{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:16Z","timestamp":1750220836057,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T00:00:00Z","timestamp":1568678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,17]]},"DOI":"10.1145\/3351108.3351143","type":"proceedings-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:32:59Z","timestamp":1567513979000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Guidelines for Data Privacy Compliance"],"prefix":"10.1145","author":[{"given":"Ntsako","family":"Baloyi","sequence":"first","affiliation":[{"name":"CSIR and Department of Informatics, University of Pretoria, Pretoria, South Africa"}]},{"given":"Paula","family":"Kotz\u00e9","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Pretoria, Pretoria, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2019,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2016.02.004"},{"key":"e_1_3_2_1_3_1","unstructured":"G. Baldini I. Kounelis I.N. Fovino and R. Neisse 2013. Critical Information Infrastructures Security. Springer Berlin Germany.  G. Baldini I. Kounelis I.N. Fovino and R. Neisse 2013. Critical Information Infrastructures Security. Springer Berlin Germany."},{"key":"e_1_3_2_1_4_1","unstructured":"N. Baloyi. 2019. A Data Privacy Framework for Cyber-physical Systems and Internet of Things for Information Technology Professionals. (Philosophiae Doctor) University of Pretoria Pretoria.  N. Baloyi. 2019. A Data Privacy Framework for Cyber-physical Systems and Internet of Things for Information Technology Professionals. (Philosophiae Doctor) University of Pretoria Pretoria."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278681.3278712"},{"volume-title":"Proceedings of the Consumer Protection in the Age of the \"Information Economy. \" (Hampshire, UK2006)","year":"2006","author":"Cate F.H.","key":"e_1_3_2_1_6_1"},{"volume-title":"Design: An Enterprise Architecture Approach. Information and Privacy Commissioner.","year":"2013","author":"Cavoukian A.","key":"e_1_3_2_1_7_1"},{"volume-title":"32nd International Conference of Data Protection and Privacy Commissioners.","author":"Cavoukian A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":". Security of Cyber-Physical Systems","volume":"5","author":"Colbert E.","year":"2017","journal-title":"Journal of Cyber Security and Information Systems"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_2_1_11_1","unstructured":"DITAS. (2017). Data-Driven Applications in Manufacturing - Drowning in the Data Lake. https:\/\/www.ditas-project.eu\/data-driven-applications-manufacturing-drowning-data-lake\/  DITAS. (2017). Data-Driven Applications in Manufacturing - Drowning in the Data Lake. https:\/\/www.ditas-project.eu\/data-driven-applications-manufacturing-drowning-data-lake\/"},{"key":"e_1_3_2_1_12_1","unstructured":"European Union. (2016). GDPR Portal: Site Overview. https:\/\/www.eugdpr.org\/eugdpr.org.html  European Union. (2016). GDPR Portal: Site Overview. https:\/\/www.eugdpr.org\/eugdpr.org.html"},{"key":"e_1_3_2_1_13_1","unstructured":"European Union 2016. Regulation (EU) 2016\/679.  European Union 2016. Regulation (EU) 2016\/679."},{"volume-title":"2016 14th Annual Conference on Privacy, Security and Trust (PST) IEEE, 706 - 713","author":"Foukia N.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"R. Gellman 2012. Fair Information Practices: A Basic History.  R. Gellman 2012. Fair Information Practices: A Basic History."},{"key":"e_1_3_2_1_16_1","unstructured":"Government of South Africa 2000. Promotion of Access to Information Act 2 of 2000 Government of South Africa.  Government of South Africa 2000. Promotion of Access to Information Act 2 of 2000 Government of South Africa."},{"key":"e_1_3_2_1_17_1","unstructured":"Government of South Africa 2013. Protection of Personal Information Act 4 of 2013 Government Printing Works.  Government of South Africa 2013. Protection of Personal Information Act 4 of 2013 Government Printing Works."},{"key":"e_1_3_2_1_18_1","unstructured":"Government of South Africa 2013. Protection of Personal Information Act 4 of 2013.  Government of South Africa 2013. Protection of Personal Information Act 4 of 2013."