Factors That Contribute to Human Security Risks at Eskom Facilities in South Africa

Author(s):  
Govender , Remone ◽  
Govender , Doraval
Author(s):  
Bill (William) Dixon

Review of: Andrew Faull, Police Work and Identity: A South African Ethnography, Abingdon, Routledge, 2018 ISBN: 978-1-138-23329-4 Sindiso Mnisi Weeks, Access to Justice and Human Security: Cultural Contradictions in Rural South Africa, Abingdon, Routledge, 2018 ISBN: 978-1-138-57860-9


Daedalus ◽  
2021 ◽  
Vol 150 (4) ◽  
pp. 181-193
Author(s):  
Oscar Gakuo Mwangi

Abstract The Lesotho Highlands Water Project, which exports water to South Africa, has enhanced the unequal structural relationship that exists between both states. Lesotho, one of the few countries in the world that exports water, has transformed from one of the largest sources of labor for South Africa to a water reservoir for South Africa. Though the project provides mutual strategic economic and political benefits to both riparian states, its construction has negatively affected environmental and human security in Lesotho. Due to hydropolitics, environmental threats in Lesotho caused by the project's construction are overlooked. These threats, which have devastating effects on resettled communities and the country's ecosystem, also constitute a threat to domestic and international security. The desire to prevent interstate conflict and maintain cooperation between the two riparian states further enhances the lopsided interstate relationship.


2011 ◽  
pp. 1254-1265
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


2008 ◽  
pp. 2704-2723
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


2019 ◽  
Vol 6 (2) ◽  
pp. 51-73
Author(s):  
Samuel Fikiri Cinini ◽  
Balgobind Shanta Singh

Author(s):  
Blessing Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa’s bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa’s readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa’s information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


Sign in / Sign up

Export Citation Format

Share Document