A study of malicious software on the macOS operating system
- Authors: Regensberg, Mark Alan
- Date: 2019
- Subjects: Malware (Computer software) , Computer security , Computer viruses , Mac OS
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/92302 , vital:30701
- Description: Much of the published malware research begins with a common refrain: the cost, quantum and complexity of threats are increasing, and research and practice should prioritise efforts to automate and reduce times to detect and prevent malware, while improving the consistency of categories and taxonomies applied to modern malware. Existing work related to malware targeting Apple's macOS platform has not been spared this approach, although limited research has been conducted on the true nature of threats faced by users of the operating system. While macOS focused research available consistently notes an increase in macOS users, devices and ultimately in threats, an opportunity exists to understand the real nature of threats faced by macOS users and suggest potential avenues for future work. This research provides a view of the current state of macOS malware by analysing and exploring a dataset of malware detections on macOS endpoints captured over a period of eleven months by an anti-malware software vendor. The dataset is augmented with malware information provided by the widely used Virus. Total service, as well as the application of prior automated malware categorisation work, AVClass to categorise and SSDeep to cluster and report on observed data. With Windows and Android platforms frequently in the spotlight as targets for highly disruptive malware like botnets, ransomware and cryptominers, research and intuition seem to suggest the threat of malware on this increasingly popular platform should be growing and evolving accordingly. Findings suggests that the direction and nature of growth and evolution may not be entirely as clear as industry reports suggest. Adware and Potentially Unwanted Applications (PUAs) make up the vast majority of the detected threats, with remote access trojans (RATs), ransomware and cryptocurrency miners comprising a relatively small proportion of the detected malware. This provides a number of avenues for potential future work to compare and contrast with research on other platforms, as well as identification of key factors that may influence its growth in the future.
- Full Text:
- Date Issued: 2019
- Authors: Regensberg, Mark Alan
- Date: 2019
- Subjects: Malware (Computer software) , Computer security , Computer viruses , Mac OS
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/92302 , vital:30701
- Description: Much of the published malware research begins with a common refrain: the cost, quantum and complexity of threats are increasing, and research and practice should prioritise efforts to automate and reduce times to detect and prevent malware, while improving the consistency of categories and taxonomies applied to modern malware. Existing work related to malware targeting Apple's macOS platform has not been spared this approach, although limited research has been conducted on the true nature of threats faced by users of the operating system. While macOS focused research available consistently notes an increase in macOS users, devices and ultimately in threats, an opportunity exists to understand the real nature of threats faced by macOS users and suggest potential avenues for future work. This research provides a view of the current state of macOS malware by analysing and exploring a dataset of malware detections on macOS endpoints captured over a period of eleven months by an anti-malware software vendor. The dataset is augmented with malware information provided by the widely used Virus. Total service, as well as the application of prior automated malware categorisation work, AVClass to categorise and SSDeep to cluster and report on observed data. With Windows and Android platforms frequently in the spotlight as targets for highly disruptive malware like botnets, ransomware and cryptominers, research and intuition seem to suggest the threat of malware on this increasingly popular platform should be growing and evolving accordingly. Findings suggests that the direction and nature of growth and evolution may not be entirely as clear as industry reports suggest. Adware and Potentially Unwanted Applications (PUAs) make up the vast majority of the detected threats, with remote access trojans (RATs), ransomware and cryptocurrency miners comprising a relatively small proportion of the detected malware. This provides a number of avenues for potential future work to compare and contrast with research on other platforms, as well as identification of key factors that may influence its growth in the future.
- Full Text:
- Date Issued: 2019
A study of South African computer users' password usage habits and attitude towards password security
- Authors: Friendman, Brandon
- Date: 2014
- Subjects: Computers -- Access control -- Passwords , Computer users -- Attitudes , Internet -- Access control , Internet -- Security measures , Internet -- Management , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: vital:4700
- Description: The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and professionals have sought to improve or even replace password authentication. Technologies such as multi-factor authentication and single sign-on have been developed to complement or even replace password authentication. The objective of the study was to investigate the password habits of South African computer and internet users. The aim was to assess their attitudes toward password security, to determine whether password policies a↵ect the manner in which they manage their passwords and to investigate their exposure to alternate authentication technologies. The results from the online survey demonstrated that password practices of the participants across their professional and personal contexts were generally insecure. Participants often used shorter, simpler and ultimately less secure passwords. Participants would try to memorise all of their passwords or reuse the same password on most of their accounts. Many participants had not received any security awareness training, and additional security technologies (such as multi-factor authentication or password managers) were seldom used or provided to them. The password policies encountered by the participants in their organisations did little towards encouraging the users to apply more secure password practices. Users lack the knowledge and understanding about password security as they had received little or no training pertaining to it.
- Full Text:
- Date Issued: 2014
- Authors: Friendman, Brandon
- Date: 2014
- Subjects: Computers -- Access control -- Passwords , Computer users -- Attitudes , Internet -- Access control , Internet -- Security measures , Internet -- Management , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: vital:4700
- Description: The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and professionals have sought to improve or even replace password authentication. Technologies such as multi-factor authentication and single sign-on have been developed to complement or even replace password authentication. The objective of the study was to investigate the password habits of South African computer and internet users. The aim was to assess their attitudes toward password security, to determine whether password policies a↵ect the manner in which they manage their passwords and to investigate their exposure to alternate authentication technologies. The results from the online survey demonstrated that password practices of the participants across their professional and personal contexts were generally insecure. Participants often used shorter, simpler and ultimately less secure passwords. Participants would try to memorise all of their passwords or reuse the same password on most of their accounts. Many participants had not received any security awareness training, and additional security technologies (such as multi-factor authentication or password managers) were seldom used or provided to them. The password policies encountered by the participants in their organisations did little towards encouraging the users to apply more secure password practices. Users lack the knowledge and understanding about password security as they had received little or no training pertaining to it.
- Full Text:
- Date Issued: 2014
A study of the catalysis of the Diels-Alder and Aldol Condensation Reactions
- Authors: Ndagano, Urbain Nshokano
- Date: 2021-04
- Subjects: To be added
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/178525 , vital:42947
- Description: Access restricted until April 2022. , Thesis (MSc) -- Faculty of Science, Chemistry, 2021
- Full Text:
- Date Issued: 2021-04
- Authors: Ndagano, Urbain Nshokano
- Date: 2021-04
- Subjects: To be added
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/178525 , vital:42947
- Description: Access restricted until April 2022. , Thesis (MSc) -- Faculty of Science, Chemistry, 2021
- Full Text:
- Date Issued: 2021-04
A study of why some physic concepts in the South African Physical Science curriculum are poorly understood in order to develop a targeted action-research intervention for Newton’s second law
- Authors: Cobbing, Kathleen Margaret
- Date: 2020
- Subjects: Physics -- Study and teaching (Secondary) -- South Africa , Physics -- Examinations, questions, etc. -- South Africa , Motion -- Study and teaching (Secondary) -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/146903 , vital:38575
- Description: Globally, many students show a poor understanding of concepts in high school physics and lack the necessary problem-solving skills that the course demands. The application of Newton’s second law was found to be particularly problematic through document analysis of South African examination feedback reports, as well as from an analysis of the physics examinations at a pair of well-resourced South African independent schools that follow the Independent Examination Board curriculum. Through an action-research approach, a resource for use by students was designed and modified to improve students’ understanding of this concept, while modelling problemsolving methods. The resource consisted of brief revision notes, worked examples and scaffolded exercises. The design of the resource was influenced by the theory of cognitive apprenticeship, cognitive load theory and conceptual change theory. One of the aims of the resource was to encourage students to translate between the different representations of a problem situation: symbolic, abstract, model and concrete. The impact of this resource was evaluated at a pair of schools using a mixed methods approach. This incorporated pre- and post-tests for a quantitative assessment, qualitative student evaluations and the analysis of examination scripts. There was an improvement from pre- to post-test for all four iterations of the intervention and these improvements were shown to be significant. The use of the resource led to an increase in the quality and quantity of diagrams drawn by students in subsequent assessments.
- Full Text:
- Date Issued: 2020
- Authors: Cobbing, Kathleen Margaret
- Date: 2020
- Subjects: Physics -- Study and teaching (Secondary) -- South Africa , Physics -- Examinations, questions, etc. -- South Africa , Motion -- Study and teaching (Secondary) -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/146903 , vital:38575
- Description: Globally, many students show a poor understanding of concepts in high school physics and lack the necessary problem-solving skills that the course demands. The application of Newton’s second law was found to be particularly problematic through document analysis of South African examination feedback reports, as well as from an analysis of the physics examinations at a pair of well-resourced South African independent schools that follow the Independent Examination Board curriculum. Through an action-research approach, a resource for use by students was designed and modified to improve students’ understanding of this concept, while modelling problemsolving methods. The resource consisted of brief revision notes, worked examples and scaffolded exercises. The design of the resource was influenced by the theory of cognitive apprenticeship, cognitive load theory and conceptual change theory. One of the aims of the resource was to encourage students to translate between the different representations of a problem situation: symbolic, abstract, model and concrete. The impact of this resource was evaluated at a pair of schools using a mixed methods approach. This incorporated pre- and post-tests for a quantitative assessment, qualitative student evaluations and the analysis of examination scripts. There was an improvement from pre- to post-test for all four iterations of the intervention and these improvements were shown to be significant. The use of the resource led to an increase in the quality and quantity of diagrams drawn by students in subsequent assessments.
