%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 34 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240511031345+00'00') /ModDate (D:20240511031345+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R 32 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 7674 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 74.959 521.469 671.775 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 75.334 520.719 671.025 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(REDCAP LAUNCHED FOR RESEARCHERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(SU Research Support Services are pleased to announce the launch of Stellenbosch Universitys Research Electronic Data )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(Capture \(REDCap\) service. REDCap is a secure web application for building and managing online surveys and databases )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(and can be configured to meet compliance standards such as HIPAA, 21 CFR Part 11, and FISMA.)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(REDCap is a tool for capturing confidential information. This requires planned and careful management in order to protect )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(the participants personal data. For data security purposes, exporting of data from the platform is discouraged, but if )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(necessary, security and confidentiality will depend on correct tagging of identifier fields in the data dictionary and correct )] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [(assigning of user rights for export by the Data Manager.)] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(Ethics approval is required from an appropriate Stellenbosch University )] TJ ET 0.373 0.169 0.255 rg BT 346.622 469.110 Td /F3 9.0 Tf [(REC)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 346.622 467.959 m 365.621 467.959 l S 0.400 0.400 0.400 rg BT 365.621 469.110 Td /F3 9.0 Tf [( if working with humans, human material )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(\(such as blood or tissue\) or their data, including secondary use of such materials \(this is defined as the reuse in a new )] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(project of previously collected data or material\). Please contact your local ethics office if you have not yet applied for ethics )] TJ ET BT 61.016 436.143 Td /F3 9.0 Tf [(clearance. The application will include questions related to how you manage, store and use data, including data entered )] TJ ET BT 61.016 425.154 Td /F3 9.0 Tf [(into REDCap. It may also require that you submit the data dictionary and an assigned roles list. Particular attention should )] TJ ET BT 61.016 414.165 Td /F3 9.0 Tf [(be paid to which identifiers you intend to collect and how you will maintain confidentiality if exporting identifiable data.)] TJ ET BT 61.016 394.176 Td /F3 9.0 Tf [(Adequate and appropriate consent is an essential requisite of REC approval. If you are collecting and storing personal )] TJ ET BT 61.016 383.187 Td /F3 9.0 Tf [(identifiers, it must be reflected in the consent form. If you intend to share or reuse data or material, it must be consented to )] TJ ET BT 61.016 372.198 Td /F3 9.0 Tf [(when the data or material is collected, otherwise, it cannot be used or shared in future research projects.)] TJ ET BT 61.016 352.209 Td /F3 9.0 Tf [(To access this service, register on )] TJ ET 0.373 0.169 0.255 rg BT 199.562 352.209 Td /F3 9.0 Tf [(redcap.