Fake News and Deepfakes - A Dangerous Threat for 21st Century Information Security HP J. Botha International Conference on Cyber Warfare and Security (ICCWS 2020) 15 (15), 2020 | 86 | 2020 |
A high-level comparison between the South African protection of personal information act and international data protection laws J Botha, MM Grobler, J Hahn, M Eloff ICMLG2017 5th International Conference on Management Leadership and …, 2017 | 35 | 2017 |
The effects of the PoPI Act on small and medium enterprises in South Africa JG Botha, MM Eloff, I Swart 2015 Information Security for South Africa (ISSA), 1-8, 2015 | 28 | 2015 |
A comparison of chat applications in terms of security and privacy J Botha, WC Vant, L Leenen Proc. 18th Eur. Conf. Cyber Warfare Secur, 55, 2019 | 22 | 2019 |
Evaluation of online resources on the implementation of the protection of personal information act in South Africa J Botha, MM Eloff, I Swart Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015 | 14 | 2015 |
Global data breaches responsible for the disclosure of personal information: 2015 & 2016 J Botha, M Grobler, M Eloff European Conference on Cyber Warfare and Security, 63-72, 2017 | 9 | 2017 |
Pro-active data breach detection: examining accuracy and applicability on personal information detected J Botha, MM Eloff, I Swart Proceedings of the 11th International Conference on Cyber Warfare and …, 2016 | 7 | 2016 |
An analysis of crypto scams during the Covid-19 pandemic: 2020-2022 JG Botha, DP Botha-Badenhorst, L Leenen | 4 | 2023 |
An Analysis of the MTI Crypto Investment Scam: User Case J Botha, T Pederson, L Leenen ECCWS 2023 22nd European Conference on Cyber Warfare and Security, 2023 | 2 | 2023 |
Cryptocurrency-crime investigation: Fraudulent use of bitcoin in a divorce case JG Botha, L Leenen International Conference on Cyber Warfare and Security 19 (1), 34-42, 2024 | 1 | 2024 |
Security threats and measures on multifunctional devices JG Botha, S Von Solms Academic Conferences and Publishing International, also Curran, 2018 | 1 | 2018 |
An Analysis of a Cryptocurrency Giveaway Scam: Use Case J Botha, L Leenen European Conference on Cyber Warfare and Security 23 (1), 74-85, 2024 | | 2024 |
A proposed high-level methodology on how OSINT is applied in blockchain investigations WP Gertenbach, JG Botha, L Leenen Proceedings of the 19th International Conference on Cyber Warfare and …, 2024 | | 2024 |
Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure J Botha, M Eloff, M Grobler Technology and Intimacy: Choice or Coercion: 12th IFIP TC 9 International …, 2016 | | 2016 |