2. Research Problem
3. Research Objective and Research Questions
To examine aspects that are required to address South African website privacy policies principles
To explore strategies South African website owners (organisations) do to improve their website privacy policies.
2. Do South African website privacy policies include the aspects that are required to address privacy principles
3. What can South African website owners (organisations) do to improve their website privacy policies
The organization is currently in effect, including several of its particular guidelines that have been issued (Van Niekerk, 2019). As a result, full implementation is anticipated to follow immediately, and companies must plan to commence completely compliance with its legislation.
Consumer Privacy Concern
The vast plurality of customers (87%) indicated people wouldn't do commerce with the firm when they were concerned regarding its privacy policies. 71% stated consumers would cease conducting commerce using a firm if something handed confidential material around without consent (Rath and Kumar, 2021). Just around 10% of customers, for instance, respect consumer packaging products or multimedia as well as entertainment corporations.
Customers want businesses to protect personal confidentiality. However, the actuality within South Africa is rather the opposite. A major data compromise exposed the sensitive details of hundreds of thousands more South Africans. There exists a significant gap between what customers anticipate as well as what is perfectly allowed to with the work organizations undertake to satisfy their commitments.
5. Literature Review
Figure 1: The PRISMA method
Source: (Church et al., 2020)
5.1 Website Requirements Explanation
(Verkijika and De Wet, 2018)
Organizations should address their clients' privacy worries as well as verify that the techniques they employ to gather and maintain information comply respectively with this same regulation or their clients' standards. Compliant strategies developed by organizations that depend on worldwide best practices might be beneficial.
(Hatamian et al., 2021)
There is much concern over the confidentiality and safety elements of electronic connection tracing programs, coupled with their possible breach of rules governing consumer defence. As a result, the creators of such applications are continually chastised for violating customers' privacy, ignoring critical security but also confidentiality standards, and designing apps within strict deadlines without addressing privacy or safety through concept.
(O’Brien et al., 2018)
Customers should be informed about the grounds why personal information is getting accumulated and such amount of period it would be held. A monitoring authority shall be established to handle customers' concerns, including contacting data about this authority should be supplied.
(Harkous et al., 2018)
Table 1: Website privacy requirements
As per Tesfay et al., (2018) Usually, websites must contain policies as well as guidelines in conjunction with the privacy statement. This Webpage Rules & Circumstances has been a legislative agreement which outlines the services as well as limitations that users should follow when accessing the webpage. Its webpage provisions as well as terms of the contract ought to contain a waiver of responsibility, an approved usage provision, a modification paragraph, a paragraph indicating the appropriate legislation as well as territory, as well as other contractual data in addition to such licensing of such copyrights inside the webpage. Such privacy laws must employ unambiguous as well as plain wording to guarantee that consumers, as well as website viewers, comprehend whatever personal details the firm gathers as well as how much material would be used. Privacy standards aren't just a smart method to develop confidence and openness amongst company consumers; they have been generally legally mandated as well as mandated by such a majority for third-party programs. Because digital privacy rules, as well as standards, operate across the entire planet, if such a webpage attracts customers who reside outside its region or nation, they must follow customers' national confidentiality rules in addition to their country. It's indeed critical and essential they examine the regulatory requirements relating to the consumer group to verify whether they're following the applicable legislation. Member nations enact digital data safeguards regulations, including a handful of government rules that provide a hodgepodge of customer procedural representation.
5.2 Guidelines for suggested website privacy settings
6. Research Methodology
This research study will be using asingle case design with embedded (multiple units of analysis), which will provide means of including qualitative and quantitative research methods within the research study. Since the research design is based on a single case design with embedded (multiple units of analysis) it will be possible by the investigatorto include qualitative and quantitative data collected from different secondary sources. Multiple units of analysis within an embedded case study also ensures that the investigator is able to include different analysesas their findings to answer the research questionsand frame the required inference from them (Bass et al., 2018). Such a case study methodologyrelies on different sources for data collection that gives richness to the data and contributes significantly to the research validity making it stronger. Hence it can be justified that the research design will use a single case design with embedded (multiple units of analysis) for investigating contemporary events regardingprivacy policies of South African websites.
Church, S., Rogers, E., Rockwood, K. and Theou, O., 2020. A scoping review of the Clinical Frailty Scale. BMC geriatrics, 20(1), pp.1-18. DOI: https://bmcgeriatr.biomedcentral.com/articles/10.1186/s12877-020-01801-7
Funk, R.S., Shakhnovich, V., Cho, Y.K., Polireddy, K., Jausurawong, T., Gress, K. and Becker, M.L., 2021. Factors associated with reduced infliximab exposure in the treatment of pediatric autoimmune disorders: a cross-sectional prospective convenience sampling study. Pediatric Rheumatology, 19(1), pp.1-11.
Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K.G. and Aberer, K., 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18) (pp. 531-548). Available at: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-harkous.pdf Hatamian, M., Wairimu, S., Momen, N. and Fritsch, L., 2021. A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical software engineering, 26(3), pp.1-51. DOI: https://link.springer.com/article/10.1007/s10664-020-09934-4
Hayibo, K.S. and Pearce, J.M., 2021. A review of the value of solar methodology with a case study of the US VOS. Renewable and Sustainable Energy Reviews, 137, p.110599.
Heale, R. and Twycross, A., 2018. What is a case study. Evidence-based nursing, 21(1), pp.7-8.