- Full Text:
- Date Issued: 2020
A Systematic Visualisation Framework for Radio-Imaging Pipelines
- Authors: Andati, Lexy Acherwa Livoyi
- Date: 2021-04
- Subjects: Radio interferometers , Radio astronomy -- Data processing , Radio astronomy -- Data processing -- Software , Jupyter
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/177338 , vital:42812
- Description: Pipelines for calibration and imaging of radio interferometric data produce many intermediate images and other data products (gain tables, etc.) These often contain valuable information about the quality of the data and the calibration, and can provide the user with valuable insights, if only visualised in the right way. However, the deluge of data that we’re experiencing with modern instruments means that most of these products are never looked at, and only the final images and data products are examined. Furthermore, the variety of imaging algorithms currently available, and the range of their options, means that very different results can be produced from the same set of original data. Proper understanding of this requires a systematic comparison that can be carried out both by individual users locally, and by the community globally. We address both problems by developing a systematic visualisation framework based around Jupyter notebooks, enriched with interactive plots based on the Bokeh and Datashader visualisation libraries. , Thesis (MSc) -- Faculty of Science, Department of Physics and Electronics, 2021
- Full Text:
- Date Issued: 2021-04
- Authors: Andati, Lexy Acherwa Livoyi
- Date: 2021-04
- Subjects: Radio interferometers , Radio astronomy -- Data processing , Radio astronomy -- Data processing -- Software , Jupyter
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/177338 , vital:42812
- Description: Pipelines for calibration and imaging of radio interferometric data produce many intermediate images and other data products (gain tables, etc.) These often contain valuable information about the quality of the data and the calibration, and can provide the user with valuable insights, if only visualised in the right way. However, the deluge of data that we’re experiencing with modern instruments means that most of these products are never looked at, and only the final images and data products are examined. Furthermore, the variety of imaging algorithms currently available, and the range of their options, means that very different results can be produced from the same set of original data. Proper understanding of this requires a systematic comparison that can be carried out both by individual users locally, and by the community globally. We address both problems by developing a systematic visualisation framework based around Jupyter notebooks, enriched with interactive plots based on the Bokeh and Datashader visualisation libraries. , Thesis (MSc) -- Faculty of Science, Department of Physics and Electronics, 2021
- Full Text:
- Date Issued: 2021-04
Accelerated implementations of the RIME for DDE calibration and source modelling
- Authors: Van Staden, Joshua
- Date: 2021
- Subjects: Radio astronomy , Radio inferometers , Radio inferometers -- Calibration , Radio astronomy -- Data processing , Radio inferometers -- Data processing , Radio inferometers -- Calibration -- Data processing
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/172422 , vital:42199
- Description: Second- and third-generation calibration methods filter out subtle effects in interferometer data, and therefore yield significantly higher dynamic ranges. The basis of these calibration techniques relies on building a model of the sky and corrupting it with models of the effects acting on the sources. The sensitivities of modern instruments call for more elaborate models to capture the level of detail that is required to achieve accurate calibration. This thesis implements two types of models to be used in for second- and third-generation calibration. The first model implemented is shapelets, which can be used to model radio source morphologies directly in uv space. The second model implemented is Zernike polynomials, which can be used to represent the primary beam of the antenna. We implement these models in the CODEX-AFRICANUS package and provide a set of unit tests for each model. Additionally, we compare our implementations against other methods of representing these objects and instrumental effects, namely NIFTY-GRIDDER against shapelets and a FITS-interpolation method against the Zernike polynomials. We find that to achieve sufficient accuracy, our implementation of the shapelet model has a higher runtime to that of the NIFTY-GRIDDER. However, the NIFTY-GRIDDER cannot simulate a component-based sky model while the shapelet model can. Additionally, the shapelet model is fully parametric, which allows for integration into a parameterised solver. We find that, while having a smaller memory footprint, our Zernike model has a greater computational complexity than that of the FITS-interpolated method. However, we find that the Zernike implementation has floating-point accuracy in its modelling, while the FITS-interpolated model loses some accuracy through the discretisation of the beam.
- Full Text:
- Date Issued: 2021
- Authors: Van Staden, Joshua
- Date: 2021
- Subjects: Radio astronomy , Radio inferometers , Radio inferometers -- Calibration , Radio astronomy -- Data processing , Radio inferometers -- Data processing , Radio inferometers -- Calibration -- Data processing
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/172422 , vital:42199
- Description: Second- and third-generation calibration methods filter out subtle effects in interferometer data, and therefore yield significantly higher dynamic ranges. The basis of these calibration techniques relies on building a model of the sky and corrupting it with models of the effects acting on the sources. The sensitivities of modern instruments call for more elaborate models to capture the level of detail that is required to achieve accurate calibration. This thesis implements two types of models to be used in for second- and third-generation calibration. The first model implemented is shapelets, which can be used to model radio source morphologies directly in uv space. The second model implemented is Zernike polynomials, which can be used to represent the primary beam of the antenna. We implement these models in the CODEX-AFRICANUS package and provide a set of unit tests for each model. Additionally, we compare our implementations against other methods of representing these objects and instrumental effects, namely NIFTY-GRIDDER against shapelets and a FITS-interpolation method against the Zernike polynomials. We find that to achieve sufficient accuracy, our implementation of the shapelet model has a higher runtime to that of the NIFTY-GRIDDER. However, the NIFTY-GRIDDER cannot simulate a component-based sky model while the shapelet model can. Additionally, the shapelet model is fully parametric, which allows for integration into a parameterised solver. We find that, while having a smaller memory footprint, our Zernike model has a greater computational complexity than that of the FITS-interpolated method. However, we find that the Zernike implementation has floating-point accuracy in its modelling, while the FITS-interpolated model loses some accuracy through the discretisation of the beam.
- Full Text:
- Date Issued: 2021
Alternative approach to controlling citrus black spot disease
- Authors: Thabede, Jahman Thabo
- Date: 2021-04
- Subjects: To be added
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/178569 , vital:42951
- Description: Access restricted until April 2022. , Thesis (MSc) -- Faculty of Science, Biochemistry and Microbiology, 2021
- Full Text:
- Date Issued: 2021-04
- Authors: Thabede, Jahman Thabo
- Date: 2021-04
- Subjects: To be added
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/178569 , vital:42951
- Description: Access restricted until April 2022. , Thesis (MSc) -- Faculty of Science, Biochemistry and Microbiology, 2021
- Full Text:
- Date Issued: 2021-04
An analysis of flood activity over the past century based on the sedimentary deposits in the Mfolozi floodplain
- Authors: Mbao, Chabala
- Date: 2017
- Subjects: Floodplain morphology -- South Africa -- Mfolozi River , Floodplains -- South Africa -- Kwazulu-Natal , Sedimentation and deposition -- South Africa -- Kwazulu-Natal , Floods -- South Africa -- Kwazulu-Natal -- Measurement , Hydrology -- Research -- South Africa -- Kwazulu-Natal , Stream measurements -- South Africa -- Kwazulu-Natal
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/53711 , vital:26312
- Description: Floods are natural phenomena that are of widespread interest to the scientific community, particularly in the context of understanding the impact of climate change as well as changing land use patterns and the security of infrastructure such as towns and roads. In northern KwaZulu-Natal, large flood events have been a reoccurring feature over the past century. The geographical position and extent of the region means that is affected by both inland and coastal weather phenomena, each with the potential to cause large flood events. While information pertaining to large floods in the region in the form of flow data is readily available, flow data is often incomplete and limited in terms of how far back in time the records extend. The Mfolozi River floodplain itself also houses a record of flood activity in the region in the form of sedimentary deposits, which have the potential to reveal flood activity over a much longer timescale, even when monitoring of flood activity in the region was not present. Establishing a link between the hydrological and sedimentary features of floods may be useful in establishing a record of flood activity extending beyond the limits of historical records. The aim of this project was to construct a record of major flood events on the Mfolozi River floodplain over the last century and determine their source. The first objective involved establishing the history of flood events in the Mfolozi River catchment utilising hydrological data recorded throughout the catchment. Thirty nine different large floods (defined as being over 800 m3.s-1) were recorded on the floodplain over the past century. The data also highlighted differences in the extent of known coastal and inland systems (tropical cyclones and cut-off lows respectively), allowing for inferences to be made about the area of the catchment most likely affected by each event; some flood events were identified as having mostly affected the upper reaches of the catchment, while others mostly affected the lower reaches, closer to the coast. The second objective was to identify the various physical, mineralogical and geochemical features of the sediment deposited on the Mfolozi floodplain. Multiple individual flood deposits were identified in the sedimentary record, with sediment tracing analysis providing insight into the source of the deposits within the catchment; no traces of igneous or metamorphic material could be found within the sediment. The source rocks were identified as mostly quartzite, with minor shale and sandstone deposits as well. This put the source of the sediment in the upper to middle reaches of the catchment. The sedimentary analysis was combined with the hydrological records to establish a chronology of flood events extending back to the 1960's. Unfortunately, this record could not be extended further due to the limited amount of sediment collected as well the limits of readily available analytical techniques; radionuclide dating methods were unsuccessful due to the low amounts of fallout radionuclides present in the sediment. The study has however successfully established a history of flood events in the region, as well as providing a link between the hydrological and sedimentary features of flood events that could potentially be useful for current and future research.
- Full Text:
- Date Issued: 2017
- Authors: Mbao, Chabala
- Date: 2017
- Subjects: Floodplain morphology -- South Africa -- Mfolozi River , Floodplains -- South Africa -- Kwazulu-Natal , Sedimentation and deposition -- South Africa -- Kwazulu-Natal , Floods -- South Africa -- Kwazulu-Natal -- Measurement , Hydrology -- Research -- South Africa -- Kwazulu-Natal , Stream measurements -- South Africa -- Kwazulu-Natal
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/53711 , vital:26312
- Description: Floods are natural phenomena that are of widespread interest to the scientific community, particularly in the context of understanding the impact of climate change as well as changing land use patterns and the security of infrastructure such as towns and roads. In northern KwaZulu-Natal, large flood events have been a reoccurring feature over the past century. The geographical position and extent of the region means that is affected by both inland and coastal weather phenomena, each with the potential to cause large flood events. While information pertaining to large floods in the region in the form of flow data is readily available, flow data is often incomplete and limited in terms of how far back in time the records extend. The Mfolozi River floodplain itself also houses a record of flood activity in the region in the form of sedimentary deposits, which have the potential to reveal flood activity over a much longer timescale, even when monitoring of flood activity in the region was not present. Establishing a link between the hydrological and sedimentary features of floods may be useful in establishing a record of flood activity extending beyond the limits of historical records. The aim of this project was to construct a record of major flood events on the Mfolozi River floodplain over the last century and determine their source. The first objective involved establishing the history of flood events in the Mfolozi River catchment utilising hydrological data recorded throughout the catchment. Thirty nine different large floods (defined as being over 800 m3.s-1) were recorded on the floodplain over the past century. The data also highlighted differences in the extent of known coastal and inland systems (tropical cyclones and cut-off lows respectively), allowing for inferences to be made about the area of the catchment most likely affected by each event; some flood events were identified as having mostly affected the upper reaches of the catchment, while others mostly affected the lower reaches, closer to the coast. The second objective was to identify the various physical, mineralogical and geochemical features of the sediment deposited on the Mfolozi floodplain. Multiple individual flood deposits were identified in the sedimentary record, with sediment tracing analysis providing insight into the source of the deposits within the catchment; no traces of igneous or metamorphic material could be found within the sediment. The source rocks were identified as mostly quartzite, with minor shale and sandstone deposits as well. This put the source of the sediment in the upper to middle reaches of the catchment. The sedimentary analysis was combined with the hydrological records to establish a chronology of flood events extending back to the 1960's. Unfortunately, this record could not be extended further due to the limited amount of sediment collected as well the limits of readily available analytical techniques; radionuclide dating methods were unsuccessful due to the low amounts of fallout radionuclides present in the sediment. The study has however successfully established a history of flood events in the region, as well as providing a link between the hydrological and sedimentary features of flood events that could potentially be useful for current and future research.
- Full Text:
- Date Issued: 2017
An analysis of fusing advanced malware email protection logs, malware intelligence and active directory attributes as an instrument for threat intelligence
- Authors: Vermeulen, Japie
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Data mining , Phishing , Data logging , Quantitative research
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63922 , vital:28506
- Description: After more than four decades email is still the most widely used electronic communication medium today. This electronic communication medium has evolved into an electronic weapon of choice for cyber criminals ranging from the novice to the elite. As cyber criminals evolve with tools, tactics and procedures, so too are technology vendors coming forward with a variety of advanced malware protection systems. However, even if an organization adopts such a system, there is still the daily challenge of interpreting the log data and understanding the type of malicious email attack, including who the target was and what the payload was. This research examines a six month data set obtained from an advanced malware email protection system from a bank in South Africa. Extensive data fusion techniques are used to provide deeper insight into the data by blending these with malware intelligence and business context. The primary data set is fused with malware intelligence to identify the different malware families associated with the samples. Active Directory attributes such as the business cluster, department and job title of users targeted by malware are also fused into the combined data. This study provides insight into malware attacks experienced in the South African financial services sector. For example, most of the malware samples identified belonged to different types of ransomware families distributed by known botnets. However, indicators of targeted attacks were observed based on particular employees targeted with exploit code and specific strains of malware. Furthermore, a short time span between newly discovered vulnerabilities and the use of malicious code to exploit such vulnerabilities through email were observed in this study. The fused data set provided the context to answer the “who”, “what”, “where” and “when”. The proposed methodology can be applied to any organization to provide insight into the malware threats identified by advanced malware email protection systems. In addition, the fused data set provides threat intelligence that could be used to strengthen the cyber defences of an organization against cyber threats.
- Full Text:
- Date Issued: 2018
- Authors: Vermeulen, Japie
- Date: 2018
- Subjects: Malware (Computer software) , Computer networks Security measures , Data mining , Phishing , Data logging , Quantitative research
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63922 , vital:28506
- Description: After more than four decades email is still the most widely used electronic communication medium today. This electronic communication medium has evolved into an electronic weapon of choice for cyber criminals ranging from the novice to the elite. As cyber criminals evolve with tools, tactics and procedures, so too are technology vendors coming forward with a variety of advanced malware protection systems. However, even if an organization adopts such a system, there is still the daily challenge of interpreting the log data and understanding the type of malicious email attack, including who the target was and what the payload was. This research examines a six month data set obtained from an advanced malware email protection system from a bank in South Africa. Extensive data fusion techniques are used to provide deeper insight into the data by blending these with malware intelligence and business context. The primary data set is fused with malware intelligence to identify the different malware families associated with the samples. Active Directory attributes such as the business cluster, department and job title of users targeted by malware are also fused into the combined data. This study provides insight into malware attacks experienced in the South African financial services sector. For example, most of the malware samples identified belonged to different types of ransomware families distributed by known botnets. However, indicators of targeted attacks were observed based on particular employees targeted with exploit code and specific strains of malware. Furthermore, a short time span between newly discovered vulnerabilities and the use of malicious code to exploit such vulnerabilities through email were observed in this study. The fused data set provided the context to answer the “who”, “what”, “where” and “when”. The proposed methodology can be applied to any organization to provide insight into the malware threats identified by advanced malware email protection systems. In addition, the fused data set provides threat intelligence that could be used to strengthen the cyber defences of an organization against cyber threats.
- Full Text:
- Date Issued: 2018
An Analysis of Internet Background Radiation within an African IPv4 netblock
- Authors: Hendricks, Wadeegh
- Date: 2020
- Subjects: Computer networks -- Monitoring –- South Africa , Dark Web , Computer networks -- Security measures –- South Africa , Universities and Colleges -- Computer networks -- Security measures , Malware (Computer software) , TCP/IP (Computer network protocol)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/103791 , vital:32298
- Description: The use of passive network sensors has in the past proven to be quite effective in monitoring and analysing the current state of traffic on a network. Internet traffic destined to a routable, yet unused address block is often referred to as Internet Background Radiation (IBR) and characterised as unsolicited. This unsolicited traffic is however quite valuable to researchers in that it allows them to study the traffic patterns in a covert manner. IBR is largely composed of network and port scanning traffic, backscatter packets from virus and malware activity and to a lesser extent, misconfiguration of network devices. This research answers the following two questions: (1) What is the current state of IBR within the context of a South African IP address space and (2) Can any anomalies be detected in the traffic, with specific reference to current global malware attacks such as Mirai and similar. Rhodes University operates five IPv4 passive network sensors, commonly known as network telescopes, each monitoring its own /24 IP address block. The oldest of these network telescopes has been collecting traffic for over a decade, with the newest being established in 2011. This research focuses on the in-depth analysis of the traffic captured by one telescope in the 155/8 range over a 12 month period, from January to December 2017. The traffic was analysed and classified according the protocol, TCP flag, source IP address, destination port, packet count and payload size. Apart from the normal network traffic graphs and tables, a geographic heatmap of source traffic was also created, based on the source IP address. Spikes and noticeable variances in traffic patterns were further investigated and evidence of Mirai like malware activity was observed. Network and port scanning were found to comprise the largest amount of traffic, accounting for over 90% of the total IBR. Various scanning techniques were identified, including low level passive scanning and much higher level active scanning.