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 199.562 351.058 m 268.097 351.058 l S 0.400 0.400 0.400 rg BT 268.097 352.209 Td /F3 9.0 Tf [( with your active SU username and password. As part of the )] TJ ET BT 61.016 341.220 Td /F3 9.0 Tf [(registration process, you will receive an email verification request. This auto-generated email will include instructions on )] TJ ET BT 61.016 330.231 Td /F3 9.0 Tf [(how to set up Google Authenticator. For security reasons, Google Authenticator )] TJ ET BT 380.174 330.231 Td /F4 9.0 Tf [(must)] TJ ET BT 401.675 330.231 Td /F3 9.0 Tf [( be used with REDCap to ensure )] TJ ET BT 61.016 319.242 Td /F3 9.0 Tf [(multi-factor authentication.)] TJ ET BT 61.016 299.253 Td /F3 9.0 Tf [(A training instance of REDCap is also available on )] TJ ET 0.373 0.169 0.255 rg BT 264.101 299.253 Td /F3 9.0 Tf [(redcaptest.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 264.101 298.102 m 347.144 298.102 l S 0.400 0.400 0.400 rg BT 347.144 299.253 Td /F3 9.0 Tf [(, where you can explore REDCap functionality and )] TJ ET BT 61.016 288.264 Td /F3 9.0 Tf [(present training sessions. Real data may not be captured in the training environment. Google Authenticator has to be set )] TJ ET BT 61.016 277.275 Td /F3 9.0 Tf [(up separately for the training environment and the live environment.)] TJ ET BT 61.016 257.286 Td /F3 9.0 Tf [(SU does not provide institutional support for the day-to-day operational use of REDCap. It is a researchers responsibility )] TJ ET BT 61.016 246.297 Td /F3 9.0 Tf [(to familiarise themselves with the software, however, )] TJ ET 0.373 0.169 0.255 rg BT 273.587 246.297 Td /F3 9.0 Tf [(embedded video guidance)] TJ ET 0.18 w 0 J [ ] 0 d 273.587 245.146 m 379.148 245.146 l S 0.400 0.400 0.400 rg BT 379.148 246.297 Td /F3 9.0 Tf [( and numerous )] TJ ET 0.373 0.169 0.255 rg BT 441.680 246.297 Td /F3 9.0 Tf [(FAQs)] TJ ET 0.18 w 0 J [ ] 0 d 441.680 245.146 m 464.684 245.146 l S 0.400 0.400 0.400 rg BT 464.684 246.297 Td /F3 9.0 Tf [( are available online. )] TJ ET BT 61.016 235.308 Td /F3 9.0 Tf [(SU-specific guidelines are available )] TJ ET 0.373 0.169 0.255 rg BT 205.565 235.308 Td /F3 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 205.565 234.157 m 223.574 234.157 l S 0.400 0.400 0.400 rg BT 223.574 235.308 Td /F3 9.0 Tf [(. For fee-based REDCap advanced support, contact )] TJ ET 0.373 0.169 0.255 rg BT 433.175 235.308 Td /F3 9.0 Tf [(redcap@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 433.175 234.157 m 508.343 234.157 l S 0.400 0.400 0.400 rg BT 508.343 235.308 Td /F3 9.0 Tf [(. For )] TJ ET BT 61.016 224.319 Td /F3 9.0 Tf [(technical support \(i.e. access-related or system errors\), contact )] TJ ET 0.373 0.169 0.255 rg BT 314.600 224.319 Td /F3 9.0 Tf [(help@sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 314.600 223.168 m 379.265 223.168 l S 0.400 0.400 0.400 rg BT 379.265 224.319 