{"id":"https://openalex.org/W2109103710","doi":"https://doi.org/10.1109/issa.2015.7335047","title":"State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?","display_name":"State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2109103710","doi":"https://doi.org/10.1109/issa.2015.7335047","mag":"2109103710"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2015.7335047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075100442","display_name":"Murdoch Watney","orcid":"https://orcid.org/0000-0002-1406-7623"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Murdoch Watney","raw_affiliation_strings":["University of Johannesburg","University of Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg","institution_ids":["https://openalex.org/I24027795"]},{"raw_affiliation_string":"University of Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5075100442"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":null,"apc_paid":null,"fwci":4.3378,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92516098,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12775","display_name":"Legal Issues in South Africa","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12775","display_name":"Legal Issues in South Africa","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9373999834060669,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13659","display_name":"Ombudsman and Human Rights","score":0.9332000017166138,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/united-states-national-security-agency","display_name":"United States National Security Agency","score":0.7022533416748047},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6171048283576965},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5906408429145813},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.5871205925941467},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.5662059187889099},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.558861494064331},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5249159932136536},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5172077417373657},{"id":"https://openalex.org/keywords/electronic-surveillance","display_name":"Electronic surveillance","score":0.4975731670856476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4815240502357483},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4731784164905548},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37541595101356506},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3396969139575958},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.33688199520111084},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3180316090583801},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1232282817363739},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.09487643837928772}],"concepts":[{"id":"https://openalex.org/C517823627","wikidata":"https://www.wikidata.org/wiki/Q121194","display_name":"United States National Security Agency","level":3,"score":0.7022533416748047},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6171048283576965},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5906408429145813},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.5871205925941467},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.5662059187889099},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.558861494064331},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5249159932136536},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5172077417373657},{"id":"https://openalex.org/C2909731529","wikidata":"https://www.wikidata.org/wiki/Q334401","display_name":"Electronic surveillance","level":2,"score":0.4975731670856476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4815240502357483},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4731784164905548},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37541595101356506},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3396969139575958},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.33688199520111084},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3180316090583801},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1232282817363739},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.09487643837928772},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2015.7335047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1437276374","https://openalex.org/W1559953158","https://openalex.org/W2485495924","https://openalex.org/W2496151714","https://openalex.org/W2989711403","https://openalex.org/W4302417921","https://openalex.org/W6628248384","https://openalex.org/W6769997010"],"related_works":["https://openalex.org/W2971540978","https://openalex.org/W2150732388","https://openalex.org/W2562211673","https://openalex.org/W2157087152","https://openalex.org/W2261599993","https://openalex.org/W2701725415","https://openalex.org/W2032927900","https://openalex.org/W2233979477","https://openalex.org/W1667866326","https://openalex.org/W2991842423"],"abstract_inverted_index":{"The":[0,12,97,176,206],"discussion":[1,102,180],"concerns":[2],"itself":[3],"with":[4],"state-on-nationals'":[5],"electronic":[6,173,202],"communication":[7,203],"surveillance":[8,34,64,73,81,92,186,232],"in":[9,115,170],"South":[10,43,52,107],"Africa.":[11],"2013":[13],"Snowden":[14],"revelations":[15],"of":[16,35,74,106,117,178,194],"collaboration":[17],"between":[18,50,239],"the":[19,26,41,51,79,134,150,168,179,191,200],"United":[20,27],"States":[21],"National":[22],"Security":[23,55],"Agency":[24,56],"and":[25,57,70,76,126,129,218,230,241],"Kingdom":[28],"Government":[29],"Communications":[30],"Headquarters":[31],"conducting":[32,171],"bulk":[33],"all":[36],"people":[37],"as":[38,40,143,188],"well":[39],"2015":[42],"African":[44,53,108],"spy":[45],"cable":[46],"disclosures":[47],"involving":[48],"communications":[49],"State":[54],"other":[58,148],"foreign":[59],"intelligence":[60],"agencies":[61,89],"confirmed":[62],"that":[63,133],"technology":[65,204],"provides":[66],"for":[67,84,93,146,153],"covert,":[68],"mass":[69],"undiscriminating":[71],"government":[72,88,185],"nationals":[75,109,196],"states.":[77],"Although":[78],"latter":[80],"was":[82,156],"conducted":[83],"national":[85],"security":[86,240],"purposes,":[87],"also":[90],"conduct":[91],"law":[94],"enforcement":[95],"purposes.":[96],"question":[98],"pertaining":[99],"to":[100,131,167,183,210,226],"this":[101],"is":[103,110,137,162,181,208],"whether":[104,163,212],"information":[105,135],"lawfully":[111],"accessed":[112,157],"and/or":[113,158,216],"retained":[114],"terms":[116],"a":[118,237],"legal":[119],"framework.":[120],"This":[121],"should":[122],"include":[123],"effective":[124],"checks":[125],"balances,":[127],"accountability":[128],"transparency":[130],"ensure":[132,227],"gathered":[136],"effectively":[138],"protected":[139],"against":[140,197],"abuse":[141],"such":[142],"its":[144],"utilization":[145],"means":[147],"than":[149],"original":[151],"purpose":[152],"which":[154],"it":[155,222],"retained.":[159],"Another":[160],"concern":[161],"different":[164],"thresholds":[165],"apply":[166],"purposes":[169],"state":[172],"communications'":[174],"surveillance.":[175],"aim":[177,207],"not":[182],"vilify":[184],"practices":[187],"governments":[189],"carry":[190],"onerous":[192],"task":[193],"protecting":[195],"threats":[198],"within":[199],"ever-advancing":[201],"medium.":[205],"rather":[209],"establish":[211],"there":[213],"exist":[214],"voids":[215],"deficiencies":[217],"if":[219],"affirmative,":[220],"how":[221],"could":[223],"be":[224],"addressed":[225],"an":[228],"open":[229],"transparent":[231],"landscape":[233],"aimed":[234],"at":[235],"striking":[236],"balance":[238],"human":[242],"rights":[243],"protection.":[244]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
