{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:14:40Z","timestamp":1758708880567,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802928","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T16:21:42Z","timestamp":1483374102000},"page":"48-55","source":"Crossref","is-referenced-by-count":1,"title":["Review of data storage protection approaches for POPI compliance"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Scharnick","sequence":"first","affiliation":[]},{"given":"Mariana","family":"Gerber","sequence":"additional","affiliation":[]},{"given":"Lynn","family":"Futcher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/09685220110366768"},{"year":"0","key":"ref12"},{"journal-title":"South African Government Gazette (2013) Retrieved from","article-title":"Protection of Personal Information Act","year":"2015","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-122"},{"journal-title":"COBIT 5 A Business Framework for the Governance and Management of Enterprise IT","year":"2013","key":"ref18"},{"journal-title":"ITIL The basics","year":"2013","author":"arraj","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/B:SBEJ.0000027667.55821.53"},{"key":"ref3","first-page":"72","article-title":"Information technology capabilities: Suggestions for SME growth","author":"lester","year":"2008","journal-title":"Institute of Behavioral and Applied Management"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/00400910010373723"},{"key":"ref5","first-page":"22","article-title":"Information communication technology (ICT) adoption among SME owners in Malaysia","volume":"2","author":"hashim","year":"2007","journal-title":"International Journal of Business and Information"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2006.12.003"},{"key":"ref7","article-title":"Content analysis: An introduction to its methodology","author":"krippendorff","year":"2012","journal-title":"Sage"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10843-006-7854-z"},{"journal-title":"Issues in SME development in Ghana and South Africa","year":"2010","author":"abor","key":"ref1"},{"key":"ref9","article-title":"The basics of information security: understanding the fundamentals of InfoSec in theory and practice","author":"andress","year":"2014","journal-title":"Syngress"},{"journal-title":"ITIL V3 and Information Security Best Management Practice","year":"2009","author":"clinch","key":"ref20"},{"journal-title":"Why SMEs should back up their data to the cloud","year":"2013","key":"ref21"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802928.pdf?arnumber=7802928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T19:24:30Z","timestamp":1484076270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802928","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}