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 204.330 Td /F3 9.0 Tf [(A REDCap mobileappis also available and can be used on iPhone, iPad, or Android phone or tablet. The REDCap )] TJ ET BT 61.016 193.341 Td /F3 9.0 Tf [(Mobile App adds a new dimension to REDCaps versatility by providing users witha tool for offline data collection, )] TJ ET BT 61.016 182.352 Td /F3 9.0 Tf [(particularly in environments with poor Internet connectivity. The devices \(tablet or phone\) must be secured. REDCap )] TJ ET BT 61.016 171.363 Td /F3 9.0 Tf [(Mobile App users must report any stolen tablets or phones to )] TJ ET 0.373 0.169 0.255 rg BT 306.131 171.363 Td /F3 9.0 Tf [(SU IT)] TJ ET 0.18 w 0 J [ ] 0 d 306.131 170.212 m 329.135 170.212 l S 0.400 0.400 0.400 rg BT 329.135 171.363 Td /F3 9.0 Tf [( and the )] TJ ET 0.373 0.169 0.255 rg BT 364.163 171.363 Td /F3 9.0 Tf [(SU REDCap Administrators)] TJ ET 0.18 w 0 J [ ] 0 d 364.163 170.212 m 474.683 170.212 l S 0.400 0.400 0.400 rg BT 474.683 171.363 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 151.374 Td /F3 9.0 Tf [()] TJ ET BT 61.016 131.385 Td /F3 9.0 Tf [()] TJ ET BT 61.016 111.396 Td /F3 9.0 Tf [()] TJ ET BT 61.016 92.907 Td /F3 9.0 Tf [(Posted in:Apps,Research | | With 0 comments)] TJ ET q 225.000 0 0 96.750 61.016 476.074 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 476.0743 286.0157 572.8243 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2018/07/redcap2.jpg) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 346.6217 468.2776 365.6207 477.4351 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://www.sun.ac.za/english/research-innovation/Research-Development/integrity-ethics) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 199.5617 351.3766 268.0967 360.5341 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://redcap.sun.ac.za) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 264.1007 298.4206 347.1437 307.5781 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://redcaptest.sun.ac.za) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 273.5867 245.4646 379.1477 254.6221 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://redcap.sun.ac.za/index.php?action=training) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 441.6797 245.4646 464.6837 254.6221 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://wiki.library.ucsf.edu/display/RKB/REDCap+Frequently+Asked+Questions) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 205.5647 234.4756 223.5737 243.6331 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/admin/Infoteg/dokumente/redcap_governance.pdf) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 433.1747 234.4756 508.3427 243.6331 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (mailto:redcap@sun.ac.za) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 314.5997 223.4866 379.2647 232.6441 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (mailto:help@sun.ac.za) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 306.1307 170.5306 329.1347 179.6881 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (mailto:help@sun.ac.za) >> endobj 32 0 obj << /Type /Annot /Subtype /Link /A 33 0 R /Border [0 0 0] /H /I /Rect [ 364.1627 170.5306 474.6827 179.6881 ] >> endobj 33 0 obj << /Type /Action /S /URI /URI (mailto:redcap@sun.ac.za) >> endobj 34 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 129 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 8092>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((Ɗ((((((((((((((((UGzgIRm%v]:r%-YO+KHX*w( {}+sP.Iss)3v R nzGnw>? WA5m|H8aW5gLn{)wFJ8'x(?e>C k} ]8e5]]( (!EPEPEPEPEPEPEPEPEPEPEPEPEPEPߴ̓}A#l= e??:ҼOXp`sqg?