{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:26:33Z","timestamp":1757622393021,"version":"3.44.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006325"},{"type":"electronic","value":"9783032006332"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00633-2_18","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:38Z","timestamp":1754648138000},"page":"305-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Promoting Privacy Compliant Data Management for\u00a0South African Digital Marketplaces: A Privacy-Aware Data Classification and\u00a0Taxonomy Reference Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2289-2273","authenticated-orcid":false,"given":"Mmaphefo Octavia","family":"Kumalo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6176-3007","authenticated-orcid":false,"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1108\/JCM-10-2013-0737","volume":"31","author":"AJ Gabisch","year":"2014","unstructured":"Gabisch, A.J., Milne, R.G.: The impact of compensation on information ownership and privacy control. J. Consum. Mark. 31(1), 13\u201326 (2014)","journal-title":"J. Consum. Mark."},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. Mag. 3(1), 26\u201333 (2005)","journal-title":"IEEE Secur. Priv. Mag."},{"key":"18_CR3","unstructured":"Bhagattjee, P.: South Africa - data protection overview (2021). https:\/\/www.dataguidance.com\/notes\/south-africa-data-protection-overview"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"C Chen","year":"2012","unstructured":"Chen, C.: Storey: business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165 (2012)","journal-title":"MIS Q."},{"key":"18_CR5","unstructured":"De\u00a0Villiers, Z.K.: A framework for ethical data use to improve personalised customer experience in the financial industry in South Africa, Master\u2019s thesis, University of the Western Cape, Western Cape, South Africa (2022)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Derave, T., Gailly, F., Sales, T.P., Poels, G.: A taxonomy and ontology for digital platforms. Inf. Syst. (2024)","DOI":"10.1016\/j.is.2023.102293"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02683509","volume":"1","author":"P Fettke","year":"2003","unstructured":"Fettke, P., Loos, P.: Classification of reference models: a methodology and its application. IseB 1(1), 35\u201353 (2003)","journal-title":"IseB"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Finck, M., Pallas, F.: They who must not be identified\u2014distinguishing personal from non-personal data under the GDPR. Int. Data Priv. Law 10(1) (2020)","DOI":"10.1093\/idpl\/ipz026"},{"key":"18_CR10","unstructured":"Friedman, B., Khan, P.H.J., Borning, A.: Value sensitive design and information systems. In: Human-Computer Interaction in Management Information Systems: Foundations. M.E. Sharpe, Inc, New York, NY, USA (2014)"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11138-016-0345-0","volume":"30","author":"CS Fuller","year":"2017","unstructured":"Fuller, C.S.: The perils of privacy regulation. Rev. Austrian Econ. 30(2), 193\u2013214 (2017)","journal-title":"Rev. Austrian Econ."},{"issue":"4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13740-020-00116-5","volume":"9","author":"M Gharib","year":"2020","unstructured":"Gharib, M., Giorgini, P., Mylopoulos, J.: An ontology for privacy requirements via a systematic literature review. J. Data Seman. 9(4), 123\u2013149 (2020)","journal-title":"J. Data Seman."},{"key":"18_CR13","unstructured":"Information Regulator South Africa (2021). https:\/\/inforegulator.org.za\/wp-content\/uploads\/2020\/07\/Guidance-Note-Processing-Special-PersonalInformation-20210628-004.pdf"},{"key":"18_CR14","unstructured":"Intersoft Consulting: GDPR - info (2021). https:\/\/gdpr-info.eu\/"},{"key":"18_CR15","unstructured":"ISO\/IEC: ISO\/IEC 27002:2013 Information Technology - Security Techniques: Code of practice for information security controls (2013)"},{"issue":"11","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/oalib.1103126","volume":"03","author":"MA Kilani","year":"2016","unstructured":"Kilani, M.A., Kobziev, V.: An overview of research methodology in information system (IS). OALib 03(11), 1\u20139 (2016)","journal-title":"OALib"},{"key":"18_CR17","unstructured":"Labadie, C., Legner, C.: Personal data protection inside and out. In: Enterprise Modelling and Information Systems Architectures (EMISAJ), pp. 1\u201320 (2020)"},{"key":"18_CR18","series-title":"Lecture Notes in Information Systems and Organisation","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-030-86800-0_27","volume-title":"Innovation Through Information Systems","author":"D Mallon","year":"2021","unstructured":"Mallon, D.: A systematic literature review of digital platform business models. In: Ahlemann, F., Sch\u00fctte, R., Stieglitz, S. (eds.) WI 2021. LNISO, vol. 48, pp. 389\u2013403. