3. Electronic Theses and Dissertations (ETDs) - All submissions

Permanent URI for this communityhttps://wiredspace.wits.ac.za/handle/10539/45

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    The effect of pertinent factors in preparation for compliance with the South African Protection of Personal Information Act of 2013 (POPI)
    (2018) Joshua, Amiel Myron
    While South Africa passed the Protection of Private Information (POPI) Act in 2013, it has not been fully enforced. Consequently there is only a basic understanding of the effect of preparation to comply with the Protection of Personal Information (POPI) Act on the organisation, staff and cost anticipated for the compliance effort. This study delves into these aspects to build a picture of various factors that are pertinent in preparation to comply. This study is exploratory due to the Act being relatively new and not fully enforced yet. It is qualitative in nature, specifically employing a constructivist lens, and gathering opinions and feelings of respondents to gain insights on the research question posed. The tool for data collection was formal semi-structured interviews that allowed for all interviewees to be asked the same questions and for flexibility to drill down into responses to gain deeper insight. The analytical framework combines elements from two ISO standards - 19600 & 17799 (now 27002) and the OECD’s Compliance Cost Assessment (CCA) framework. The retrospective effect of the Act was determined to be a risk in preparation for compliance particularly the conditions for lawful processing of information as currently held information would need to comply with the Act as well as new information being collected going forward. Compliance with legal requirements works hand in hand with corporate governance. The King IV codes are an example of corporate governance standards in South Africa and have bearing on data protection and data governance and suggest that it be on the agenda of the Board of an organisation. While the codes of governance are detailed and good practise by many accounts they are not legally binding and as such the POPI Act can be seen to be the legal instrument to ensure a minimum standard of protection across the board. A unique aspect of the POPI Act is pertinent to organisations in that juristic person’s privacy is protected by the Act. Various reasons are given for this, but the analysis determined that the most plausible is that this is due to the constitution. How this is done could be determined by a future study into the matter. Governance and organisational theory are traversed also. Compliance with legislation is central to these. The Act stands to affects the structure of organisations and spur change. The study also proposes a model for compliance.
  • Item
    Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.
    (2017) Donald, Katherine Faye
    This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms.
Copyright Ownership Is Guided By The University's

Intellectual Property policy

Students submitting a Thesis or Dissertation must be aware of current copyright issues. Both for the protection of your original work as well as the protection of another's copyrighted work, you should follow all current copyright law.