Malcolm Robert Pattinson
According to our database1,
Malcolm Robert Pattinson
authored at least 36 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
2020
Matching training to individual learning styles improves information security awareness.
Inf. Comput. Secur., 2020
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale.
Comput. Secur., 2020
2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
2018
Inf. Comput. Secur., 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Inf. Comput. Secur., 2017
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.
Comput. Secur., 2017
A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses.
Australas. J. Inf. Syst., 2017
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
2016
Inf. Comput. Secur., 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2016
2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails.
Proceedings of the Australasian Conference on Information Systems, 2015
2014
Inf. Manag. Comput. Secur., 2014
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Proceedings of the Australasian Conference on Information Systems, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
Inf. Manag. Comput. Secur., 2012
2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
2010
Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique.
Proceedings of the South African Information Security Multi-Conference, 2010
2007
Inf. Manag. Comput. Secur., 2007
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Risk Homeostasis as a Factor of Information Security.
Proceedings of the 2nd Australian Information Security Management Conference, 2004