item Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutions(1996) Daya, Jithendra ChotooThis paper addresses concerns surrounding information privacy and the secondary use of information in South African corporations. This study also attempts to assess the level of concern that management and information technology practitioners if! South African retail banks have about privacy issues. The research suggests that privacy is a huge concern internationally and may affect South African corporations if they do not follow certain policies and practices. Eleven in-person structured interviews were conducted at four banks. The research proposes a set of guidelines by which South African management and IT practitioners, who are involved with the identification and solution of some of the problems that may be presented by possible privacy legislation, will be able to assess their policies and practices against international practices and policies. The results inform IS managers and executives about appropriate business policies they can implement voluntarily to address public concerns about specific information practices that may be considered a threat to privacy. The findings suggest that the executives are deliberately avoiding confronting the issue of information privacy for as long as possible. The executives are adopting a wait-and-see attitude and will react 011 whatever legislation requires them to do. At the time of the report senior executives at banks were not accepting responsibility for information privacy policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs.