{"id":"https://openalex.org/W2139283408","doi":"https://doi.org/10.1109/issa.2015.7335062","title":"Mapping &amp;#x2018;Security Safeguard&amp;#x2019; Requirements in a data privacy legislation to an international privacy framework: A compliance methodology","display_name":"Mapping &amp;#x2018;Security Safeguard&amp;#x2019; Requirements in a data privacy legislation to an international privacy framework: A compliance methodology","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2139283408","doi":"https://doi.org/10.1109/issa.2015.7335062","mag":"2139283408"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2015.7335062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038121843","display_name":"Irene Govender","orcid":"https://orcid.org/0000-0002-4499-1091"},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"I. Govender","raw_affiliation_strings":["Department of Mathematical Sciences/Computer Science, Stellenbosch University","Department of Mathematical Sciences/Computer Science, Stellenbosch University, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences/Computer Science, Stellenbosch University","institution_ids":["https://openalex.org/I26092322"]},{"raw_affiliation_string":"Department of Mathematical Sciences/Computer Science, Stellenbosch University, South Africa","institution_ids":["https://openalex.org/I26092322"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5038121843"],"corresponding_institution_ids":["https://openalex.org/I26092322"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.1080262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14432","display_name":"Freedom of Expression and Defamation","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13048","display_name":"Patient Dignity and Privacy","score":0.9613000154495239,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.7384228706359863},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.6057104468345642},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6023188233375549},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.5450204014778137},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5426537990570068},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5050161480903625},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.49574241042137146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47864973545074463},{"id":"https://openalex.org/keywords/privacy-laws-of-the-united-states","display_name":"Privacy laws of the United States","score":0.4687621295452118},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4587445855140686},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41246891021728516},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4113849699497223},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.20541992783546448},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.16801196336746216}],"concepts":[{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.7384228706359863},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.6057104468345642},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6023188233375549},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.5450204014778137},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5426537990570068},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5050161480903625},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.49574241042137146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47864973545074463},{"id":"https://openalex.org/C175968658","wikidata":"https://www.wikidata.org/wiki/Q839447","display_name":"Privacy laws of the United States","level":3,"score":0.4687621295452118},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4587445855140686},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41246891021728516},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4113849699497223},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.20541992783546448},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.16801196336746216}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2015.7335062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W7929538","https://openalex.org/W1538318299","https://openalex.org/W1547183878","https://openalex.org/W1547909883","https://openalex.org/W1563183496","https://openalex.org/W1593169143","https://openalex.org/W1870146437","https://openalex.org/W1901712126","https://openalex.org/W1988826963","https://openalex.org/W2002698441","https://openalex.org/W2026732414","https://openalex.org/W2043288878","https://openalex.org/W2044935933","https://openalex.org/W2154453017","https://openalex.org/W2915282849","https://openalex.org/W3125679698","https://openalex.org/W6632288991","https://openalex.org/W6632748191","https://openalex.org/W6633846099","https://openalex.org/W6639901368"],"related_works":["https://openalex.org/W1265951235","https://openalex.org/W4390203642","https://openalex.org/W4251916081","https://openalex.org/W2127837371","https://openalex.org/W3176177457","https://openalex.org/W4245730406","https://openalex.org/W2498129867","https://openalex.org/W2465865879","https://openalex.org/W189247940","https://openalex.org/W2098937825"],"abstract_inverted_index":{"It":[0],"is":[1,51,62,132,154,162,198,248],"commonplace":[2],"for":[3,77,168,184],"organisations":[4,32,78],"to":[5,9,53,79,103,122,224,235,255,265],"collect":[6],"personal":[7,29,85,152,213],"information":[8,30,153,214],"be":[10,75,89,216,278],"processed":[11],"and":[12,50,145,159,190,264,293],"stored":[13],"on":[14,222],"their":[15],"systems.":[16],"Until":[17],"recently,":[18],"there":[19],"was":[20,43],"no":[21],"comprehensive":[22],"legislation":[23,263],"that":[24,72,97,109],"addressed":[25,199],"the":[26,194,241,266,285],"`processing'":[27],"of":[28,38,173,182,187,193,212,240,290],"by":[31,64,95],"in":[33,47,196,200,207,246,287],"South":[34,259],"Africa.":[35],"The":[36,69,126],"Protection":[37],"Personal":[39],"Information":[40],"Bill":[41],"(\u201cPOPI\u201d)":[42],"signed":[44],"into":[45,55],"law":[46],"November":[48],"2013":[49],"expected":[52],"come":[54],"effect,":[56],"later":[57],"this":[58,227,230,237],"year":[59],"(2015).":[60],"POPI":[61,144,197,208,247,294],"informed":[63],"international":[65,137,271],"data":[66,106,261,291],"privacy":[67,107,138,170,176,188,262,272,292],"legislation.":[68],"implications":[70],"are":[71],"it":[73,100],"will":[74],"incumbent":[76],"revisit":[80],"how":[81,223],"they":[82],"`handle'":[83],"peoples'":[84],"information.":[86],"This":[87,117,274],"can":[88],"a":[90,101,114,120,148,165,180,233,281],"daunting":[91],"task":[92],"as":[93,164,280],"evidenced":[94],"countries":[96],"still":[98],"find":[99],"challenge":[102],"comply":[104,123],"with":[105,124,140,219,258,270],"laws":[108],"have":[110],"been":[111],"enacted":[112],"there,":[113],"while":[115],"ago.":[116],"article":[118,231],"proposes":[119,232],"methodology":[121,234],"POPI.":[125],"Generally":[127],"Accepted":[128],"Privacy":[129],"Principles":[130],"(GAPP)":[131],"an":[133],"American/Canadian":[134],"framework":[135,275],"containing":[136],"requirements":[139],"best":[141],"practices.":[142],"Both,":[143],"GAPP":[146,161,254],"address":[147],"common":[149],"purpose:":[150],"`How":[151],"collected,":[155],"used,":[156],"retained,":[157],"disclosed,":[158],"disposed.'":[160],"reputed":[163],"solid":[166],"benchmark":[167],"good":[169],"practice,":[171],"comprising":[172],"ten":[174],"overarching":[175],"principles":[177],"which":[178],"yields":[179],"set":[181],"criteria":[183],"effective":[185],"management":[186],"risks":[189],"compliance.":[191,295],"Much":[192],"provisions":[195,242],"GAPP.":[201],"A":[202],"key":[203],"condition":[204],"(Security":[205],"Safeguards)":[206],"stipulates":[209],"what":[210],"aspects":[211],"must":[215],"adequately":[217],"secured,":[218],"limited":[220],"insight":[221],"go":[225],"about":[226],"process.":[228],"Accordingly,":[229],"fill":[236],"gap.":[238],"All":[239],"under":[243],"`Security":[244],"Safeguards'":[245],"mapped":[249],"onto":[250],"GAPP,":[251],"thereby":[252],"contextualising":[253],"facilitate":[256],"compliance":[257],"Africa's":[260],"same":[267],"end,":[268],"complying":[269],"laws.":[273],"could":[276],"also":[277],"implemented":[279],"checklist/auditing":[282],"document,":[283],"guiding":[284],"organisation":[286],"its":[288],"implementation":[289]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