Isaak, J. and Hanna, M.J., 2018. User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), pp.56-59. DOI: 10.1109/MC.2018.3191268
Kamal, S.S.L.B.A., 2019. Research paradigm and the philosophical foundations of a qualitative study. PEOPLE: International Journal of Social Sciences, 4(3), pp.1386-1394.
Khaldi, K., 2017. Quantitative, qualitative or mixed research: which research paradigm to use. Journal of Educational and Social Research, 7(2), pp.15-15.
L. Haven, T. and Van Grootel, D.L., 2019. Preregistering qualitative research. Accountability in research, 26(3), pp.229-244. DOI: https://www.tandfonline.com/doi/pdf/10.1080/08989621.2019.1580147
Mpungose, C.B., 2020. Emergent transition from face-to-face to online learning in a South African University in the context of the Coronavirus pandemic. Humanities and Social Sciences Communications, 7(1), pp.1-9. Available at: https://www.nature.com/articles/s41599-020-00603-x
Nurgalieva, L., O’Callaghan, D. and Doherty, G., 2020. Security and privacy of mHealth applications: a scoping review. IEEE Access, 8, pp.104247-104268. DOI: 10.1109/ACCESS.2020.2999934
O’Brien, P., Young, S.W., Arlitsch, K. and Benedict, K., 2018. Protecting privacy on the web: A study of HTTPS and Google Analytics implementation in academic library websites. Online Information Review, 42(6), pp.734-751. DOI: https://www.emerald.com/insight/content/doi/10.1108/OIR-02-2018-0056/full/html
Oliva, R., 2019. Intervention as a research strategy. Journal of Operations Management, 65(7), pp.710-724. Qin, Q., Ke, Q., Du, J.T. and Xie, Y., 2021. How Users' Gaze Behavior Is Related to Their Quality Evaluation of a Health Website Based on HONcode Principles. Data and Information Management, 5(1), pp.75-85. DOI: https://doi.org/10.2478/dim-2020-0045
Rath, D.K. and Kumar, A., 2021. Information privacy concern at individual, group, organization and societal level-a literature review. Vilakshan-XIMB Journal of Management. DOI: https://www.emerald.com/insight/content/doi/10.1108/XJM-08-2020-0096/full/html
Rethlefsen, M.L., Kirtley, S., Waffenschmidt, S., Ayala, A.P., Moher, D., Page, M.J. and Koffel, J.B., 2021. PRISMA-S: an extension to the PRISMA statement for reporting literature searches in systematic reviews. Systematic reviews, 10(1), pp.1-19. DOI: https://systematicreviewsjournal.biomedcentral.com/articles/10.1186/s13643-020-01542-z Rong, S., Wang, L., Peng, Z., Liao, Y., Li, D., Yang, X., Nuessler, A.K., Liu, L., Bao, W. and Yang, W., 2020. The mechanisms and treatments for sarcopenia: could exosomes be a perspective research strategy in the future. Journal of cachexia, sarcopenia and muscle, 11(2), pp.348-365.
Speak, A., Escobedo, F.J., Russo, A. and Zerbe, S., 2018. Comparing convenience and probability sampling for urban ecology applications. Journal of applied ecology, 55(5), pp.2332-2342. DOI: https://besjournals.onlinelibrary.wiley.com/doi/pdf/10.1111/1365-2664.13167
Staunton, C. and De Stadler, E., 2019. Protection of Personal Information Act No. 4 of 2013: implications for biobanks. South African Medical Journal, 109(4), pp.232-234. DOI: https://journals.co.za/doi/pdf/10.7196/SAMJ.2019.v109i4.13617
Staunton, C., Adams, R., Botes, M., de Vries, J., Labuschaigne, M., Loots, G., Mahomed, S., Loideain, N.N., Olckers, A., Pepper, M.S. and Pope, A., 2021. Enabling the use of health data for research: Developing a POPIA code of conduct for research in South Africa. South African Journal of Bioethics and Law, 14(1), pp.33-36. DOI: https://journals.co.za/doi/pdf/10.7196/SAJBL.2021.v14i1.740
Staunton, C., Tschigg, K. and Sherman, G., 2021. Data protection, data management, and data sharing: Stakeholder perspectives on the protection of personal health information in South Africa. PloS one, 16(12), p.e0260341. DOI: https://doi.org/10.1371/journal.pone.0260341
Sundler, A.J., Lindberg, E., Nilsson, C. and Palmér, L., 2019. Qualitative thematic analysis based on descriptive phenomenology. Nursing open, 6(3), pp.733-739. DOI: https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/nop2.275
Swales, L., Thaldar, D. and Donnelly, D.L., 2022. Why research institutions should indemnify researchers against POPIA civil liability. South African journal of science, 118(3), pp.22-24. DOI: https://journals.co.za/doi/pdf/10.10520/ejc-sajsci-v118-n3-a9
Verkijika, S.F. and De Wet, L., 2018. Quality assessment of egovernment websites in S ubS aharan A frica: A public values perspective. The Electronic Journal of Information Systems in Developing Countries, 84(2), p.e12015. DOI: https://onlinelibrary.wiley.com/doi/pdf/10.1002/isd2.12015
Washington, S., Karlaftis, M., Mannering, F. and Anastasopoulos, P., 2020. Statistical and econometric methods for transportation data analysis. Chapman and Hall/CRC.
Yin, R.K. (2013). “Case study research design and methods”, (3 rd Ed), Sage Publications, California.