},{"key":"e_1_3_2_1_19_1","unstructured":"ICO 2005. The Employment Practices Code: Supplementary Guidance. Information Commissioner's Office.  ICO 2005. The Employment Practices Code: Supplementary Guidance. Information Commissioner's Office."},{"key":"e_1_3_2_1_20_1","unstructured":"ICO 2010. Personal Information Online Code of Practice. Information Commissioner's Office.  ICO 2010. Personal Information Online Code of Practice. Information Commissioner's Office."},{"key":"e_1_3_2_1_21_1","unstructured":"ICO 2011. Data Sharing Code of Practice. Information Commissioner's Office.  ICO 2011. Data Sharing Code of Practice. Information Commissioner's Office."},{"key":"e_1_3_2_1_22_1","unstructured":"ICO 2011. The Employment Practices Code. Information Commissioner's Office.  ICO 2011. The Employment Practices Code. Information Commissioner's Office."},{"volume-title":"Anonymisation: Managing Data Protection Risk Code of Practice. Information Commissioner's Office.","year":"2012","author":"ICO","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"ICO 2013. Bring Your Own Device (BYOD). Information Commissioner's Office.  ICO 2013. Bring Your Own Device (BYOD). Information Commissioner's Office."},{"key":"e_1_3_2_1_25_1","unstructured":"ICO 2013. Privacy impact assessment and risk management. Information Commissioner's Office Wilmslow.  ICO 2013. Privacy impact assessment and risk management. Information Commissioner's Office Wilmslow."},{"key":"e_1_3_2_1_26_1","unstructured":"ICO 2014. Conducting Privacy Impact Assessments Code of Practice. Information Commissioner's Office.  ICO 2014. Conducting Privacy Impact Assessments Code of Practice. Information Commissioner's Office."},{"key":"e_1_3_2_1_27_1","unstructured":"ICO 2014. Data Protection and Journalism: A Guide for the Media Information Commissioner's Office.  ICO 2014. Data Protection and Journalism: A Guide for the Media Information Commissioner's Office."},{"key":"e_1_3_2_1_28_1","unstructured":"ICO 2014. Protecting Personal Data in Online Services: Learning from the Mistakes of Others. Information Commissioner's Office.  ICO 2014. Protecting Personal Data in Online Services: Learning from the Mistakes of Others. Information Commissioner's Office."},{"key":"e_1_3_2_1_29_1","unstructured":"ICO 2014. Subject Access Code of Practice Information Commissioner's Office.  ICO 2014. Subject Access Code of Practice Information Commissioner's Office."},{"volume-title":"Picture: A Data Protection Code of Practice for Surveillance Cameras and Personal Information Information Commissioner's Office.","year":"2015","author":"ICO","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"ICO 2016. Consultation on ICO's Privacy Notices Code of Practice: Summary of Responses. Information Commissioner's Office.  ICO 2016. Consultation on ICO's Privacy Notices Code of Practice: Summary of Responses. Information Commissioner's Office."},{"key":"e_1_3_2_1_32_1","unstructured":"ICO 2016. A Practical Guide to IT Security Information Commissioner's Office.  ICO 2016. A Practical Guide to IT Security Information Commissioner's Office."},{"key":"e_1_3_2_1_33_1","unstructured":"ICO 2017. Big Data Artificial Intelligence Machine Learning and Data Protection. Information Commissioner's Office.  ICO 2017. Big Data Artificial Intelligence Machine Learning and Data Protection. Information Commissioner's Office."},{"key":"e_1_3_2_1_34_1","unstructured":"ICO 2017. The Guide to Data Protection. Information Commissioner's Office.  ICO 2017. The Guide to Data Protection. Information Commissioner's Office."},{"key":"e_1_3_2_1_35_1","unstructured":"Institute of Directors Southern Africa 2016. King IV Report on Corporate Governance for South Africa 2016. Institute of Directors Southern Africa.  Institute of Directors Southern Africa 2016. King IV Report on Corporate Governance for South Africa 2016. Institute of Directors Southern Africa."},{"key":"e_1_3_2_1_36_1","unstructured":"ISACA 2012. COBIT 5 for Information Security. Information Systems Audit and Control Association Illinois.  