Cate Jerram

According to our database1, Cate Jerram authored at least 23 papers between 2001 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
The Information Security Awareness of Bank Employees.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
The design of phishing studies: Challenges for researchers.
Comput. Secur., 2015

Examining Attitudes toward Information Security Behaviour using Mixed Methods.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015

2014
A study of information security awareness in Australian government organisations.
Inf. Manag. Comput. Secur., 2014

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014

Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

A Study of Information System Risk Perceptions at a Local Government Organisation.
Proceedings of the Australasian Conference on Information Systems, 2013

The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Why Do Some People Manage Phishing Emails Better Than Others?
Inf. Manag. Comput. Secur., 2012

2011
Managing Phishing Emails: A Scenario-Based Experiment.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

2010
Exploring the Public Sector Adoption of HRIS.
Ind. Manag. Data Syst., 2010

Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique.
Proceedings of the South African Information Security Multi-Conference, 2010

Exploring the organizational adoption of Human Resources Information Systems (HRIS) in the Australian public sector.
Proceedings of the Australasian Conference on Information Systems, 2010

2005
Synthesising Sensemaking Approaches for Understanding Distributed Knowledge in Organisations.
Proceedings of the Australasian Conference on Information Systems, 2005

Information Systems Rollout for Knowledge Management at the ABS.
Proceedings of the Australasian Conference on Information Systems, 2005

2004
Creating Learning Communities: Using CMC Tools in Large Class Situations.
Proceedings of the Australasian Conference on Information Systems, 2004

2003
Knowledge Sharing as a KM Strategy: Panacea or Tyranny.
Proceedings of the Australasian Conference on Information Systems, 2003

2002
A Sensemaking Model Of Knowledge Management In Organisations.
Proceedings of the 10th European Conference on Information Systems, 2002

Email and Assumptions: a study in electronic (mis)understandings.
Proceedings of the Australasian Conference on Information Systems, 2002

2001
Understanding Crisis from a Sense-Making Perspective: An IS Operation Change.
Proceedings of the Australasian Conference on Information Systems, 2001


  Loading...