- Full Text:
- Date Issued: 2020
- Authors: Hendricks, Wadeegh
- Date: 2020
- Subjects: Computer networks -- Monitoring –- South Africa , Dark Web , Computer networks -- Security measures –- South Africa , Universities and Colleges -- Computer networks -- Security measures , Malware (Computer software) , TCP/IP (Computer network protocol)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/103791 , vital:32298
- Description: The use of passive network sensors has in the past proven to be quite effective in monitoring and analysing the current state of traffic on a network. Internet traffic destined to a routable, yet unused address block is often referred to as Internet Background Radiation (IBR) and characterised as unsolicited. This unsolicited traffic is however quite valuable to researchers in that it allows them to study the traffic patterns in a covert manner. IBR is largely composed of network and port scanning traffic, backscatter packets from virus and malware activity and to a lesser extent, misconfiguration of network devices. This research answers the following two questions: (1) What is the current state of IBR within the context of a South African IP address space and (2) Can any anomalies be detected in the traffic, with specific reference to current global malware attacks such as Mirai and similar. Rhodes University operates five IPv4 passive network sensors, commonly known as network telescopes, each monitoring its own /24 IP address block. The oldest of these network telescopes has been collecting traffic for over a decade, with the newest being established in 2011. This research focuses on the in-depth analysis of the traffic captured by one telescope in the 155/8 range over a 12 month period, from January to December 2017. The traffic was analysed and classified according the protocol, TCP flag, source IP address, destination port, packet count and payload size. Apart from the normal network traffic graphs and tables, a geographic heatmap of source traffic was also created, based on the source IP address. Spikes and noticeable variances in traffic patterns were further investigated and evidence of Mirai like malware activity was observed. Network and port scanning were found to comprise the largest amount of traffic, accounting for over 90% of the total IBR. Various scanning techniques were identified, including low level passive scanning and much higher level active scanning.
- Full Text:
- Date Issued: 2020
An analysis of the use of DNS for malicious payload distribution
- Authors: Dube, Ishmael
- Date: 2019
- Subjects: Internet domain names , Computer networks -- Security measures , Computer security , Computer network protocols , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/97531 , vital:31447
- Description: The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking broadens this research field and fills in the existing research gap by extending the analysis of DNS being used as a payload distribution channel to detection of domains that are used to distribute different malicious payloads. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterises the malicious payload distribution channels by analysing passive DNS traffic and modelling the DNS query and response patterns. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.
- Full Text:
- Date Issued: 2019
- Authors: Dube, Ishmael
- Date: 2019
- Subjects: Internet domain names , Computer networks -- Security measures , Computer security , Computer network protocols , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/97531 , vital:31447
- Description: The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking broadens this research field and fills in the existing research gap by extending the analysis of DNS being used as a payload distribution channel to detection of domains that are used to distribute different malicious payloads. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterises the malicious payload distribution channels by analysing passive DNS traffic and modelling the DNS query and response patterns. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.
- Full Text:
- Date Issued: 2019
An assessment of amount, distribution and use of urban green spaces in small towns of the Eastern Cape
- Authors: Radebe, Denis Siphosihle
- Date: 2019
- Subjects: Urban ecology (Sociology) -- South Africa -- Eastern Cape , Small cities -- South Africa -- Eastern Cape , City planning -- South Africa -- Eastern Cape , Recreation areas -- South Africa -- Eastern Cape , Open spaces -- South Africa -- Eastern Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/76447 , vital:30563
- Description: Most regions of the developing world are experiencing large-scale urbanisation, with urban population growth outstripping rural growth. This is most marked in small and medium-sized towns as opposed to megacities. Urbanisation is associated with numerous changes in social, economic and ecological states and dynamics. A key one, of interest in this study, is the sustainability and liveability of the growing towns and cities. The retention, provision and maintenance of multifunctional urban green infrastructure are a core strategy in this regard. This study therefore sought to assess the amount, distribution and use of urban green spaces within South Africa using small towns of the Eastern Cape. The primary research included sixteen aerial images of which eight were historical aerial photographs and another eight were the latest aerial images of the selected study towns. Historical and latest aerial images were digitised to classify the types and calculate the amount of urban green space. GIS mapping, interviews and focus group discussions were conducted with urban residents to understand how these green spaces are used. The analytical tools in this study derived from social science included household surveys of 180 randomly selected respondents in small towns. Fifteen types of green spaces were identified in the sample towns. The study further revealed that green spaces are not distributed equally in different suburbs of small towns, generally being less green spaces, especially formal parks and recreation areas, in poorer areas. The results indicated a decline of green spaces with urbanisation, and most marked in fast growing towns. The results suggested that urban residents frequently visited urban green spaces, with most respondents favouring the use of green spaces for social and cultural benefits. How use of different spaces was strongly gender related, with males favouring less developed green space types (such as commonages and woodlands) and females for formal areas such domestic and institutional gardens and churchyards. Respondents also identified various challenges associated with using and accessing urban green spaces, with pollution, crime and lack of maintenance in particular. The study shows the importance of GIS as a mapping tool that can be used to provide information for ecological planning in rapidly changing urban environment. The research process generated several lessons that need to be taken into consideration when designing urban landscapes, most importantly relating to the diversity, quantity, quality and maintenance of urban green spaces.
- Full Text:
- Date Issued: 2019
- Authors: Radebe, Denis Siphosihle
- Date: 2019
- Subjects: Urban ecology (Sociology) -- South Africa -- Eastern Cape , Small cities -- South Africa -- Eastern Cape , City planning -- South Africa -- Eastern Cape , Recreation areas -- South Africa -- Eastern Cape , Open spaces -- South Africa -- Eastern Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/76447 , vital:30563
- Description: Most regions of the developing world are experiencing large-scale urbanisation, with urban population growth outstripping rural growth. This is most marked in small and medium-sized towns as opposed to megacities. Urbanisation is associated with numerous changes in social, economic and ecological states and dynamics. A key one, of interest in this study, is the sustainability and liveability of the growing towns and cities. The retention, provision and maintenance of multifunctional urban green infrastructure are a core strategy in this regard. This study therefore sought to assess the amount, distribution and use of urban green spaces within South Africa using small towns of the Eastern Cape. The primary research included sixteen aerial images of which eight were historical aerial photographs and another eight were the latest aerial images of the selected study towns. Historical and latest aerial images were digitised to classify the types and calculate the amount of urban green space. GIS mapping, interviews and focus group discussions were conducted with urban residents to understand how these green spaces are used. The analytical tools in this study derived from social science included household surveys of 180 randomly selected respondents in small towns. Fifteen types of green spaces were identified in the sample towns. The study further revealed that green spaces are not distributed equally in different suburbs of small towns, generally being less green spaces, especially formal parks and recreation areas, in poorer areas. The results indicated a decline of green spaces with urbanisation, and most marked in fast growing towns. The results suggested that urban residents frequently visited urban green spaces, with most respondents favouring the use of green spaces for social and cultural benefits. How use of different spaces was strongly gender related, with males favouring less developed green space types (such as commonages and woodlands) and females for formal areas such domestic and institutional gardens and churchyards. Respondents also identified various challenges associated with using and accessing urban green spaces, with pollution, crime and lack of maintenance in particular. The study shows the importance of GIS as a mapping tool that can be used to provide information for ecological planning in rapidly changing urban environment. The research process generated several lessons that need to be taken into consideration when designing urban landscapes, most importantly relating to the diversity, quantity, quality and maintenance of urban green spaces.
- Full Text:
- Date Issued: 2019
An assessment of temporal changes in selective biological characteristics of chokka squid (Loligo reynaudii d’Órbigny, 1845)
- Authors: Mmethi, Mpho Audrey
- Date: 2020
- Subjects: Loligo reynaudii , Squids -- Morphology , Squids -- South Africa , Squid fisheries -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/143516 , vital:38253
- Description: The biological characteristics of chokka squid, Loligo reynaudii, sampled off the south coast of South Africa, were compared between 1994 and 2017 to ascertain any temporal changes using analysis of length frequency (LF) data over 15 years (1996–2017), and mantle length (ML) and total weight (TW) relationships over 9 years (1994–2016). To investigate feeding, two caecum colours were chosen for analysis (white: no food ingested, and yellow: six to seven hours after food ingestion). Other factors were kept constant throughout: similar sampling period of 60 days in spring-summer, similar depths and areas sampled, and identical maturity stage. Anecdotal evidence from fishers suggested that the length frequency and ML_TW relationship of chokka have changed over years, with possibilities to be linked to fishing activities and environmental conditions. Also, there is evidence in the published literature that both fisheries and environment may influence length distributions in populations of fish and cephalopods over time. The results from this study showed no significant differences between length frequencies over the time series. However, a significant decrease in length frequencies between 2014 and 2016 was noted when paired data was analysed by Anova (2014:2015, 2014:2016 and 2015:2016), which was initially noted in kernel density, Figure 2, hence an additional analysis was done. These changes were not linked to sea temperature (at 9 m, 14 m, 18 m, and 21 m depth strata), with not significant (P>0.05) results when temperature was analysed by t-test between 2002 and 2015. There was also a weak correlation between length frequency and the total squid catch in a given year (F Statistic (df = 1; 13) is 3.686 and 5.394 for males and females respectively, R² is 0.221 for males and 0.293 for females), but too weak to interpret, given the lack of other supporting data and the short time series. The ML_TW relationship showed no significant trends between the years for either sex. There was also no correlation between the ML_TW and total squid catch or temperature. A white caecum occurred significantly more often in males than in females (dof = 1; p < 0.05) from General Linear Model (GLM), indicating that the presence of non-feeding males in the spawning grounds may be linked to the behaviour of spawning squid.