ISACA 2012. COBIT 5 for Information Security. Information Systems Audit and Control Association Illinois."},{"volume-title":"ISO\/IEC 29100:2011 International Organization for Standardization","key":"e_1_3_2_1_37_1"},{"volume-title":"ISO\/IEC 27001:2013 International Organization for Standardization","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","unstructured":"ISO\/IEC 2013. Information Technology - Security Techniques - Privacy Architecture Framework International Organization for Standardization Geneva 45.  ISO\/IEC 2013. Information Technology - Security Techniques - Privacy Architecture Framework International Organization for Standardization Geneva 45."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7907015"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"e_1_3_2_1_42_1","unstructured":"E.A. Lee and S.A. Seshia 2017. Introduction to Embedded Systems A Cyber-Physical Systems Approach. MIT Press.   E.A. Lee and S.A. Seshia 2017. Introduction to Embedded Systems A Cyber-Physical Systems Approach. MIT Press."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2011.6116428"},{"key":"e_1_3_2_1_44_1","unstructured":"R. Minerva A. Biru and D. Rotondi 2015. Towards a Definition of the Internet of Things (IoT). IEEE.  R. Minerva A. Biru and D. Rotondi 2015. Towards a Definition of the Internet of Things (IoT). IEEE."},{"key":"e_1_3_2_1_45_1","unstructured":"S. Nourse. (2017). What POPI Means for Cybersecurity. https:\/\/www.is.co.za\/blog\/articles\/what-popi-means-for-cybersecurity\/  S. Nourse. (2017). What POPI Means for Cybersecurity. https:\/\/www.is.co.za\/blog\/articles\/what-popi-means-for-cybersecurity\/"},{"key":"e_1_3_2_1_46_1","unstructured":"Nymity 2018. Privacy Management Accountability Framework. Nymity Inc.  Nymity 2018. Privacy Management Accountability Framework. Nymity Inc."},{"key":"e_1_3_2_1_47_1","unstructured":"OECD 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. The Organisation for Economic Co-operation and Development.  OECD 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. The Organisation for Economic Co-operation and Development."},{"key":"e_1_3_2_1_48_1","unstructured":"OECD 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data.  OECD 1980. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991566"},{"volume-title":"International Conference on Human Aspects of Information Security, Privacy, and Trust Springer, 338 - 347","author":"Petroulakis N.E.","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.28"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_55_1","unstructured":"V. Vaishnavi W. Kuechler and S. Petter. (2004\/17 20 December 2017). Design Science Research in Information Systems. http:\/\/desrist.org\/desrist\/content\/design-science-research-in-information-systems.pdf  V. Vaishnavi W. Kuechler and S. Petter. (2004\/17 20 December 2017). Design Science Research in Information Systems. http:\/\/desrist.org\/desrist\/content\/design-science-research-in-information-systems.pdf"},{"volume-title":"Breeuwsma","year":"2017","author":"Vermesan O.","key":"e_1_3_2_1_56_1"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.04.008"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"e_1_3_2_1_61_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin A.F.","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"event":{"name":"SAICSIT '19: Conference of the South African Institute of Computer Scientists and Information Technologists 2019","acronym":"SAICSIT '19","location":"Skukuza South Africa"},"container-title":["Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351108.3351143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:40Z","timestamp":1750202020000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351143"}},"subtitle":["A Focus on Cyber-physical Systems and Internet of Things"],"short-title":[],"issued":{"date-parts":[[2019,9,17]]},"references-count":62,"alternative-id":["10.1145\/3351108.3351143","10.1145\/3351108"],"URL":"https:\/\/doi.org\/10.1145\/3351108.3351143","relation":{},"subject":[],"published":{"date-parts":[[2019,9,17]]},"assertion":[{"value":"2019-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}