Follow
Marianne Loock
Title
Cited by
Cited by
Year
Characteristics and responsibilities involved in a phishing attack
A Van der Merwe, M Loock, M Dabrowski
Proceedings of the 4th international symposium on Information and …, 2005
922005
A conceptual analysis of information security education, information security training and information security awareness definitions
E Amankwa, M Loock, E Kritzinger
The 9th International Conference for Internet Technology and Secured …, 2014
832014
Establishing information security policy compliance culture in organizations
E Amankwa, M Loock, E Kritzinger
Information & Computer Security 26 (4), 420-436, 2018
692018
A framework and methodology for knowledge management system implementation
H Smuts, A Van Der Merwe, M Loock, P Kotzé
Proceedings of the 2009 Annual Research Conference of the South African …, 2009
612009
Critical success factors for information systems outsourcing management: a software development lifecycle view
H Smuts, A van der Merwe, P Kotzé, M Loock
Proceedings of the 2010 Annual Research Conference of the South African …, 2010
582010
The influence of national culture on information security culture
S Govender, E Kritzinger, M Loock
2016 IST-Africa Week Conference, 1-9, 2016
272016
Enhancing information security education and awareness: Proposed characteristics for a model
E Amankwa, M Loock, E Kritzinger
2015 Second International Conference on Information Security and Cyber …, 2015
242015
Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa
TK Lejaka, A Da Veiga, M Loock
2019 Conference on Information Communications Technology and Society (ICTAS …, 2019
182019
Conceptualising a cloud business intelligence security evaluation framework for small and medium enterprises in small towns of the Limpopo Province, South Africa
M Moyo, M Loock
Information 12 (3), 128, 2021
162021
Advances in intelligent systems and computing
H Smuts, P Kotzé, A Van Der Merwe, M Loock
Springer Verlag, 2015
142015
A critical investigation into the current shortage of information technology postgraduates produced by Unisa
E Kritzinger, M Loock
Unisa Institutional Repository, 2012
142012
Threats and opportunities for information systems outsourcing
H Smuts, P Kotzé, A van der Merwe, M Loock
2015 International Conference on Enterprise Systems (ES), 110-120, 2015
132015
Information systems outsourcing issues in the communication technology sector
H Smuts, P Kotzé, A Van der Merwe, M Loock
IADIS, 2010
132010
A framework to integrate ICT security awareness into the South African schooling system
M Walaza, M Loock, E Kritzinger
Proceedings of the Southern African Institute for Computer Scientist and …, 2014
122014
Cyber4Dev‐Q: Calibrating cyber awareness in the developing country context
A Da Veiga, M Loock, K Renaud
The Electronic Journal of Information Systems in Developing Countries 88 (1 …, 2022
102022
Framework for managing shared knowledge in an information systems outsourcing context
H Smuts, P Kotzé, A Van der Merwe, M Loock
Knowledge Management, Innovation, and Entrepreneurship in a Changing World …, 2020
102020
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review
M Moyo, M Loock
2016 11th International Conference for Internet Technology and Secured …, 2016
102016
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
SG Govender, E Kritzinger, M Loock
Personal and Ubiquitous Computing, 1-14, 2021
82021
The roles, behaviors and expectations of the participants in the development of student graduateness
JC Mentz, MA Schoeman, M Loock
International Conference on Innovative Technologies and Learning, 435-445, 2019
72019
Cyber Safety Awareness–Through the Lens of 21st Century Learning Skills and Game-Based Learning
E Kritzinger, M Loock, L Goosen
Innovative Technologies and Learning: Second International Conference, ICITL …, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20