Representative Publications
He has published in journals such as the IBM Systems Journal, Computers & Security, Government Information Quarterly, Information Systems Management, Information Management & Computer Security, and the South African Computer Journal. He has published 24 journal papers and 74 conference papers. He has also presented at several industry forums and workshops
[24] B. Coetzee and R.A. Botha (2019) The Internet of Things: The Disclosure Paradox. Journal of Engineering and Applied Sciences, Volume 14, No 6, pp. 9321 – 9325.
[23] R.G. Leppan, R.A. Botha and J. van Niekerk (2018) Process Model for Differentiated Instruction Using Learning Analytics. South African Computer Journal, Volume 30, No 2.
[22] A. Kandeh, R.A. Botha and L. Futcher (2018) Enforcement of the POPI Act: Perspective of data management professionals. South African Journal of Information Management, Volume 20, No 1
[21] B. Haskins and R.A. Botha (2017) Aligning the Most Frequently Discussed Topics on the Dr Math Service with Those Found on NSC Mathematics Exams, The Journal for Transdisciplinary Research in Southern Africa, Volume 13, No 1
[20] R. Mooi and R.A. Botha (2016) A Model for Building a Computer Security Incident Response Capability. SAIEE Africa Research Journal, Volume 107 No 2, pp. 78 – 91.
[19] K. Adesemowo, R. von Solms and R.A. Botha (2016), Safeguarding Information as an Asset: Do We Need a Redefinition in the knowledge economy and beyond? South African Journal of Information Management, Vol 18, No 1 (2016), 12 pages.
[18] G. Thomas, R.A. Botha and D van Greunen (2015) Understanding the Problem of Coordination in a Large Scale Distributed Environment from a Service Lens View - Towards the South African Public Sector e-Administration criteria for coordination support, Government Information Quarterly 32(4), pp. 526 -- 538
[17] L Tekeni, R.A. Botha and K-L Thomson (2015), A multi-faceted model for IP-based service authorization in the eduroam network, SAIEE Africa Research Journal 106(2), pp 83 – 92.
[16] B Haskins and R.A. Botha (2015) Contrasting methods for classifying microtext statements containing mathematics, Journal of New Generation Sciences 13(1) pp. 70 – 87.
[15] L. Butgereit, R.A. Botha and M. van den Heever (2012) Key Identifiers and Spelling Conventions in MXit-Lingo as found in Conversations with Dr Math. The Journal for Transdisciplinary Research in Southern Africa 8(1), July 2012, pp. 30 – 50.
[14] L. Butgereit and R.A. Botha (2011) A model to identify mathematics topics in MXit lingo to provide tutors quick access to supporting documentation. Pythagoras 32(2), 2011, pp.23 – 33.
[13] S.M. Furnell and R.A. Botha (2011) Social Networks – access to all areas? Computer Fraud and Security, 2011(5), pp. 14 – 19.
[12] R.A. Botha, S.M. Furnell and N.L. Clarke (2009) From desktop to mobile: Examining the security experience. Computers & Security, Volume 28, Number 3-4, 2009, pp. 130 – 137.
[11] J. Ophoff and R.A. Botha (2008) Mobile Communication: User perception and practice, South African Computer Journal, Volume 40, June 2008, pp. 63 – 73.
[10] G. Thomas and R.A. Botha (2007) Secure Mobile Device Use in Healthcare: Guidance from HIPAA and ISO17799, Information Systems Management, Volume 24, 2007, pp. 333 – 342.
[9] R.A. Botha and T.G. Gaadingwe (2006) Reflecting on 20 SEC conferences, Computers & Security, Volume 25, Number 4, 2006, pp. 247 – 256.
[8] R.A. Botha and J.H.P. Eloff (2002) An Access Control Architecture for XML documents in Workflow Environments, in South African Computer Journal, Number 28, 2002, pp. 3 – 10.
[7] R.A. Botha and J.H.P. Eloff (2001) Separation of Duties for Access Control Enforcement in Workflow Environments, IBM Systems Journal, Volume 40, Number 3, 2001, pp. 666 – 682.
[6] R.A. Botha and J.H.P. Eloff (2001) A Framework for Access Control in Workflow Systems, Information Management and Computer Security, Volume 9, Number 3, 2001, pp. 126 – 133.
[5] R.A. Botha and J.H.P. Eloff (2001) Access Control in Document-centric Workflow Systems – An Agent-based Approach, Computers & Security, Volume 20, Number 6, 2001, pp. 525 – 532.
[4] S. Perelson and R.A. Botha and J.H.P. Eloff (2001) Separation of Duty Administration, South African Computer Journal, Number 27, 2001, pp. 64 – 69.
[3] C. Papenfus and R.A. Botha (2000) An XML-based Approach to Enforcing History-based Separation of Duty Policies in Heterogeneous Workflow Environments, South African Computer Journal - Special Issue'00, No. 26, pp. 60 – 68.
[2] S. Perelson and R.A. Botha (2000) Conflict Analysis as a Means of Enforcing Static Separation of Duty Requirements in Workflow Environments, South African Computer Journal – Special Issue'00, No. 26, pp. 212 – 216.
[1] R.A. Botha and J.H.P. Eloff (1997) Information Security in a client/server environment, Elektron, Vol. 14, No. 2