|&x ҼV%kU/ykJ3NcߚtݑǍ zOftϥjz$In# {W4Cg{VWoguO}Dfah$&8'h$7|rq^8&|2kVH+&}.K1I=}j.a?G<Fc4Oj˫9[?ؤkDkq_WÏQ^o%2 5s_<@PFhձ3qMkUk@q_?Ut;=*TT26p4 dq@SE8W>p>\ү,++ufWk_/h-qkgZaolnOGSRQ\gzIYF͹p:EeܐfN+'TotF+U\d]]xG,MɤiH[=5+ǰG׈c'Z:]W=$nz( _7̾0BG s4V=,0=q'5j[ brjq0}̅@LסJ"a,enG l{JkA Zm#OPAo]^1fo-;:-c9Iwαđ][lcb%'O;dt{3Tug0ӭ&R(aR@18Zi_tkjٯџu:l0C_-owhnt|Kgwwl g¾Ҵ-OiHnY ]ckUmph>N}y|׾#A1s:42;:cnoʇ:dobx ksǥC,yB?kWp>Q]WEl]qI 9xP EKE|?Q|w EYۦvNJEal0q?i7~'蚊O:݌42`pUW{i ۉ@o}o$gIS1Q: e6]ȱA4HFI>__!|Mu$gg1 @{rkw-oQOys$l?'5:~cMk"vO-X`BAb9>tm7AOҬmm!R"( ~ xj |0ޛ ~[ Y vtTrA #W ar;W͞*4]6CHSH$n${W"G'+;N88&AK.}n]P]~~,y3k$IZY~To(SqFEDoUi ƽt|[x;67p6,qWc)lw4όg+K'8eqf]mIs*vTRH־-6h,\(y,O_af8M?sxoF ,[OW3smͯt8V|+O~?o5eյheF{@uem93}x D2[W2< *&еiX`RAO!IwKIi.}M|hdnex᧎týu#E~څamYLDC"tt`# p?] LguE}ʋW瘯?jգm?%?|N}WZE֡k<",JA ~Z:#C`/5^ߤY<#EZ#{4xS᷊I:0$!OD]I4pidT_V8! B(_ښu~mD7&YR<}LWѓ$T`.Q ?0k?aYxB>VAl1@RQLhBȑp+>]C[@vir݆~Q_VԘ Fħ$q_&xOC'ҴXUG?3OkS_=Sw.|Aa GV!3$޽@_qsna̺5 IH4ן|G#cP?Ic_h!/{-m}o%uTߚu/P%͜7#@_ oWHC% FcVГiז  @hFMHQMTKZ%3 85KƓqkX.f(zW͞6m[oh XqGՇҹO7IO0p$ٗq¦[ֹ٧.K7ۮipmkf!T^qNFhBZZZkpi[me* r~6|1icx]bI|HMą6g|}O5%WB𵰵 2,yr}|p\<+j-$+鹐ʀ8"'c#g62/fƾpmEl?!|[nniȿ_2%Lko"E්ULh5qS,e1ƣ~Y5w6~iry ) ( H=4_mvfYc)G?}ϭkZST +aQG޿8(׉yp|n%#j{;w7B߹ k(џ {+.-G^x? ChoAWДQE̾E-mq_zuu4jvrM$ҿO*nmy2v$}J'M>ݼIq&Pcҽ{Umu2MKkw 2FH#jvR#5(%O#5}k/B_RM=9AJF6p,%-جW?d_jϤ#\؃q<,OH9{ j6fp.0'6K%1‘vpix»{[KKf!]\ #dی~5w#:u?ӶM"]ˁzTo6}{sp,`{gXz@W/xg&9\J(5-j`E pEVPF5_Yz0ԯoDi2ryKr I(Þ&;X 8[x#5 UG@Xl/âK$ITv*07k~0>.i^vj1 gQ铜gpFNz} zV-nlHEF)" >j~&Ѵ}2MRQ&nܡ3H;(;IYx3sjVkn3+53jzTH=0vk(Ki-χtkumn1aLQ$M 1rv[7_&^jZtMŪ}Pwe%Cq HLija.{{+[W6ojY#*e g$:T7O*tBOn>K9;4o [.bu {[2$d7'jw핧~œ{^ok:,ڧru<9N \_”Y>(x=e[[z=+BoQ"=J$ S0}vϾ3]?y42Ӹנ{,g;*:P=Eioeg kUFQ@Q@bx P43YqWfBknRjF\R] !u;]!+\<`g ";+unPϋ]68UfP[F3(غ]GO{ K M>..# `_rz;x}D!'T=啥ݤ/1?&wʬy+2٦Ku+EXmK`t5|yeIG򫪰@9Ɗ^ 5=3W~Tޑ8Vi|bbdn}6lmm 9%$1`y|{OUvӣK&>s d zWV U9ǡ sC+?^hD R{J5MDCw\]GkqQeؿ"On9ZiZ9O Cyr=T꣌TQV<[~ռ;YbOJd)uLBH<.xK|\7/Z:LidV m s0:׸Z+j:մ<__/ι=-兞s2],Mѕ^u|,,n˪i>#'Iqj-.|% NS3 O*;۟eNdգޑ!c8{_ZI6}&d j-QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE((((((Q@Q@Q@Q@Q@Q@Q@Q@ endstream endobj xref 0 35 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000504 00000 n 0000000656 00000 n 0000008382 00000 n 0000008494 00000 n 0000008601 00000 n 0000008717 00000 n 0000008837 00000 n 0000008964 00000 n 0000009067 00000 n 0000009195 00000 n 0000009334 00000 n 0000009462 00000 n 0000009537 00000 n 0000009665 00000 n 0000009744 00000 n 0000009872 00000 n 0000009974 00000 n 0000010102 00000 n 0000010229 00000 n 0000010357 00000 n 0000010477 00000 n 0000010605 00000 n 0000010680 00000 n 0000010808 00000 n 0000010881 00000 n 0000011009 00000 n 0000011082 00000 n 0000011210 00000 n 0000011285 00000 n trailer << /Size 35 /Root 1 0 R /Info 5 0 R >> startxref 19545 %%EOF Apps « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Apps

