{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:01:00Z","timestamp":1740099660380,"version":"3.37.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030432751"},{"type":"electronic","value":"9783030432768"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43276-8_12","type":"book-chapter","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T08:03:08Z","timestamp":1583568188000},"page":"158-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Privacy Compliance Benefits for Organisations \u2013 A Cyber-Physical Systems and Internet of Things Study"],"prefix":"10.1007","author":[{"given":"Ntsako","family":"Baloyi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1610-2776","authenticated-orcid":false,"given":"Paula","family":"Kotz\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,8]]},"reference":[{"key":"12_CR1","unstructured":"ICO: Privacy impact assessment and risk management. Information Commissioner\u2019s Office, Wilmslow (2013)"},{"key":"12_CR2","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25, 166\u2013170 (1968)","journal-title":"Wash. Lee Law Rev."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.2307\/3481326","volume":"90","author":"DJ Solove","year":"2002","unstructured":"Solove, D.J.: Conceptualizing privacy. Calif. Law Rev. 90, 1087\u20131155 (2002)","journal-title":"Calif. Law Rev."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1111\/j.1083-6101.2007.00371.x","volume":"12","author":"K Erickson","year":"2007","unstructured":"Erickson, K., Howard, P.N.: A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records. J. Comput.-Mediat. Commun. 12, 1229\u20131247 (2007)","journal-title":"J. Comput.-Mediat. Commun."},{"key":"12_CR5","first-page":"107","volume":"8","author":"DD Cole","year":"2015","unstructured":"Cole, D.D.: Assessing the leakers: criminal or heroes. J. Nat. Secur. Law Policy 8, 107\u2013118 (2015)","journal-title":"J. Nat. Secur. Law Policy"},{"key":"12_CR6","unstructured":"European Union: GDPR Portal: Site Overview. https:\/\/www.eugdpr.org\/eugdpr.org.html"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Baloyi, N., Kotz\u00e9, P.: A data privacy model based on Internet of Things and cyber-physical systems reference architectures. In: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists: SAICSIT 2018 \u2013 Technology for Change, pp. 258\u2013268. ACM (2018). https:\/\/doi.org\/10.1145\/3278681.3278712","DOI":"10.1145\/3278681.3278712"},{"key":"12_CR8","unstructured":"Government of South Africa: Protection of Personal Information Act 4 of 2013. Government Printing Works (2013). www.justice.gov.za\/legislation\/acts\/2013-004.pdf"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Baloyi, N., Kot\u017ae, P.: Are organisations in South Africa ready to comply with personal data protection or privacy legislation and regulations? In: Cunningham, P., Cunningham, M. (eds.) IST-Africa 2017 Conference, pp. 1\u201311. IEEE (2017)","DOI":"10.23919\/ISTAFRICA.2017.8102340"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.compind.2016.02.004","volume":"81","author":"RF Babiceanu","year":"2016","unstructured":"Babiceanu, R.F., Seker, R.: Big data and virtualization for manufacturing cyber-physical systems: a survey of the current status and future outlook. Comput. Ind. 81, 128\u2013137 (2016). https:\/\/doi.org\/10.1016\/j.compind.2016.02.004","journal-title":"Comput. Ind."},{"key":"12_CR11","unstructured":"Internet Society: The Internet of Things: An Overview (2015)"},{"key":"12_CR12","volume-title":"Privacy and Security by Design: an Enterprise Architecture Approach","author":"A Cavoukian","year":"2013","unstructured":"Cavoukian, A., Dixon, M.: Privacy and Security by Design: an Enterprise Architecture Approach. Information and Privacy Commissioner, Ontario (2013)"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Aktypi, A., Nurse, J.R.C., Goldsmith, M.: Unwinding Ariadne\u2019s identity thread: privacy risks with fitness trackers and online social networks. In: Proceedings of the 2017 on Multimedia Privacy and Security, pp. 1\u201311. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3137616.3137617","DOI":"10.1145\/3137616.3137617"},{"key":"12_CR14","volume-title":"Introduction to Embedded Systems: A Cyber-Physical Systems Approach","author":"EA Lee","year":"2017","unstructured":"Lee, E.A., Seshia, S.A.: Introduction to Embedded Systems: A Cyber-Physical Systems Approach. MIT Press, Cambridge (2017)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","volume":"3","author":"J Lee","year":"2015","unstructured":"Lee, J., Bagheri, B., Kao, H.: A cyber-physical systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 3, 18\u201323 (2015)","journal-title":"Manuf. Lett."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Thinakaran, K., Dhillon, J.S., Gunasekaran, S.S., Chen, L.F.: A conceptual privacy framework for privacy-aware IoT health applications. In: 6th International Conference on Computing and Informatics, Kuala Lumpur, pp. 175\u2013183 (2017)","DOI":"10.13189\/csit.2018.060402"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Torre, H., Koceva, F., Sanchez, O.R., Adorni, G.: A framework for personal data protection in the loT. In: Internet Technology and Secured Transactions (ICITST), pp. 384\u2013391. IEEE (2016). https:\/\/doi.org\/10.1109\/ICITST.2016.7856735","DOI":"10.1109\/ICITST.2016.7856735"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54, 2787\u20132805 (2010). https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010","journal-title":"Comput. Netw."},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/JSYST.2014.2322503","volume":"9","author":"SK Khaitan","year":"2015","unstructured":"Khaitan, S.K., McCalley, J.D.: Design techniques and applications of cyberphysical systems: a survey. IEEE Syst. J. 9, 350\u2013365 (2015). https:\/\/doi.org\/10.1109\/JSYST.2014.2322503","journal-title":"IEEE Syst. J."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1, 3\u20139 (2014)","journal-title":"IEEE Internet Things J."},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MNET.2008.4579768","volume":"22","author":"AD Wood","year":"2008","unstructured":"Wood, A.D., et al.: Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Network 22, 26\u201333 (2008). July\/August 2018","journal-title":"IEEE Network"},{"key":"12_CR22","volume-title":"A Risk and Control Framework for Cloud Computing and Virtualization","author":"M Carroll","year":"2012","unstructured":"Carroll, M.: A Risk and Control Framework for Cloud Computing and Virtualization. University of South Africa, Pretoria (2012)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Colbert, E.: Security of cyber-physical systems. J. Cyber Secur. Inf. Syst. 5 (2017)","DOI":"10.1007\/978-3-319-51328-7_2"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Miclea, L., Sanislav, T.: About dependability in cyber-physical systems. In: EWDTS, pp. 17\u201321 (2011)","DOI":"10.1109\/EWDTS.2011.6116428"},{"key":"12_CR25","unstructured":"Minerva, R., Biru, A., Rotondi, D.: Towards a Definition of the Internet of Things (IoT). IEEE (2015)"},{"key":"12_CR26","unstructured":"Lin, S., et al.: The Industrial Internet of Things Volume G1: Reference Architecture, Industrial Internet Consortium (2017)"},{"key":"12_CR27","unstructured":"Tesfachew, T.: Key challenges in the development and implementation of data protection laws. In: Data Protection Regulations and International Data Flows: Implications for Trade and Development, United Nations, Geneva, pp. 7\u201322 (2016)"},{"key":"12_CR28","unstructured":"Government of the United Kingdom. Data Protection Act 29 of 1998. Government of the United Kingdom (1998). www.legislation.gov.uk\/ukpga\/1998\/29\/pdfs\/ukpga_19980029_en.pdf"},{"key":"12_CR29","unstructured":"African Union: African Union Convention on Cyber Security and Personal Data Protection, African Union (2014)"},{"key":"12_CR30","unstructured":"Cate, F.H.: The failure of fair information practice principles. In: Winn, J.K. (ed.): Consumer Protection in the Age of the \u201cInformation Economy.