School of Computing

PERSONAL PROFILE: PROF MARIANNE LOOCK


SELECTED RECENT PUBLICATIONS

Journal publications

Botha C-L ; Kritzinger, E; Loock, M. (2012)
Best Practice Recommendations and Legal Requirements for South African Banks
Journal of Universal Computer Science
(18) 6
pp 845-856
View/download link: ISSN:

Kritzinger, E; Loock, M. (2012)
Postgraduate studies: Human-based technology
Progressio
(34)
View/download link: ISSN:

Conference proceedings

Govender S; Kritzinger, E; Loock, M. (2016)
The Influence of National Culture onInformation Security Culture
IST-Africa 2016 Conference Proceedings
Durban, South Africa
978-1-905824-54-0

Shabe, TB; Kritzinger, E; Loock, M. (2015)
Measuring cyber security awareness among cell phone users in South Africa
African Cyber Citizenship Conference (ACCC)
Port Elizabeth, South Africa
ISBN: 978-1-920508-67-8

Smuts, H ; Kotze, P ; Van der Merwe, A ; Loock, M. (2015)
Knowledge Asset Management Pertinent to Information Systems Outsourcing
Proceedings of the 3rd World Conference on Information Systems and Technologies (WorldCIST 2015)
Ponta Delgada, São Miguel, Azores, Portugal
978-3-319-16486-1
pp 43-55

Walaza Mvelo; Loock, M; Kritzinger, E. (2015)
Towards a Framework for Integrating ICT Security Awareness with South African Education
ISTE International Conference (ISTE 2015)
Kruger National Park, South Africa
978-1-86888-833-7

Sonhera, N; Kritzinger, E; Loock, M. (2015)
Cyber Threat Incident Handling Procedure for South African Schools
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Lesvos, Greece
ISBN: 978-1-841023-88-5

Smuts, H ; Kotze, P ; Van der Merwe, A ; Loock, M. (2015)
Threats and Opportunities for Information Systems Outsourcing
Third International Conference on Enterprise Systems (ES 2015)
Basel, Switserland
978-1-4673-8005-8

Moyo, M ; Abdullah, H; Loock, M. (2015)
Level of security awareness among upcoming web applications developers in South African rural towns a cause for concern
ACCC 2015: African Cyber Citizenship Conference
Port Elizabeth, South Africa
ISBN: 978-1-92058-67-8
View/download link: http://accconference.nmmu.ac.za

Walaza Mvelo; Loock, M; Kritzinger, E. (2015)
A Pragmatic Approach towards the Integration of ICT Security Awareness into the South African Education System
Second International Conference on Information Security and Cyber Forensics (InfoSec 2015)
Cape Town, South Africa
978-1-4673-6987-9

Amankwa Eric ; Loock, M; Kritzinger, E. (2015)
Enhancing Information Security Education and Awareness: proposed characteristics for a Model
Second International Conference on Information Security and Cyber Forensics (InfoSec 2015)
Cape Town, South Africa
978-1-4673-6987-9

le Roux, P; Loock, M. (2015)
The impact and opportunities of e-tutoring in a challenged socio-economic environment
International Conference on Computing, Communication and Security (ICCCS 2015)
Le Meridien, Mauritius
978-1-4673-9353-9

M Walaza; Loock, M; Kritzinger, E. (2014)
A Framework to Integrate ICT Security Awareness into the South African Schooling System
SAICSIT 2014
Pretoria
ISBN: 978-1-4503-3246-0

Kureva G; Loock, M; Kritzinger, E. (2014)
Towards Incorporating Internet ServiProviders into Information Security Awareness
IICE 2014
Dublin
ISBN: 978-1-908320-25-4

Amankwa E; Loock, M; Kritzinger, E. (2014)
A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
ICITST2014
London
ISBN: 978-1-908320-39-1

Buthelezi , MP; Loock, M. (2014)
User Online Privacy and Identity management Behaviors: A comparative study
1st Annual Global Online Conference on Information and Computer Technology (CICT2014)
not known yet

