{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:41Z","timestamp":1750221041866,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T00:00:00Z","timestamp":1537920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,26]]},"DOI":"10.1145\/3278681.3278712","type":"proceedings-article","created":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T13:05:43Z","timestamp":1541768743000},"page":"258-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A data privacy model based on internet of things and cyber-physical systems reference architectures"],"prefix":"10.1145","author":[{"given":"Ntsako","family":"Baloyi","sequence":"first","affiliation":[{"name":"University of Pretoria, Pretoria, South Africa"}]},{"given":"Paula","family":"Kotz\u00e9","sequence":"additional","affiliation":[{"name":"University of Pretoria, Hatfield, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.24"},{"key":"e_1_3_2_1_2_1","unstructured":"Adolphs P. Bedenbender H. Dirzus D. Ehlich M. Epple U. Hankel M. Heidel R. Hoffmeister M. Huhle H. K\u00e4rcher B. Koziolek H. Pichler R. Pollmeier S. Schewe F. Walter A. Waser B. and Wollschlaeger M. 2015. Reference architecture model industrie 4.0 (RAMI4.0).  Adolphs P. Bedenbender H. Dirzus D. Ehlich M. Epple U. Hankel M. Heidel R. Hoffmeister M. Huhle H. K\u00e4rcher B. Koziolek H. Pichler R. Pollmeier S. Schewe F. Walter A. Waser B. and Wollschlaeger M. 2015. Reference architecture model industrie 4.0 (RAMI4.0) ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v8i8.4841"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.86"},{"volume-title":"RFID Journal Emerald Expositions.","year":"2009","author":"Ashton K.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Babar S. Mahalle P. Stango A. Prasad N. and Prasad R. 2010. Proposed security model and threat taxonomy for the Internet of Things (IoT). Recent Trends in Network Security and Applications 420 - 429.  Babar S. Mahalle P. Stango A. Prasad N. and Prasad R. 2010. Proposed security model and threat taxonomy for the Internet of Things (IoT). Recent Trends in Network Security and Applications 420 - 429.","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2016.02.004"},{"volume-title":"IST-Africa 2017 Conference Proceedings, P. Cunningham and M. Cunningham Eds., 1 - 11","author":"Baloyi N.","key":"e_1_3_2_1_8_1"},{"volume-title":"IST-Africa 2017 Conference Proceedings, P. Cunningham and M. Cunningham Eds. IIMC, 1-11","author":"Baloyi N.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Baloyi N. and Kotz\u00e9 P. 2018. A Review of Data Privacy Frameworks for the Internet of Things. CSIR.  Baloyi N. and Kotz\u00e9 P. 2018. A Review of Data Privacy Frameworks for the Internet of Things. CSIR."},{"key":"e_1_3_2_1_11_1","unstructured":"Brettel M. Friederichsen N. Keller M. and Rosenberg M. 2014. How virtualization decentralization and network building change the manufacturing landscape: An Industry 4.0 perspective. International Journal of Information and Communication Engineering 8 1 37 - 44.  Brettel M. Friederichsen N. Keller M. and Rosenberg M. 2014. How virtualization decentralization and network building change the manufacturing landscape: An Industry 4.0 perspective. International Journal of Information and Communication Engineering 8 1 37 - 44."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Broy M. 2010. Cyber-Physikal Systems: Innovation durch softwareintensive eingebettete Systeme.  Broy M. 2010. Cyber-Physikal Systems: Innovation durch softwareintensive eingebettete Systeme.","DOI":"10.1007\/978-3-642-14901-6"},{"volume-title":"Consumer Protection in the Age of the Information Economy","author":"Cate F.H.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Privacy and Security by Design: An Enterprise Architecture Approach IPC","author":"Cavoukian A.","year":"2013","journal-title":"Ontario"},{"volume-title":"32nd International Conference of Data Protection and Privacy Commissioners.","author":"Cavoukian A.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389151"},{"key":"e_1_3_2_1_17_1","first-page":"107","article-title":"Assessing the leakers: criminal or heroes","volume":"8","author":"Cole D.D.","year":"2015","journal-title":"Journal of National Security Law & Policy"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845505"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2014.2361192"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00371.x"},{"key":"e_1_3_2_1_21_1","unstructured":"European Union 2016. GDPR Portal: Site Overview.  European Union 2016. GDPR Portal: Site Overview."},{"volume-title":"2016 14th Annual Conference on Privacy, Security and Trust (PST) IEEE, 706 - 713","author":"Foukia N.","key":"e_1_3_2_1_22_1"},{"volume-title":"Communications and Network Security (CNS), 2015 IEEE Conference on IEEE, 705 - 706","author":"Funke S.