default search action
Dalenca Pottas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j5]Kevin Tatenda Kativu, Dalenca Pottas:
Leveraging intrinsic resources for the protection of health information assets. South Afr. Comput. J. 31(2) (2019) - [c23]Sophia Moganedi, Dalenca Pottas:
Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis. ISSA 2019: 57-68 - 2016
- [c22]Kevin Tatenda Kativu, Dalenca Pottas:
A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape. WITFOR 2016: 96-106 - 2015
- [c21]Helen van de Haar, Darelle van Greunen, Dalenca Pottas:
Biometrics in social grants: Separating myth from reality. ISTAS 2015: 1-8 - 2013
- [j4]Retha de la Harpe, Hugo Lotriet, Dalenca Pottas, Mikko Korpela:
Socio-technical approach to community health: designing and developing a mobile care data application for home-based healthcare, in South Africa. J. Community Informatics 9(2) (2013) - [j3]Nobubele Angel Shozi, Dalenca Pottas, Nicky Mostert-Phipps:
Perceived Benefits Of Remote Data Capturing In Community Home-Based Care: The Caregivers' Perspective. J. Community Informatics 9(2) (2013) - [c20]Helen van de Haar, Darelle van Greunen, Dalenca Pottas:
The characteristics of a biometric. ISSA 2013: 1-8 - [c19]Nicky Mostert-Phipps, Dalenca Pottas, Mikko Korpela:
Guidelines to Encourage the Adoption and Meaningful Use of Health Information Technologies in the South African Healthcare Landscape. MedInfo 2013: 147-151 - [c18]Dalenca Pottas, Nicky Mostert-Phipps:
Citizens and Personal Health Records - the Case of Nelson Mandela Bay. MedInfo 2013: 501-504 - [c17]Melissa Masiza, Nicky Mostert-Phipps, Dalenca Pottas:
Patients Prefer Electronic Medical Records - Fact or Fiction? MedInfo 2013: 957 - 2012
- [j2]Alexandros Yeratziotis, Dalenca Pottas, Darelle van Greunen:
A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm. Int. J. Hum. Comput. Interact. 28(10): 678-694 (2012) - [c16]Alexandros Yeratziotis, Darelle van Greunen, Dalenca Pottas:
A Framework for Evaluating Usable Security: The Case of Online Health Social Networks . HAISA 2012: 97-107 - 2011
- [c15]Nobubele Angel Shozi, Dalenca Pottas, Nicky Mostert-Phipps:
A Socio-technical Perspective on the Use of Mobile Phones for Remote Data Collection in Home Community Based Care in Developing Countries. AFRICOMM 2011: 135-145 - [c14]Alfred Coleman, Marlien Herselman, Dalenca Pottas:
E-Health Readiness Assessment for E-Health Framework for Africa: A Case Study of Hospitals in South Africa. eHealth 2011: 162-169 - 2010
- [c13]Nkqubela Ruxwana, Marlien Herselman, Dalenca Pottas:
Community Awareness and Involvement: An Overlooked Security Control. SAISMC 2010: 47-60 - [c12]Tite Tuyikeze, Dalenca Pottas:
An Information Security Policy Development Life Cycle . SAISMC 2010: 165-176 - [c11]Sinovuyo Tyali, Dalenca Pottas:
Information Security Management Systems in the Healthcare Context. SAISMC 2010: 177-187 - [c10]Eldridge van der Westhuizen, Dalenca Pottas:
Towards Characteristics of Lifelong Health Records. E-HEALTH 2010: 61-70 - [c9]Rudi G. Harmse, Dalenca Pottas:
Help Me to Understand Your World: A Reflection on the Potential Impact of E-Health Systems on the Prognosis for Asperger Syndrome. E-HEALTH 2010: 210-221 - [c8]Nicky Mostert-Phipps, Dalenca Pottas, Mikko Korpela:
A Socio-Technical Approach to Continuity of Care and Electronic Records in the South African Context. MedInfo 2010: 406-410 - [c7]Debra Box, Dalenca Pottas:
Trust - Can it be controlled? MedInfo 2010: 651-655
2000 – 2009
- 2007
- [c6]Surendren S. Govender, Dalenca Pottas:
A model to assess the benefit value of knowledge management in an IT service provider environment. SAICSIT 2007: 36-45 - 2006
- [c5]Rabbie Maphakela, Dalenca Pottas:
Towards Regulatory Compliance - A model for the South African Financial Sector. ISSA 2006: 1-11 - [c4]Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar:
The Organisational Information Security Profile - A Tool to Assist The Board. ISSA 2006: 1-13 - 2005
- [c3]Tite Tuyikeze, Dalenca Pottas:
Information Security Management and Regulatory Compliance in the South African Health Sector. ISSA 2005: 1-12
1990 – 1999
- 1993
- [c2]Dalenca Pottas, Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342 - 1992
- [c1]Dalenca Pottas, Sebastiaan H. von Solms:
MAPS - Model for Automated Profile Specification. SEC 1992: 113-126 - 1991
- [j1]Dalenca Pottas, Sebastiaan H. von Solms:
A computerized management reporting aid for a mainframe security system. Comput. Secur. 10(7): 653-660 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint