Johnny Botha
Cited by
Cited by
The effects of the PoPI Act on small and medium enterprises in South Africa
JG Botha, MM Eloff, I Swart
2015 Information Security for South Africa (ISSA), 1-8, 2015
A high-level comparison between the South African protection of personal information act and international data protection laws
J Botha, MM Grobler, J Hahn, M Eloff
ICMLG2017 5th International Conference on Management Leadership and …, 2017
Evaluation of online resources on the implementation of the protection of personal information act in South Africa
J Botha, MM Eloff, I Swart
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
A comparison of Chat Applications in terms of security and privacy
J Botha, C Van‘t Wout, L Leenen
Proc. 18th Eur. Conf. Cyber Warfare Secur., 55, 2019
Global Data Breaches Responsible for the Disclosure of Personal Information: 2015 & 2016
J Botha, M Grobler, M Eloff
European Conference on Cyber Warfare and Security, 63-72, 2017
Pro-active data breach detection: examining accuracy and applicability on personal information detected
J Botha, MM Eloff, I Swart
ICCWS 2016 11th International Conference on Cyber Warfare and Security …, 2016
Fake News and Deepfakes - A Dangerous Threat for 21st Century Information Security
HP J. Botha
International Conference on Cyber Warfare and Security (ICCWS 2020) 15 (15), 2020
Security threats and measures on multifunctional devices
JG Botha, S Von Solms
Academic Conferences and Publishing International, also Curran, 2018
Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure
J Botha, M Eloff, M Grobler
IFIP International Conference on Human Choice and Computers, 72-85, 2016
Paper Title Author (s) Page No Preface vii Committee viii Biographies x
A Algawi, M Kiperberg, R Leon, N Zaidenberg, CMB Pills, R Pills, A Resh, ...
The system can't perform the operation now. Try again later.
Articles 1–10