Marcus A. Butavicius
Orcid: 0000-0003-0722-3912
According to our database1,
Marcus A. Butavicius
authored at least 48 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks.
Inf. Comput. Secur., 2024
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals.
Inf. Comput. Secur., 2024
Improving the Human Firewall: Exploring the Factors that Influence Cyber-Security Incident Reporting.
Proceedings of the Human Aspects of Information Security and Assurance, 2024
2023
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2022
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails.
Comput. Secur., 2022
2020
Matching training to individual learning styles improves information security awareness.
Inf. Comput. Secur., 2020
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale.
Comput. Secur., 2020
2019
Int. J. Hum. Comput. Stud., 2019
Int. J. Hum. Comput. Interact., 2019
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
2018
Inf. Comput. Secur., 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Inf. Comput. Secur., 2017
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.
Comput. Secur., 2017
A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses.
Australas. J. Inf. Syst., 2017
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
2016
Inf. Comput. Secur., 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2016
2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails.
Proceedings of the Australasian Conference on Information Systems, 2015
2014
Inf. Manag. Comput. Secur., 2014
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
Inf. Manag. Comput. Secur., 2012
Int. J. Hum. Comput. Stud., 2012
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012
2011
Int. J. Knowl. Learn., 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
2010
Int. J. Intell. Def. Support Syst., 2010
Super-resolution of Infrared Images: Does it Improve Operator Object Detection Performance?
J. Comput. Inf. Technol., 2010
J. Comput. Inf. Technol., 2010
2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
2007
An empirical evaluation of four data visualization techniques for displaying short news text similarities.
Int. J. Hum. Comput. Stud., 2007
2003
Int. J. Hum. Comput. Stud., 2003