Dalenca Pottas

Orcid: 0000-0002-8150-7748

According to our database1, Dalenca Pottas authored at least 28 papers between 1991 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Leveraging intrinsic resources for the protection of health information assets.
South Afr. Comput. J., 2019

Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis.
Proceedings of the Information and Cyber Security - 18th International Conference, 2019

2016
A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape.
Proceedings of the ICT for Promoting Human Development and Protecting the Environment, 2016

2015
Biometrics in social grants: Separating myth from reality.
Proceedings of the 2015 IEEE International Symposium on Technology and Society, 2015

2013
Perceived Benefits Of Remote Data Capturing In Community Home-Based Care: The Caregivers' Perspective.
J. Community Informatics, 2013

Socio-technical approach to community health: designing and developing a mobile care data application for home-based healthcare, in South Africa.
J. Community Informatics, 2013

Citizens and Personal Health Records - the Case of Nelson Mandela Bay.
Proceedings of the MEDINFO 2013, 2013

Guidelines to Encourage the Adoption and Meaningful Use of Health Information Technologies in the South African Healthcare Landscape.
Proceedings of the MEDINFO 2013, 2013

Patients Prefer Electronic Medical Records - Fact or Fiction?
Proceedings of the MEDINFO 2013, 2013

The characteristics of a biometric.
Proceedings of the 2013 Information Security for South Africa, 2013

2012
A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm.
Int. J. Hum. Comput. Interact., 2012

A Framework for Evaluating Usable Security: The Case of Online Health Social Networks .
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
E-Health Readiness Assessment for E-Health Framework for Africa: A Case Study of Hospitals in South Africa.
Proceedings of the Electronic Healthcare - 4th International Conference, 2011

A Socio-technical Perspective on the Use of Mobile Phones for Remote Data Collection in Home Community Based Care in Developing Countries.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2011

2010
A Socio-Technical Approach to Continuity of Care and Electronic Records in the South African Context.
Proceedings of the MEDINFO 2010, 2010

Trust - Can it be controlled?
Proceedings of the MEDINFO 2010, 2010

Towards Characteristics of Lifelong Health Records.
Proceedings of the E-Health - First IMIA/IFIP Joint Symposium, 2010

Help Me to Understand Your World: A Reflection on the Potential Impact of E-Health Systems on the Prognosis for Asperger Syndrome.
Proceedings of the E-Health - First IMIA/IFIP Joint Symposium, 2010

Information Security Management Systems in the Healthcare Context.
Proceedings of the South African Information Security Multi-Conference, 2010

An Information Security Policy Development Life Cycle .
Proceedings of the South African Information Security Multi-Conference, 2010

Community Awareness and Involvement: An Overlooked Security Control.
Proceedings of the South African Information Security Multi-Conference, 2010

2007
A model to assess the benefit value of knowledge management in an IT service provider environment.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007

2006
The Organisational Information Security Profile - A Tool to Assist The Board.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Towards Regulatory Compliance - A model for the South African Financial Sector.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Information Security Management and Regulatory Compliance in the South African Health Sector.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

1993
Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
Proceedings of the Computer Security, 1993

1992
MAPS - Model for Automated Profile Specification.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1991
A computerized management reporting aid for a mainframe security system.
Comput. Secur., 1991


  Loading...