Prof Reinhardt Botha

BSc (Hons)(UPE); MSc PhD (RAU); PGCHE; MIITPSA

 

Professor of Information Technology

Department of Information Technology

ReinhardtA.Botha@mandela.ac.za

041 504 3179

North Campus, Room J114A


Biography / Background

Reinhardt A. Botha is a Professor of Information Technology in the School of Information Technology.  He is the director of the Centre for Research in Information and Cyber Security (CRICS). His research focuses on Information Security and Privacy. Reinhardt holds a PhD degree from the former Rand Afrikaans University in Johannesburg as well as a Postgraduate Certificate in Higher Education from Nelson Mandela Metropolitan University.  He is a certified ITIL Expert as well as a certified IBM Application Security Specialist.

Currently he teaches Information Technology Management subjects to fourth-year students. In addition, he supervises a number of research-focused master and doctoral candidates. On the administrative front he was the chairperson of the Faculty Research, Technology and Innovation Committee, as well as chairperson of the Faculty Post-graduate Studies Committee, and as such represent the Faculty on the NMMU Research, Technology and Innovation Committee and the NMMU Postgraduate Studies Committee from 2010 – 2019.

Awards and Achievements

  • NRF rating (Y = 2003 – 2008; C = 2009 – 2014; 2015 – 2020)
  • Research Merit Award, Port Elizabeth Technikon, 2002
  • New Researcher of the Year, Port Elizabeth Technikon, 2001
  • SANLAM subject prize for academic achievement in Computer Science, University of Port Elizabeth, 1988
  • Alumni Merit Award for academic achievement in Computer Science, University of Port Elizabeth, 1987

Professional Activities

He serves on the editorial board of Information & Computer Security and is a past section editor of the South African Computer Journal.

Supervision

He has supervised six doctoral students and 32 masters students. His current postgraduate students comprise five doctoral and five masters candidates.


Teaching Interests

My teaching included a variety of subjects mostly aimed at senior students:

  • Management Information Systems 2 (1996 – 1998)
  • Research Methodology 4 (2003 – 2005)
  • Project 4 (2003)
  • Information Systems 3: Database Systems Module (1996 – 2002)
  • User Interfaces 4 (1999 – 2002)
  • Database Systems 4 (1999 – 2001)
  • Knowledge Management 4 (2002 – 2003; 2006 – 2008)
  • Information Technology Management 1 (1996 – 1998)
  • e-Commerce 1: m-Business Module (2005 – 2007)
  • Installation Management III (2010 & 2011)
  • Information and Technology Management 4 (2008 onwards)
  • IT Professional Practice 1 (2019 onwards)

Research Interests

Reinhardt has research relationships with:

  • Prof Steve Furnell, Network Research Group, Plymouth, England
  • Prof Dr Kai Rannenberg, Chair of Mobile Business and Multilateral Security, Goethe University, Frankfurt, Germany

Representative Publications

He has published in journals such as the IBM Systems Journal, Computers & Security, Government Information Quarterly, Information Systems Management, Information Management & Computer Security, and the South African Computer Journal. He has published 24 journal papers and 74 conference papers. He has also presented at several industry forums and workshops

[24] B. Coetzee and R.A. Botha (2019) The Internet of Things: The Disclosure Paradox. Journal of Engineering and Applied Sciences, Volume 14, No 6, pp. 9321 – 9325.

[23]   R.G. Leppan, R.A. Botha and J. van Niekerk (2018) Process Model for Differentiated Instruction Using Learning Analytics. South African Computer Journal, Volume 30, No 2.

[22]   A. Kandeh, R.A. Botha and L. Futcher (2018) Enforcement of the POPI Act: Perspective of data management professionals. South African Journal of Information Management, Volume 20, No 1

[21]   B. Haskins and R.A. Botha (2017) Aligning the Most Frequently Discussed Topics on the Dr Math Service with Those Found on NSC Mathematics Exams, The Journal for Transdisciplinary Research in Southern Africa, Volume 13, No 1

[20]   R. Mooi and R.A. Botha (2016) A Model for Building a Computer Security Incident Response Capability. SAIEE Africa Research Journal, Volume 107 No 2, pp. 78 – 91.

[19]   K. Adesemowo,  R. von Solms and R.A. Botha (2016),  Safeguarding Information as an Asset: Do We Need a Redefinition in the knowledge economy and beyond?  South African Journal of Information Management, Vol 18, No 1 (2016), 12 pages.

[18]   G. Thomas, R.A. Botha and D van Greunen (2015) Understanding the Problem of Coordination in a Large Scale Distributed Environment from a Service Lens View - Towards the South African Public Sector e-Administration criteria for coordination support, Government Information Quarterly 32(4), pp. 526 -- 538

[17]   L Tekeni, R.A. Botha and K-L Thomson (2015), A multi-faceted model for IP-based service authorization in the eduroam network, SAIEE Africa Research Journal 106(2), pp 83 – 92.

[16]   B Haskins and R.A. Botha (2015) Contrasting methods for classifying microtext statements containing mathematics, Journal of New Generation Sciences 13(1) pp. 70 – 87.

[15]   L. Butgereit, R.A. Botha and M. van den Heever (2012) Key Identifiers and Spelling Conventions in MXit-Lingo as found in Conversations with Dr Math. The Journal for Transdisciplinary Research in Southern Africa 8(1), July 2012, pp. 30 – 50.

[14]   L. Butgereit and R.A. Botha (2011) A model to identify mathematics topics in MXit lingo to provide tutors quick access to supporting documentation. Pythagoras 32(2), 2011, pp.23 – 33.

[13]   S.M. Furnell and R.A. Botha (2011) Social Networks – access to all areas? Computer Fraud and Security, 2011(5), pp. 14 – 19.

[12]   R.A. Botha, S.M. Furnell and N.L. Clarke (2009) From desktop to mobile: Examining the security experience. Computers & Security, Volume 28, Number 3-4, 2009, pp. 130 – 137.

[11]   J. Ophoff and R.A. Botha (2008) Mobile Communication: User perception and practice, South African Computer Journal, Volume 40, June 2008, pp. 63 – 73.

[10]   G. Thomas and R.A. Botha (2007) Secure Mobile Device Use in Healthcare: Guidance from HIPAA and ISO17799, Information Systems Management, Volume 24, 2007, pp. 333 – 342.

[9]     R.A. Botha and T.G. Gaadingwe (2006) Reflecting on 20 SEC conferences, Computers & Security, Volume 25, Number 4, 2006, pp. 247 – 256.

[8]     R.A. Botha and J.H.P. Eloff (2002) An Access Control Architecture for XML documents in Workflow Environments, in South African Computer Journal, Number 28, 2002, pp. 3 – 10.

[7]     R.A. Botha and J.H.P. Eloff (2001) Separation of Duties for Access Control Enforcement in Workflow Environments, IBM Systems Journal, Volume 40, Number 3, 2001, pp. 666 – 682.

[6]     R.A. Botha and J.H.P. Eloff (2001) A Framework for Access Control in Workflow Systems,  Information Management and Computer Security, Volume 9, Number 3, 2001, pp. 126 – 133.

[5]     R.A. Botha and J.H.P. Eloff (2001) Access Control in Document-centric Workflow Systems – An Agent-based Approach, Computers & Security, Volume 20, Number 6, 2001, pp. 525 – 532.

[4]     S. Perelson and R.A. Botha and J.H.P. Eloff (2001) Separation of Duty Administration, South African Computer Journal, Number 27, 2001, pp. 64 – 69.

[3]     C. Papenfus and R.A. Botha (2000)  An XML-based Approach to Enforcing History-based Separation of Duty Policies in Heterogeneous Workflow Environments, South African Computer Journal - Special Issue'00, No. 26,  pp. 60 – 68.

[2]     S. Perelson and R.A. Botha  (2000) Conflict Analysis as a Means of Enforcing Static Separation of Duty Requirements in Workflow Environments, South African Computer Journal – Special Issue'00, No. 26, pp. 212 – 216.

[1]     R.A. Botha and J.H.P. Eloff (1997) Information Security in a client/server environment, Elektron, Vol. 14, No. 2