BibTeX records: Reinhardt A. Botha

download as .bib file

@article{DBLP:journals/imcs/RensburgBS22,
  author       = {Ebenhaeser Otto Janse van Rensburg and
                  Reinhardt A. Botha and
                  Rossouw von Solms},
  title        = {Utility indicator for emotion detection in a speaker authentication
                  system},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {672--686},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0097},
  doi          = {10.1108/ICS-07-2021-0097},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/RensburgBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/BothaF21,
  author       = {Reinhardt A. Botha and
                  Steven Furnell},
  title        = {Facing up to security and privacy in online meetings},
  journal      = {Netw. Secur.},
  volume       = {2021},
  number       = {5},
  pages        = {7--13},
  year         = {2021},
  url          = {https://doi.org/10.1016/S1353-4858(21)00052-0},
  doi          = {10.1016/S1353-4858(21)00052-0},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/BothaF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/MokobaneB20,
  author       = {Ntsewa B. Mokobane and
                  Reinhardt A. Botha},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Does Ubuntu Influence Social Engineering Susceptibility?},
  booktitle    = {Human Aspects of Information Security and Assurance - 14th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos,
                  Greece, July 8-10, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {593},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57404-8\_8},
  doi          = {10.1007/978-3-030-57404-8\_8},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/haisa/MokobaneB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicm/ManjeziB19,
  author       = {Zandile Manjezi and
                  Reinhardt A. Botha},
  title        = {From Concept to Practice: Untangling the Direct-Control Cycle},
  booktitle    = {Proceedings of the 9th International Conference on Information Communication
                  and Management, {ICICM} 2019, Prague, Czech Republic, August 23-26,
                  2019},
  pages        = {101--105},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357419.3357427},
  doi          = {10.1145/3357419.3357427},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicm/ManjeziB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/LeppanBN18,
  author       = {Ronald George Leppan and
                  Reinhardt A. Botha and
                  Johan F. Van Niekerk},
  title        = {Process Model for Differentiated Instruction using Learning Analytics},
  journal      = {South Afr. Comput. J.},
  volume       = {30},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.18489/sacj.v30i2.481},
  doi          = {10.18489/SACJ.V30I2.481},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/LeppanBN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ManjeziB18,
  author       = {Zandile Manjezi and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Preventing and Mitigating Ransomware - {A} Systematic Literature Review},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_11},
  doi          = {10.1007/978-3-030-11407-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ManjeziB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigite/BothaM17,
  author       = {Reinhardt A. Botha and
                  Russell E. McMahon},
  editor       = {Stephen J. Zilora and
                  Tom Ayers and
                  Daniel S. Bogaard},
  title        = {Reflections on Curriculating a South African Information Technology
                  Degree},
  booktitle    = {Proceedings of the 18th Annual Conference on Information Technology
                  Education and the 6th Annual Conference on Research in Information
                  Technology, {SIGITE/RIIT} 2017, Rochester, New York, USA, October
                  4-7, 2017},
  pages        = {69},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3125659.3125667},
  doi          = {10.1145/3125659.3125667},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigite/BothaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conf-irm/MooiB16,
  author       = {Roderick Mooi and
                  Reinhardt A. Botha},
  title        = {Prioritizing computer security incident response services for the
                  South African National Research Network (SANReN)},
  booktitle    = {{CONF-IRM} 2016, The International Conference on Information Resources
                  Management: Digital Emancipation in a Networked Society, Cape Town,
                  South Africa, May 18-20, 2016},
  pages        = {27},
  year         = {2016},
  url          = {http://aisel.aisnet.org/confirm2016/27},
  timestamp    = {Mon, 07 Nov 2016 15:02:30 +0100},
  biburl       = {https://dblp.org/rec/conf/conf-irm/MooiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/ThomasBG15,
  author       = {Godwin Thomas and
                  Reinhardt A. Botha and
                  Darell van Greunen},
  title        = {Understanding the problem of coordination in a large scale distributed
                  environment from a service lens view - Towards the South African public
                  sector e-Administration criteria for coordination support},
  journal      = {Gov. Inf. Q.},
  volume       = {32},
  number       = {4},
  pages        = {526--538},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.giq.2015.08.002},
  doi          = {10.1016/J.GIQ.2015.08.002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/giq/ThomasBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MooiB15,