C J Bezuidenhout; Loock, M; le Roux, P. (2014)
Conceptual model: Drawing a parallel between CRISP-DM and SIMON’s decision making model
International Science and Technology Conference (ISTEC2014)
Doha, Katar
2146-7382

Naidoo, T; Kritzinger, E; Loock, M. (2013)
Cyber safety education: towards a cyber-safety awareness framework for primary schools
Conference proceedings of the 8th International Conference on e-Learning (ICEL-2013)
Cape Peninsula University of Technology, Cape Town, South Africa
ISBN:978-1-909507-29-6

Kriel, L; Kritzinger, E; Loock, M. (2013)
Dangers of Using Social Networks for children online Security
Conference proceedings of the 2013 Paris International Academic Conference
Paris, France
ISBN:1539-8757 (print); 2157-9660 (online)

Sonhera N., ; Kritzinger, E; Loock, M. (2012)
A Proposed Cyber Threat Incident Handling Framework for Schools in South Africa.
Proceedings the 2012 Annual Research Conference of the South African Institute for Computer Scientists and Information Technologists (SAICSIT). South Africa.
Pretoria
ISBN: 9781450313087

J. L. Smuts; P. Kotze; A. van der Merwe; Loock, M. (2010)
Information Systems Outsourcing issues in the communication technology sector
IADIS Information Systems 2010 (IS 2010) International Conference
Porto, Portugal

Smuts, H; van der Merwe, A; Kotze, P.; Loock, M. (2010)
Critical success factors for information systems outsourcing management: a software development lifecycle view.
SAICSIT 2010 Conference
Bela Bela, South Africa

Smuts, H; van der Merwe, A; Loock, M. (2009)
Key characteristics in selecting software tools for Knowledge Management
11th International Conference on Enterprise Information Systems
Milan, Italy

J. L. Smuts; A. van der Merwe; Loock, M; P. Kotze. (2009)
A framework and methodology for knowledge management system implementation
SAICSIT 2009: The 15th Annual Conference of the South African Institute of Computer Scientists and Information Technologists
Vaal River, South Africa

van der Merwe, A; Loock, M; Dabrowski, M. (2005)
Characteristics and Responsibilities involved in a Phishing Attack
Winter International Symposium on Information and Communication Technologies
Cape Town
pp 249-254

Loock, M; J. H. P. Eloff. (2005)
Investigating the usage of the Chinese Wall Security Policy model for Data Mining.
WISICT 2005: The 4th International Symposium on Information and Communication Technologies.
Cape Town, South Africa

Loock, M; J. H. P. Eloff. (2005)
A new Access Control model based on the Chinese Wall Security Policy Model
ISSA 2005: The 5th annual Information Security for South Africa conference
Johannesburg, South Africa

Loock, M; J. H. P. Eloff. (2002)
Information Security Issues in Data Mining
ISSA 2002: The Second annual Information Security for South Africa conference
Muldersdrift
pp 30


Other proceedings

Loock, M; J. H. P. Eloff. (2002)
Information Security Issues in Data Mining
Presented at the Post Graduate Research Symposium at SAICSIT 2002

Loock, M; A. L. Steenkamp. (1994)
A Knowledge Support System for Object-oriented Design
SACLA 94: The 24th Southern African Computer Lecturers Conference

Loock, M; A. L. Steenkamp. (1994)
Knowledge-based Support for Object-oriented Design
Ninth Annual Masters and PhD Students in Computer Science Conference
pp 128-141


Book/chapters

Smuts, H ; van der Merwe, A ; Loock, M; Kotze, P . Strategic Information Technology Governance and Organizational Politics in Modern Business
2015
IGI Global
ISBN: 978-1-4666-8524-6

J. L. Smuts; A. van der Merwe; Loock, M. Key characteristics relevant for selecting knowledge management software tools, Knowledge Management and Innovation
2009
IGI Global