References
- Administrative Decisions Tribunal of New South Wales. (n.d). DO -v- University of New South Wales [2002] NSW ADT 211. Sydney: Author. Retrieved from http://www.vrlaw.com.au/cases/pdfs/200403091826290.do.pdf
- Bridgwater, A. (2013, July 19). ICO fines NHS Surrey over “truly shocking & disturbing” data destruction. The ITAM Review. Retrieved from http://www.itassetmanagement.net/2013/07/19/ico-fines-nhs-surrey-shocking-disturbing-data-destruction/
- Bygrave, L. A. (2002). Data protection law: Approaching its rationale, logic and limits. London: Kluwer Law International.
- Clark, E., & Cho, G. (2000). Privacy in an e-business world: A question of balance. Journal of Law, Information and Science, 11, 7–40. Retrieved from http://www.jlisjournal.org/
- Commonwealth of Australia. (1988). Privacy Act 1988. Canberra: Office of Legislative Drafting and Publishing, Attorney-General’s Department. Retrieved from https://www.comlaw.gov.au/ComLaw/Legislation/ActCompilation1.nsf/0/F0FB9D36BA883440CA25773E00194A84/$file/Privacy1988_WD02HYP.pdf+
- Crompton, M. (2004). Complaint determination no. 3 of 2004. Sydney: Office of the Federal Privacy Commissioner. Retrieved from https://www.oaic.gov.au/images/documents/migrated/migrated/comdeter0403.pdf
- Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 104–115. doi:10.1287/orsc.10.1.104
- Department of Higher Education and Training. (2014). Regulations for reporting by public higher education institutions. Retrieved from http://www.gov.za/sites/www.gov.za/files/37726_rg10209_gon464.pdf
- Ernst & Young. (2012). University of the future: A thousand year old industry on the cusp of profound change. Retrieved from http://www.ey.com/Publication/vwLUAssets/University_of_the_future/$FILE/University_of_the_future_2012.pdf
- Government of Canada. (2000). Personal Information Protection and Electronic Documents Act. Retrieved from http://laws-lois.justice.gc.ca/PDF/P-8.6.pdf
- Greenleaf, G., Waters, N., & Bygrave, L. (2007). Implementing privacy principles: After 20 years, it’s time to enforce the Privacy Act. University of NSW Faculty of Law Research Series, 2007-31. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=987763
- Gunasekara, G., & Dillon, E. (2008). Data protection litigation in New Zealand: Processes and outcomes. Victoria University of Wellington Law Review, 39, 457–486. Retrieved from http://www.victoria.ac.nz/law/research/publications/vuwlr
- Her Majesty’s Government. (2005). Data Protection Act 1998. Retrieved from http://www.legislation.gov.uk/ukpga/1998/29/pdfs/ukpga_19980029_en.pdf
- Hollingdale, F. (2000). Internet privacy survey shows Australian websites lacking (Freehills Internet Privacy Survey Report 2000). Privacy Law and Policy Reporter. Retrieved from http://www.austlii.edu.au/au/journals/PrivLawPRpr/2000/1.html
- Information Commissioner’s Office. (2012). ICO fines NHS Surrey for failing to check the destruction of old computers for 28 May 2012. Retrieved from http://breachwatch.com/2013/06/18/nhs-surrey/
- Institute of Directors in Southern Africa. (2009). King Code of Governance for South Africa 2009. Pretoria: Author. Retrieved from http://www.ecgi.org/codes/documents/king3.pdf
- International Working Group on Data Protection in Telecommunications. (1996). Report and recommendations on telecommunication and privacy in labour relationships. Berlin: Datenschutz und Informationsfreiheit. Retrieved from https://datenschutz-berlin.de/attachments/136/dsarb_en.pdf?1200576710
- Kay, D., Korn, N., & Oppenheim, C. (2012). Legal, risk and ethical aspects of analytics in higher education ( Analytics Series, Vol. 1. No. 6). Lancaster: Centre for Education Technology and Interoperability Standards. Retrieved from http://publications.cetis.org.uk/wp-content/uploads/2012/11/Legal-Risk-and-Ethical-Aspects-of-Analytics-in-Higher-Education-Vol1-No6.pdf
- Maurushat, A. (2009). Data breach notification law across the world from California to Australia ( University of New South Wales Faculty of Law Research Series. The Berkeley Electronic Press, paper 11). Sydney: University of New South Wales. Retrieved from http://law.bepress.com/cgi/viewcontent.cgi?article=1153&context=unswwps-flrps09
- Oblinger, D. G. (2012). Let’s talk analytics. EDUCAUSE Review, 47, 10–13. Retrieved from http://er.educause.edu/
- Office of the Data Protection Commissioner. (1995). EU directive 95/46/EC – The data protection directive. Retrieved from https://www.dataprotection.ie/docs/EU-Directive-95-46-EC/89.htm
- Petronio, S. S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: State University of New York Press.
- Prinsloo, P., & Slade, S. (2014). Educational triage in higher open education: Walking a moral tightrope. The International Review of Research in Open and Distributed Learning, 15, 306–331. Retrieved from http://www.irrodl.org/index.php/irrodl/index
- Republic of South Africa. (1996). Constitution of the Republic of South Africa No. 108 of 1996. Retrieved from http://www.gov.za/sites/www.gov.za/files/images/a108-96.pdf
- Republic of South Africa. (2000). Promotion of Access to Information Act No. 2 of 2000. Retrieved from http://www.justice.gov.za/legislation/acts/2000-002.pdf
- Republic of South Africa. (2009). Consumer Protection Act No. 68 of 2008. Retrieved from http://www.thenct.org.za/NCTDocs/founding-legislation/f8d6f6aa-994d-4305-b3d0-ea056416bbd0.pdf
- Republic of South Africa. (2013). Protection of Personal Information Act, 2013. Retrieved from http://www.justice.gov.za/legislation/acts/2013-004.pdf
- Richards, N. M., & King, J. H. (2014). Big data ethics. Wake Forest Law Review, 49, 393–432. Retrieved from http://wakeforestlawreview.com/
- Slade, S., & Prinsloo, P. (2013). Learning analytics: Ethical issues and dilemmas. American Behavioural Scientist, 57, 1510–1529.
- Sotto, L. J., Treacy, B. C., & McLellan, M. L. (2010). Privacy and data security risks in cloud computing. Electronic Commerce and Law Report, 15 ECLR 186. Retrieved from http://www.womensnetworkingforum.com/files/Publication/4845e31f-63d8-4f9a-9a36-a074e4170225/Presentation/PublicationAttachment/6f52b2fd-2973-48cc-9f23-c941f1e19358/Privacy-Data_Security_Risks_in_Cloud_Computing_2.10.pdf
- Stoddart, J. (2004). Privacy: Annual report to Parliament 2003–2004. Ontario: Minister of Public Works and Government Services. Retrieved from https://www.priv.gc.ca/information/ar/200304/200304_e.pdf
- Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing. Computer Law & Security Review, 26, 391–397. Retrieved from http://www.journals.elsevier.com/computer-law-and-security-review/
- Swartz, T. A., Bowen, D. E., & Brown, S. W. (1996). Advances in services marketing and management. Greenwich, CT: JAI Press.
- Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 798–824. Retrieved from http://aisel.aisnet.org/jais/