Marianne Loock
University of South Africa
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Marianne Loock.
world conference on information systems and technologies | 2015
Hanlie Smuts; Paula Kotzé; Alta van der Merwe; Marianne Loock
Organisations have over time realised that leveraging their already-accumulated knowledge assets are the most cost effective way to increase their competitive standing and to harness innovation. In choosing to outsource their information systems (IS), they may unintentionally fragment their knowledge assets by missing critical learning opportunities, with a resulting loss of ensuing business gains. Organisations should manage knowledge exploitation effectively, especially in the context of IS outsourcing arrangements, where the planning, management and operation of all or a part of the IS function, are handed over to an independent third party. There is, however, currently a lack of applied research to explain how knowledge asset dynamics happen in organisational value creation mechanisms, especially in the context of IS outsourcing. This paper analyses and describes knowledge asset management relevant in such an IS outsourcing arrangement. By understanding the requirements to manage knowledge assets, an organisation may optimise the relationships among critical knowledge assets as well as the knowledge sharing mechanisms required to meet knowledge demands in the context of IS outsourcing.
south african institute of computer scientists and information technologists | 2010
Hanlie Smuts; Alta van der Merwe; Paula Kotzé; Marianne Loock
Information systems (IS) outsourcing is a serious commitment -- a formal relationship underpinned by a contractual agreement, with long-term consequences among two or more organisations. Many organisations end up frustrated as they learn that their attempts at IS outsourcing have failed. However, some failures could be avoided with knowledge of common pitfalls and critical success factors of such IS outsourcing contracts. This paper investigates essential aspects of IS outsourcing management during the software development life cycle. The survey results are reported in conjunction with findings in the literature of similar studies in other markets, and unique contributors to IS outsourcing in this particular context in the South African corporate market, are identified.
south african institute of computer scientists and information technologists | 2009
Hanlie Smuts; Alta van der Merwe; Marianne Loock; Paula Kotzé
Knowledge assets are of far greater value than any tangible asset and provide organisations with the basis for creating a sustainable competitive advantage. The nature of knowledge and knowledge management have given rise to a range of different definitions of knowledge management systems that enable organisations to convert their knowledge into actionable information that provides them with a competitive edge and innovative capability. Such an implementation process is a comprehensive course of action that requires focus and commitment through-out the organisation in order to achieve results, yet no universally accepted framework or methodology for such a process exists. This paper analyses and describes enhancements to a 12-step process derived by Calabrese and Orlando [6] to implement a knowledge management system aimed at providing a more comprehensive framework and methodology for knowledge management system implementation. These enhancements are based on findings relating to a knowledge management proof of concept implementation conducted at one of the major mobile telecommunication operators in South Africa.
international conference for internet technology and secured transactions | 2014
Eric Amankwa; Marianne Loock; Elmarie Kritzinger
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness. An investigation to determine if any differences exist between information security education, information security training and information security awareness was conducted. This was done to help institutions understand when they need to train or educate employees and when to introduce information security awareness programmes. A conceptual analysis based on the existing literature was used for proposing working definitions, which can be used as a reference point for future information security researchers. Three important attributes (namely focus, purpose and method) were identified as the distinguishing characteristics of information security education, information security training and information security awareness. It was found that these information security concepts are different in terms of their focus, purpose and methods of delivery.
south african institute of computer scientists and information technologists | 2012
Naume Sonhera; Elmarie Kritzinger; Marianne Loock
In South Africa, there is a lack of structure or guidance for schools on how to deal with cyber threats. There are no clear procedures that are consistently followed by schools, governing boards and educators, and the cyber threat process is not widely known and understood by educators, learners and their parents/guardians. As a result, many learners remain vulnerable to the negative effects of cyber threats. An example is a Krugersdorp High School girl who was attacked after a cyber-threat ordeal, (The Star 9 February 2012: 1). In this paper a framework is therefore proposed that schools can implement to assist learners with cyber threat incidents. The methodology that will be followed in this article is, firstly, to determine from the literature how a victim of cyber threat can be helped, secondly, to develop an incident handling structure that will assist learners in reporting cyber threats, and thirdly, to develop a framework which will address the lack of structure, guidance or procedures when dealing with cyber threats in schools. The gap which exists now deters learners from reporting cyber threat incidents. To fill this gap, the authors propose an incident handling structure which will assist learners to report and receive protection against online threats. It is hoped that, in the end, learners will know what to do when they are threatened online. In addition, cyber threat policies and procedures are proposed to protect and inform learners and their parents about cyber threats. These procedures collate, outline legislation and the policies of the Department of Basic Education. The aim is to give schools rights and responsibilities in addressing cyber threat incidents. Practical considerations such as time and costs limit the study to a sample of schools in South Africa. The framework for intervention in cyber threat incidents as part of school policies in South Africa is merely a proposal to the rightful stake holders, since policies for schools are determined by the Department of Basic Education which the authors are not members of.