Microsoft 365 vs. Office 365: What’s the difference?

Tuesday, June 4th, 2019

Microsoft 365 vs. Office 365: What’s the difference?

There is a lot to be said for consistency in product names, but when you have dozens of products with multiple versions of each, similar names can get confusing fast. Yes, Microsoft we are referring to you …

Microsoft introduced Microsoft 365, a bundle of existing products under one license. The name is similar to the already existing Office 365 (and the recently renamed Dynamics 365). In fact, a lot of people already inadvertently called Office 365 by the name of Microsoft 365.

So, it’s easy to see how the two products can be confused. It gets even more confusing when you learn Microsoft 365 includes Office 365.

Let’s break down the differences:

The Short Version

Office 365 is a cloud-based suite of productivity apps like Outlook, Word, PowerPoint, and more. Microsoft 365 is a bundle of services including Office 365, plus several other services including Windows 10 Enterprise.

The Long Version

Office 365

Office 365 is a cloud-based suite of apps and services centred around business productivity. It includes some apps you’re probably already familiar with like Microsoft Outlook, Word, PowerPoint, Excel, Skype for Business, SharePoint, OneDrive and Teams, along with robust productivity, collaboration, and security features. 

Microsoft 365

Microsoft 365 is a bundle of services that includes Office 365. It also includes Windows 10 Enterprise, Enterprise Mobility + Security (EMS), and machine learning. As the title implies, it’s more geared towards larger organisations that wants a single, secure platform with which to share and collaborate. It includes strong data security features on top of Windows 10 Pro and Office 365.

What’s included in Microsoft 365 in comparison to Office 365?

Both products come with the ability to have fully installed Office applications on tablets, phones and PCs, as well as the web browser versions. You get 1TB of personal file storage, as well as business class email and calendars. You also have access to Skype for Business for instant messaging and video calling, as well as Microsoft Teams and other new tools like Delve and Planner.

The differences begin with device management. Unlike Office 365, Microsoft 365 comes with a single console to manage users and devices. You can also automatically deploy Office applications to Windows 10 PCs.

The security tools are also missing from Office 365. The alternative comes with the ability to protect data across devices and secure access. You can also protect Windows 10 devices from risks such as malware with Windows Defender.  

[ARTICLE BY MANDY WANZA]

Exam access app a resounding success

Thursday, August 30th, 2018

Until recently granting access to examinations for students has been a manual and time-consuming process of checking-off access lists. However, thanks to new technology developed by Information Technology in collaboration with the Examination Office in the Registrar’s Division, this is no longer the case.    

Since June this year, the identification of students for access to examination venues has been facilitated with the use of cell phones at each venue. 

A student’s student card is held against the back of the cell phone, and on the screen, it is indicated whether the student is supposed to write the examination in the specific module in the specific venue. The screen will display a green mark if the student is at the correct exam venue (see image right) and a red cross if not. If the student is at the wrong venue, the screen will indicate where the student should be for the exam or test.  

This will result in access to examination venues being easily and swiftly controlled and will certainly simplify and improve the function of access control with regard to examination venues.  

This easier scanning process is made possible by the NFC (near-field communications) chip on Android phones which communicates with the MIFARE chip embedded in the student card,  and the identification information is then used by the phone app to look up the student’s exam venue. The exam venue and module information come from the Student Information System. 

Tests were first conducted on a small scale during the November 2017 examination and the technology was rolled out fully for the June 2018 examination. It was a resounding success.  

