A psychobiographical study of William Wilberforce
- Authors: Daubermann, Bettina Pamela
- Date: 2013
- Subjects: Personality development
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9966 , http://hdl.handle.net/10948/d1020857 , http://hdl.handle.net/10948/d1021085
- Description: The proposed study is of a psychobiographical nature and employs a qualitative research approach. The individual that forms the subject of this study is William Wilberforce. A social activist most of his life, Wilberforce is best known for his voice and works behind the abolition of the slave trade in 1807 and the abolition of slavery in 1833. His ambitious nature, social eloquence and verbal intellect resulted in him being elected as a member of parliament in the House of Commons in England during the period 1780 to 1825. Transformed by the Christian faith in 1885, Wilberforce came to the realization he had received a calling from God to speak up for those who could not with a specific task set out before him which was to abolish slavery. It was the purpose of the present research to explore and describe Wilberforce’s psychological development across his life-span according to Carl Rogers’ (1961) personality theory of optimal development. Salient aspects of Wilberforce’s life were related and compared to components of the theory so as to explore and describe the degree of optimal development that Wilberforce reached at different points in his life and whether he could be described as a fully functioning person. According to Rogers’ theory William Wilberforce was chosen as the research subject for his historical contribution to mankind by his devotion to the moral enhancement of his country.
- Full Text:
- Date Issued: 2013
Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013