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86800-0_27"},{"key":"18_CR19","unstructured":"Michalsons: Protection of Personal Information Act 4 of 2013 (2022). https:\/\/popia.co.za\/"},{"key":"18_CR20","doi-asserted-by":"publisher","DOI":"10.4135\/9781849209687","volume-title":"Qualitative Research in Information Systems","author":"MD Myers","year":"2002","unstructured":"Myers, M.D., Avison, D.: Qualitative Research in Information Systems. SAGE Publications Ltd, London (2002)"},{"key":"18_CR21","unstructured":"National Institute of Standards and Technology: NIST Privacy Framework: A tool for improving privacy through Enterprise Risk Management, V1.0, Technical report, NIST CSWP 01162020, National Institute of Standards and Technology, Gaithersburg, MD (2020)"},{"key":"18_CR22","unstructured":"Nguyen, P., Solomon, L.: Consumer data and the digital economy: Emerging issues in data collection, use and sharing, Technical report, Consumer Policy Research Centre, Victoria, Melbourne (2018)"},{"key":"18_CR23","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79 (2004)"},{"key":"18_CR24","unstructured":"Ohm, P.: The rise and fall of invasive ISP surveillance. Univ. Illinois Law Rev. 2009(5) (2009)"},{"key":"18_CR25","first-page":"17","volume":"2716","author":"T Pauli","year":"2020","unstructured":"Pauli, T., Marx, E., Dunzer, S., Matzner, M.: Modeling platform ecosystems. CEUR Workshop Proc. 2716, 17\u201330 (2020)","journal-title":"CEUR Workshop Proc."},{"issue":"1","key":"18_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-014-0011-7","volume":"2014","author":"C Richthammer","year":"2014","unstructured":"Richthammer, C., Netter, M., Riesner, M., S\u00e4nger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. Inf. Secur. 2014(1), 1\u201317 (2014). https:\/\/doi.org\/10.1186\/s13635-014-0011-7","journal-title":"EURASIP J. Inf. Secur."},{"issue":"4","key":"18_CR27","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1108\/BL-01-2020-0001","volume":"33","author":"F Saberian","year":"2020","unstructured":"Saberian, F., Amirshahi, M., Ebrahimi, M., Nazemi, A.: Linking digital platforms\u2019 service dimensions to customers\u2019 purchase. Bottom Line 33(4), 315\u2013335 (2020)","journal-title":"Bottom Line"},{"key":"18_CR28","unstructured":"Salazar, J.: Whose data? Information economics, digital privacy, and the right to be forgotten. In: Austrian Student Scholars Conference (2021)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Solove, D.J.: Conceptualizing privacy. Calif. Law Rev. Inc. 90(4), 1087 \u2013 1155 (2002)","DOI":"10.2307\/3481326"},{"key":"18_CR30","unstructured":"Swanepoel, G.: The rise of South Africa\u2019s resilient ecommerce landscape (2024). https:\/\/newsroom.mastercard.com\/news\/eemea\/en\/perspectives\/en\/2024\/the-rise-of-south-africa-s-resilient-ecommerce-landscape\/"},{"issue":"4","key":"18_CR31","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.3390\/app11041762","volume":"11","author":"D S\u00e1nchez","year":"2021","unstructured":"S\u00e1nchez, D., Viejo, A., Batet, M.: Automatic assessment of privacy policies under the GDPR. Appl. Sci. 11(4), 1762 (2021)","journal-title":"Appl. Sci."},{"key":"18_CR32","unstructured":"Wahyuni, D.: The research design maze: understanding paradigms, cases, methods and methodologies 10(1) (2012)"},{"issue":"1","key":"18_CR33","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1080\/17517570601088380","volume":"1","author":"S Wang","year":"2007","unstructured":"Wang, S., Archer, N.P.: Electronic marketplace definition and classification: literature review and clarifications. Enterp. Inf. Syst. 1(1), 89\u2013112 (2007)","journal-title":"Enterp. Inf. Syst."},{"key":"18_CR34","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1) (1968)"},{"issue":"8","key":"18_CR35","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/systems11080380","volume":"11","author":"R Zahid","year":"2023","unstructured":"Zahid, R., et al.: Secure data management life cycle for government big-data ecosystem: design and development perspective. Systems 11(8), 380 (2023)","journal-title":"Systems"},{"key":"18_CR36","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, 1st edn. PublicAffairs, New York, NY (2019)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00633-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:39:09Z","timestamp":1757360349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00633-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006325","9783032006332"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00633-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}