default search action
Elmarie Kritzinger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Elmarie Kritzinger, Adéle da Veiga, Wynand van Staden:
Measuring organizational information security awareness in South Africa. Inf. Secur. J. A Glob. Perspect. 32(2): 120-133 (2023) - [c39]Sebastiaan H. von Solms, Jaco du Toit, Elmarie Kritzinger:
Another Look at Cybersecurity Awareness Programs. HAISA 2023: 13-23 - [c38]Patricia Gouws, Elmarie Kritzinger:
Using Massive Open Online Courses (MOOCs) to Create Learning Spaces for Quality Lifelong Learning for All Communities Through Engaged Scholarship (ES). ICITL 2023: 345-355 - 2022
- [j10]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. Inf. Comput. Secur. 30(4): 583-614 (2022) - [c37]Ileen E. Bredenkamp, Elmarie Kritzinger, Marlien Herselman:
Evaluating a Consumer Data Protection Framework for IS Compliance Awareness in South Africa: An Expert Review. ARTIIS (2) 2022: 352-367 - [c36]Nompilo Fakude, Elmarie Kritzinger:
Factors Influencing Internet Users' Attitude and Behaviour Toward Digital Piracy: A Systematic Literature Review Article. ICITL 2022: 313-323 - [c35]Nompilo Fakude, Elmarie Kritzinger:
Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs - A Systematic Literature Review Study. ICS 2022: 625-636 - [c34]Elmarie Kritzinger, Geoffrey Lautenbach:
Cyber-Safety Awareness: Assisting Schools in Implementation Guidelines. SAI (3) 2022: 617-629 - 2021
- [j9]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Information Security Policy Compliance Culture: Examining the Effects of Accountability Measures. Int. J. Technol. Hum. Interact. 17(4): 75-91 (2021) - [j8]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture. Pers. Ubiquitous Comput. 25(5): 927-940 (2021) - [c33]Adéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Pheeha Machaka:
A Reference Point for Designing a Cybersecurity Curriculum for Universities. HAISA 2021: 46-62 - 2020
- [j7]Elmarie Kritzinger:
Improving Cybersafety Maturity of South African Schools. Inf. 11(10): 471 (2020) - [c32]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A Framework to Enhance ICT Security Through Education, Training & Awareness (ETA) Programmes in South African Small, Medium and Micro-sized Enterprises (SMMEs): A Scoping Review. CSOC (3) 2020: 45-58 - [c31]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
A Framework for the Assessment of Information Security Risk, the Reduction of Information Security Cost and the Sustainability of Information Security Culture. CSOC (3) 2020: 69-84 - [c30]Dorothy Scholtz, Elmarie Kritzinger, Adele Botha:
Cyber Safety Awareness Framework for South African Schools to Enhance Cyber Safety Awareness. CSOC (3) 2020: 216-223 - [c29]Kagisho Mabitle, Elmarie Kritzinger:
Schoolteacher Preference of Cyber-Safety Awareness Delivery Methods: A South African Study. CSOC (2) 2020: 268-283 - [c28]Thulani Mashiane, Elmarie Kritzinger:
Theoretical Domains Framework Applied to Cybersecurity Behaviour. CSOC (2) 2020: 411-428
2010 – 2019
- 2019
- [c27]Dorothy Scholtz, Elmarie Kritzinger, Adele Botha:
Underpinning Knowledge and Skills for Educators to Enhance Cyber Safety Awareness in South African Schools. ICITL 2019: 278-290 - [c26]Thulani Mashiane, Elmarie Kritzinger:
Theoretical Domain Framework to Identify Cybersecurity Behaviour Constructs. ICITL 2019: 320-329 - [c25]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
The South African ICT Security Awareness Framework for Education (SAISAFE). ICITL 2019: 330-339 - [c24]Elmarie Kritzinger, Marianne Loock, Leila Goosen:
Cyber Safety Awareness - Through the Lens of 21st Century Learning Skills and Game-Based Learning. ICITL 2019: 477-485 - [c23]Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
Information Security Cost Reduction Through Social Means. ISSA 2019: 1-14 - [c22]Anthony Bolton, Leila Goosen, Elmarie Kritzinger:
Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise. ISSA 2019: 99-113 - [c21]Dorothy Scholtz, Elmarie Kritzinger:
Enculturation of Cyber Safety Awareness for Communities in South Africa. SIGSAND/PLAIS 2019: 91-104 - 2018