  author       = {Roderick Mooi and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Prerequisites for building a Computer Security Incident Response capability},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335057},
  doi          = {10.1109/ISSA.2015.7335057},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MooiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/TschersichB14,
  author       = {Markus Tschersich and
                  Reinhardt A. Botha},
  editor       = {Michel Avital and
                  Jan Marco Leimeister and
                  Ulrike Schultze},
  title        = {Exploring the Impact of Restrictive Default Privacy Settings on the
                  Privacy Calculus on Social Network sites},
  booktitle    = {22st European Conference on Information Systems, {ECIS} 2014, Tel
                  Aviv, Israel, June 9-11, 2014},
  year         = {2014},
  url          = {http://aisel.aisnet.org/ecis2014/proceedings/track14/11},
  timestamp    = {Tue, 28 Oct 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/TschersichB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inc/OphoffB14,
  author       = {Jacques Ophoff and
                  Reinhardt A. Botha},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bogdan V. Ghita},
  title        = {A Privacy-Aware Model for Communications Management in the {IP} Multimedia
                  Subsystem},
  booktitle    = {Tenth International Network Conference, {INC} 2014, Plymouth, UK,
                  July 8-10, 2014. Proceedings},
  pages        = {117--126},
  publisher    = {Plymouth University},
  year         = {2014},
  url          = {http://www.cscan.org/openaccess/?paperid=220},
  timestamp    = {Tue, 16 May 2023 22:42:08 +0200},
  biburl       = {https://dblp.org/rec/conf/inc/OphoffB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TekeniTB14,
  author       = {Luzuko Tekeni and
                  Kerry{-}Lynn Thomson and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Concerns regarding service authorization by {IP} address using eduroam},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950495},
  doi          = {10.1109/ISSA.2014.6950495},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TekeniTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/HaskinsB13,
  author       = {Bertram Haskins and
                  Reinhardt A. Botha},
  title        = {Identifying Tag Word Counterparts for Dr. Math},
  booktitle    = {Analyzing Microtext, Papers from the 2013 {AAAI} Spring Symposium,
                  Palo Alto, California, USA, March 25-27, 2013},
  series       = {{AAAI} Technical Report},
  volume       = {{SS-13-01}},
  publisher    = {{AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS13/paper/view/5717},
  timestamp    = {Mon, 09 Sep 2013 15:08:42 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaiss/HaskinsB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africon/ButgereitB13,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  title        = {Predictable patterns in microtext as seen in educational applications
                  using MXit in South Africa},
  booktitle    = {{AFRICON} 2013, Pointe aux Piments, Mauritius, September 9-12, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/AFRCON.2013.6757588},
  doi          = {10.1109/AFRCON.2013.6757588},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africon/ButgereitB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/TschersichB13,
  author       = {Markus Tschersich and
                  Reinhardt A. Botha},
  title        = {Understanding the impact of default privacy settings on self-disclosure
                  in social networking services: Building a conceptual model and measurement
                  instrument},
  booktitle    = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago,
                  Illinois, USA, August 15-17, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/11},
  timestamp    = {Tue, 28 Oct 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/TschersichB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ButgereitB13,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  title        = {An architecture for synchronous micro-volunteering in Africa using
                  social media},
  booktitle    = {2013 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22,
                  2013},
  pages        = {175--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PerComW.2013.6529477},
  doi          = {10.1109/PERCOMW.2013.6529477},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ButgereitB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/ButgereitB13,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  editor       = {John McNeill and
                  Karen L. Bradshaw and
                  Philip Machanick and
                  Mosiuoa Tsietsi},
  title        = {A comparison of different calculations for N-gram similarities in
                  a spelling corrector for mobile instant messaging language},
  booktitle    = {2013 South African Institute for Computer Scientists and Information
                  Technologists, {SAICSIT} '13, East London, South Africa, October 7-9,
                  2013},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513456.2513458},
  doi          = {10.1145/2513456.2513458},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saicsit/ButgereitB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inc/GossB12,
  author       = {Ryan G. Goss and
                  Reinhardt A. Botha},
