Admissibility of electronic evidence in criminal proceedings: an outline of the South African legal position M Watney ICFAI Journal of Cyber Law 2009, 2009 | 36 | 2009 |
A South African perspective on mutual legal assistance and extradition in a globalized world M Watney Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad …, 2012 | 11 | 2012 |
Challenges pertaining to cyber war under international law M Watney 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 10 | 2014 |
Cybercrime regulation at a cross-road: State and transnational laws versus global laws M Watney International Conference on Information Society (i-Society 2012), 71-75, 2012 | 10 | 2012 |
The way forward in addressing cybercrime regulation on a global level MM Watney Journal of Internet Technology and Secured Transactions (JITST) 1, 62-67, 2012 | 10 | 2012 |
Cybersecurity threats to and cyberattacks on critical infrastructure: a legal perspective M Watney 21st European Conference on Cyber Warfare and Security (ECCWS) 2022 2022 (1 …, 2022 | 8 | 2022 |
Artificial intelligence and its legal risk to cybersecurity MM Watney 19th European Conference on Cyber Warfare and Security (ECCWS2020), 398-405, 2020 | 8 | 2020 |
The third wave of preferential procurement regulations in South Africa G Quinot Journal of South African Law/Tydskrif vir die Suid-Afrikaanse Reg 2018 (4 …, 2018 | 7 | 2018 |
Regulation of Internet Pornography in South Africa M Watney THRHR 69, 227, 2006 | 7 | 2006 |
Law enforcement access to end-to-end encrypted social media communications M Watney 7th European Conference on Social Media (ECSM2020), 338-414, 2020 | 6 | 2020 |
The evolution of Internet legal regulation in addressing crime and terrorism M Watney Journal of Digital Forensics, Security and Law 2 (2), 3, 2007 | 6 | 2007 |
State surveillance of the internet: human rights infringement or e-security mechanism? M Watney Global E-Security Proceedings 2006 (0955000823), 2006 | 6 | 2006 |
The use of electronic surveillance in conducting criminal investigations on the internet M Watney Handbook of electronic security and digital forensics, 525-572, 2010 | 5 | 2010 |
The use of electronic surveillance in conducting criminal investigations on the internet / The legal conflict between security and privacy in addressing terrorism and other … M Watney Handbook of electronic security and digital forensics, 525-552 / 553-572, 2010 | 5 | 2010 |
Evolution of illegal social media communication regulation M Watney 5th European Conference on Social Media Limerick Institute of Technology …, 2018 | 4 | 2018 |
When does abuse of social media constitute a crime?–A South African legal perspective within a global context M Watney ISSE 2013 Securing Electronic Business Processes: Highlights of the …, 2013 | 4 | 2013 |
The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet N Pohlmann, H Reimer, W Schneider, M Watney ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007 | 4 | 2007 |
The legal position of social media intermediaries in addressing fake news M Watney 17th European Conference on Cyber Warfare and Security (ECCWS2017 …, 2018 | 3 | 2018 |
Assessment of the South African parole system (part 2) M Watney Journal of South African Law (TSAR) 2018 (1), 88-105, 2018 | 3 | 2018 |
Assessment of the South African parole system (part 1) M Watney Journal of South African Law 2017 (4), 704-732, 2017 | 3 | 2017 |