Journal publicationsMoyo Moses; LOOCKM (2021)
Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South AfricaInformation
(12) 3
View/download link:
https:// doi.org/10.3390/info12030128Govender SG; Kritzinger, E; LOOCKM (2021)
A Framework and Tool for the Assessment of Information Security Risk, the Reduction of Information Security Cost and the Sustainability of Information Security CulturePersonal and Ubiquitous Computing
(25)
View/download link:
https://doi.org/10.1007/s00779-021-01549-wAmankwa Eric ; LOOCKM; Kritzinger, E (2021)
Information Security Policy Compliance Culture: Examining the Effects of Accountability measuresInternational Journal of Technology and Human Interaction (IJTHI)
(17) 4
View/download link:
https://doi.org/10.4018/IJTHFlack GP ; Kritzinger, E; LOOCKM (2021)
Improving Compliance with the Acceptable Usage PolicyLecture Notes in Networks and Systems
(228)
pp 621-635
View/download link:
doi.org/10.1007/978-3-030-77448-6_61Da Veiga, A; LOOCKM; Renaud, K. (2021)
Cyber4Dev-Q: calibrating cyber awareness in the developing country contextThe Electronic Journal of Information Systems in Developing Countries
(88) 1
pp 1-19
View/download link:
http://dx.doi.org/10.1002/isd2.12198 Sonhera N; Kritzinger, E; LOOCKM (2021)
Cyber Incident Handling and the Perceptions of Learners on Cyber Incidents in South African SchoolsAdvances in Science, Technology and Engineering Systems Journal
(6) 5
pp 23-31
Sonhera N; Kritzinger, E; LOOCKM (2021)
Roles and Responsibilities for School Role Players in Addressing Cyber Incidents in South AfricaEURASIAN JOURNAL OF SOCIAL SCIENCES
(9) 3
pp 123-137
View/download link:
10.15604/ejss.2021.09.03.001Govender SG; Kritzinger, E; LOOCKM (2020)
Information security cost reduction through social meansCommunications in Computer and Information Science
(1166)
pp 1-14
Govender SG; Kritzinger, E; LOOCKM (2020)
A Framework for the Assessment of Information Security Risk, the Reduction of Information Security Cost and the Sustainability of Information Security CultureAISC
(1226)
pp 69-84
View/download link:
10.1007/978-3-030-51974-2_7Walaza M; LOOCKM; Kritzinger, E (2020)
A Framework to Enhance ICT Security Through Education, Training & Awareness (ETA) Programmes in South African Small, Medium and Micro-sized Enterprises (SMMEs): A Scoping ReviewAISC
(1226)
pp 45-58
View/download link:
10.1007/978-3-030-51974-2_5MENTZJC; SCHOEMA; LOOCKM (2019)
The Roles, Behaviors and Expectations of the Participants in the Development of Student GraduatenessLNCS 11937 .Innovative Technologies and Learning Second International Conference, ICITL 2019
pp 435-445
View/download link:
https://doi.org/10.1007/978-3-030-35343-8Kritzinger, E; LOOCKM; Goosen L (2019)
Cyber Safety Awareness – Through the Lens of 21st Century Learning Skills and Game-Based LearningLNCS
(11937)
pp 477 - 485
View/download link:
https://doi.org/10.1007/978-3-030-35343-8_51Kritzinger, E; LOOCKM; Mwim, E.N (2018)
Cyber safety awareness and culture planning in South AfricaLecture Notes Computer Science
(11161)
Amankwa E; LOOCKM; Kritzinger, E (2018)
Establishing information security policy compliance culture in organizations Information & Computer Security
(26) 4
pp 420 - 436
View/download link:
https://doi.org/10.1108/ICS-09-2017-0063Govender SG; LOOCKM; Kritzinger, E (2018)
Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed FrameworkLecture Notes in Computer Science: Cyberspace Safety and Security
(LNCS11161)
pp 281 - 290
Shabe T; Kritzinger, E; LOOCKM (2017)
Scorecard Approach for Cyber-Security AwarenessLecture Notes Computer Science
(10676)
pp 140 - 153
Botha C-L ; Kritzinger, E; LOOCKM (2012)
Best Practice Recommendations and Legal Requirements for South African BanksJournal of Universal Computer Science
(18) 6
pp 845-856
View/download link:
ISSN: Kritzinger, E; LOOCKM (2012)
Postgraduate studies: Human-based technologyProgressio
(34)
View/download link:
ISSN: Govender; LOOCKM; Kritzinger, E
Enhancing Information Security Culture to Reduce Information Security Cost: A proposed frameworkLecture Notes Computer Science
(11161)
Govender; LOOCKM; Kritzinger, E
Enhancing Information Security Culture to Reduce Information Security Cost: A proposed frameworkLecture Notes Computer Science
(11161)
Kritzinger, E; LOOCKM; Goosen L
Theoretical Domain Framework to Identify Cybersecurity Behaviour ConstructLNCS
(11937)
pp 320-329