  editor       = {Reinhardt A. Botha and
                  Paul Dowland and
                  Steven Furnell},
  title        = {Establishing discernible flow characteristics for accurate, real-time
                  network protocol identification},
  booktitle    = {Ninth International Network Conference {(INC} 2012), Port Elizabeth,
                  South Africa, July 11-12, 2012. Proceedings},
  pages        = {25--34},
  publisher    = {University of Plymouth},
  year         = {2012},
  url          = {http://www.cscan.org/?page=openaccess\&\#38;id=140},
  timestamp    = {Tue, 16 May 2023 22:42:08 +0200},
  biburl       = {https://dblp.org/rec/conf/inc/GossB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NtlatywaBH12,
  author       = {Phumezo Ntlatywa and
                  Reinhardt A. Botha and
                  Bertram Haskins},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Claimed vs observed information disclosure on social networking sites},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320443},
  doi          = {10.1109/ISSA.2012.6320443},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NtlatywaBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/NtlatywaBH12,
  author       = {Phumezo Ntlatywa and
                  Reinhardt A. Botha and
                  Bertram Haskins},
  title        = {Factors that Influence the Choice of Privacy Settings on Facebook:
                  Freshmen's View at a South African University},
  booktitle    = {2012 International Conference on Privacy, Security, Risk and Trust,
                  {PASSAT} 2012, and 2012 International Confernece on Social Computing,
                  SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages        = {843--850},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SocialCom-PASSAT.2012.36},
  doi          = {10.1109/SOCIALCOM-PASSAT.2012.36},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/NtlatywaBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/inc/2012,
  editor       = {Reinhardt A. Botha and
                  Paul Dowland and
                  Steven Furnell},
  title        = {Ninth International Network Conference {(INC} 2012), Port Elizabeth,
                  South Africa, July 11-12, 2012. Proceedings},
  publisher    = {University of Plymouth},
  year         = {2012},
  url          = {http://www.cscan.org/?page=openaccess\&\#38;eid=1},
  isbn         = {978-1-84102-315-1},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/inc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GossB11,
  author       = {Ryan Gavin Goss and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Traffic Management in Next Generation Service Provider Networks -
                  Are We There Yet?},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GossB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/ButgereitB11,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  editor       = {Irwin Brown and
                  Kosheek Sewchurran and
                  Hussein Suleman},
  title        = {Using N-grams to identify mathematical topics in MXit lingo},
  booktitle    = {Proceedings of the 2011 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists, {SAICSIT} 2011,
                  Cape Town, South Africa, October 3-5, 2011},
  pages        = {40--48},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2072221.2072227},
  doi          = {10.1145/2072221.2072227},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saicsit/ButgereitB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6/ButgereitB10,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  editor       = {Ana Pont and
                  Guy Pujolle and
                  S. V. Raghavan},
  title        = {C\({}^{\mbox{3}}\)TO: {A} Scalable Architecture for Mobile Tutoring
                  over Cell Phones},
  booktitle    = {Communications: Wireless in Developing Countries and Networks of the
                  Future - Third {IFIP} {TC} 6 International Conference, {WCITD} 2010
                  and {IFIP} {TC} 6 International Conference, {NF} 2010, Held as Part
                  of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {327},
  pages        = {15--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15476-8\_3},
  doi          = {10.1007/978-3-642-15476-8\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip6/ButgereitB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8/ThomasB10,
  author       = {Godwin Thomas and
                  Reinhardt A. Botha},
  editor       = {Marijn Janssen and
                  Winfried Lamersdorf and
                  Jan Pries{-}Heje and
                  Michael Rosemann},
  title        = {Virtual Communities as a Mechanism for Sustainable Coordination within
                  the South African Public Sector},
  booktitle    = {E-Government, E-Services and Global Processes - Joint {IFIP} {TC}
                  8 and {TC} 6 International Conferences, {EGES} 2010 and {GISP} 2010,
                  Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {334},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15346-4\_6},
  doi          = {10.1007/978-3-642-15346-4\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip8/ThomasB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GossB10,
  author       = {Ryan G. Goss and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Deep Packet Inspection - Fear of the Unknown},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/34\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GossB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/ButgereitB10,