international conference enterprise systems | 2015
Hanlie Smuts; Paula Kotzé; Alta van der Merwe; Marianne Loock
The outsourcing of information systems has grown as an accepted business trend, with several reasons being cited for considering IS outsourcing. However, there is evidence that IS outsourcing threats may impact negatively on the initial intent to outsource, as well as the success of an IS outsourcing arrangement. Managing successful IS outsourcing relationships is concerned with exploiting outsourcing opportunities and avoiding outsourcing threats. The aim of this paper is to share the findings of a systematic literature review on opportunities and threats pertinent to IS outsourcing. By considering and addressing IS outsourcing threats and opportunities, organisations may realise benefit across the whole IS outsourcing lifecycle in achieving their strategic intent to outsource.
international conference on enterprise information systems | 2009
Hanlie Smuts; Alta van der Merwe; Marianne Loock
The shift to knowledge as the primary source of value results in the new economy being led by those who manage knowledge effectively. Today’s organisations are creating and leveraging knowledge, data and information at an unprecedented pace – a phenomenon that makes the use of technology not an option, but a necessity. Software tools in knowledge management are a collection of technologies and are not necessarily acquired as a single software solution. Furthermore, these knowledge management software tools have the advantage of using the organisation’s existing information technology infrastructure. Organisations and business decision makers spend a great deal of resources and make significant investments in the latest technology, systems and infrastructure to support knowledge management. It is imperative that these investments are validated properly, made wisely and that the most appropriate technologies and software tools are selected or combined to facilitate knowledge management. In this paper, we propose a set of characteristics that should support decision makers in the selection of software tools for knowledge management. These characteristics were derived from both in-depth interviews and existing theory in publications.
Journal of Knowledge Management | 2017
Hanlie Smuts; Paula Kotzé; Alta van der Merwe; Marianne Loock
Both information systems IS outsourcing and knowledge management are well-established business phenomena. The integration of shared knowledge in an IS outsourcing arrangement, represents the blending of organisational knowledge with external knowledge sources. In an attempt to provide tactical mechanisms for creating and managing shared knowledge in organisations embarking on IS outsourcing arrangements, this article focuses on the design and application of a knowledge framework for IS outsourcing, with the purpose of guiding organisations in their knowledge exchange planning through concrete mechanisms, practical steps and validation. Key considerations for IS outsourcing is mapped to critical success factors, each associated with a set of knowledge requirements and knowledge flows to support the successful achievement of a specific critical success factor. An associated assessment tool was designed to identify knowledge exchange mechanisms and potential issues and gaps in current or future IS outsource arrangements.
international conference on information security | 2015
Mvelo Walaza; Marianne Loock; Elmarie Kritzinger
Information and Communication Technology (ICT) can play a major role in improving the standard of education in South Africa. The increasing use of ICT (mobile phones, PCs, tablets) by South African school learners imposes the need for stringent ICT security awareness initiatives. These initiatives will protect school learners against the dangers associated with growing ICT use. This article presents a practical framework for the integration of ICT security awareness into the South African education system. The framework is called the ICT Security Awareness Framework for Education (ISAFE) and its details are discussed in this article.
Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014 on SAICSIT 2014 Empowered by Technology | 2014
Mvelo Walaza; Marianne Loock; Elmarie Kritzinger
In various countries, information and communication technology (ICT) is used to enhance and improve the levels and standards of education. Scholars in countries such as South Africa have conducted studies to prove that ICT can be essential in the improvement and enhancement of education. This study deals with the problem of the lack of ICT security awareness in South African education (among South African learners). Research studies that have been conducted have shown that there is a huge problem when it comes to integrating ICT security awareness into the South African schooling system. With the resurgence of new technologies such as Facebook, Twitter and Skype, school learners are more vulnerable to ICT security attacks and ICT-related crime than ever before. Even though the studies, models and frameworks have been conducted and proposed, there is still a gap when it comes to solutions that are directed specifically to South African school learners. Hence a more integrated approach in the form of a framework, directed mostly on South African school learners, has been proposed in this study. In this study, an in-depth literature review of past scholarly work, models and frameworks is done. Having reviewed some of the existing models and frameworks, and identified the potential gaps, a framework to address the aforementioned problem is proposed. The results of the literature review analysis and the proposed framework are reported and compared to support the gap analysis.