- Full Text:
- Date Issued: 2020
- Authors: Mmethi, Mpho Audrey
- Date: 2020
- Subjects: Loligo reynaudii , Squids -- Morphology , Squids -- South Africa , Squid fisheries -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/143516 , vital:38253
- Description: The biological characteristics of chokka squid, Loligo reynaudii, sampled off the south coast of South Africa, were compared between 1994 and 2017 to ascertain any temporal changes using analysis of length frequency (LF) data over 15 years (1996–2017), and mantle length (ML) and total weight (TW) relationships over 9 years (1994–2016). To investigate feeding, two caecum colours were chosen for analysis (white: no food ingested, and yellow: six to seven hours after food ingestion). Other factors were kept constant throughout: similar sampling period of 60 days in spring-summer, similar depths and areas sampled, and identical maturity stage. Anecdotal evidence from fishers suggested that the length frequency and ML_TW relationship of chokka have changed over years, with possibilities to be linked to fishing activities and environmental conditions. Also, there is evidence in the published literature that both fisheries and environment may influence length distributions in populations of fish and cephalopods over time. The results from this study showed no significant differences between length frequencies over the time series. However, a significant decrease in length frequencies between 2014 and 2016 was noted when paired data was analysed by Anova (2014:2015, 2014:2016 and 2015:2016), which was initially noted in kernel density, Figure 2, hence an additional analysis was done. These changes were not linked to sea temperature (at 9 m, 14 m, 18 m, and 21 m depth strata), with not significant (P>0.05) results when temperature was analysed by t-test between 2002 and 2015. There was also a weak correlation between length frequency and the total squid catch in a given year (F Statistic (df = 1; 13) is 3.686 and 5.394 for males and females respectively, R² is 0.221 for males and 0.293 for females), but too weak to interpret, given the lack of other supporting data and the short time series. The ML_TW relationship showed no significant trends between the years for either sex. There was also no correlation between the ML_TW and total squid catch or temperature. A white caecum occurred significantly more often in males than in females (dof = 1; p < 0.05) from General Linear Model (GLM), indicating that the presence of non-feeding males in the spawning grounds may be linked to the behaviour of spawning squid.
- Full Text:
- Date Issued: 2020
An assessment of the effectiveness of the Crossways Farm Village constructed wetland in the treatment of domestic wastewater
- Authors: Silbernagl, Ryan
- Date: 2020
- Subjects: Crossways Farm Village FWS wetland (South Africa)-- Management , Sewage -- Purification -- South Africa , Wetland management -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/145011 , vital:38400
- Description: A mass balance study was conducted comparing inflowing and outflowing solute loads in order to calculate the treatment efficiency of a free water surface (FWS) constructed wetland used to treat domestic wastewater following primary treatment in an anaerobic reactor and oxidation in a rotating biological contractor. Water samples were taken at six locations down the length of the treatment system and analysed for nitrate nitrogen (NO3-N), nitrite nitrogen (NO2-N), ammonia nitrogen (NH4-N) and phosphorus as phosphate (PO4-P). Flow was determined using two V notch weirs combined with pressure transducers based on an empirically derived stage-discharge relationship. The concentration of each solute (g.m-3) multiplied by flow (m3.day-1) provides a measurement of the mass of each solute entering and leaving the treatment wetland such that the difference (inflow – outflow) indicates the nett storage in, or loss from, the wetland. In order to determine the water balance, apart from measuring surface inflows and outflows, rainfall was measured using an onsite rain gauge. Evapotranspirational losses were determined using the Penman-Monteith equation based on weather data collected at an onsite weather station. Other than water that entered the wetland via the primary water treatment works, surface inflows could be ignored as the wetland was sealed with a plastic liner, which also prevented groundwater inflow and outflow. Wetland outputs via surface outflow and evapotranspiration were then subtracted from wetland inputs to determine the water balance over the study period. Approximately 10.5% of water inputs into the hydrological mass balance calculation was not accounted for, which is considered to be accounted for by inaccuracy associated with the estimation of evapotranspiration and possibly by differences in water levels in the wetland at the start and end of the experiment. Total input, output and storage of NO3-N, NO2-N, NH4-N and PO4-P was calculated from April 2016 to September 2016 to give the treatment efficiency of the FWS wetland system. Results showed a 91.5% reduction in NO3-N, 76.6% reduction in NH4-N, and 88.8% reduction in PO4P between the inflow and outflow. Wetland sediment and vegetation (Typha capensis) samples were also analysed for nitrogen and phosphorus content to give an estimate of nutrient stocks/storage accumulated in plant tissues and sediments over the lifespan of the wetland. Standing stock calculations showed that a total of 450.1kg of nitrogen is stored in the wetlands, of which 69.3kg is stored in wetland sediments. Wetland phosphorus retention was found to be significantly lower with a total of 57.1kg of phosphorus, of which 77.4% was stored in sediments, indicating that wetland sediments comprise the largest store and therefore removal pathway of nutrients in the Crossways Farm Village FWS wetland.
- Full Text:
- Date Issued: 2020
- Authors: Silbernagl, Ryan
- Date: 2020
- Subjects: Crossways Farm Village FWS wetland (South Africa)-- Management , Sewage -- Purification -- South Africa , Wetland management -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/145011 , vital:38400
- Description: A mass balance study was conducted comparing inflowing and outflowing solute loads in order to calculate the treatment efficiency of a free water surface (FWS) constructed wetland used to treat domestic wastewater following primary treatment in an anaerobic reactor and oxidation in a rotating biological contractor. Water samples were taken at six locations down the length of the treatment system and analysed for nitrate nitrogen (NO3-N), nitrite nitrogen (NO2-N), ammonia nitrogen (NH4-N) and phosphorus as phosphate (PO4-P). Flow was determined using two V notch weirs combined with pressure transducers based on an empirically derived stage-discharge relationship. The concentration of each solute (g.m-3) multiplied by flow (m3.day-1) provides a measurement of the mass of each solute entering and leaving the treatment wetland such that the difference (inflow – outflow) indicates the nett storage in, or loss from, the wetland. In order to determine the water balance, apart from measuring surface inflows and outflows, rainfall was measured using an onsite rain gauge. Evapotranspirational losses were determined using the Penman-Monteith equation based on weather data collected at an onsite weather station. Other than water that entered the wetland via the primary water treatment works, surface inflows could be ignored as the wetland was sealed with a plastic liner, which also prevented groundwater inflow and outflow. Wetland outputs via surface outflow and evapotranspiration were then subtracted from wetland inputs to determine the water balance over the study period. Approximately 10.5% of water inputs into the hydrological mass balance calculation was not accounted for, which is considered to be accounted for by inaccuracy associated with the estimation of evapotranspiration and possibly by differences in water levels in the wetland at the start and end of the experiment. Total input, output and storage of NO3-N, NO2-N, NH4-N and PO4-P was calculated from April 2016 to September 2016 to give the treatment efficiency of the FWS wetland system. Results showed a 91.5% reduction in NO3-N, 76.6% reduction in NH4-N, and 88.8% reduction in PO4P between the inflow and outflow. Wetland sediment and vegetation (Typha capensis) samples were also analysed for nitrogen and phosphorus content to give an estimate of nutrient stocks/storage accumulated in plant tissues and sediments over the lifespan of the wetland. Standing stock calculations showed that a total of 450.1kg of nitrogen is stored in the wetlands, of which 69.3kg is stored in wetland sediments. Wetland phosphorus retention was found to be significantly lower with a total of 57.1kg of phosphorus, of which 77.4% was stored in sediments, indicating that wetland sediments comprise the largest store and therefore removal pathway of nutrients in the Crossways Farm Village FWS wetland.