  author       = {Laurie L. Butgereit and
                  Reinhardt A. Botha},
  editor       = {Paula Kotz{\'{e}} and
                  Alta van der Merwe and
                  Aurona Gerber},
  title        = {A busyness model for assigning tutors to pupils in a mobile, online
                  tutoring system: a look at C\({}^{\mbox{3}}\)TO},
  booktitle    = {Proceedings of the 2010 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists, {SAICSIT} 2010,
                  Bela Bela, South Africa, October 11-13, 2010},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {350--355},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1899503.1899543},
  doi          = {10.1145/1899503.1899543},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saicsit/ButgereitB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BothaFC09,
  author       = {Reinhardt A. Botha and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {From desktop to mobile: Examining the security experience},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {3-4},
  pages        = {130--137},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2008.11.001},
  doi          = {10.1016/J.COSE.2008.11.001},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BothaFC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VictorRB09,
  author       = {Rudi Victor and
                  Andrew Rutherford and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Enhanced Presence Handling},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {309--326},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VictorRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/OphoffB08,
  author       = {Jacobus A. Ophoff and
                  Reinhardt A. Botha},
  title        = {Mobile communications: user perception and practice},
  journal      = {South Afr. Comput. J.},
  volume       = {40},
  pages        = {63--73},
  year         = {2008},
  url          = {http://reference.sabinet.co.za/document/EJC28045},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/OphoffB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/RutherfordB08,
  author       = {Andrew Rutherford and
                  Reinhardt A. Botha},
  editor       = {Marten van Sinderen and
                  Jo{\~{a}}o Paulo A. Almeida and
                  Lu{\'{\i}}s Ferreira Pires and
                  Maarten Steen},
  title        = {Towards Enhanced Presence Filtering},
  booktitle    = {Workshops Proceedings of the 12th International {IEEE} Enterprise
                  Distributed Object Computing Conference, {ECOCW} 2008, 16 September
                  2008, Munich, Germany},
  pages        = {159--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDOCW.2008.61},
  doi          = {10.1109/EDOCW.2008.61},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/RutherfordB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/saicsit/2008,
  editor       = {Reinhardt A. Botha and
                  Charmain Cilliers},
  title        = {Proceedings of the 2008 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists on {IT} Research
                  in Developing Countries, {SAICSIT} 2008, Wilderness, South Africa,
                  October 6-8, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {338},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-286-3},
  timestamp    = {Tue, 04 Oct 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/saicsit/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ism/ThomasB07,
  author       = {Godwin Thomas and
                  Reinhardt A. Botha},
  title        = {Secure Mobile Device Use in Healthcare Guidance from {HIPAA} and {ISO17799}},
  journal      = {Inf. Syst. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {333--342},
  year         = {2007},
  url          = {https://doi.org/10.1080/10580530701586060},
  doi          = {10.1080/10580530701586060},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ism/ThomasB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/saicsit/2007,
  editor       = {Lynette Barnard and
                  Reinhardt A. Botha},
  title        = {Proceedings of the 2007 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists on {IT} Research
                  in Developing Countries, {SAICSIT} 2007, Port Elizabeth, South Africa,
                  October 2-3, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {226},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-775-9},
  timestamp    = {Tue, 04 Oct 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/saicsit/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BothaG06,
  author       = {Reinhardt A. Botha and
                  Tshepo G. Gaadingwe},
  title        = {Reflecting on 20 {SEC} conferences},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {247--256},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.04.002},
  doi          = {10.1016/J.COSE.2006.04.002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BothaG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwmc/OphoffB06,
  author       = {Jacobus A. Ophoff and
                  Reinhardt A. Botha},
  editor       = {Petre Dini and
                  Christer {\AA}hlund and
                  Cosmin Dini and
                  Eugen Borcoci},
  title        = {Privacy-enhancing Call Management in an IP-based Infrastructure},
  booktitle    = {Proceedings of the Second International Conference on Wireless and
                  Mobile Communications (ICWMC'06), Bucharest, Romania, July 29-31,
                  2006},
  pages        = {42},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICWMC.2006.77},