\u201d Ashgate Publishing, Hampshire (2006)"},{"key":"12_CR31","unstructured":"Government of South Africa. Constitution of the Republic of South Africa. Government of South Africa (1996). (ISBN 978-0-621-39063-6), www.justice.gov.za\/legislation\/constitution\/SAConstitution-web-eng.pdf"},{"key":"12_CR32","unstructured":"OECD: Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data (1980)"},{"key":"12_CR33","unstructured":"Vaishnavi, V., Kuechler, W., Petter, S.: Design Science Research in Information Systems. http:\/\/desrist.org\/desrist\/content\/design-science-research-in-information-systems.pdf"},{"key":"12_CR34","volume-title":"A Data Privacy Framework for Cyber-physical Systems and Internet of Things for Information Technology Professionals","author":"N Baloyi","year":"2019","unstructured":"Baloyi, N.: A Data Privacy Framework for Cyber-physical Systems and Internet of Things for Information Technology Professionals. University of Pretoria, Pretoria (2019)"},{"key":"12_CR35","unstructured":"ICO: Subject Access Code of Practice Information Commissioner\u2019s Office, Wilmslow (2014)"},{"key":"12_CR36","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.bushor.2015.06.005","volume":"58","author":"BD Weinberg","year":"2015","unstructured":"Weinberg, B.D., Milne, G.R., Andonova, Y.G., Hajjat, F.M.: Internet of Things: convenience vs. privacy and secrecy. Bus. Horiz. 58, 615\u2013624 (2015). https:\/\/doi.org\/10.1016\/j.bushor.2015.06.005","journal-title":"Bus. Horiz."},{"key":"12_CR37","unstructured":"Reuters. Musk Deletes Facebook Pages of Tesla, SpaceX After Challenged on Twitter. https:\/\/www.reuters.com\/article\/us-spacex-musk\/musk-deletes-facebook-pages-of-tesla-spacex-after-challenged-on-twitter-idUSKBN1GZ2MZ"},{"key":"12_CR38","unstructured":"ICO: Anonymisation: Managing Data Protection Risk Code of Practice, Information Commissioner\u2019s Office, Wilmslow (2012)"},{"key":"12_CR39","unstructured":"ICO: Data Sharing Code of Practice, Information Commissioner\u2019s Office, Wilmslow (2011)"},{"key":"12_CR40","unstructured":"Head, T.: Momentum agree to R2.4\u00a0m payout for Nathan Ganas\u2019 family. https:\/\/www.thesouthafrican.com\/momentum-agree-pay-ganas-family-why\/"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Baloyi, N., Kot\u017ae, P.: Do users know or care about what is done with their personal data: a South African study. In: Cunningham, P., Cunningham, M. (eds.) IST-Africa 2017 Conference Proceedings, pp. 1\u201311. IEEE (2017)","DOI":"10.23919\/ISTAFRICA.2017.8102301"},{"key":"12_CR42","unstructured":"Kula, S.: Appointment of the Information Regulator for POPI and PAIA. https:\/\/www.michalsons.com\/blog\/appointment-of-the-information-regulator\/20059"},{"key":"12_CR43","unstructured":"ICO: The Guide to Data Protection, Information Commissioner\u2019s Office, Wilmslow (2017)"},{"key":"12_CR44","unstructured":"ICO: In the Picture: A Data Protection Code of Practice for Surveillance Cameras and Personal Information Information Commissioner\u2019s Office, Wilmslow (2015)"},{"key":"12_CR45","unstructured":"Government of South Africa. Promotion of Access to Information Act 2 of 2000. Government of South Africa (2000). www.justice.gov.za\/legislation\/acts\/2000-002.pdf"},{"key":"12_CR46","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/sys.21464","volume":"22","author":"M Sinclair","year":"2019","unstructured":"Sinclair, M., Siemieniuch, C., Palmer, P.: The identification of knowledge gaps in the technologies of cyber-physical systems with recommendations for closing these gaps. Syst. Eng. 22, 3\u201319 (2019)","journal-title":"Syst. Eng."}],"container-title":["Communications in Computer and Information Science","Information and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43276-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T22:43:16Z","timestamp":1666046596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43276-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030432751","9783030432768"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43276-8_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Information Security Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johannesburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"issa2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.infosecsa.co.za","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}