- Full Text:
- Date Issued: 2020
An assessment of the invasion state and fisheries suitability in four dams and a natural lake in the Western Cape, South Africa
- Authors: Dredge, Brendon Neville
- Date: 2016
- Subjects: Introduced organisms Fishery management -- South Africa -- Western Cape Fishes -- Conservation -- South Africa -- Western Cape Introduced fishes -- South Africa -- Western Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/69114 , vital:29391
- Description: Despite more than a century of introductions, fish invasions are poorly understood in South Africa. This thesis aims to: (1) provide baseline information on the fish fauna in five inland water bodies (four dams: Theewaterskloof, Clanwilliam, Quaggaskloof, and Voelvlei and a natural lake, Groenvlei) in the Western Cape; (2) determine which species were established and provide a baseline of abundance and size structure for monitoring and, (3) make preliminary recommendations for a fishery. First, criteria for determining establishment were developed by undertaking a full biological assessment of bluegill Lepomis macrochirus, a data-poor species in South Africa. This included the assessment of growth rate using validated estimates of age derived from otoliths in two dams (Clanwilliam Dam: Lt=335.9(1−eo.113(t+1.06)); Groenvlei: Lt=287.2(1-e−0.171(t+0.54)). Length at 50% maturity was similar for males (146 mmFL) and females (147 mmFL). Length frequency analysis combined with data on the age and growth and reproduction demonstrated that established populations of bluegill contained several age cohorts as well as mature and juvenile fishes. A meta-analysis was conducted to: (1) compile a list of initial stocking dates for all alien fishes in each waterbody and (2) use angler tournament data to assess for additional species and persistence over time. Data from the meta-analysis was combined with ichthyological survey data to determine establishment success. These data demonstrated that nine non-native species had established in the five water bodies. Clanwilliam Dam had the largest number (7) of non-native species established, Groenvlei (5) and Theewaterskloof, Brandvlei and Voelvlei the lowest with four species. The state of invasion of each species in the province showed that all nine species are categorised as invasive. This information on establishment was then integrated into a framework for rapidly determining what type of fishery would be most suitable for the 5 waterbodies. Potential yield was estimated using morphoedaphic models, were 260 t/yr for Theewaterskloof Dam, 93 t/yr for Voelvlei, 81 t/yr for Brandvlei, 59 t/yr for Groenvlei and 55 t/yr for Groenvlei. The CPUE for Groenvlei was the highest in gill nets with 1.32 ± 1.94 kg/h, then Voelvlei 1.05 ± 1.34 kg/h followed by Brandvlei (0.84 ± 1.48 kg/h), Clanwilliam (0.71 ± 1.55 kg/h) and lastly Theewaterskloof (0.36 ± 0.41 kg/h). Only Theewaterskloof could produce in excess of 100 t/yr but less than 400 t/yr of fish making it suitable for a small scale fishery. The CPUE values of Theewaterskloof were the lowest and a gill net fishery on this water body may not produce sufficient fish for the fishery. All water bodies had a high recreational angling usage, the opening of a small scale fishery could be detrimental to this industry. Subsistence and recreational anglers should be promoted with the possibility of a long line industry targeting Clarias gariepinus.
- Full Text:
- Date Issued: 2016
- Authors: Dredge, Brendon Neville
- Date: 2016
- Subjects: Introduced organisms Fishery management -- South Africa -- Western Cape Fishes -- Conservation -- South Africa -- Western Cape Introduced fishes -- South Africa -- Western Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/69114 , vital:29391
- Description: Despite more than a century of introductions, fish invasions are poorly understood in South Africa. This thesis aims to: (1) provide baseline information on the fish fauna in five inland water bodies (four dams: Theewaterskloof, Clanwilliam, Quaggaskloof, and Voelvlei and a natural lake, Groenvlei) in the Western Cape; (2) determine which species were established and provide a baseline of abundance and size structure for monitoring and, (3) make preliminary recommendations for a fishery. First, criteria for determining establishment were developed by undertaking a full biological assessment of bluegill Lepomis macrochirus, a data-poor species in South Africa. This included the assessment of growth rate using validated estimates of age derived from otoliths in two dams (Clanwilliam Dam: Lt=335.9(1−eo.113(t+1.06)); Groenvlei: Lt=287.2(1-e−0.171(t+0.54)). Length at 50% maturity was similar for males (146 mmFL) and females (147 mmFL). Length frequency analysis combined with data on the age and growth and reproduction demonstrated that established populations of bluegill contained several age cohorts as well as mature and juvenile fishes. A meta-analysis was conducted to: (1) compile a list of initial stocking dates for all alien fishes in each waterbody and (2) use angler tournament data to assess for additional species and persistence over time. Data from the meta-analysis was combined with ichthyological survey data to determine establishment success. These data demonstrated that nine non-native species had established in the five water bodies. Clanwilliam Dam had the largest number (7) of non-native species established, Groenvlei (5) and Theewaterskloof, Brandvlei and Voelvlei the lowest with four species. The state of invasion of each species in the province showed that all nine species are categorised as invasive. This information on establishment was then integrated into a framework for rapidly determining what type of fishery would be most suitable for the 5 waterbodies. Potential yield was estimated using morphoedaphic models, were 260 t/yr for Theewaterskloof Dam, 93 t/yr for Voelvlei, 81 t/yr for Brandvlei, 59 t/yr for Groenvlei and 55 t/yr for Groenvlei. The CPUE for Groenvlei was the highest in gill nets with 1.32 ± 1.94 kg/h, then Voelvlei 1.05 ± 1.34 kg/h followed by Brandvlei (0.84 ± 1.48 kg/h), Clanwilliam (0.71 ± 1.55 kg/h) and lastly Theewaterskloof (0.36 ± 0.41 kg/h). Only Theewaterskloof could produce in excess of 100 t/yr but less than 400 t/yr of fish making it suitable for a small scale fishery. The CPUE values of Theewaterskloof were the lowest and a gill net fishery on this water body may not produce sufficient fish for the fishery. All water bodies had a high recreational angling usage, the opening of a small scale fishery could be detrimental to this industry. Subsistence and recreational anglers should be promoted with the possibility of a long line industry targeting Clarias gariepinus.
- Full Text:
- Date Issued: 2016
An assessment of the wild cyclopia subternata (vleitee) resource
- Authors: Van der Walt, Wouter
- Date: 2021-04
- Subjects: Legumes -- South Africa , Fynbos -- South Africa , Fynbos ecology -- South Africa , Fynbos -- Harvesting -- South Africa , Biodiversity conservation -- South Africa , Traditional ecological knowledge -- South Africa , Wild Cyclopia Subternata (Vleitee) , Honeybush tea industry
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/176874 , vital:42767
- Description: Cyclopia spp. is used for the production of Honeybush tea, an herbal tea which is used in many cases as a substitute for rooibos tea. The wild harvesting of this fynbos plant still brings in up to 85% of the annual crop and as such needs to be carefully monitored in order to avoid over harvesting and the destruction of biodiversity within the Eastern and Western Cape mountain regions of Southern Africa. Due to the concerns of overharvesting and unsuitable use of the wild resource issues of supply security have been raised. There is a lack of formal knowledge relating to the plant, its harvesting, the industry and its economic potential. This study aimed to amend this scarcity by contributing to the knowledge of C. subternata as a wild harvested plant, the physical environment favoured by C. subternata, sustainable use through harvesting of the wild plant and harvesting methods specific to this honeybush species. The research concludes by presenting a guideline for best harvest practices of the wild C. subternata plant. , Thesis (MSc) -- Faculty of Science, Department of Geography, 2021
- Full Text:
- Date Issued: 2021-04
- Authors: Van der Walt, Wouter
- Date: 2021-04
- Subjects: Legumes -- South Africa , Fynbos -- South Africa , Fynbos ecology -- South Africa , Fynbos -- Harvesting -- South Africa , Biodiversity conservation -- South Africa , Traditional ecological knowledge -- South Africa , Wild Cyclopia Subternata (Vleitee) , Honeybush tea industry
- Language: English
- Type: thesis , text , Masters , MSc
- Identifier: http://hdl.handle.net/10962/176874 , vital:42767
- Description: Cyclopia spp. is used for the production of Honeybush tea, an herbal tea which is used in many cases as a substitute for rooibos tea. The wild harvesting of this fynbos plant still brings in up to 85% of the annual crop and as such needs to be carefully monitored in order to avoid over harvesting and the destruction of biodiversity within the Eastern and Western Cape mountain regions of Southern Africa. Due to the concerns of overharvesting and unsuitable use of the wild resource issues of supply security have been raised. There is a lack of formal knowledge relating to the plant, its harvesting, the industry and its economic potential. This study aimed to amend this scarcity by contributing to the knowledge of C. subternata as a wild harvested plant, the physical environment favoured by C. subternata, sustainable use through harvesting of the wild plant and harvesting methods specific to this honeybush species. The research concludes by presenting a guideline for best harvest practices of the wild C. subternata plant. , Thesis (MSc) -- Faculty of Science, Department of Geography, 2021
- Full Text:
- Date Issued: 2021-04
An electrospun nanofiber colorimetric probe for detection of Alkaline Phosphatase for diagnosis of liver toxicity
- Authors: Mohale, Mamello
- Date: 2014
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/54532 , vital:26581
- Description: A novel electrospun nanofiber colorimetric probe for the detection of Alkaline Phosphatase (ALP) for diagnosis of liver toxicity was developed through electrospinning of a para nitrophenyl phosphate (pNPP) functionalised nylon polymer. The chemical stability of the enzyme substrate (pNPP) and its two products (para nitrophenol (pNP) and para nitrophenolate (pNPL)) was evaluated in biological (pH 7.4), acidic (pH 2) and alkaline (pH 9) pH, respectively. Enzyme kinetics models of Michaelis Menten (MM) and Lineweaver Burk (LB) were used to characterise free ALP. Solution and nanofiber assaying of free ALP and 10x diluted serum (spiked with ALP) was also carried out. The results demonstrated that pNPP and pNP were colourless while pNPL was yellow which indicated that all reagents were chemically stable. In addition, the chromophore of pNPL exhibited a strong molar extinction coefficient (ε) of 18,458 M-1 cm-1. LB plot being the most accurate compared to MM showed Vmax, Km and excess substrate concentration of 5.5 × 10-3 μmol/min-1, 0.025 mM and 0.25 mM respectively. Solution and nanofiber assaying of free ALP and serum confirmed a direct proportional correlation between the pNPL yellow colour intensity and enzyme activity up to 858 IU/L and 820 IU/L respectively. The dipping of the nanofiber layer into solution showed that the leaching rate of pNPP was extremely high at 1.37 × 10-3 A/min-1 as was observed after only the first 0.25 min interval. However, this was not of great concern since it was also observed that administration of the sample (20 μL) by a dropwise method minimised leaching compared to dipping. The preliminary findings on the effect of temperature on the chemical stability of pNPP indicated that it was stable below temperatures of 40°C while it hydrolysed at 80°C. Therefore a sensitive, rapid and simple colorimetric probe for the detection of ALP was developed. The probe exhibited characteristics that make it suitable to be incorporated into point of care colorimetric liver toxicity diagnostic devices for applications in resource poor settings and telemedicine.
