Reinhardt A. Botha

ORCID: 0000-0002-6176-3007
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Privacy, Security, and Data Protection
  • Information and Cyber Security
  • Mobile Learning in Education
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Business Process Modeling and Analysis
  • Cryptography and Data Security
  • Innovative Teaching and Learning Methods
  • Network Security and Intrusion Detection
  • Software Engineering Techniques and Practices
  • ICT in Developing Communities
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Malware Detection Techniques
  • Service-Oriented Architecture and Web Services
  • Speech Recognition and Synthesis
  • Impact of Technology on Adolescents
  • Speech and Audio Processing
  • Cloud Data Security Solutions
  • Information Technology Governance and Strategy
  • Digital Communication and Language
  • Music and Audio Processing
  • Open Education and E-Learning
  • Social Media and Politics
  • Knowledge Management and Sharing

Nelson Mandela University
2014-2023

Port Elizabeth Provincial Hospital
2004

IEEE Computer Society
2000-2001

Separation of duty, as a security principle, has its primary objective the prevention fraud and errors. This is achieved by disseminating tasks associated privileges for specific business process among multiple users. principle demonstrated in traditional example separation duty found requirement two signatures on check. Previous work requirements often explored implementations based role-based access control (RBAC) principles. These are concerned with constraining associations between RBAC...

10.1147/sj.403.0666 article EN IBM Systems Journal 2001-01-01

Abstract Material property dependence on the OH−/Zn2+ molar ratio of precursor was investigated by varying amount NaOH during synthesis ZnO. It necessary to control water content and temperature mixture ensure reproducibility. observed that structural properties, particle size, photoluminescence intensity wavelength maximum were influenced precursor. The XRD spectra for ZnO nanoparticles show entire peaks corresponding various planes wurtzite ZnO, indicating a single phase. UV measurements...

10.2478/s11534-011-0050-3 article EN cc-by-nc-nd Open Physics 2011-06-03

Due to the correspondence between role abstraction in Role-based Access Control (RBAC) and notion of organizational positions, it seems easy construct hierarchies. This is, however, a misconception. paper argues that, order reflect functional requirements, hierarchy becomes very complex. In bid simplify design hierarchies suitable for expression access control requirements workflow systems, proposes "typed" hierarchy. is specific type. The associations different types roles are limited by...

10.1109/cmpsac.2001.960606 article EN 2002-11-13

Workflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow rooted scope of a BPR project. A framework for is developed. The suggests existing role‐based mechanisms can be used as foundation systems. separates administration‐time and run‐time aspects. Key areas must investigated to meet imposed by on services identified.

10.1108/09685220110394848 article EN Information Management & Computer Security 2001-08-01

Background: The urgency to enforce the Protection of Personal Information (POPI) Act is building up within South Africa, triggered by appointment Regulator for POPI on 01 December 2016. However, data management practitioners, absence a practical guideline how legally process personal information employees, customers or other juristic persons in line with poses day-to-day technical challenge, especially those embarking maiden journey comply Act.Objectives: objective this article explore and...

10.4102/sajim.v20i1.917 article EN cc-by South African journal of information management 2018-10-09

10.1016/j.cose.2006.04.002 article EN Computers & Security 2006-05-26

10.1016/s1361-3723(11)70052-5 article EN Computer Fraud & Security 2011-05-01

Smart meter implementation is still in its infancy many African countries, including South Africa. This evident from the fact that most research studies are either Eurocentric or American-centric. Hence, this aimed to identify consumer-centric factors for planning considerations of smart meters We used various behavioural theoretical models found literature potential relevant study. Based on quantitatively gathered data (n = 705), a structural equation model (SEM) was evaluate identified...

10.18489/sacj.v33i2.909 article EN cc-by-nc South African Computer Journal 2021-12-20

Dr MathTM is a mobile, online tutoring system where learners can use MXitTM on their mobile phones to receive help with mathematics homework from volunteer tutors. These conversations between and Math are held in MXit lingo. lingo heavily abbreviated, English-like language that evolving users of communicate using MXit. The project has been running since January 2007 uses tutors who mostly university students readily understand However, due the large number simultaneous often involved...

10.4102/pythagoras.v32i2.59 article EN cc-by Pythagoras 2011-11-16

There are a number of considerations before one can commence with establishing Computer Security Incident Response Team (CSIRT). This paper presents the results structured literature review investigating business requirements for CSIRT. That is, identifies those things that must be in place prior to commencing actual establishment process. These include characterising CSIRT environment, funding, constituency, authority and legal considerations. Firstly, we identified authoritative...

10.1109/issa.2015.7335057 article EN 2015-08-01

Although there are numerous guides available for establishing a computer security incident response capability, appears to be no underlying management model that brings them all together. This paper aims address the problem by developing Computer Security Incident Response Team (CSIRT). A design science-based approach has been selected overall project. However, current reports on first three activities in science research: identifying problem, listing solution objectives, and designing...

10.23919/saiee.2016.8531544 article EN other-oa SAIEE Africa Research Journal 2016-06-01

Research on internet users reports a gap between reported privacy concerns and observed behavior. This has also been social networking sites like Facebook MySpace. current study explores the extent of this by examining individual components. Unlike previous studies that have explored versus behavior, claimed information disclosure disclosure. A questionnaire was used to examine observations public profiles were conducted actual The shows there is disclosure, in case concern However, act more...

10.1109/issa.2012.6320443 article EN Information Security for South Africa 2012-08-01
Coming Soon ...