 Emce Louw, Head of the Exam Office experienced the impact first-hand as the process was driven from her office. This included loading the cell phones, setting up data, training the convenors responsible for scanning at the venues and collecting the phones after the exams. She received overwhelmingly positive feedback from invigilators and students alike: 

 

 

 

 

Scan van studentekaarte is fantasties! Ek het gister 4de jaar Megatronika studente gehad. Hulle was vreeslik beïndruk met die scanning!”

The development and successful completion of the technology was a cross-functional team effort. Hendrik le Roux from Information Technology’s Access Control Division was the project manager and Guzelle Hendricks was responsible for business analysis for the two three-month phases of the project which ran from the end of 2017 to June 2018.  

In addition to Hendrik and Guzelle the following staff played a key role in getting the project off the ground – Phillip Greeff (TAS), Gregory Isaacs (TAS), Anna-Mari du Toit, Marc-Allen Johnson, Jeremy van Rooyen, Charles Hopkins, who wrote the app and Elmar Matthee who was responsible for the back-end development. On the side of the functional stakeholders, besides for Emce, Neels Fourie (Deputy Registrar), and Jan du Toit and Helene Nieuwoudt (both from SISS) participated in the project.

REDCap launched for researchers

Tuesday, July 31st, 2018

SU Research Support Services are pleased to announce the launch of Stellenbosch University’s Research Electronic Data Capture (REDCap) service. REDCap is a secure web application for building and managing online surveys and databases and can be configured to meet compliance standards such as HIPAA, 21 CFR Part 11, and FISMA.

REDCap is a tool for capturing confidential information. This requires planned and careful management in order to protect the participant’s personal data. For data security purposes, exporting of data from the platform is discouraged, but if necessary, security and confidentiality will depend on correct tagging of identifier fields in the data dictionary and correct assigning of user rights for export by the Data Manager.

Ethics approval is required from an appropriate Stellenbosch University REC if working with humans, human material (such as blood or tissue) or their data, including secondary use of such materials (this is defined as the reuse in a new project of previously collected data or material). Please contact your local ethics office if you have not yet applied for ethics clearance. The application will include questions related to how you manage, store and use data, including data entered into REDCap. It may also require that you submit the data dictionary and an assigned roles list. Particular attention should be paid to which identifiers you intend to collect and how you will maintain confidentiality if exporting identifiable data.

Adequate and appropriate consent is an essential requisite of REC approval. If you are collecting and storing personal identifiers, it must be reflected in the consent form. If you intend to share or reuse data or material, it must be consented to when the data or material is collected, otherwise, it cannot be used or shared in future research projects.

To access this service, register on redcap.sun.ac.za with your active SU username and password. As part of the registration process, you will receive an email verification request. This auto-generated email will include instructions on how to set up Google Authenticator. For security reasons, Google Authenticator must be used with REDCap to ensure multi-factor authentication.

A training instance of REDCap is also available on redcaptest.sun.ac.za, where you can explore REDCap functionality and present training sessions. ‘Real’ data may not be captured in the training environment. Google Authenticator has to be set up separately for the training environment and the live environment.

SU does not provide institutional support for the day-to-day operational use of REDCap. It is a researcher’s responsibility to familiarise themselves with the software, however, embedded video guidance and numerous FAQs are available online. SU-specific guidelines are available here. For fee-based REDCap advanced support, contact redcap@sun.ac.za.  For technical support (i.e. access-related or system errors), contact help@sun.ac.za.

A REDCap mobile app is also available and can be used on iPhone, iPad, or Android phone or tablet. The REDCap Mobile App adds a new dimension to REDCap’s versatility by providing users with a tool for offline data collection, particularly in environments with poor Internet connectivity. The devices (tablet or phone) must be secured. REDCap Mobile App users must report any stolen tablets or phones to SU IT and the SU REDCap Administrators.

 

 

 

Protect what you share

Thursday, March 29th, 2018

Last month it was revealed that a Trump data company, Cambridge Analytica, used the data of Facebook users during the American election. Security company SANS Security provided the information below to clarify the situation and provide solutions if you are concerned about your data being shared online.

