{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:11Z","timestamp":1750306571382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T00:00:00Z","timestamp":1411948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,29]]},"DOI":"10.1145\/2664591.2664596","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T12:29:24Z","timestamp":1413289764000},"page":"11-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Framework to Integrate ICT Security Awareness into the South African Schooling System"],"prefix":"10.1145","author":[{"given":"Mvelo","family":"Walaza","sequence":"first","affiliation":[{"name":"University of South Africa, South Africa"}]},{"given":"Marianne","family":"Loock","sequence":"additional","affiliation":[{"name":"University of South Africa, South Africa"}]},{"given":"Elmarie","family":"Kritzinger","sequence":"additional","affiliation":[{"name":"University of South Africa, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2014,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amedzo K.E. 2007. The Integration of Information and Communication technology into Rural Schools of South Africa: A Case Study of Schools in Malamulele. Stellenbosch University.  Amedzo K.E. 2007. The Integration of Information and Communication technology into Rural Schools of South Africa: A Case Study of Schools in Malamulele. Stellenbosch University."},{"key":"e_1_3_2_1_2_1","unstructured":"Department of Communications 2014. National Integrated ICT Policy Green Paper. Gorvenment Gazette.  Department of Communications 2014. National Integrated ICT Policy Green Paper. Gorvenment Gazette."},{"key":"e_1_3_2_1_3_1","unstructured":"Department of Education 2007. Guidelines for Teacher Training and Professional Development in ICT. (2007).  Department of Education 2007. Guidelines for Teacher Training and Professional Development in ICT. (2007)."},{"key":"e_1_3_2_1_4_1","unstructured":"Department of Education 2004. White Paper on e-Education. Government Gazette.  Department of Education 2004. White Paper on e-Education. Government Gazette."},{"key":"e_1_3_2_1_5_1","unstructured":"Draper K. 2010. Understanding science teachers' use and integration of ICT in a developing country context. University of Pretoria.  Draper K. 2010. Understanding science teachers' use and integration of ICT in a developing country context. University of Pretoria."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.006"},{"key":"e_1_3_2_1_7_1","unstructured":"Edwards C.K. 2013. A Framework for the Governance of Information Security. Nova Southeastern University.  Edwards C.K. 2013. A Framework for the Governance of Information Security. Nova Southeastern University."},{"volume-title":"South Africa: A supply-and demand-side analysis of the ICT sector. Evidence for ICT Policy Action. 7","year":"2012","author":"Gillwald A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Information and Communication Technology for Education in India and South Asia: 2010. http:\/\/www.infodev.org\/infodev-files\/resource\/InfodevDocuments_1016.pdf. Accessed: 2013-06-22.  Information and Communication Technology for Education in India and South Asia: 2010. http:\/\/www.infodev.org\/infodev-files\/resource\/InfodevDocuments_1016.pdf. Accessed: 2013-06-22."},{"key":"e_1_3_2_1_10_1","unstructured":"ISACA 2009. An Introduction to the Business Model for Information Security. ISACA.  ISACA 2009. An Introduction to the Business Model for Information Security. ISACA."},{"key":"e_1_3_2_1_11_1","unstructured":"Kritzinger E. 2006. An Information Security Retrieval And Awareness Model For Industry. University of South Africa.  Kritzinger E. 2006. An Information Security Retrieval And Awareness Model For Industry. University of South Africa."},{"key":"e_1_3_2_1_12_1","unstructured":"Kritzinger E. and Padayachee K. 2010. Teaching Safe and Secure usage of ICTs in South African Schools.  Kritzinger E. and Padayachee K. 2010. Teaching Safe and Secure usage of ICTs in South African Schools."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"e_1_3_2_1_14_1","unstructured":"Mdlongwa T. 2012. Information and Communication Technology ( ICT ) as a Means of Enhancing Education in Schools in South Africa: Challenges Benefits and Recommendations. Africa Institute of South Africa.  Mdlongwa T. 2012. Information and Communication Technology ( ICT ) as a Means of Enhancing Education in Schools in South Africa: Challenges Benefits and Recommendations. Africa Institute of South Africa."},{"key":"e_1_3_2_1_15_1","unstructured":"Mikre F. 2011. The Roles of Information Communication Technologies in Education Review Article with Emphasis to the Computer and Internet. July (2011).  Mikre F. 2011. The Roles of Information Communication Technologies in Education Review Article with Emphasis to the Computer and Internet. July (2011)."},{"volume-title":"Towards Carnegie III (Cape Town","year":"2012","author":"Ndlovu N.S.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"132","article-title":"Protecting Children from Exposure to Pornography in South Africa","volume":"11","author":"Nevondwe L.","year":"2014","journal-title":"Bangladesh e-Journal of Sociology."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047594.2047628"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJIET.2012.V2.196"},{"key":"e_1_3_2_1_20_1","unstructured":"SA students pour R6.1 billion into tech: 2014. http:\/\/businesstech.co.za\/news\/general\/55685\/sa-students-pour-r6-1-billion-into-tech\/. Accessed: 2014-04-16.  SA students pour R6.1 billion into tech: 2014. http:\/\/businesstech.co.za\/news\/general\/55685\/sa-students-pour-r6-1-billion-into-tech\/. Accessed: 2014-04-16."},{"key":"e_1_3_2_1_21_1","unstructured":"SA's security awareness lags: 2011. http:\/\/www.itweb.co.za\/index.php?option=com_content&view=article&id=42395. Accessed: 2014-03-30.  SA's security awareness lags: 2011. http:\/\/www.itweb.co.za\/index.php?option=com_content&view=article&id=42395. Accessed: 2014-03-30."},{"key":"e_1_3_2_1_22_1","unstructured":"South African Centre for Information Security: 2010. http:\/\/www.sacfis.co.za\/index.htm. Accessed: 2014-03-27.  South African Centre for Information Security: 2010. http:\/\/www.sacfis.co.za\/index.htm. Accessed: 2014-03-27."},{"key":"e_1_3_2_1_23_1","unstructured":"The European Network and Information Security Agency (ENISA) 2010. The new users' guide: How to raise information security awareness.  The European Network and Information Security Agency (ENISA) 2010. The new users' guide: How to raise information security awareness."},{"key":"e_1_3_2_1_24_1","unstructured":"Da Veiga A. 2008. Cultivating and Assessing Information Security Culture. University of Pretoria.  Da Veiga A. 2008. Cultivating and Assessing Information Security Culture. University of Pretoria."},{"volume-title":"Journal of Information Technology Education: Innovations in Practice. 11","year":"2012","author":"Wayman I.","key":"e_1_3_2_1_25_1"}],"event":{"name":"SAICSIT '14: Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014","acronym":"SAICSIT '14","location":"Centurion South Africa"},"container-title":["Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014 on SAICSIT 2014 Empowered by Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664591.2664596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664591.2664596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:24Z","timestamp":1750227204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664591.2664596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,29]]},"references-count":25,"alternative-id":["10.1145\/2664591.2664596","10.1145\/2664591"],"URL":"https:\/\/doi.org\/10.1145\/2664591.2664596","relation":{},"subject":[],"published":{"date-parts":[[2014,9,29]]},"assertion":[{"value":"2014-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}