- Full Text:
- Date Issued: 2014
- Authors: Mohale, Mamello
- Date: 2014
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/54532 , vital:26581
- Description: A novel electrospun nanofiber colorimetric probe for the detection of Alkaline Phosphatase (ALP) for diagnosis of liver toxicity was developed through electrospinning of a para nitrophenyl phosphate (pNPP) functionalised nylon polymer. The chemical stability of the enzyme substrate (pNPP) and its two products (para nitrophenol (pNP) and para nitrophenolate (pNPL)) was evaluated in biological (pH 7.4), acidic (pH 2) and alkaline (pH 9) pH, respectively. Enzyme kinetics models of Michaelis Menten (MM) and Lineweaver Burk (LB) were used to characterise free ALP. Solution and nanofiber assaying of free ALP and 10x diluted serum (spiked with ALP) was also carried out. The results demonstrated that pNPP and pNP were colourless while pNPL was yellow which indicated that all reagents were chemically stable. In addition, the chromophore of pNPL exhibited a strong molar extinction coefficient (ε) of 18,458 M-1 cm-1. LB plot being the most accurate compared to MM showed Vmax, Km and excess substrate concentration of 5.5 × 10-3 μmol/min-1, 0.025 mM and 0.25 mM respectively. Solution and nanofiber assaying of free ALP and serum confirmed a direct proportional correlation between the pNPL yellow colour intensity and enzyme activity up to 858 IU/L and 820 IU/L respectively. The dipping of the nanofiber layer into solution showed that the leaching rate of pNPP was extremely high at 1.37 × 10-3 A/min-1 as was observed after only the first 0.25 min interval. However, this was not of great concern since it was also observed that administration of the sample (20 μL) by a dropwise method minimised leaching compared to dipping. The preliminary findings on the effect of temperature on the chemical stability of pNPP indicated that it was stable below temperatures of 40°C while it hydrolysed at 80°C. Therefore a sensitive, rapid and simple colorimetric probe for the detection of ALP was developed. The probe exhibited characteristics that make it suitable to be incorporated into point of care colorimetric liver toxicity diagnostic devices for applications in resource poor settings and telemedicine.
- Full Text:
- Date Issued: 2014
An ergonomics approach to understanding perceived barriers to the provision of high-quality healthcare: a Sarah Baartman District clinics case study
- Authors: Card, Jason
- Date: 2020
- Subjects: Medical care -- South Africa -- Eastern Cape , Public health -- South Africa -- Eastern Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/170536 , vital:41933
- Description: Background:The complex nature of healthcare systemsoftenresultsinthe emergence of context-specific barriers that limit the ability for healthcare stakeholders to ensure safe and effective care delivery. In low-to middle-income (LMIC) countries, such as South Africa (SA), limited financial, material and human resources coupled withpoor infrastructure and poor public health determinants, includingpoverty andpoor education, affectthe ability to maintain andimprove on quality care outcomes.Understanding what different stakeholders perceive as barriers, and if these barriers are understood at different levels, is therefore important when attempting to mitigate the risk for unsafe or inefficient care delivery. Human Factors and Ergonomics (HFE) adoptssystems and participatory approaches for the exploration, analysis, and design of socio-technical systems to optimize both human wellbeing and system performance.The barriers to safe and effective healthcare delivery, from an HFE perspective, are not known in the South African context, particularly in parts of the Eastern Cape Province. Elucidatingthesebarriers, even if self-reported,may guidefuture efforts aimed at mitigating risks.The purpose of this study, therefore,wasto explore and highlight the perceived systemic barriers to local and national healthcare delivery, within the Sarah Baartman District in the Eastern Cape Province of South Africa.Methods: Ashort discussion aimed at introducing HFE and components of the Work Systems Model, followed by a survey that captured participant demographics, job characteristics, the perceived national and local systemic barriers, and proposed solutions, was administered withhealthcare stakeholders from 14 primary healthcare facilities and 1 department office within the Sarah Baartman District.Participants (n=120) included management, pharmacy, administration, maintenance, community-and home-based care and nursing staff.Data from the surveys were thematically analysed and categorised according to components of the work system model (Carayon, 2009) and respective workgroup.Results: The findings revealed many overlapping,systemic barriersthat includedshortages of staff, poor management and leadership, a lack of equipmentand basic necessities, poor infrastructure, patient complexity,and high workloads. The results further indicate that the way in which the reported barriers affect worksystem interactionsand performance are unique to different workgroups. Stakeholders iiproposedthat,among others, the absorption of contract workers, the provision of training and adequate human and medical resources and the maintenance of facilities may mitigate the barriers and improve healthcare delivery.Conclusion: The findings highlight a myriad of perceived systemic barriers perceived in the Sarah Baartman district, some of which were fundamental for the effective function of any healthcare system. These barriers may have wide-spread implications for stakeholders at all levels, ultimately affecting the performance, satisfaction and safety and the quality of care. It is especially important to consider these barriers in light of the COVID-19 epidemic, which emerged throughout this study and the major threat it presents to South African healthcare systems. Future research should aim to explore how these barriers interact to contribute to processes and outcomes, as well as explore the perceptions at provincial and national levels in order to better identify areas and strategies for improvement.
- Full Text:
- Date Issued: 2020
- Authors: Card, Jason
- Date: 2020
- Subjects: Medical care -- South Africa -- Eastern Cape , Public health -- South Africa -- Eastern Cape
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/170536 , vital:41933
- Description: Background:The complex nature of healthcare systemsoftenresultsinthe emergence of context-specific barriers that limit the ability for healthcare stakeholders to ensure safe and effective care delivery. In low-to middle-income (LMIC) countries, such as South Africa (SA), limited financial, material and human resources coupled withpoor infrastructure and poor public health determinants, includingpoverty andpoor education, affectthe ability to maintain andimprove on quality care outcomes.Understanding what different stakeholders perceive as barriers, and if these barriers are understood at different levels, is therefore important when attempting to mitigate the risk for unsafe or inefficient care delivery. Human Factors and Ergonomics (HFE) adoptssystems and participatory approaches for the exploration, analysis, and design of socio-technical systems to optimize both human wellbeing and system performance.The barriers to safe and effective healthcare delivery, from an HFE perspective, are not known in the South African context, particularly in parts of the Eastern Cape Province. Elucidatingthesebarriers, even if self-reported,may guidefuture efforts aimed at mitigating risks.The purpose of this study, therefore,wasto explore and highlight the perceived systemic barriers to local and national healthcare delivery, within the Sarah Baartman District in the Eastern Cape Province of South Africa.Methods: Ashort discussion aimed at introducing HFE and components of the Work Systems Model, followed by a survey that captured participant demographics, job characteristics, the perceived national and local systemic barriers, and proposed solutions, was administered withhealthcare stakeholders from 14 primary healthcare facilities and 1 department office within the Sarah Baartman District.Participants (n=120) included management, pharmacy, administration, maintenance, community-and home-based care and nursing staff.Data from the surveys were thematically analysed and categorised according to components of the work system model (Carayon, 2009) and respective workgroup.Results: The findings revealed many overlapping,systemic barriersthat includedshortages of staff, poor management and leadership, a lack of equipmentand basic necessities, poor infrastructure, patient complexity,and high workloads. The results further indicate that the way in which the reported barriers affect worksystem interactionsand performance are unique to different workgroups. Stakeholders iiproposedthat,among others, the absorption of contract workers, the provision of training and adequate human and medical resources and the maintenance of facilities may mitigate the barriers and improve healthcare delivery.Conclusion: The findings highlight a myriad of perceived systemic barriers perceived in the Sarah Baartman district, some of which were fundamental for the effective function of any healthcare system. These barriers may have wide-spread implications for stakeholders at all levels, ultimately affecting the performance, satisfaction and safety and the quality of care. It is especially important to consider these barriers in light of the COVID-19 epidemic, which emerged throughout this study and the major threat it presents to South African healthcare systems. Future research should aim to explore how these barriers interact to contribute to processes and outcomes, as well as explore the perceptions at provincial and national levels in order to better identify areas and strategies for improvement.