  doi          = {10.1109/ICWMC.2006.77},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwmc/OphoffB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffPB06,
  author       = {Jacobus A. Ophoff and
                  Stephen Perelson and
                  Reinhardt A. Botha},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Model for Secure Value-Added Service Subscriptions in Cellular Networks},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/60\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffPB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffB05,
  author       = {Jacobus A. Ophoff and
                  Reinhardt A. Botha},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Revisiting Reachability Management as a Multilateral Security Mechanism},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/011\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/BothaE02,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {An access control architecture for {XML} documents in workflow environments},
  journal      = {South Afr. Comput. J.},
  volume       = {28},
  pages        = {3--10},
  year         = {2002},
  url          = {http://reference.sabinet.co.za/document/EJC27925},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/BothaE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Botha02,
  author       = {Reinhardt A. Botha},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Towards Semantic Integrity in Rational Databases},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {287--298},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Botha02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BothaE01,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {Access Control in Document-centric Workflow Systems An Agent-based
                  Approach},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {525--532},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00613-7},
  doi          = {10.1016/S0167-4048(01)00613-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BothaE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmsj/BothaE01,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {Separation of duties for access control enforcement in workflow environments},
  journal      = {{IBM} Syst. J.},
  volume       = {40},
  number       = {3},
  pages        = {666--682},
  year         = {2001},
  url          = {https://doi.org/10.1147/sj.403.0666},
  doi          = {10.1147/SJ.403.0666},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmsj/BothaE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BothaE01,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {A framework for access control in workflow systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {126--133},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110394848},
  doi          = {10.1108/09685220110394848},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BothaE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/PerelsonBE01,
  author       = {Stephen Perelson and
                  Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {Separation of Duty administration},
  journal      = {South Afr. Comput. J.},
  volume       = {27},
  pages        = {64--69},
  year         = {2001},
  url          = {http://reference.sabinet.co.za/document/EJC27909},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/PerelsonBE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BothaE01,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {Designing Role Hierarchies for Access Control in Workflow Systems},
  booktitle    = {25th International Computer Software and Applications Conference {(COMPSAC}
                  2001), Invigorating Software Development, 8-12 October 2001, Chicago,
                  IL, {USA}},
  pages        = {117--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CMPSAC.2001.960606},
  doi          = {10.1109/CMPSAC.2001.960606},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BothaE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/PapenfusB00,
  author       = {C. Papenfus and
                  Reinhardt A. Botha},
  title        = {An {XML} based approach to enforcing history-based separation of duty
                  policies in heterogeneous workflow environments},
  journal      = {South Afr. Comput. J.},
  volume       = {26},
  pages        = {60--68},
  year         = {2000},
  url          = {http://reference.sabinet.co.za/document/EJC27901},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/PapenfusB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/PerelsonB00,
  author       = {Stephen Perelson and
                  Reinhardt A. Botha},
  title        = {Conflict analysis as a means of enforcing static separation of duty
                  requirements in workflow environments},
  journal      = {South Afr. Comput. J.},
  volume       = {26},
  pages        = {212--216},
  year         = {2000},
  url          = {http://reference.sabinet.co.za/document/EJC27881},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/PerelsonB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CholewkaBE00,
  author       = {Damian G. Cholewka and
                  Reinhardt A. Botha and
                  Jan H. P. Eloff},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {A Context-Sensitive Access Control Model and Prototype Implementation},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {341--350},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 06 Sep 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CholewkaBE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics