{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:05:36Z","timestamp":1742997936326,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031203152"},{"type":"electronic","value":"9783031203169"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20316-9_27","type":"book-chapter","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T18:52:04Z","timestamp":1669315924000},"page":"352-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating a Consumer Data Protection Framework for IS Compliance Awareness in South Africa: An Expert Review"],"prefix":"10.1007","author":[{"given":"Ileen E.","family":"Bredenkamp","sequence":"first","affiliation":[]},{"given":"Elmarie","family":"Kritzinger","sequence":"additional","affiliation":[]},{"given":"Marlien","family":"Herselman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,25]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Blascak, N., Cheney, J.S., Hunt, R.M., Mikhed, V., Ritter, D., Vogan, M.: Financial consequences of identity theft: evidence from consumer credit bureau records (2019)","DOI":"10.21799\/frbp.wp.2019.02"},{"key":"27_CR2","unstructured":"Irvin-Erickson, Y., Ricks, A.: Identity theft and fraud victimization: what we know about identity theft and fraud victims from research-and practice-based evidence (2019)"},{"issue":"1","key":"27_CR3","first-page":"10","volume":"9","author":"L Masilela","year":"2021","unstructured":"Masilela, L., Nel, D.: The role of data and information security governance in protecting public sector data and information assets in national government in South Africa. Africa\u2019s Public Serv. Deliv. Perform. Rev. 9(1), 10 (2021)","journal-title":"Africa\u2019s Public Serv. Deliv. Perform. Rev."},{"key":"27_CR4","unstructured":"S. A. Government: Protection of Personal Information Act. Government Gazette, Cape Town (2013)"},{"key":"27_CR5","unstructured":"South African National Treasury: Cybercrimes and Cybersecurity Bill, vol. 416, no. 42237, pp. 1\u2013176 (2017)"},{"key":"27_CR6","unstructured":"Government Printer: Promotion of Access to Information Act (PAIA) 2 of 2000, Cape Town, 2000. https:\/\/www.gov.za\/documents\/promotion-access-information-act"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.18489\/sacj.v52i0.201","volume":"52","author":"N Kortjan","year":"2014","unstructured":"Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. SACJ 52, 29\u201341 (2014)","journal-title":"SACJ"},{"key":"27_CR8","unstructured":"South Africa Cyber-Security Academic Alliance: Welcome to SACSAA (2014)"},{"key":"27_CR9","unstructured":"Kritzinger, E.: Cyber-Security Awareness Project (2014). http:\/\/eagle.unisa.ac.za\/elmarie\/index.php"},{"key":"27_CR10","unstructured":"The Council for Scientific and Industrial Research (2021). https:\/\/www.csir.co.za\/"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45\u201377 (2007). https:\/\/doi.org\/10.2753\/MIS0742-1222240302","journal-title":"J. Manag. Inf. Syst."},{"key":"27_CR12","unstructured":"ISO\/IEC 27000: ISO\/IEC 27000:2014 Information technology | Security techniques | Information security management systems - Overview and vocabulary (2014). https:\/\/www.iso27001security.com\/html\/27000.html"},{"key":"27_CR13","unstructured":"Prat, N., Comyn-Wattiau, I., Akoka, J.: Artifact evaluation in information systems design-science research - a holistic view. In: Proceedings of the Pacific Asia Conference\u00a0on\u00a0Information Systems PACIS 2014 (2014)"},{"key":"27_CR14","first-page":"1","volume":"23","author":"N Prat","year":"2014","unstructured":"Prat, N., Comyn-Wattiau, I., Akoka, J.: Artifact evaluation in information systems design-science research-a holistic view. PACIS 23, 1\u201316 (2014)","journal-title":"PACIS"},{"issue":"1","key":"27_CR15","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/ejis.2014.36","volume":"25","author":"J Venable","year":"2016","unstructured":"Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst. 25(1), 77\u201389 (2016)","journal-title":"Eur. J. Inf. Syst."},{"key":"27_CR16","unstructured":"\u00c5gerfalk, P.J.: Information Systems Actability: Understanding Information Technology as a Tool for Business Action And Communication. Link\u00f6ping University Electronic Press (2003)"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Moonen, H., van Hillegersberg, J.: Real-time coordination in container trucking \u2013 prototyping and evaluating a multi-agent system for real-time container truck planning at post-Kogeko. In: van Nunen, J., Huijbregts, P., Rietveld, P. (eds.) Transitions Towards Sustainable Mobility, pp. 139\u2013159. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21192-8_8","DOI":"10.1007\/978-3-642-21192-8_8"},{"key":"27_CR18","unstructured":"Chen, S., Osman, N.M., Nunes, J.M.B., Peng, G.C.: Information systems evaluation methodologies (2011)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Ali, B.J., Anwar, G.: Factors influencing the citizens\u2019 acceptance of electronic government. Int. J. Eng. Bus. Manag. 5 (2021)","DOI":"10.22161\/ijebm.5.1.5"},{"issue":"3","key":"27_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3390\/info12030129","volume":"12","author":"X Li","year":"2021","unstructured":"Li, X., Zhang, Z., Stefanidis, K.: A data-driven approach for video game playability analysis based on players\u2019 reviews. Information 12(3), 129 (2021)","journal-title":"Information"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 337\u2013355 (2013). https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"162","DOI":"10.20853\/27-1-233","volume":"27","author":"L Minnaar","year":"2016","unstructured":"Minnaar, L., Heystek, J.: Online surveys as data collection instruments in education research: a feasible option? South African J. High. Educ. 27(1), 162\u2013183 (2016). https:\/\/doi.org\/10.20853\/27-1-233","journal-title":"South African J. High. Educ."},{"issue":"5","key":"27_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.9790\/0837-2405053138","volume":"24","author":"MSDP Nayak","year":"2019","unstructured":"Nayak, M.S.D.P., Narayan, K.A.: Strengths and weakness of online surveys. IOSR J. Humanit. Soc. Sci. 24(5), 31\u201338 (2019). https:\/\/doi.org\/10.9790\/0837-2405053138","journal-title":"IOSR J. Humanit. Soc. Sci."},{"key":"27_CR24","unstructured":"Saunders, M., Lewis, P., Thornhill, A.: Research Methods for Business Students, 7th edn. Nueva York Pearson Educ. (2016)"},{"issue":"3","key":"27_CR25","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1093\/poq\/nfm024","volume":"71","author":"AL Holbrook","year":"2007","unstructured":"Holbrook, A.L., Krosnick, J.A., Moore, D., Tourangeau, R.: Response order effects in dichotomous categorical questions presented orally the impact of question and respondent attributes. Public Opin. Q. 71(3), 325\u2013348 (2007). https:\/\/doi.org\/10.1093\/poq\/nfm024","journal-title":"Public Opin. Q."},{"key":"27_CR26","unstructured":"Nielsen, J.: Why you only need to test with 5 users. Nielsen Norman Group, pp. 737\u20138939 (2000). https\/\/www.nngroup.com\/articles\/why-you-only-need-to-test-with-5-users\/"},{"key":"27_CR27","unstructured":"Davies, R.: Network perspectives in the evaluation of development interventions: more than a metaphor (2003)"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20316-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T19:21:41Z","timestamp":1669317701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20316-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031203152","9783031203169"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20316-9_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Compostela","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"191","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}