- [j6]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Establishing information security policy compliance culture in organizations. Inf. Comput. Secur. 26(4): 420-436 (2018) - [c20]Sunthoshan G. Govender, Marianne Loock, Elmarie Kritzinger:
Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed Framework. CSS 2018: 281-290 - [c19]Elmarie Kritzinger, Marianne Loock, E. N. Mwim:
Cyber Safety Awareness and Culture Planning in South Africa. CSS 2018: 317-326 - [c18]Thulani Mashiane, Elmarie Kritzinger:
Cybersecurity Behaviour: A Conceptual Taxonomy. WISTP 2018: 147-156 - 2017
- [j5]Elmarie Kritzinger:
Growing a cyber-safety culture amongst school learners in South Africa through gaming. South Afr. Comput. J. 29(2) (2017) - [c17]Elmarie Kritzinger:
A Curriculum Approach to Improving Cyber Safety in South African Schools. SETE@ICWL 2017: 95-105 - [c16]Tsosane Shabe, Elmarie Kritzinger, Marianne Loock:
Scorecard Approach for Cyber-Security Awareness. SETE@ICWL 2017: 144-153 - [c15]Elmarie Kritzinger, Maria Bada, Jason R. C. Nurse:
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. World Conference on Information Security Education 2017: 110-120 - 2016
- [j4]Elmarie Kritzinger:
Short-term initiatives for enhancing cyber-safety within South African schools. South Afr. Comput. J. 28(1) (2016) - [c14]Anthony Bolton, Leila Goosen, Elmarie Kritzinger:
Enterprise Digitization Enablement Through Unified Communication & Collaboration. SAICSIT 2016: 6:1-6:10 - 2015
- [c13]Naume Sonhera, Elmarie Kritzinger, Marianne Loock:
Cyber Threat Incident Handling Procedure for South African Schools. HAISA 2015: 215-232 - [c12]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A pragmatic approach towards the integration of ICT security awareness into the South African education system. InfoSec 2015: 35-40 - [c11]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Enhancing information security education and awareness: Proposed characteristics for a model. InfoSec 2015: 72-77 - [c10]Ileen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller:
Identifying gaps in IT retail Information Security policy implementation processes. InfoSec 2015: 126-133 - 2014
- [c9]Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
A conceptual analysis of information security education, information security training and information security awareness definitions. ICITST 2014: 248-252 - [c8]Elmarie Kritzinger:
Online safety in South Africa - A cause for growing concern. ISSA 2014: 1-7 - [c7]Mvelo Walaza, Marianne Loock, Elmarie Kritzinger:
A Framework to Integrate ICT Security Awareness into the South African Schooling System. SAICSIT 2014: 11 - 2013
- [c6]Elmarie Kritzinger, Keshnee Padayachee:
Engendering an e-safety awareness culture within the South African context. AFRICON 2013: 1-5 - 2012
- [j3]Carla-Lee Botha, Elmarie Kritzinger, Marianne Loock:
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks. J. Univers. Comput. Sci. 18(6): 845-856 (2012) - [c5]Naume Sonhera, Elmarie Kritzinger, Marianne Loock:
A proposed cyber threat incident handling framework for schools in South Africa. SAICSIT 2012: 374-383 - 2011
- [c4]Basie von Solms, Elmarie Kritzinger:
Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed? AFRICOMM 2011: 116-124 - 2010
- [j2]Elmarie Kritzinger, Sebastiaan H. von Solms:
Cyber security for home users: A new way of protection through awareness enforcement. Comput. Secur. 29(8): 840-847 (2010)
2000 – 2009
- 2008
- [j1]Elmarie Kritzinger, E. Smith:
Information security management: An information security retrieval and awareness model for industry. Comput. Secur. 27(5-6): 224-231 (2008) - 2006
- [c3]Elmarie Kritzinger:
Information Security in an E-learning Environment. Education for the 21st Century 2006: 345-349 - 2004
- [c2]Elmarie Kritzinger, Sebastiaan H. von Solms:
Five Non-Technical Pillars of Network Information Security Management. Communications and Multimedia Security 2004: 277-287 - 2002
- [c1]Elmarie Kritzinger-von Solms, Leon Strous:
Information Security: A Corporate Governance Issue. IICIS 2002: 115-133
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint