{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:38:07Z","timestamp":1772642287977,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/ictas.2019.8703636","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T18:41:45Z","timestamp":1556822505000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["A conceptual privacy governance framework"],"prefix":"10.1109","author":[{"given":"Paulus","family":"Swartz","sequence":"first","affiliation":[]},{"given":"Adele","family":"Da Veiga","sequence":"additional","affiliation":[]},{"given":"Nico","family":"Martins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"herath","year":"2011","journal-title":"Building a privacy program A practitioner's guide"},{"key":"ref32","first-page":"1","year":"1988","journal-title":"Privacy Act 1988 No 119"},{"key":"ref31","first-page":"1","year":"2009","journal-title":"Generally Accepted Privacy Principles"},{"key":"ref30","article-title":"Privacy Management Programme: A Best Practice Guide","year":"0","journal-title":"Office of the Privacy Commisioner for Personal Data Hong Kong"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.005"},{"key":"ref36","first-page":"1","article-title":"Factorial Invariance of an Information Security Culture Assessment Instrument for Multinational Organisations With Operations","volume":"4","author":"martins","year":"2015","journal-title":"Regul Gov"},{"key":"ref35","article-title":"Privacy Maturity Model","year":"0","journal-title":"AICPA\/CICA"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/1086.1065898X\/46183.15.3.20060701\/94185.5"},{"key":"ref10","author":"saunders","year":"2016","journal-title":"Research methods for business students"},{"key":"ref11","year":"0","journal-title":"Protection of Personal Information Act Summary | POPIA"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.19030\/iber.v13i6.8922"},{"key":"ref13","year":"0","journal-title":"Press briefing by the Information Regulator 20 September 2017"},{"key":"ref14","article-title":"King III vs King IV - What you really need to know","author":"clamp","year":"0","journal-title":"Grant Thornton South Africa"},{"key":"ref15","year":"0","journal-title":"King IV Report on Corporate Governance for South Africa 2016"},{"key":"ref16","article-title":"King Code of Governance for South Africa 2009","year":"0","journal-title":"The Institute of Directors in Southern Africa"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.12.002"},{"key":"ref18","article-title":"Privacy compliance laws: Why the European Commission has finally got it right","author":"vael","year":"0","journal-title":"CSO Online"},{"key":"ref19","article-title":"Common Privacy Framework CCIM Assessment Projects","year":"0","journal-title":"Community Care Information Management"},{"key":"ref28","article-title":"Privacy management framework: enabling compliance and encouraging good practice","year":"0","journal-title":"Office of the Information and Privacy Commissioner"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.47"},{"key":"ref27","article-title":"Getting Accountability Right with a Privacy Management Program","year":"0","journal-title":"Office of the Information and Privacy Commissioner"},{"key":"ref3","article-title":"IAPP-EY Annual Privacy Governance Report 2016","author":"hughes","year":"0","journal-title":"IAPP-EY"},{"key":"ref6","volume":"1","year":"2016","journal-title":"The EU General Data Protection Regulation is finally agreed"},{"key":"ref29","year":"0","journal-title":"The OECD Privacy Framework"},{"key":"ref5","article-title":"General Data Protection Regulation (EU) 2016\/679","year":"0","journal-title":"Official Journal of the European Union"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/ISTAFRICA.2017.8102340"},{"key":"ref7","first-page":"57","article-title":"A High-Level Comparison between the South African Protection of Personal Information Act and International Data Protection Laws","volume":"12","author":"botha","year":"2017","journal-title":"12th Int Conf Cyber Warf Secur"},{"key":"ref2","first-page":"1","article-title":"Protection Personal information Act, 2013","volume":"581","year":"2013","journal-title":"Natl Gazettes No 37067"},{"key":"ref9","first-page":"39","article-title":"Conceptual Framework: What do you think is going on?","author":"maxwell","year":"2013","journal-title":"Qualitative Research Design An Interactive Approach"},{"key":"ref1","year":"0","journal-title":"Privacy trends 2014 Privacy protection in the age of technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6356-2_3"},{"key":"ref22","article-title":"An examination of BC Goverment's privacy breach management","author":"denham","year":"0","journal-title":"Office of the Information and Privacy Commissioner"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6356-2_5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944730"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32805-3_23"},{"key":"ref26","article-title":"Privacy Governance Framework","author":"pilgrim","year":"0","journal-title":"Information and privacy commission NSW"},{"key":"ref25","first-page":"16","article-title":"Focusing and bounding the collection of data: The substantive start","author":"miles","year":"1994","journal-title":"Qualitative Data Analysis An Expanded Sourcebook"}],"event":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","location":"Durban, South Africa","start":{"date-parts":[[2019,3,6]]},"end":{"date-parts":[[2019,3,8]]}},"container-title":["2019 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8693291\/8703516\/08703636.pdf?arnumber=8703636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:15:38Z","timestamp":1657840538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8703636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ictas.2019.8703636","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}