{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:18:43Z","timestamp":1742980723754,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448046"},{"type":"electronic","value":"9783319448053"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44805-3_7","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T01:03:04Z","timestamp":1472000584000},"page":"72-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure"],"prefix":"10.1007","author":[{"given":"Johnny","family":"Botha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mariki","family":"Eloff","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"7_CR1","unstructured":"Shackleford, D.: When Breaches Happen: Top Five Questions to Prepare for. A SANS Whitepaper, SANS Institute, June 2012. \n                    http:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/breaches-happen-top-questions-prepare-35220\n                    \n                  . Accessed 3 June 2016"},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(12)70061-1","volume":"2012","author":"Y Rozenberg","year":"2012","unstructured":"Rozenberg, Y.: Challenges in PII data protection. Comput. Fraud Secur. 2012(6), 5\u20139 (2012)","journal-title":"Comput. Fraud Secur."},{"key":"7_CR3","unstructured":"Data breaches often not detected for months, report finds, Global Space (2013). \n                    https:\/\/www.globalscape.com\/blog\/2013\/2\/14\/data-breaches-often-not-detected-for-months-report-finds\n                    \n                  . Accessed 12 Jan 2016"},{"key":"7_CR4","unstructured":"South African Government Gazette: Protection of Personal Information Act (2013). \n                    www.gov.za\/documents\/download.php?f=204368\n                    \n                  \n          \n                    .\n                   Accessed Nov 2014"},{"key":"7_CR5","unstructured":"Botha, J., Eloff, M., Swart, I.: Pro-active data breach detection: examining accuracy and applicability on personal information detected. In: Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016, Boston (2016)"},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1002\/pam.20567","volume":"30","author":"S Romanosky","year":"2011","unstructured":"Romanosky, S., Telang, R., Acquisti, A.: Do data breach disclosure laws reduce identity theft? J. Policy Anal. Manag. 30(2), 256\u2013286 (2011)","journal-title":"J. Policy Anal. Manag."},{"key":"7_CR7","unstructured":"Justice and Constitutional Development: Discussion of the Cybercrimes and Cybersecurity Bill, Republic of South Africa (2015). \n                    http:\/\/www.justice.gov.za\/legislation\/invitations\/CyberCrimesDiscussionDocument2015.pdf\n                    \n                  \n          \n                    .\n                   Accessed 11 Jan 2016"},{"key":"7_CR8","unstructured":"Reynolds, G.: Ethics in Information Technology: Thomson Learning, Canada (2003)"},{"key":"7_CR9","unstructured":"Noblet, T.: Business IT: Understanding Regulatory Compliance, (N.D.). \n                    https:\/\/technet.microsoft.com\/en-us\/magazine\/2006.09.businessofit.aspx\n                    \n                  \n          \n                    .\n                   Accessed 11 Jan 2016"},{"key":"7_CR10","first-page":"171","volume-title":"Cyber-law @ SA II - the Law of the Internet in South Africa","author":"D Goodburn","year":"2004","unstructured":"Goodburn, D., Ngoye, M.: Privacy and the internet. In: Buys, R.-H., Cronj\u00e9, F. (eds.) Cyber-law @ SA II - the Law of the Internet in South Africa, 2nd edn, p. 171. Van Schaik Publishers, Pretoria (2004)","edition":"2"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Botha, J., Eloff, M., Swart, I.: The effects of the PoPI Act on small and medium enterprises in South Africa. In: Information Security for South Africa (ISSA), Johannesburg (2015)","DOI":"10.1109\/ISSA.2015.7335054"},{"key":"7_CR12","unstructured":"Wietryk, K.: Data Protection in the European Union and other Selected Countries: A New Comparative Study, (N.D.). \n                    http:\/\/www.kwr.at\/fileadmin\/res\/pdf\/publikationen\/mag-arno-cichocki\/10541_Data_Protection_Austria.pdf\n                    \n                  . Accessed Feb 2015"},{"key":"7_CR13","volume-title":"Information Ethics and the Law","author":"B Hannes","year":"2012","unstructured":"Hannes, B., Marius, A.: Information Ethics and the Law. Van Schaik Publishers, Pretoria (2012)"},{"key":"7_CR14","unstructured":"Botha, J., Eloff, M., Swart, I.: Evaluation of online resources on the implementation of the protection of personal information act in South Africa. In: Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015, Kruger National Park (2015)"},{"key":"7_CR15","unstructured":"Pearson, A.: Protect Your Organization Against 91\u00a0% of Data Breaches (2015). \n                    http:\/\/blog.securityinnovation.com\/blog\/2015\/11\/protect-organization-against-91-percent-data-breaches.html\n                    \n                  . Accessed 15 Jan 2016"},{"key":"7_CR16","unstructured":"Office of the Information and Privacy Commissioner: Privacy-Proofing Your Retail Business - Tips for Protecting Customers\u2019 Personal Information. Canada (2007)"},{"key":"7_CR17","unstructured":"Michalsons: Information Regulator in South Africa (2015). \n                    http:\/\/www.michalsons.co.za\/blog\/information-regulator-in-south-africa\/13893\n                    \n                  . Accessed 11 Jan 2016"},{"key":"7_CR18","unstructured":"Republic of South Africa: Protection of Personal Information Act (2013)"},{"key":"7_CR19","unstructured":"Paganini, P.: Cybercrime exploits Anthem data breach in Phishing campaigns (2015). \n                    http:\/\/securityaffairs.co\/wordpress\/33278\/cyber-crime\/anthem-phishing-campaigns.html\n                    \n                  . Accessed 14 Jan 2016"},{"key":"7_CR20","unstructured":"Zetter, K.: Hackers Finally Post Stolen Ashley Madison Data. \n                    http:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/\n                    \n                  . Accessed 11 Jan 2016"}],"container-title":["IFIP Advances in Information and Communication Technology","Technology and Intimacy: Choice or Coercion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44805-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:05:33Z","timestamp":1598227533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44805-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448046","9783319448053"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44805-3_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}