Conference proceedingsAmankwa Eric ; LOOCKM; Kritzinger, E (2019)
A Composite Framework to Promote Information Security Policy Compliance in OrganisationsEMENA-ISTL
Marrakech, Morocco
Springer International Publishing
pp pp 458-468
View/download link:
https://doi.org/10.1007/978-3-030-36778-7Govender S; Kritzinger, E; LOOCKM (2016)
The Influence of National Culture onInformation Security CultureIST-Africa 2016 Conference Proceedings
Durban, South Africa
978-1-905824-54-0
Shabe, TB; Kritzinger, E; LOOCKM (2015)
Measuring cyber security awareness among cell phone users in South AfricaAfrican Cyber Citizenship Conference (ACCC)
Port Elizabeth, South Africa
ISBN: 978-1-920508-67-8
Smuts, H ; Kotze, P ; Van der Merwe, A ; LOOCKM (2015)
Knowledge Asset Management Pertinent to Information Systems OutsourcingProceedings of the 3rd World Conference on Information Systems and Technologies (WorldCIST 2015)
Ponta Delgada, São Miguel, Azores, Portugal
978-3-319-16486-1
pp 43-55
Walaza Mvelo; LOOCKM; Kritzinger, E (2015)
Towards a Framework for Integrating ICT Security Awareness with South African EducationISTE International Conference (ISTE 2015)
Kruger National Park, South Africa
978-1-86888-833-7
Sonhera, N; Kritzinger, E; LOOCKM (2015)
Cyber Threat Incident Handling Procedure for South African SchoolsInternational Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Lesvos, Greece
ISBN: 978-1-841023-88-5
Smuts, H ; Kotze, P ; Van der Merwe, A ; LOOCKM (2015)
Threats and Opportunities for Information Systems OutsourcingThird International Conference on Enterprise Systems (ES 2015)
Basel, Switserland
978-1-4673-8005-8
Moyo, M ; Abdullah, H; LOOCKM (2015)
Level of security awareness among upcoming web applications developers in South African rural towns a cause for concernACCC 2015: African Cyber Citizenship Conference
Port Elizabeth, South Africa
ISBN: 978-1-92058-67-8
View/download link:
http://accconference.nmmu.ac.zaWalaza Mvelo; LOOCKM; Kritzinger, E (2015)
A Pragmatic Approach towards the Integration of ICT Security Awareness into the South African Education SystemSecond International Conference on Information Security and Cyber Forensics (InfoSec 2015)
Cape Town, South Africa
978-1-4673-6987-9
Amankwa Eric ; LOOCKM; Kritzinger, E (2015)
Enhancing Information Security Education and Awareness: proposed characteristics for a ModelSecond International Conference on Information Security and Cyber Forensics (InfoSec 2015)
Cape Town, South Africa
978-1-4673-6987-9
le Roux, P; LOOCKM (2015)
The impact and opportunities of e-tutoring in a challenged socio-economic environmentInternational Conference on Computing, Communication and Security (ICCCS 2015)
Le Meridien, Mauritius
978-1-4673-9353-9
M Walaza; LOOCKM; Kritzinger, E (2014)
A Framework to Integrate ICT Security Awareness into the South African Schooling SystemSAICSIT 2014
Pretoria
ISBN: 978-1-4503-3246-0
Kureva G; LOOCKM; Kritzinger, E (2014)
Towards Incorporating Internet ServiProviders into Information Security AwarenessIICE 2014
Dublin
ISBN: 978-1-908320-25-4
Amankwa E; LOOCKM; Kritzinger, E (2014)
A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness DefinitionsICITST2014
London
ISBN: 978-1-908320-39-1
Buthelezi, M. P; LOOCKM (2014)
User Online Privacy and Identity management Behaviors: A comparative study1st Annual Global Online Conference on Information and Computer Technology (CICT2014)
not known yet
C J Bezuidenhout; LOOCKM; le Roux, P (2014)
Conceptual model: Drawing a parallel between CRISP-DM and SIMON’s decision making modelInternational Science and Technology Conference (ISTEC2014)
Doha, Katar
2146-7382
Naidoo, T; Kritzinger, E; LOOCKM (2013)
Cyber safety education: towards a cyber-safety awareness framework for primary schoolsConference proceedings of the 8th International Conference on e-Learning (ICEL-2013)
Cape Peninsula University of Technology, Cape Town, South Africa
ISBN:978-1-909507-29-6
Kriel, L; Kritzinger, E; (2013)
Dangers of Using Social Networks for children online SecurityConference proceedings of the 2013 Paris International Academic Conference
Paris, France
ISBN:1539-8757 (print); 2157-9660 (online)
Sonhera N., ; Kritzinger, E; (2012)
A Proposed Cyber Threat Incident Handling Framework for Schools in South Africa. Proceedings the 2012 Annual Research Conference of the South African Institute for Computer Scientists and Information Technologists (SAICSIT). South Africa.
