default search action
Malcolm Robert Pattinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j13]Marcus A. Butavicius, Kathryn Parsons, Meredith Lillie, Agata McCormac, Malcolm R. Pattinson, Dragana Calic:
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Comput. Secur. 98: 102020 (2020) - [j12]Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac:
Matching training to individual learning styles improves information security awareness. Inf. Comput. Secur. 28(1): 1-14 (2020) - 2018
- [j11]Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie:
The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 26(3): 277-289 (2018) - 2017
- [j10]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Tara Zwaans, Malcolm R. Pattinson:
A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australas. J. Inf. Syst. 21 (2017) - [j9]Agata McCormac, Tara Zwaans, Kathryn Parsons, Dragana Calic, Marcus A. Butavicius, Malcolm Robert Pattinson:
Individual differences and Information Security Awareness. Comput. Hum. Behav. 69: 151-156 (2017) - [j8]Kathryn Parsons, Dragana Calic, Malcolm Robert Pattinson, Marcus A. Butavicius, Agata McCormac, Tara Zwaans:
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 66: 40-51 (2017) - [j7]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Managing information security awareness at an Australian bank: a comparative study. Inf. Comput. Secur. 25(2): 181-189 (2017) - 2016
- [j6]Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac, Dragana Calic:
Assessing information security attitudes: a comparison of two studies. Inf. Comput. Secur. 24(2): 228-240 (2016) - 2015
- [j5]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
The design of phishing studies: Challenges for researchers. Comput. Secur. 52: 194-206 (2015) - 2014
- [j4]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm Robert Pattinson, Cate Jerram:
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42: 165-176 (2014) - [j3]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
A study of information security awareness in Australian government organisations. Inf. Manag. Comput. Secur. 22(4): 334-345 (2014) - 2012
- [j2]Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Why Do Some People Manage Phishing Emails Better Than Others? Inf. Manag. Comput. Secur. 20(1): 18-28 (2012) - 2007
- [j1]Malcolm R. Pattinson, Grantley Anderson:
How well are information risks being communicated to your computer end-users? Inf. Manag. Comput. Secur. 15(5): 362-371 (2007)
Conference and Workshop Papers
- 2023
- [c23]Andrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius:
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals. HAISA 2023: 225-236 - 2021
- [c22]Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver:
Cyber Security in Healthcare Organisations. HAISA 2021: 3-11 - 2019
- [c21]Malcolm R. Pattinson, Jane Sweeney, Marcus A. Butavicius, Andrew Reeves, Kathryn Parsons, Agata McCormac, Dragana Calic:
Aligning Cyber-Security Training to Individual Cognitive Style. HAISA 2019: 132-142 - 2018
- [c20]Kathryn Parsons, Marcus A. Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm R. Pattinson:
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience? HAISA 2018: 1-11 - [c19]Malcolm R. Pattinson, Marcus A. Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac:
Adapting Cyber-Security Training to Your Employees. HAISA 2018: 67-79 - 2017
- [c18]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. HAISA 2017: 12-23 - [c17]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. HAISA 2017: 80-90 - 2016
- [c16]Agata McCormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus A. Butavicius, Malcolm Robert Pattinson:
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2016: 56 - [c15]Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac:
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. HAISA 2016: 12-21 - [c14]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:
The Information Security Awareness of Bank Employees. HAISA 2016: 189-198 - 2015
- [c13]Kathryn Parsons, Marcus A. Butavicius, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? ACIS 2015: 6 - [c12]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac:
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ACIS 2015: 98 - [c11]Malcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram:
Examining Attitudes toward Information Security Behaviour using Mixed Methods. HAISA 2015: 57-70 - [c10]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Factors that Influence Information Security Behavior: An Australian Web-Based Study. HCI (22) 2015: 231-241 - 2014
- [c9]Kathryn Marie Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus Antanas Butavicius, Cate Jerram:
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. HAISA 2014: 30-41 - 2013
- [c8]Malcolm R. Pattinson, Cate Jerram:
A Study of Information System Risk Perceptions at a Local Government Organisation. ACIS 2013: 6 - [c7]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm R. Pattinson, Cate Jerram:
The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2013: 31 - [c6]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. EISMC 2013: 34-44 - [c5]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. SEC 2013: 366-378 - 2011
- [c4]Malcolm R. Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Managing Phishing Emails: A Scenario-Based Experiment. HAISA 2011: 74-85 - 2010
- [c3]Malcolm Robert Pattinson, Cate Jerram:
Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique. SAISMC 2010: 7-12 - 2004
- [c2]Malcolm R. Pattinson:
Risk Homeostasis as a Factor of Information Security. AISM 2004: 64-72 - [c1]Malcolm Robert Pattinson, Grantley Anderson:
Risk Communication, Risk Perception and Information Security. IICIS 2004: 175-184
Informal and Other Publications
- 2016
- [i2]Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Dragana Calic, Agata McCormac, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? CoRR abs/1605.04717 (2016) - [i1]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac:
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. CoRR abs/1606.00887 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint