39 research outputs found

    Concern for information privacy:a cross-nation study of the United Kingdom and South Africa

    Get PDF
    Individuals have differing levels of information privacy concern, formed by their expectations and the confidence they have that organisations meet this in practice. Variance in privacy laws and national factors may also play a role. This study analyses individuals’ information privacy expectation and confidence across two nations, the United Kingdom and South Africa, through a survey of 1463 respondents. The findings indicate that the expectation for privacy in both countries are very high. However, numerous significant differences exist between expectations and confidence when examining privacy principles. The overall results for both countries show that there is a gap in terms of the privacy expectations of respondents compared to the confidence they have in whether organisations are meeting their expectations. Governments, regulators, and organisations with an online presence need to consider individuals’ expectations and ensure that controls that meet regulatory requirements, as well as expectations, are in place

    A framework for designing cloud forensic‑enabled services (CFeS)

    Get PDF
    Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services falls back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic-enabled. It consists of a set of cloud forensic constraints, a modelling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic related task

    Concern for information privacy in South Africa: An empirical study using the OIPCI

    Get PDF
    Please follow the DOI link at the top of the record to access the published version of this article online on the website of the journal.The information privacy concern of consumers concerning the processing of their personal information by online organizations (websites) is investigated in this study by means of a quantitative approach. An overview of existing concerns about information privacy instruments are presented based on a literature review. The Online Information Privacy Concern Instrument (OIPCI) is used to study consumers’ expectations and experience regarding information privacy principles in order to identify their concerns about information privacy. The study was conducted in South Africa with a demographical representative sample of 1000 participants. Gaps were identified where consumers experienced that online organizations were not meeting their privacy expectations. This indicated that the regulatory requirements (in this case, the Protection of Personal Information Act (POPI) are perceived as not being met. The results indicate that while consumers in South Africa have a high expectation for privacy, it is not met in practice. Corrective action and interventions are required from a government and online organization perspective.Women in Research Grant of UNISA.School of Computin
    corecore