Johnny Botha
Johnny Botha
Bestätigte E-Mail-Adresse bei csir.co.za
Titel
Zitiert von
Zitiert von
Jahr
A high-level comparison between the South African protection of personal information act and international data protection laws
J Botha, MM Grobler, J Hahn, M Eloff
ICMLG2017 5th International Conference on Management Leadership and …, 2017
182017
The effects of the PoPI Act on small and medium enterprises in South Africa
JG Botha, MM Eloff, I Swart
2015 Information Security for South Africa (ISSA), 1-8, 2015
172015
Evaluation of online resources on the implementation of the protection of personal information act in South Africa
J Botha, MM Eloff, I Swart
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
132015
Fake News and Deepfakes - A Dangerous Threat for 21st Century Information Security
HP J. Botha
International Conference on Cyber Warfare and Security (ICCWS 2020) 15 (15), 2020
62020
Pro-active data breach detection: examining accuracy and applicability on personal information detected
J Botha, MM Eloff, I Swart
ICCWS 2016 11th International Conference on Cyber Warfare and Security …, 2016
62016
A comparison of chat applications in terms of security and privacy
J Botha, WC Vant, L Leenen
Proc. 18th Eur. Conf. Cyber Warfare Secur., 55, 2019
52019
Global data breaches responsible for the disclosure of personal information: 2015 & 2016
J Botha, M Grobler, M Eloff
European Conference on Cyber Warfare and Security, 63-72, 2017
52017
Security threats and measures on multifunctional devices
JG Botha, S Von Solms
Academic Conferences and Publishing International, also Curran, 2018
2018
Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure
J Botha, M Eloff, M Grobler
IFIP International Conference on Human Choice and Computers, 72-85, 2016
2016
Paper Title Author (s) Page No Preface vii Committee viii Biographies x
A Algawi, M Kiperberg, R Leon, N Zaidenberg, CMB Pills, R Pills, A Resh, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10