“The US Federal Trade Commission is investigating whether Facebook violated terms of a 2011 settlement when data of up to 50 million users were transferred to Cambridge Analytica, a data analytics firm.  This data was originally collected from a Facebook app called “thisisyourdigitallife”.  The app not only collected extensive data from people who downloaded it, but the app connected data on their friends also.  This incident is raising a lot of questions, to include what other data has been collected by other apps, and how was that data shared.  Below are steps you can take to protect your privacy.  Note that while these steps are specific to Facebook, you should consider following the same steps for any social networking sites you use online.  In addition, Facebook will be making privacy changes in the coming months, as such, some of the links or options listed below may change. 

  1. Delete: If you are truly concerned about Facebook and no longer trust it, the most dramatic step you can take is to Delete Your Facebook Account.  If you do, your information cannot be recovered, so we recommend you download all of your past Facebook activity first from your settings page.
  2. Deactivate: The second option is to Deactivate Your Facebook Account, which is in your General Account Settings. This freezes your online activity to include disabling your profile and remove your name and photo from most things you’ve shared on Facebook.  However, you will still be able to message people.  Unlike Deletion, with Deactivation, you can Re-activate your account, which means your profile and past activity is restored.
  3. Minimize Apps: The issue is not only what data Facebook collects about your activity, but what data any third party apps that connect to your Facebook account, apps such as Clash of Clans or What is Your Inner Age.  Only install apps you need and minimize what they collect.  Why do you think there has been such an explosion of these fun and free apps?  Because they make money harvesting your information. In addition, limit what others share about you with their apps in the “Apps Others Use” section. Finally, delete an app when you no longer need it or no longer trust it.  Not sure what apps you have?  Check out your apps page and review your apps. Every app you have is just one more opportunity for others to collect information about you.  
  4. Logins: Many websites (and apps) give you the option of using your Facebook account to login.  While that is convenient, it just means more data sharing is happening between that website and your Facebook account.  Protect your privacy by using a unique login for each and every account you have.  Can’t remember all of your passwords?  Neither can we, that is why we recommend a Password Manager.
  5. Sharing: Always be careful what you share with others.  If you do not want your parents or boss to read it, you probably should not post it.  Yes, you can use privacy options to control who can read your posts, but remember those can be confusing and change often, so what you thought was privately shared can become publicly available.
  6. Two-factor Authentication: Finally, while not related to privacy, one of the best steps you can take to securing any of your online accounts is to enable two-factor authentication.  This requires a second step to logging into the site.  This very simple step is one of THE most effective ways you can secure your online accounts.

Unfortunately, these steps are not as simple as we would like.  Facebook and other sites do this on purpose, they make money by collecting your information.  We want you to be aware that information is being collected about you and the steps you can take to protect yourself.  Finally, while these steps are specific to Facebook, keep in mind many other free sites have the same issues.”

[Source: SANS Security Awareness]

All Office365 applications now available

Monday, June 5th, 2017

Information Technology enabled the complete cloud-based Office365 package for all staff with an active role earlier this month.

The complete Office 365 package includes:
– Outlook mail
– OneDrive for Business (5TB for each staff member and student)
– SharePoint Online (public and team sites)
– Access to online MS Office apps (for example Word, Excel, PowerPoint, etc.)
– Five downloadable versions of Office 2016 for personal devices (for example laptops, tablets and smartphones) Take note that these Office 2016 versions are not allowed on any asset number devices, it’s only allowed on personal devices.

What is Office 365?

If you have any questions, please let us know by logging a request on ServiceNow or calling our Service Desk at 808 4367. For more information on the Office365 package, please consult our FAQs or have a look at the Office365 training videos.

IMPORTANT: When using cloud-based services, you have to keep your private and work usernames, passwords and data separate. Never use the same username for private and work email accounts, storage spaces and applications.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.