{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T08:47:55Z","timestamp":1748335675327,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335072","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns"],"prefix":"10.1109","author":[{"given":"Mc Donald","family":"van der Merwe","sequence":"first","affiliation":[]},{"given":"Wynand JC","family":"van Staden","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/10864415.2004.11044301","article-title":"Consumer Attitudes: An Empirical Study","volume":"8","author":"tsang","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"key":"ref32","article-title":"Consumer security risks survey 2014: Multi-device threats in a multi-device world","author":"kasperksy","year":"2014","journal-title":"B2B International in conjunction with Kaspersky Lab"},{"article-title":"Case Study Research: Design and Methods","year":"2003","author":"yin","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/249422"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(03)00008-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.22.1.71.17627"},{"key":"ref10","first-page":"193","article-title":"The right to privacy","author":"warren","year":"1889","journal-title":"Harvard Law Review"},{"key":"ref11","article-title":"Privacy","author":"decew","year":"2015","journal-title":"The Stanford Encyclopedia of Philosophy Spring"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","article-title":"IT security and privacy: Design and use of privacy enhancing security mechanisms","author":"fischer-hubner","year":"2001"},{"journal-title":"Organisation for Economic Cooperation and Development Tech Rep","article-title":"OECD Guidelines on the Protection of Privacy and transborder Flows of Personal Data","year":"1980","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00117-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0892-96"},{"article-title":"Background Studies and Invesitigations 11: The road to anonimity","year":"2000","author":"hes","key":"ref17"},{"year":"0","key":"ref18","article-title":"Republic of South Africa: Financial intelligence centre act 38 of 2001"},{"year":"0","key":"ref19","article-title":"Republic of South Africa: Regulation of Interception of Communications and Provision of Communication-related Information Act 70 of 2002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20241"},{"key":"ref4","first-page":"51","article-title":"Mobile Marketing is Yet to Bloom","author":"doherty","year":"2007","journal-title":"Revolution"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20011"},{"key":"ref3","article-title":"Driving Consumer Acceptance of Mobile Marketing: A Theoretical Framework and Empirical Study","volume":"6","author":"bauer","year":"2005","journal-title":"Journal of Electronic Commerce Research"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1080\/02650487.2007.11072997","article-title":"Consumer perceptions and attitudes towards SMS advertising: recent evidence from New Zealand","volume":"26","author":"carroll","year":"2007","journal-title":"International Journal of Advertising"},{"article-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","year":"2009","author":"creswell","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2005.30"},{"key":"ref8","first-page":"29","article-title":"Antecedants of South African High School Pupils' Acceptance of Universities' SMS Advertising","volume":"9","author":"radder","year":"2010","journal-title":"Int J of E-Business Research"},{"key":"ref7","article-title":"Towards an understanding of the youth's perception of, and response to, mobile advertising in an emerging market: an exploratory study","volume":"1","author":"beneke","year":"2011","journal-title":"International Journal of Management and Technology"},{"key":"ref2","first-page":"447","article-title":"Consumer Attitude toward Advertising via Mobile Devices - An Empirical Investigation among Austrian Users","author":"haghirian","year":"2005","journal-title":"ECIS"},{"key":"ref9","first-page":"444","article-title":"Attitudes of young consumers towards SMS advertising","volume":"3","author":"van der waldt","year":"2009","journal-title":"African Journal of Business Management"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2004.10.006"},{"year":"1995","key":"ref20","article-title":"EU Data Protection Directive 95\/46\/EC Tech. Rep"},{"year":"0","key":"ref22","article-title":"Republic of South Africa: Electronic Communications and Transactions Act No 25 of 2002"},{"year":"2013","key":"ref21","article-title":"The Republic of South AFrica: Protection of Personal Information Act"},{"journal-title":"Permission marketing Turning strangers into friends and friends into customers","year":"1999","author":"godin","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/14637150710834578"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.4324\/9780203838020","author":"fishbein","year":"2011","journal-title":"Predicting and Changing Behavior The Reasoned Action Approach Taylor & Francis"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJIIM.2010.030710"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335072.pdf?arnumber=7335072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T16:53:41Z","timestamp":1567356821000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335072","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}