- Full Text:
- Date Issued: 2020
An exploration of the overlap between open source threat intelligence and active internet background radiation
- Authors: Pearson, Deon Turner
- Date: 2020
- Subjects: Computer networks -- Security measures , Computer networks -- Monitoring , Malware (Computer software) , TCP/IP (Computer network protocol) , Open source intelligence
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/103802 , vital:32299
- Description: Organisations and individuals are facing increasing persistent threats on the Internet from worms, port scanners, and malicious software (malware). These threats are constantly evolving as attack techniques are discovered. To aid in the detection and prevention of such threats, and to stay ahead of the adversaries conducting the attacks, security specialists are utilising Threat Intelligence (TI) data in their defense strategies. TI data can be obtained from a variety of different sources such as private routers, firewall logs, public archives, and public or private network telescopes. However, at the rate and ease at which TI is produced and published, specifically Open Source Threat Intelligence (OSINT), the quality is dropping, resulting in fragmented, context-less and variable data. This research utilised two sets of TI data, a collection of OSINT and active Internet Background Radiation (IBR). The data was collected over a period of 12 months, from 37 publicly available OSINT datasets and five IBR datasets. Through the identification and analysis of common data between the OSINT and IBR datasets, this research was able to gain insight into how effective OSINT is at detecting and potentially reducing ongoing malicious Internet traffic. As part of this research, a minimal framework for the collection, processing/analysis, and distribution of OSINT was developed and tested. The research focused on exploring areas in common between the two datasets, with the intention of creating an enriched, contextualised, and reduced set of malicious source IP addresses that could be published for consumers to use in their own environment. The findings of this research pointed towards a persistent group of IP addresses observed on both datasets, over the period under research. Using these persistent IP addresses, the research was able to identify specific services being targeted. Amongst these persistent IP addresses were significant packets from Mirai like IoT Malware on port 23/tcp and 2323/tcp as well as general scanning activity on port 445/TCP.
- Full Text:
- Date Issued: 2020
- Authors: Pearson, Deon Turner
- Date: 2020
- Subjects: Computer networks -- Security measures , Computer networks -- Monitoring , Malware (Computer software) , TCP/IP (Computer network protocol) , Open source intelligence
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/103802 , vital:32299
- Description: Organisations and individuals are facing increasing persistent threats on the Internet from worms, port scanners, and malicious software (malware). These threats are constantly evolving as attack techniques are discovered. To aid in the detection and prevention of such threats, and to stay ahead of the adversaries conducting the attacks, security specialists are utilising Threat Intelligence (TI) data in their defense strategies. TI data can be obtained from a variety of different sources such as private routers, firewall logs, public archives, and public or private network telescopes. However, at the rate and ease at which TI is produced and published, specifically Open Source Threat Intelligence (OSINT), the quality is dropping, resulting in fragmented, context-less and variable data. This research utilised two sets of TI data, a collection of OSINT and active Internet Background Radiation (IBR). The data was collected over a period of 12 months, from 37 publicly available OSINT datasets and five IBR datasets. Through the identification and analysis of common data between the OSINT and IBR datasets, this research was able to gain insight into how effective OSINT is at detecting and potentially reducing ongoing malicious Internet traffic. As part of this research, a minimal framework for the collection, processing/analysis, and distribution of OSINT was developed and tested. The research focused on exploring areas in common between the two datasets, with the intention of creating an enriched, contextualised, and reduced set of malicious source IP addresses that could be published for consumers to use in their own environment. The findings of this research pointed towards a persistent group of IP addresses observed on both datasets, over the period under research. Using these persistent IP addresses, the research was able to identify specific services being targeted. Amongst these persistent IP addresses were significant packets from Mirai like IoT Malware on port 23/tcp and 2323/tcp as well as general scanning activity on port 445/TCP.
- Full Text:
- Date Issued: 2020
An explorative study of Makana local football association coaches characteristics, experiences and needs
- Authors: Callow, Gavin
- Date: 2020
- Subjects: Makana Local Football Association (South Africa) , Football -- Coaching -- South Africa , Football coaches -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/138785 , vital:37672
- Description: Introduction: Sports participation has been associated with a number of benefits to young athletes, outside of purely physical health. One of the key components of a successful sports talent identification and development program is effective coaching. A foundation of effective coaching is the coach’s knowledge which can be developed through formal, non-formal and informal means of education. The majority of coach education literature has however focused on coaches from developed countries. Limited studies have looked at the educational experiences and needs of South African coaches, particularly football coaches. The purpose of the current investigation is to establish Local Football Association (LFA) coaches’ perceptions of their educational backgrounds and what knowledge they deem important to be effective coaches. Method: A mixed methods approach was used in which (n=25) Makana LFA coaches answered a questionnaire with the aim of identifying their educational histories and what their current educational needs were. A semi-structured interview was also implemented in which some of the respondents (n=4) were asked more in-depth questions around the same topics, to create a more complete coaching profile. Results: The questionnaire responses highlighted that only 8% of the coaches possess a formal coaching qualification and all of the coaches work on a volunteer basis. Previous experience as a player is the chief source of knowledge for Makana LFA coaches. Not having enough available time is the main perceived barrier for 56% of participants to seeking out further educational opportunities. Fundamentals of coaching was selected by 56% of the coaches as a key subject they want to learn more about. Findings from the interview demonstrate that participants coach multiple teams and often have to rely on senior players to take up assistant coach positions, as well as managing their time effectively to work with all their teams. Informal education is the main source of information for the coaches which includes asking for advice, reading coaching manuals or having a mentor. The coaches value all 3 forms of education, however non-formal workshops are favoured. This is due to all of the coaches already having some form of informal learning experience and formal learning opportunities being too costly to pursue. A combination of lectures, practical sessions and group discussions is desired as a delivery method of coaching knowledge. Discussion: The level of coaching qualifications in the LFA is low, this may have significant implications for talent identification and development in the Sarah Baartman region. All the coaches are volunteer coaches, who primarily rely on informal means of coaching education. ‘Time’ was indicated to be a major barrier, to coaches seeking out educational opportunities. Coaches indicated that they would benefit from a coaching program if it took into consideration their needs, such as wanting to learn more about interpersonal and intrapersonal awareness. Conclusion: If local coaching programs are to be effective, they must reflect the educational needs of their community.
- Full Text:
- Date Issued: 2020
- Authors: Callow, Gavin
- Date: 2020
- Subjects: Makana Local Football Association (South Africa) , Football -- Coaching -- South Africa , Football coaches -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/138785 , vital:37672
- Description: Introduction: Sports participation has been associated with a number of benefits to young athletes, outside of purely physical health. One of the key components of a successful sports talent identification and development program is effective coaching. A foundation of effective coaching is the coach’s knowledge which can be developed through formal, non-formal and informal means of education. The majority of coach education literature has however focused on coaches from developed countries. Limited studies have looked at the educational experiences and needs of South African coaches, particularly football coaches. The purpose of the current investigation is to establish Local Football Association (LFA) coaches’ perceptions of their educational backgrounds and what knowledge they deem important to be effective coaches. Method: A mixed methods approach was used in which (n=25) Makana LFA coaches answered a questionnaire with the aim of identifying their educational histories and what their current educational needs were. A semi-structured interview was also implemented in which some of the respondents (n=4) were asked more in-depth questions around the same topics, to create a more complete coaching profile. Results: The questionnaire responses highlighted that only 8% of the coaches possess a formal coaching qualification and all of the coaches work on a volunteer basis. Previous experience as a player is the chief source of knowledge for Makana LFA coaches. Not having enough available time is the main perceived barrier for 56% of participants to seeking out further educational opportunities. Fundamentals of coaching was selected by 56% of the coaches as a key subject they want to learn more about. Findings from the interview demonstrate that participants coach multiple teams and often have to rely on senior players to take up assistant coach positions, as well as managing their time effectively to work with all their teams. Informal education is the main source of information for the coaches which includes asking for advice, reading coaching manuals or having a mentor. The coaches value all 3 forms of education, however non-formal workshops are favoured. This is due to all of the coaches already having some form of informal learning experience and formal learning opportunities being too costly to pursue. A combination of lectures, practical sessions and group discussions is desired as a delivery method of coaching knowledge. Discussion: The level of coaching qualifications in the LFA is low, this may have significant implications for talent identification and development in the Sarah Baartman region. All the coaches are volunteer coaches, who primarily rely on informal means of coaching education. ‘Time’ was indicated to be a major barrier, to coaches seeking out educational opportunities. Coaches indicated that they would benefit from a coaching program if it took into consideration their needs, such as wanting to learn more about interpersonal and intrapersonal awareness. Conclusion: If local coaching programs are to be effective, they must reflect the educational needs of their community.
- Full Text:
- Date Issued: 2020