Reinhardt A. Botha
Orcid: 0000-0002-6176-3007Affiliations:
- Nelson Mandela Metropolitan University, Port Elizabeth, South Africa
According to our database1,
Reinhardt A. Botha
authored at least 48 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
1
2
1
1
1
1
1
1
1
4
2
1
1
1
1
1
1
1
3
5
3
2
4
1
1
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
2022
Inf. Comput. Secur., 2022
2021
South Afr. Comput. J., 2021
2020
Proceedings of the Human Aspects of Information Security and Assurance, 2020
2019
Proceedings of the 9th International Conference on Information Communication and Management, 2019
2018
South Afr. Comput. J., 2018
Proceedings of the Information Security - 17th International Conference, 2018
2017
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017
2016
Prioritizing computer security incident response services for the South African National Research Network (SANReN).
Proceedings of the CONF-IRM 2016, 2016
2015
Understanding the problem of coordination in a large scale distributed environment from a service lens view - Towards the South African public sector e-Administration criteria for coordination support.
Gov. Inf. Q., 2015
Proceedings of the 2015 Information Security for South Africa, 2015
2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the Tenth International Network Conference, 2014
Exploring the Impact of Restrictive Default Privacy Settings on the Privacy Calculus on Social Network sites.
Proceedings of the 22st European Conference on Information Systems, 2014
2013
A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument.
Proceedings of the 19th Americas Conference on Information Systems, 2013
Predictable patterns in microtext as seen in educational applications using MXit in South Africa.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013
Proceedings of the Analyzing Microtext, 2013
2012
Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Establishing discernible flow characteristics for accurate, real-time network protocol identification.
Proceedings of the Ninth International Network Conference (INC 2012), 2012
2011
Proceedings of the 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
A busyness model for assigning tutors to pupils in a mobile, online tutoring system: a look at C<sup>3</sup>TO.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Virtual Communities as a Mechanism for Sustainable Coordination within the South African Public Sector.
Proceedings of the E-Government, E-Services and Global Processes, 2010
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010
2009
Proceedings of the Information Security South Africa Conference 2009, 2009
2008
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
2007
Inf. Syst. Manag., 2007
2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006
2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
2002
South Afr. Comput. J., 2002
Towards Semantic Integrity in Rational Databases.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
IBM Syst. J., 2001
Comput. Secur., 2001
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001
2000
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments.
South Afr. Comput. J., 2000
An XML based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments.
South Afr. Comput. J., 2000
A Context-Sensitive Access Control Model and Prototype Implementation.
Proceedings of the Information Security for Global Information Infrastructures, 2000