{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:29Z","timestamp":1730276489489,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335047","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?"],"prefix":"10.1109","author":[{"given":"Murdoch","family":"Watney","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Spy wars: South Africa is not innocent","year":"2013","author":"de wet","key":"ref10"},{"article-title":"Wat word regtig alles afgeluister?","year":"2015","author":"george","key":"ref11"},{"key":"ref12","first-page":"511","article-title":"Identity theft: the mirror reflects another face","volume":"3","author":"watney","year":"2004","journal-title":"TSAR"},{"key":"ref13","first-page":"95","volume":"10","author":"o'harrow","year":"2006","journal-title":"No Place to Hide"},{"key":"ref14","first-page":"26","article-title":"Hate speech is a crime: Equality Court rules in favour of domestic worker","author":"williams","year":"2015","journal-title":"De Rebus"},{"year":"2015","key":"ref15","article-title":"Govt targets xenophobic content"},{"article-title":"Parliament must restore public trust after spy cable scandal","year":"2015","author":"heard","key":"ref16"},{"article-title":"Greenpeace head kumi Naidoo saddened at spying revelations","year":"2015","author":"smith","key":"ref17"},{"key":"ref18","first-page":"70","article-title":"Nowhere to Hide - Big Brother is Watching You: Non-communiative Personal Cellphone Information and the Right to Privacy","volume":"1","author":"hamman","year":"2010","journal-title":"Speculum Juris"},{"article-title":"Data Retention Directive Declared Invalid by EU Court of Justice","year":"2014","author":"corbet","key":"ref19"},{"article-title":"Facebook does U-turn on atheist group ban","year":"2015","author":"alfreds","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/9789812837042_0027"},{"article-title":"Secret State: How the government speis on you","year":"2011","author":"swart","key":"ref6"},{"article-title":"RICA: Is it unconstitutional?","year":"2011","author":"de vos","key":"ref5"},{"article-title":"SA govt secrecy getting worse: report","year":"2014","author":"writer","key":"ref8"},{"article-title":"Rica-what is the point?","year":"2014","author":"writer","key":"ref7"},{"article-title":"Digital tsunami to hit SA workplace","year":"2015","author":"van zyl","key":"ref2"},{"key":"ref1","first-page":"279","article-title":"Cyber War","volume":"2","author":"clarke","year":"2012"},{"article-title":"A critique of the General Intelligence Laws Amendment Act","year":"2012","author":"nathan","key":"ref9"},{"article-title":"UPD Commons Intelligence and Security Committee blames ISPs for murder","year":"2014","author":"jackson","key":"ref20"},{"key":"ref22","first-page":"1","article-title":"Muslim clerics slate &#x2018;murderous&#x2019; Islamic State","author":"khoisan","year":"2015","journal-title":"Saturday Star"},{"article-title":"ISIS is commiting war crimes on the Internet","year":"2015","author":"fidler","key":"ref21"},{"key":"ref24","first-page":"7","article-title":"Cybersecurity and Cyberwar","author":"singer","year":"2014"},{"article-title":"SA an attractive destination for terrorism funding networks","year":"2015","author":"benjamin","key":"ref23"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335047.pdf?arnumber=7335047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:57:02Z","timestamp":1490399822000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335047","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}