Follow
Johnny Botha
Title
Cited by
Cited by
Year
Fake News and Deepfakes - A Dangerous Threat for 21st Century Information Security
HP J. Botha
International Conference on Cyber Warfare and Security (ICCWS 2020) 15 (15), 2020
862020
A high-level comparison between the South African protection of personal information act and international data protection laws
J Botha, MM Grobler, J Hahn, M Eloff
ICMLG2017 5th International Conference on Management Leadership and …, 2017
352017
The effects of the PoPI Act on small and medium enterprises in South Africa
JG Botha, MM Eloff, I Swart
2015 Information Security for South Africa (ISSA), 1-8, 2015
282015
A comparison of chat applications in terms of security and privacy
J Botha, WC Vant, L Leenen
Proc. 18th Eur. Conf. Cyber Warfare Secur, 55, 2019
222019
Evaluation of online resources on the implementation of the protection of personal information act in South Africa
J Botha, MM Eloff, I Swart
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
142015
Global data breaches responsible for the disclosure of personal information: 2015 & 2016
J Botha, M Grobler, M Eloff
European Conference on Cyber Warfare and Security, 63-72, 2017
92017
Pro-active data breach detection: examining accuracy and applicability on personal information detected
J Botha, MM Eloff, I Swart
Proceedings of the 11th International Conference on Cyber Warfare and …, 2016
72016
An analysis of crypto scams during the Covid-19 pandemic: 2020-2022
JG Botha, DP Botha-Badenhorst, L Leenen
42023
An Analysis of the MTI Crypto Investment Scam: User Case
J Botha, T Pederson, L Leenen
ECCWS 2023 22nd European Conference on Cyber Warfare and Security, 2023
22023
Cryptocurrency-crime investigation: Fraudulent use of bitcoin in a divorce case
JG Botha, L Leenen
International Conference on Cyber Warfare and Security 19 (1), 34-42, 2024
12024
Security threats and measures on multifunctional devices
JG Botha, S Von Solms
Academic Conferences and Publishing International, also Curran, 2018
12018
An Analysis of a Cryptocurrency Giveaway Scam: Use Case
J Botha, L Leenen
European Conference on Cyber Warfare and Security 23 (1), 74-85, 2024
2024
A proposed high-level methodology on how OSINT is applied in blockchain investigations
WP Gertenbach, JG Botha, L Leenen
Proceedings of the 19th International Conference on Cyber Warfare and …, 2024
2024
Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure
J Botha, M Eloff, M Grobler
Technology and Intimacy: Choice or Coercion: 12th IFIP TC 9 International …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–14