Pretoria
ISBN: 9781450313087
J. L. Smuts; P. Kotze; A. van der Merwe; LOOCKM (2010)
Information Systems Outsourcing issues in the communication technology sectorIADIS Information Systems 2010 (IS 2010) International Conference
Porto, Portugal
Smuts, H; van der Merwe, A; Kotze, P.; LOOCKM (2010)
Critical success factors for information systems outsourcing management: a software development lifecycle view.SAICSIT 2010 Conference
Bela Bela, South Africa
Smuts, H; van der Merwe, A; LOOCKM (2009)
Key characteristics in selecting software tools for Knowledge Management11th International Conference on Enterprise Information Systems
Milan, Italy
J. L. Smuts; A. van der Merwe; LOOCKM; P. Kotze (2009)
A framework and methodology for knowledge management system implementationSAICSIT 2009: The 15th Annual Conference of the South African Institute of Computer Scientists and Information Technologists
Vaal River, South Africa
van der Merwe, A; LOOCKM; Dabrowski, M (2005)
Characteristics and Responsibilities involved in a Phishing AttackWinter International Symposium on Information and Communication Technologies
Cape Town
pp 249-254
LOOCKM; J. H. P. Eloff (2005)
Investigating the usage of the Chinese Wall Security Policy model for Data Mining. WISICT 2005: The 4th International Symposium on Information and Communication Technologies.
Cape Town, South Africa
LOOCKM; J. H. P. Eloff (2005)
A new Access Control model based on the Chinese Wall Security Policy ModelISSA 2005: The 5th annual Information Security for South Africa conference
Johannesburg, South Africa
LOOCKM; J. H. P. Eloff (2002)
Information Security Issues in Data MiningISSA 2002: The Second annual Information Security for South Africa conference
Muldersdrift
pp 30
Conference proceedings (non peer-reviewed)LOOCKM; J. H. P. Eloff (2002)
Information Security Issues in Data MiningPresented at the Post Graduate Research Symposium at SAICSIT 2002
LOOCKM; A. L. Steenkamp (1994)
A Knowledge Support System for Object-oriented DesignSACLA 94: The 24th Southern African Computer Lecturers Conference
LOOCKM; A. L. Steenkamp (1994)
Knowledge-based Support for Object-oriented DesignNinth Annual Masters and PhD Students in Computer Science Conference
pp 128-141
Book/chaptersGiannakopoulos, A.; Buckley, S.B.; LOOCKM
Social Pathologies: Is the Social Pedagogue the Key to Alleviating and Combating Social Pathologies? Chapter in Handbook of Research on Pedagogies and Early Intervention Strategies for Combatting Socio-Pathological Behaviors 2022
IGI Global
pp pp 370 - 397
ISBN: ISBN13: 9781799885092 | ISBN10: 1799885097 | EISBN13: 9781799885115
Hanlie Smuts ; Paula Kotze ; Alta van der Merwe ; LOOCKM
Framework for Managing Shared Knowledge in an Information Systems Outsourcing Context. In: Knowledge Management, Innovation, and Entrepreneurship in a Changing World2020
IGI Global
pp Chapter 10: page 243-285
ISBN: ISBN13: 9781799823551|ISBN10: 1799823555|ISBN13 Softcover: 9781799823568|EISBN13: 9781799823575
Smuts, H ; van der Merwe, A ; LOOCKM; Kotze, P
Strategic Information Technology Governance and Organizational Politics in Modern Business2015
IGI Global
ISBN: 978-1-4666-8524-6
J. L. Smuts; A. van der Merwe; LOOCKM
Key characteristics relevant for selecting knowledge management software tools, Knowledge Management and Innovation2009
IGI Global
OtherLOOCKM; Steenkamp, A. L.
Poster Session at Conference: Object-Oriented Development: Knowledge Base Support for Design. SAICSIT 95: The First Annual Conference of the South African Institute of Computer Scientists and Information Technologists. Pretoria, 1995.