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Government of South Africa 1996. Constitution of the Republic of South Africa 1 - 182.  Government of South Africa 1996. Constitution of the Republic of South Africa 1 - 182.","DOI":"10.1080\/02587203.1997.11834934"},{"key":"e_1_3_2_1_25_1","unstructured":"Government of South Africa 2000. Promotion of Access to Information Act 2 of 2002.  Government of South Africa 2000. Promotion of Access to Information Act 2 of 2002."},{"key":"e_1_3_2_1_26_1","unstructured":"Government of South Africa 2013. Protection of Personal Information Act 4 of 2013.  Government of South Africa 2013. Protection of Personal Information Act 4 of 2013."},{"key":"e_1_3_2_1_27_1","unstructured":"Government of the United Kingdom 1998. Data Protection Act 29 of 1998.  Government of the United Kingdom 1998. Data Protection Act 29 of 1998."},{"key":"e_1_3_2_1_28_1","unstructured":"Ico 2013. Privacy impact assessment and risk management. Information Commissioner's Office Wilmslow.  Ico 2013. Privacy impact assessment and risk management. Information Commissioner's Office Wilmslow."},{"key":"e_1_3_2_1_29_1","unstructured":"Ico 2013. Privacy in mobile apps: Guidance for app developers. Information Commissioner's Office Wilmslow.  Ico 2013. Privacy in mobile apps: Guidance for app developers. Information Commissioner's Office Wilmslow."},{"key":"e_1_3_2_1_30_1","unstructured":"Information & Privacy Commissioner of Ontario 2013. Privacy by Design.  Information & Privacy Commissioner of Ontario 2013. Privacy by Design."},{"key":"e_1_3_2_1_31_1","unstructured":"Institute of Directors Southern Africa 2016. King IV Report on Corporate Governance for South Africa 2016.  Institute of Directors Southern Africa 2016. King IV Report on Corporate Governance for South Africa 2016."},{"volume-title":"ISO\/IEC 27001:2013 ISO","author":"Iso","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"Iso\/Iec\/Ieee 2011. Systems and software engineering - Architecture description. In ISO\/IEC\/IEEE 42010:2011 International Organization for Standardization Geneva.  Iso\/Iec\/Ieee 2011. Systems and software engineering - Architecture description. In ISO\/IEC\/IEEE 42010:2011 International Organization for Standardization Geneva."},{"key":"e_1_3_2_1_34_1","unstructured":"Itu 2005. The Internet of Things International Telecommunication Union.  Itu 2005. The Internet of Things International Telecommunication Union."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7907015"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"e_1_3_2_1_40_1","unstructured":"Lee E.A. and Seshia S.A. 2011. Introduction to Embedded Systems LeeSeshia.org.   Lee E.A. and Seshia S.A. 2011. Introduction to Embedded Systems LeeSeshia.org."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"e_1_3_2_1_42_1","unstructured":"Lin S.-W. Miller B. Durand J. Bleakley G. Chigani A. Martin R. Murphy B. and Crawford M. 2017. The Industrial Internet of Things volume G1: Reference architecture. Industrial Internet Consortium.  Lin S.-W. Miller B. Durand J. Bleakley G. Chigani A. Martin R. Murphy B. and Crawford M. 2017. The Industrial Internet of Things volume G1: Reference architecture. Industrial Internet Consortium."},{"key":"e_1_3_2_1_43_1","unstructured":"Lin S. Miller B. Durand J. Bleakley G. Chigani A. Martin R. Murphy B. and Crawford M. 2017. The Industrial Internet of Things volume G1: Reference architecture. Industrial Internet Consortium.  Lin S. Miller B. Durand J. Bleakley G. Chigani A. Martin R. Murphy B. and Crawford M. 2017. The Industrial Internet of Things volume G1: Reference architecture. Industrial Internet Consortium."},{"volume-title":"Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium IEEE, 153 - 159","author":"Ma Z.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"e_1_3_2_1_46_1","unstructured":"Mcafee 2014. Securing the Internet of Things. McAfee.  Mcafee 2014. Securing the Internet of Things. McAfee."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2011.6116428"},{"key":"e_1_3_2_1_48_1","unstructured":"Minerva R. Biru A. and Rotondi D. 2015. Towards a definition of the Internet of Things (IoT). IEEE Internet Initiative.  Minerva R. Biru A. and Rotondi D. 2015. Towards a definition of the Internet of Things (IoT) . IEEE Internet Initiative."},{"key":"e_1_3_2_1_49_1","unstructured":"Nymity 2018. Privacy management accountability framework.  Nymity 2018. Privacy management accountability framework."},{"key":"e_1_3_2_1_50_1","unstructured":"Oecd 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data.  Oecd 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data."},{"key":"e_1_3_2_1_51_1","unstructured":"Oecd 2013. Supplementary explanatory memorandum to the revised recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data (2013). In OECD Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data OECD 19 -37.  Oecd 2013. Supplementary explanatory memorandum to the revised recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data (2013). In OECD Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data OECD 19 -37."},{"key":"e_1_3_2_1_52_1","unstructured":"Oetzel M.C. and Spiekermann S. 2012. Privacy-by-Design Through Systematic Privacy Impact Assessment - A Design Science Approach. In European Conference on Information Systems 2012 Proceedings Association for Information Systems Electronic Library Online 160 - 171.  Oetzel M.C. and Spiekermann S. 2012. Privacy-by-Design Through Systematic Privacy Impact Assessment - A Design Science Approach. In European Conference on Information Systems 2012 Proceedings Association for Information Systems Electronic Library Online 160 - 171."},{"key":"e_1_3_2_1_53_1","unstructured":"Panetta K. 2016. 7 Technologies Underpin the Hype Cycle for the Internet of Things 2016 Gartner.  Panetta K. 2016. 7 Technologies Underpin the Hype Cycle for the Internet of Things 2016 Gartner."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991566"},{"key":"e_1_3_2_1_55_1","unstructured":"Petroulakis N.E. Askoxylakis I.G. Traganitis A. and Spanoudakis G. 2013. Human Aspects of Information Security Privacy and Trust. Springer.  Petroulakis N.E. Askoxylakis I.G. Traganitis A. and Spanoudakis G. 2013. Human Aspects of Information Security Privacy and Trust. Springer."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.28"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11740-014-0586-3"},{"key":"e_1_3_2_1_59_1","unstructured":"Sherwood J. Clark A. and Lyna D. 2009. Enterprise Security Architecture. SABSA.   Sherwood J. Clark A. and Lyna D. 2009. Enterprise Security Architecture. SABSA."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"volume-title":"2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) IEEE, 376 - 380","author":"Tan L.","key":"e_1_3_2_1_62_1"},{"volume-title":"Data Protection Regulations and International Data Flows: Implications for Trade and Development United Nations","author":"Tesfachew T.","key":"e_1_3_2_1_63_1"},{"volume-title":"6th International Conference on Computing and Informatics, Kuala Lumpur, 175 - 183","author":"Thinakaran K.","key":"e_1_3_2_1_64_1"},{"key":"e_1_3_2_1_65_1","first-page":"154","article-title":". Analyzing IoT Reference Architecture Models","volume":"5","author":"Torkaman M.","year":"2016","journal-title":"International Journal of Computer Science and Software Engineering"},{"first-page":"384","volume-title":"Proceedings of the ICITST'(2016)","author":"Torre H.","key":"e_1_3_2_1_66_1"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54069-1_4"},{"key":"e_1_3_2_1_68_1","unstructured":"Van Thienen S. Clinton A. Mahto M. and Sniderman B. 2016. Industry 4.0 and the chemicals industry. Deloitte University Press.  Van Thienen S. Clinton A. Mahto M. and Sniderman B. 2016. Industry 4.0 and the chemicals industry. Deloitte University Press."},{"volume-title":"Proceedings of 2014 International Conference on Contemporary Computing and Informatics (IC3I) IEEE, Piscataway, 634 - 638","author":"Varghese A.","key":"e_1_3_2_1_69_1"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.04.008"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"e_1_3_2_1_72_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin A.F.","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.20"},{"volume-title":"Proceedings 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE","year":"2010","author":"Wu M.","key":"e_1_3_2_1_74_1"},{"key":"e_1_3_2_1_75_1","unstructured":"Zachman J.A. 2016. The Framework for Enterprise Architecture: Background Description and Utility Zachman International Monument.  Zachman J.A. 2016. The Framework for Enterprise Architecture: Background Description and Utility Zachman International Monument."}],"event":{"name":"SAICSIT '18: 2018 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '18","location":"Port Elizabeth South Africa"},"container-title":["Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278681.3278712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3278681.3278712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:54Z","timestamp":1750207434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278681.3278712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,26]]},"references-count":75,"alternative-id":["10.1145\/3278681.3278712","10.1145\/3278681"],"URL":"https:\/\/doi.org\/10.1145\/3278681.3278712","relation":{},"subject":[],"published":{"date-parts":[[2018,9,26]]},"assertion":[{"value":"2018-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}