39 research outputs found
Concern for information privacy:a cross-nation study of the United Kingdom and South Africa
Individuals have differing levels of information privacy concern, formed by their expectations and the confidence they have that organisations meet this in practice. Variance in privacy laws and national factors may also play a role. This study analyses individuals’ information privacy expectation and confidence across two nations, the United Kingdom and South Africa, through a survey of 1463 respondents. The findings indicate that the expectation for privacy in both countries are very high. However, numerous significant differences exist between expectations and confidence when examining privacy principles. The overall results for both countries show that there is a gap in terms of the privacy expectations of respondents compared to the confidence they have in whether organisations are meeting their expectations. Governments, regulators, and organisations with an online presence need to consider individuals’ expectations and ensure that controls that meet regulatory requirements, as well as expectations, are in place
A framework for designing cloud forensic‑enabled services (CFeS)
Cloud computing is used by consumers to access cloud services. Malicious
actors exploit vulnerabilities of cloud services to attack consumers. The link
between these two assumptions is the cloud service. Although cloud forensics assists
in the direction of investigating and solving cloud-based cyber-crimes, in many
cases the design and implementation of cloud services falls back. Software designers
and engineers should focus their attention on the design and implementation of
cloud services that can be investigated in a forensic sound manner. This paper presents
a methodology that aims on assisting designers to design cloud forensic-enabled
services. The methodology supports the design of cloud services by implementing
a number of steps to make the services cloud forensic-enabled. It consists
of a set of cloud forensic constraints, a modelling language expressed through a
conceptual model and a process based on the concepts identified and presented in
the model. The main advantage of the proposed methodology is the correlation of
cloud services’ characteristics with the cloud investigation while providing software
engineers the ability to design and implement cloud forensic-enabled services via
the use of a set of predefined forensic related task
Concern for information privacy in South Africa: An empirical study using the OIPCI
Please follow the DOI link at the top of the record to access the published version of this article online on the website of the journal.The information privacy concern of consumers concerning the processing of their personal information by online organizations (websites) is investigated in this study by means of a quantitative approach. An overview of existing concerns about information privacy instruments are presented based on a literature review. The Online Information Privacy Concern Instrument (OIPCI) is used to study consumers’ expectations and experience regarding information privacy principles in order to identify their concerns about information privacy. The study was conducted in South Africa with a demographical representative sample of 1000 participants. Gaps were identified where consumers experienced that online organizations were not meeting their privacy expectations. This indicated that the regulatory requirements (in this case, the Protection of Personal Information Act (POPI) are perceived as not being met. The results indicate that while consumers in South Africa have a high expectation for privacy, it is not met in practice. Corrective action and interventions are required from a government and online organization perspective.Women in Research Grant of UNISA.School of Computin