3. Electronic Theses and Dissertations (ETDs) - All submissions
Permanent URI for this communityhttps://wiredspace.wits.ac.za/handle/10539/45
Browse
2 results
Search Results
Item Un-appointed Hackers: should they be compensated?(2019) Goliath, Yonnique FrancescaCybersecurity and data privacy have been prioritised by financial institutions due to legislative requirements, an increase in system security breaches, and in fulfilment of their obligations to their stakeholders. This paper discusses stakeholders’ interests, the moral duties of financial institutions, and the harm caused by hacking activities, in the context of data security. Specifically, the paper seeks to answer the question whether un-appointed hackers, who alert institutions to their security vulnerabilities and do not have malicious intent, should be compensated. Stakeholders’ interests and financial institutions’ moral duties are considered in the context of the stakeholder theory, and Kantian norms. I argue that financial institutions should not compensate un-appointed hackers, because hacking violates the principle of respect due to the data subject, and the financial institution’s moral duty to act in the interests of its stakeholders.Item Data security aspects of a debit card system(2016-08-17) Botha, Jacobus TheronA debit-card is a form of payment, The card is pre-charged with a value, monetary or otherwise, before distribution to the user, and is therefore a pre-payment card . It is then 'used up, its value being decremented until it is valueless. At this point, it is either discarded or re-charged by the administration authority, It is distinct from a credit card, which provides a post-payment facility. The aim of this project is to investigate the security aspects of a debit-card reader system for use as an unattended fee-collecting subsystem in such applications as public telephones, parking meters and vending machines. Card technology and attributes of debit card systems are discussed, an overview of cryptology is given, and an implementation of a magnetic card system is described.