Marcus A. Butavicius

Orcid: 0000-0003-0722-3912

According to our database1, Marcus A. Butavicius authored at least 48 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks.
Inf. Comput. Secur., 2024

The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals.
Inf. Comput. Secur., 2024

Improving the Human Firewall: Exploring the Factors that Influence Cyber-Security Incident Reporting.
Proceedings of the Human Aspects of Information Security and Assurance, 2024

2023
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails.
Comput. Secur., 2022

2020
Matching training to individual learning styles improves information security awareness.
Inf. Comput. Secur., 2020

When believing in technology leads to poor cyber security: Development of a trust in technical controls scale.
Comput. Secur., 2020

2019
Predicting susceptibility to social influence in phishing emails.
Int. J. Hum. Comput. Stud., 2019

Using Semantic Context to Rank the Results of Keyword Search.
Int. J. Hum. Comput. Interact., 2019

Mouse Behavior as an Index of Phishing Awareness.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

Aligning Cyber-Security Training to Individual Cognitive Style.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

2018
The effect of resilience and job stress on information security awareness.
Inf. Comput. Secur., 2018

Adapting Cyber-Security Training to Your Employees.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Managing information security awareness at an Australian bank: a comparative study.
Inf. Comput. Secur., 2017

The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.
Comput. Secur., 2017

Individual differences and Information Security Awareness.
Comput. Hum. Behav., 2017

A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses.
Australas. J. Inf. Syst., 2017

Understanding the Relationships between Resilience, Work Stress and Information Security Awareness.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Assessing information security attitudes: a comparison of two studies.
Inf. Comput. Secur., 2016

The Information Security Awareness of Bank Employees.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2016

2015
The design of phishing studies: Challenges for researchers.
Comput. Secur., 2015

Factors that Influence Information Security Behavior: An Australian Web-Based Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Examining Attitudes toward Information Security Behaviour using Mixed Methods.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
A study of information security awareness in Australian government organisations.
Inf. Manag. Comput. Secur., 2014

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014

Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Interfaces for discourse summarisation: a human factors analysis.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Why Do Some People Manage Phishing Emails Better Than Others?
Inf. Manag. Comput. Secur., 2012

An assessment of email and spontaneous dialog visualizations.
Int. J. Hum. Comput. Stud., 2012

How to Assess Human Visual Performance on an Operational Task.
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012

2011
Scenario testing methodology for the assessment of screening technologies.
Int. J. Knowl. Learn., 2011

Managing Phishing Emails: A Scenario-Based Experiment.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

2010
Infrared image enhancement and human detection performance measures.
Int. J. Intell. Def. Support Syst., 2010

Super-resolution of Infrared Images: Does it Improve Operator Object Detection Performance?
J. Comput. Inf. Technol., 2010

Improving Infrared Images for Standoff Object Detection.
J. Comput. Inf. Technol., 2010

2008
An Experiment on Human Face Recognition Performance for Access Control.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

2007
An empirical evaluation of four data visualization techniques for displaying short news text similarities.
Int. J. Hum. Comput. Stud., 2007

2003
Visualizations of binary data: A comparative evaluation.
Int. J. Hum. Comput. Stud., 2003


  Loading...