Please use this identifier to cite or link to this item: http://hdl.handle.net/11189/6182
DC FieldValueLanguage
dc.contributor.authorIyamu, Tikoen_US
dc.contributor.authorNgqame, Yandiswaen_US
dc.date.accessioned2018-02-13T12:47:16Z-
dc.date.available2018-02-13T12:47:16Z-
dc.date.issued2017-
dc.identifier.issn1560-683X-
dc.identifier.urihttp://hdl.handle.net/11189/6182-
dc.description.abstractBackground: Personal information about individuals is stored by organisations including government agencies. The information is intended to be kept confidential and strictly used for its primary and legitimate purposes. However, that has not always been the case in many South African government agencies and departments. In recent years, personal information about individuals and groups has been illegally leaked for other motives, in which some were detrimental. Even though there exists a legislation, Protection of Personal Information (POPI) Act, which prohibits such malpractices, illegally leaked information has however, not stopped or reduced. In addition to the adoption of the POPI Act, a more stringent approach is therefore needed in order to improve sanity in the use and management of personal information. Otherwise, the detriment that such malpractices cause too many citizens can only be on the increase. Objectives: The objectives of this study were in twofold: (1) to examine and understand the activities that happen with personal information leaks, which includes why and how information is leaked; and (2) to develop a conceptual framework, which includes identification of the factors that influence information leaks and breaches in an environment. Method: Qualitative research methods were followed in achieving the objectives of the study. Within the qualitative methods, documents including existing literature were gathered. The activity theory was employed as lens to guide the analysis. Result: From the analysis, four critical factors were found to be of influence in information leaks and breaches in organisations. The factors include: (1) information and its value, (2) the roles of society and its compliance to information protection, (3) government and its laws relating to information protection and (4) the need for standardisation of information usage and management within a community. Based on the factors, a conceptual framework was developed. Conclusion: This study can be used to guide implementation of information protection acts in any environment. It empirically contributes to societal awareness on how and why personal information is leaked and breached. Also, it will benefit academic domain, particularly in the use of activity theory.en_US
dc.language.isoenen_US
dc.publisherSouth African Journal of Information Managementen_US
dc.relation.ispartofSouth African Journal of Information Managementen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/za/-
dc.subjectConceptual frameworken_US
dc.subjectProtection of personal informationen_US
dc.subjectProtection of Personal Information (POPI) Acten_US
dc.titleTowards a conceptual framework for protection of personal information from the perspective of activity theoryen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/ 10.4102/sajim.v19i1.867-
Appears in Collections:FID - Journal Articles (DHET subsidised)
Files in This Item:
File Description SizeFormat 
Towards a conceptual framework for protection.pdfMain Article2.24 MBAdobe PDFView/Open
Show simple item record

Page view(s)

46
checked on Oct 17, 2018

Download(s)

3
checked on Oct 17, 2018

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons