default search action
Marianne Loock
Person information
- affiliation: University of South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c32]Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs). HAISA 2023: 211-224 - 2022
- [j8]Adéle da Veiga, Marianne Loock, Karen Renaud:
Cyber4Dev-Q: Calibrating cyber awareness in the developing country context. Electron. J. Inf. Syst. Dev. Ctries. 88(1) (2022) - [j7]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. Inf. Comput. Secur. 30(4): 583-614 (2022) - 2021
- [j6]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Information Security Policy Compliance Culture: Examining the Effects of Accountability Measures. Int. J. Technol. Hum. Interact. 17(4): 75-91 (2021) - [j5]Moses Moyo, Marianne Loock:
Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa. Inf. 12(3): 128 (2021) - [j4]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture. Pers. Ubiquitous Comput. 25(5): 927-940 (2021) - [c31]Adéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Pheeha Machaka:
A Reference Point for Designing a Cybersecurity Curriculum for Universities. HAISA 2021: 46-62 - 2020
- [c30]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A Framework to Enhance ICT Security Through Education, Training & Awareness (ETA) Programmes in South African Small, Medium and Micro-sized Enterprises (SMMEs): A Scoping Review. CSOC (3) 2020: 45-58 - [c29]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
A Framework for the Assessment of Information Security Risk, the Reduction of Information Security Cost and the Sustainability of Information Security Culture. CSOC (3) 2020: 69-84 - [c28]Moses Moyo, Marianne Loock:
Evaluation of Cloud Business Intelligence Prior to Adoption: The Voice of Small Business Enterprises in a South African Township. EMCIS 2020: 449-460 - [e10]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings. Communications in Computer and Information Science 1166, Springer 2020, ISBN 978-3-030-43275-1 [contents]
2010 – 2019
- 2019
- [c27]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
The South African ICT Security Awareness Framework for Education (SAISAFE). ICITL 2019: 330-339 - [c26]Jan Carel Mentz, Martha Anna Schoeman, Marianne Loock:
The Roles, Behaviors and Expectations of the Participants in the Development of Student Graduateness. ICITL 2019: 435-445 - [c25]Elmarie Kritzinger, Marianne Loock, Leila Goosen:
Cyber Safety Awareness - Through the Lens of 21st Century Learning Skills and Game-Based Learning. ICITL 2019: 477-485 - [c24]Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa. ICTAS 2019: 1-6 - [c23]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
Information Security Cost Reduction Through Social Means. ISSA 2019: 1-14 - [e9]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 [contents] - 2018
- [j3]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Establishing information security policy compliance culture in organizations. Inf. Comput. Secur. 26(4): 420-436 (2018) - [c22]Sunthoshan G. Govender, Marianne Loock, Elmarie Kritzinger:
Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed Framework. CSS 2018: 281-290 - [c21]Elmarie Kritzinger, Marianne Loock, E. N. Mwim:
Cyber Safety Awareness and Culture Planning in South Africa. CSS 2018: 317-326 - [c20]Moses Moyo, Marianne Loock:
Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges. ISSA (Revised Selected Papers) 2018: 133-148 - 2017
- [j2]Hanlie Smuts, Paula Kotzé, Alta van der Merwe, Marianne Loock:
Framework for Managing Shared Knowledge in an Information Systems Outsourcing Context. Int. J. Knowl. Manag. 13(4): 1-30 (2017) - [c19]Tsosane Shabe, Elmarie Kritzinger, Marianne Loock:
Scorecard Approach for Cyber-Security Awareness. SETE@ICWL 2017: 144-153 - [e8]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017. IEEE 2017, ISBN 978-1-5386-0545-5 [contents] - 2016
- [c18]Moses Moyo, Marianne Loock:
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review. ICITST 2016: 250-254 - [e7]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 [contents] - 2015
- [c17]Hanlie Smuts, Paula Kotzé, Alta van der Merwe, Marianne Loock:
Threats and Opportunities for Information Systems Outsourcing. ES 2015: 110-120 - [c16]Naume Sonhera, Elmarie Kritzinger, Marianne Loock:
Cyber Threat Incident Handling Procedure for South African Schools. HAISA 2015: 215-232 - [c15]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A pragmatic approach towards the integration of ICT security awareness into the South African education system. InfoSec 2015: 35-40 - [c14]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Enhancing information security education and awareness: Proposed characteristics for a model. InfoSec 2015: 72-77 - [c13]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. ISSA 2015: 1 - [c12]Hanlie Smuts, Paula Kotzé, Alta van der Merwe, Marianne Loock:
Knowledge Asset Management Pertinent to Information Systems Outsourcing. WorldCIST (1) 2015: 43-55 - [e6]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 [contents] - 2014
- [c11]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
A conceptual analysis of information security education, information security training and information security awareness definitions. ICITST 2014: 248-252 - [c10]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. ISSA 2014: 1 - [c9]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A Framework to Integrate ICT Security Awareness into the South African Schooling System. SAICSIT 2014: 11 - [e5]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014. IEEE 2014, ISBN 978-1-4799-3384-6 [contents] - 2013
- [c8]Hein S. Venter, Marianne Loock, Marijke Coetzee:
Introduction. ISSA 2013: 1 - [e4]Hein S. Venter, Marianne Loock, Marijke Coetzee:
2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013. IEEE 2013, ISBN 978-1-4799-0808-0 [contents] - 2012
- [j1]Carla-Lee Botha, Elmarie Kritzinger, Marianne Loock:
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks. J. Univers. Comput. Sci. 18(6): 845-856 (2012) - [c7]Hein S. Venter, Marianne Loock, Marijke Coetzee:
Introduction. ISSA 2012: 1 - [c6]Naume Sonhera, Elmarie Kritzinger, Marianne Loock:
A proposed cyber threat incident handling framework for schools in South Africa. SAICSIT 2012: 374-383 - [e3]Hein S. Venter, Marianne Loock, Marijke Coetzee:
2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012. IEEE 2012, ISBN 978-1-4673-2160-0 [contents] - 2011
- [e2]Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings ISSA 2011. ISSA, Pretoria, South Africa 2011, ISBN 978-1-4577-1482-5 [contents] - 2010
- [c5]Hanlie Smuts, Alta van der Merwe, Paula Kotzé, Marianne Loock:
Critical success factors for information systems outsourcing management: a software development lifecycle view. SAICSIT 2010: 304-313 - [e1]Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010. ISSA, Pretoria, South Africa 2010, ISBN 978-1-4244-5494-5 [contents]
2000 – 2009
- 2009
- [c4]Hanlie Smuts, Alta van der Merwe, Marianne Loock:
Key Characteristics in Selecting Software Tools for Knowledge Management. ICEIS (2) 2009: 170-179 - [c3]Hanlie Smuts, Alta van der Merwe, Marianne Loock, Paula Kotzé:
A framework and methodology for knowledge management system implementation. SAICSIT 2009: 70-79 - 2005
- [c2]Marianne Loock, Jan H. P. Eloff:
A new Access Control model based on the Chinese Wall Security Policy Model. ISSA 2005: 1-10 - 2002
- [c1]Marianne Loock:
Minimizing Security Risk Areas revealed by Data mining. ISSA 2002: 1-15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint