Reinhardt A. Botha

Orcid: 0000-0002-6176-3007

Affiliations:
  • Nelson Mandela Metropolitan University, Port Elizabeth, South Africa


According to our database1, Reinhardt A. Botha authored at least 46 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Utility indicator for emotion detection in a speaker authentication system.
Inf. Comput. Secur., 2022

2021
Facing up to security and privacy in online meetings.
Netw. Secur., 2021

2020
Does Ubuntu Influence Social Engineering Susceptibility?
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
From Concept to Practice: Untangling the Direct-Control Cycle.
Proceedings of the 9th International Conference on Information Communication and Management, 2019

2018
Process Model for Differentiated Instruction using Learning Analytics.
South Afr. Comput. J., 2018

Preventing and Mitigating Ransomware - A Systematic Literature Review.
Proceedings of the Information Security - 17th International Conference, 2018

2017
Reflections on Curriculating a South African Information Technology Degree.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

2016
Prioritizing computer security incident response services for the South African National Research Network (SANReN).
Proceedings of the CONF-IRM 2016, 2016

2015
Understanding the problem of coordination in a large scale distributed environment from a service lens view - Towards the South African public sector e-Administration criteria for coordination support.
Gov. Inf. Q., 2015

Prerequisites for building a Computer Security Incident Response capability.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
Concerns regarding service authorization by IP address using eduroam.
Proceedings of the 2014 Information Security for South Africa, 2014

A Privacy-Aware Model for Communications Management in the IP Multimedia Subsystem.
Proceedings of the Tenth International Network Conference, 2014

Exploring the Impact of Restrictive Default Privacy Settings on the Privacy Calculus on Social Network sites.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013

An architecture for synchronous micro-volunteering in Africa using social media.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Predictable patterns in microtext as seen in educational applications using MXit in South Africa.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

Identifying Tag Word Counterparts for Dr. Math.
Proceedings of the Analyzing Microtext, 2013

2012
Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University.
Proceedings of the 2012 International Conference on Privacy, 2012

Claimed vs observed information disclosure on social networking sites.
Proceedings of the 2012 Information Security for South Africa, 2012

Establishing discernible flow characteristics for accurate, real-time network protocol identification.
Proceedings of the Ninth International Network Conference (INC 2012), 2012

2011
Using N-grams to identify mathematical topics in MXit lingo.
Proceedings of the 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2011

Traffic Management in Next Generation Service Provider Networks - Are We There Yet?
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
A busyness model for assigning tutors to pupils in a mobile, online tutoring system: a look at C<sup>3</sup>TO.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010

Deep Packet Inspection - Fear of the Unknown.
Proceedings of the Information Security South Africa Conference 2010, 2010

Virtual Communities as a Mechanism for Sustainable Coordination within the South African Public Sector.
Proceedings of the E-Government, E-Services and Global Processes, 2010

C<sup>3</sup>TO: A Scalable Architecture for Mobile Tutoring over Cell Phones.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

2009
From desktop to mobile: Examining the security experience.
Comput. Secur., 2009

Enhanced Presence Handling.
Proceedings of the Information Security South Africa Conference 2009, 2009

2008
Mobile communications: user perception and practice.
South Afr. Comput. J., 2008

Towards Enhanced Presence Filtering.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799.
Inf. Syst. Manag., 2007

2006
Reflecting on 20 SEC conferences.
Comput. Secur., 2006

A Model for Secure Value-Added Service Subscriptions in Cellular Networks.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Privacy-enhancing Call Management in an IP-based Infrastructure.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

2005
Revisiting Reachability Management as a Multilateral Security Mechanism.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2002
An access control architecture for XML documents in workflow environments.
South Afr. Comput. J., 2002

Towards Semantic Integrity in Rational Databases.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Separation of Duty administration.
South Afr. Comput. J., 2001

A framework for access control in workflow systems.
Inf. Manag. Comput. Secur., 2001

Separation of duties for access control enforcement in workflow environments.
IBM Syst. J., 2001

Access Control in Document-centric Workflow Systems An Agent-based Approach.
Comput. Secur., 2001

Designing Role Hierarchies for Access Control in Workflow Systems.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments.
South Afr. Comput. J., 2000

An XML based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments.
South Afr. Comput. J., 2000

A Context-Sensitive Access Control Model and Prototype Implementation.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...