Agata McCormac

According to our database1, Agata McCormac authored at least 34 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Matching training to individual learning styles improves information security awareness.
Inf. Comput. Secur., 2020

More than the individual: Examining the relationship between culture and Information Security Awareness.
Comput. Secur., 2020

When believing in technology leads to poor cyber security: Development of a trust in technical controls scale.
Comput. Secur., 2020

2019
Using Semantic Context to Rank the Results of Keyword Search.
Int. J. Hum. Comput. Interact., 2019

Aligning Cyber-Security Training to Individual Cognitive Style.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

2018
The effect of resilience and job stress on information security awareness.
Inf. Comput. Secur., 2018

Adapting Cyber-Security Training to Your Employees.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Managing information security awareness at an Australian bank: a comparative study.
Inf. Comput. Secur., 2017

The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.
Comput. Secur., 2017

Individual differences and Information Security Awareness.
Comput. Hum. Behav., 2017

A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses.
Australas. J. Inf. Syst., 2017

Understanding the Relationships between Resilience, Work Stress and Information Security Awareness.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Assessing information security attitudes: a comparison of two studies.
Inf. Comput. Secur., 2016

The Information Security Awareness of Bank Employees.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2016

2015
The design of phishing studies: Challenges for researchers.
Comput. Secur., 2015

Factors that Influence Information Security Behavior: An Australian Web-Based Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Examining Attitudes toward Information Security Behaviour using Mixed Methods.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
A study of information security awareness in Australian government organisations.
Inf. Manag. Comput. Secur., 2014

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014

Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Interfaces for discourse summarisation: a human factors analysis.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Why Do Some People Manage Phishing Emails Better Than Others?
Inf. Manag. Comput. Secur., 2012

An assessment of email and spontaneous dialog visualizations.
Int. J. Hum. Comput. Stud., 2012

2011
Scenario testing methodology for the assessment of screening technologies.
Int. J. Knowl. Learn., 2011

Managing Phishing Emails: A Scenario-Based Experiment.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011


  Loading...