{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:01:15Z","timestamp":1758704475660,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T00:00:00Z","timestamp":1474848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,26]]},"DOI":"10.1145\/2987491.2987506","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T18:16:29Z","timestamp":1476209789000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act"],"prefix":"10.1145","author":[{"given":"Prittish","family":"Dala","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Pretoria, South Africa"}]},{"given":"Hein S.","family":"Venter","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Pretoria, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"unstructured":"Kuneva M. (2009) \"Keynote Speech - Roundtable on Online Data Collection Targeting and Profiling\" p.2 http:\/\/europa.eu\/rapid\/press-release_SPEECH-09-156_en.pdf (Accessed 6 May 2016).  Kuneva M. (2009) \"Keynote Speech - Roundtable on Online Data Collection Targeting and Profiling\" p.2 http:\/\/europa.eu\/rapid\/press-release_SPEECH-09-156_en.pdf (Accessed 6 May 2016).","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"19","volume-title":"Issue 13","author":"Ali A.","year":"2013"},{"key":"e_1_3_2_1_3_1","first-page":"12","volume-title":"9th Edition","author":"World Economic Forum","year":"2014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1080\/13600869955134"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1111\/j.1467-9833.2008.00433.x"},{"issue":"4","key":"e_1_3_2_1_6_1","first-page":"1423","article-title":"Identity Theft: The Crime of the New Millennium","volume":"80","author":"Hoar S.B.","year":"2001","journal-title":"Oregon Law Review"},{"key":"e_1_3_2_1_7_1","first-page":"14","article-title":"Risk to Entities Regarding Data Breaches - Lessons from a Brief Case Study","volume":"2","author":"Information Systems Audit and Control Association (ISACA).","year":"2014","journal-title":"Information Systems Audit and Control Association (ISACA) Journal"},{"key":"e_1_3_2_1_8_1","first-page":"5","volume-title":"Titus White Paper","author":"Titus","year":"2011"},{"key":"e_1_3_2_1_9_1","first-page":"48","volume-title":"Without Prejudice","volume":"12","author":"Stein P.","year":"2012"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Cape Town and Pretoria: Government Printer","author":"Republic","year":"2009"},{"issue":"37067","key":"e_1_3_2_1_11_1","first-page":"2","article-title":"Protection of Personal Information (POPI) Act (Act 4 of 2013)","author":"Republic","year":"2013","journal-title":"Cape Town: Government Printer"},{"unstructured":"CIBECS. (2012) \"State of Business Data Protection in South Africa\" http:\/\/offers.cibecs.com\/state-of-business-data-protection-in-sa (Accessed 6 May 2016).  CIBECS. (2012) \"State of Business Data Protection in South Africa\" http:\/\/offers.cibecs.com\/state-of-business-data-protection-in-sa (Accessed 6 May 2016).","key":"e_1_3_2_1_12_1"},{"issue":"70","key":"e_1_3_2_1_13_1","first-page":"2205","article-title":"Announcements, Tablings and Committee Reports","author":"Parliament","year":"2015","journal-title":"Cape Town: Government Printer"},{"unstructured":"Michalsons. (2014) \"Protection of Personal Information Act - POPI\" http:\/\/www.michalsons.co.za\/protection-of-personal-information-act-popi\/11105 (Accessed 6 May 2016).  Michalsons. (2014) \"Protection of Personal Information Act - POPI\" http:\/\/www.michalsons.co.za\/protection-of-personal-information-act-popi\/11105 (Accessed 6 May 2016).","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"5","volume-title":"New Age International","author":"Kothari C.R.","year":"2004"}],"event":{"sponsor":["AWS Amazon Web Services","IBM IBM"],"acronym":"SAICSIT '16","name":"SAICSIT '16: Annual Conference of the South African Institute of Computer Scientists and Information Technologists","location":"Johannesburg South Africa"},"container-title":["Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987491.2987506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987491.2987506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987491.2987506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":15,"alternative-id":["10.1145\/2987491.2987506","10.1145\/2987491"],"URL":"https:\/\/doi.org\/10.1145\/2987491.2987506","relation":{},"subject":[],"published":{"date-parts":[[2016,9,26]]},"assertion":[{"value":"2016-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}