{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:29Z","timestamp":1775188109322,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802923","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"9-17","source":"Crossref","is-referenced-by-count":6,"title":["PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment"],"prefix":"10.1109","author":[{"given":"Paulus","family":"Swartz","sequence":"first","affiliation":[]},{"given":"Adele","family":"Da Veiga","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"cohen","year":"0","journal-title":"The Positivist Paradigm"},{"key":"ref38","first-page":"236","article-title":"The A-Z of Social Research Positivism","author":"brewer","year":"2015","journal-title":"SAGE Research Methods"},{"key":"ref33","first-page":"604","article-title":"Hello, POPI? On cold calling, financial intermediaries and advisors and the Protection of Personal Information Bill","volume":"76","author":"millard","year":"2013","journal-title":"Journal of Contemporary Roman-Dutch Law"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359241"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1125170.1125230"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367360209"},{"key":"ref37","first-page":"14","article-title":"2012 State of business data protection in South Africa","year":"0"},{"key":"ref36","article-title":"Turnaround and transformation in cybersecurity","year":"0","journal-title":"PricewaterhouseCoopers (PWC)"},{"key":"ref35","article-title":"2015 Protected Health Information Data Breach Report","author":"widup","year":"0"},{"key":"ref34","year":"0","journal-title":"Financial Advisory and Intermediary Services (FIAS) Act 2002 (Act No 37 of 2002)"},{"key":"ref10","article-title":"The protection of personal information bill: The journey to implementation","year":"0"},{"key":"ref40","first-page":"1159","article-title":"Encyclopedia of Research Design","author":"staller","year":"2010","journal-title":"Encyclopedia of Research Design Qualitative Research"},{"key":"ref11","first-page":"1","article-title":"Sheherezade and the 101 Data Privacy Laws: Origins, Significance and Global Trajectories","volume":"23","author":"greenleaf","year":"2014","journal-title":"Journal of Law and Information Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iilr.2002.08.001"},{"key":"ref13","year":"0","journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 1995"},{"key":"ref14","year":"0","journal-title":"General Data Protection Regulation (GDPR) of 2012"},{"key":"ref15","article-title":"The proposed EU General Data Protection Regulation: A guide for in-house lawyers","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.72"},{"key":"ref17","year":"0","journal-title":"Protection of Personal Information Act (PoPI) 4 of 2013 South African Government"},{"key":"ref18","year":"0","journal-title":"Promotion of Access to Information Act (PAIA) 2 of 2000 South African Government"},{"key":"ref19","author":"heyink","year":"0","journal-title":"Funds Approved for Establishment of Privacy Regulator Privacy Online"},{"key":"ref28","year":"0","journal-title":"A European strategy on the data value chain"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2014.11.002"},{"key":"ref27","first-page":"57","volume":"15","author":"miller","year":"2013","journal-title":"From data to decisions a value chain for big data IT Professional"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/13642987.2010.493360"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.420"},{"key":"ref29","first-page":"42","article-title":"Direct marketing and spam via electronic communications: An analysis of the regulatory framework in South Africa","volume":"47","author":"hamann","year":"2013","journal-title":"De Jure"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2598902"},{"key":"ref8","first-page":"30","article-title":"A not so private world","volume":"14","author":"milo","year":"2013","journal-title":"Without Prejudice"},{"key":"ref7","first-page":"1315","article-title":"the Protection of Personal Information Act and Its Impact on Freedom of Information","volume":"13","author":"de bruyn","year":"0","journal-title":"Int J of E-Business Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/13642980500032156"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v16i1.1948"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2013.6716749"},{"key":"ref20","first-page":"54","article-title":"The partial commencement of the Protection of Personal Information Act, 2013","volume":"14","author":"pillay","year":"2014","journal-title":"Without Prejudice"},{"key":"ref22","first-page":"20","article-title":"Personal data on the Internet-can POPI protect you?","author":"magolego","year":"2014","journal-title":"De Rebus"},{"key":"ref21","first-page":"414","article-title":"Big data held to privacy laws, too","volume":"519","author":"wilson","year":"2015","journal-title":"Correspondence Macmillan Publishers Limited"},{"key":"ref42","first-page":"35","article-title":"Experimental Design and Analysis","author":"seltman","year":"2013"},{"key":"ref24","first-page":"1","article-title":"South African Parliament Enacts Comprehensive Data Protection Law: An Overview of the Protection of Personal Information Bill","author":"calaguas","year":"2013","journal-title":"Africa Law Today"},{"key":"ref41","first-page":"263","article-title":"The A-Z of Social Research Research design","author":"miller","year":"2003","journal-title":"SAGE Research Methods"},{"key":"ref23","year":"0","journal-title":"Consumers Protection Act (CPA) 68 of 2008 South African Government"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335054"},{"key":"ref43","year":"0","journal-title":"Regulation of Interception of Communication and Provision of Communication -Related Information Act (RICA) Act 70 of 2002 South African Government"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2013.6641046"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","location":"Johannesburg, South Africa","start":{"date-parts":[[2016,8,17]]},"end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802923.pdf?arnumber=7802923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T12:03:44Z","timestamp":1484913824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802923","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}