Skip to main content

Evaluating a Consumer Data Protection Framework for IS Compliance Awareness in South Africa: An Expert Review

  • Conference paper
  • First Online:
Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2022)

Abstract

As a developing country, South Africa (SA) seems to lack a balance between trust consumers place in organizations with whom they share their personal information to obtain goods and services and the degree to which that consumer confidence is justified by organizations’ IS compliance status. The displacement of consumers’ confidence is due to a lack of IS compliance awareness necessary to enable sound decision-making when it comes to the sharing of their personal information in the ordinary course of making a living as part of public society. In SA, there are currently no government-led programs to raise consumer awareness about IS compliance. Prior data protection frameworks failed to take into account and address these issues as key lessons from which the need for a consumer data protection framework (CDPF) spawned. The aim of the CDPF is to support the SA government with instilling consumer IS compliance awareness. The primary goal of this paper is to present the evaluation results of the expert reviews that were conducted by means of an online survey to determine the relevance, value/importance and practicality of CDPF components for implementation in the SA government setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Blascak, N., Cheney, J.S., Hunt, R.M., Mikhed, V., Ritter, D., Vogan, M.: Financial consequences of identity theft: evidence from consumer credit bureau records (2019)

    Google Scholar 

  2. Irvin-Erickson, Y., Ricks, A.: Identity theft and fraud victimization: what we know about identity theft and fraud victims from research-and practice-based evidence (2019)

    Google Scholar 

  3. Masilela, L., Nel, D.: The role of data and information security governance in protecting public sector data and information assets in national government in South Africa. Africa’s Public Serv. Deliv. Perform. Rev. 9(1), 10 (2021)

    Google Scholar 

  4. S. A. Government: Protection of Personal Information Act. Government Gazette, Cape Town (2013)

    Google Scholar 

  5. South African National Treasury: Cybercrimes and Cybersecurity Bill, vol. 416, no. 42237, pp. 1–176 (2017)

    Google Scholar 

  6. Government Printer: Promotion of Access to Information Act (PAIA) 2 of 2000, Cape Town, 2000. https://www.gov.za/documents/promotion-access-information-act

  7. Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. SACJ 52, 29–41 (2014)

    Article  Google Scholar 

  8. South Africa Cyber-Security Academic Alliance: Welcome to SACSAA (2014)

    Google Scholar 

  9. Kritzinger, E.: Cyber-Security Awareness Project (2014). http://eagle.unisa.ac.za/elmarie/index.php

  10. The Council for Scientific and Industrial Research (2021). https://www.csir.co.za/

  11. Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007). https://doi.org/10.2753/MIS0742-1222240302

    Article  Google Scholar 

  12. ISO/IEC 27000: ISO/IEC 27000:2014 Information technology | Security techniques | Information security management systems - Overview and vocabulary (2014). https://www.iso27001security.com/html/27000.html

  13. Prat, N., Comyn-Wattiau, I., Akoka, J.: Artifact evaluation in information systems design-science research - a holistic view. In: Proceedings of the Pacific Asia Conference on Information Systems PACIS 2014 (2014)

    Google Scholar 

  14. Prat, N., Comyn-Wattiau, I., Akoka, J.: Artifact evaluation in information systems design-science research-a holistic view. PACIS 23, 1–16 (2014)

    MATH  Google Scholar 

  15. Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst. 25(1), 77–89 (2016)

    Article  Google Scholar 

  16. Ågerfalk, P.J.: Information Systems Actability: Understanding Information Technology as a Tool for Business Action And Communication. Linköping University Electronic Press (2003)

    Google Scholar 

  17. Moonen, H., van Hillegersberg, J.: Real-time coordination in container trucking – prototyping and evaluating a multi-agent system for real-time container truck planning at post-Kogeko. In: van Nunen, J., Huijbregts, P., Rietveld, P. (eds.) Transitions Towards Sustainable Mobility, pp. 139–159. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21192-8_8

  18. Chen, S., Osman, N.M., Nunes, J.M.B., Peng, G.C.: Information systems evaluation methodologies (2011)

    Google Scholar 

  19. Ali, B.J., Anwar, G.: Factors influencing the citizens’ acceptance of electronic government. Int. J. Eng. Bus. Manag. 5 (2021)

    Google Scholar 

  20. Li, X., Zhang, Z., Stefanidis, K.: A data-driven approach for video game playability analysis based on players’ reviews. Information 12(3), 129 (2021)

    Article  Google Scholar 

  21. Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 337–355 (2013). https://doi.org/10.25300/MISQ/2013/37.2.01

  22. Minnaar, L., Heystek, J.: Online surveys as data collection instruments in education research: a feasible option? South African J. High. Educ. 27(1), 162–183 (2016). https://doi.org/10.20853/27-1-233

    Article  Google Scholar 

  23. Nayak, M.S.D.P., Narayan, K.A.: Strengths and weakness of online surveys. IOSR J. Humanit. Soc. Sci. 24(5), 31–38 (2019). https://doi.org/10.9790/0837-2405053138

    Article  Google Scholar 

  24. Saunders, M., Lewis, P., Thornhill, A.: Research Methods for Business Students, 7th edn. Nueva York Pearson Educ. (2016)

    Google Scholar 

  25. Holbrook, A.L., Krosnick, J.A., Moore, D., Tourangeau, R.: Response order effects in dichotomous categorical questions presented orally the impact of question and respondent attributes. Public Opin. Q. 71(3), 325–348 (2007). https://doi.org/10.1093/poq/nfm024

    Article  Google Scholar 

  26. Nielsen, J.: Why you only need to test with 5 users. Nielsen Norman Group, pp. 737–8939 (2000). https//www.nngroup.com/articles/why-you-only-need-to-test-with-5-users/

  27. Davies, R.: Network perspectives in the evaluation of development interventions: more than a metaphor (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ileen E. Bredenkamp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bredenkamp, I.E., Kritzinger, E., Herselman, M. (2022). Evaluating a Consumer Data Protection Framework for IS Compliance Awareness in South Africa: An Expert Review. In: Guarda, T., Portela, F., Augusto, M.F. (eds) Advanced Research in Technologies, Information, Innovation and Sustainability. ARTIIS 2022. Communications in Computer and Information Science, vol 1676. Springer, Cham. https://doi.org/10.1007/978-3-031-20316-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20316-9_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20315-2

  • Online ISBN: 978-3-031-20316-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics