Cate Jerram

According to our database1, Cate Jerram authored at least 16 papers between 2002 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
The Information Security Awareness of Bank Employees.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
The design of phishing studies: Challenges for researchers.
Comput. Secur., 2015

Examining Attitudes toward Information Security Behaviour using Mixed Methods.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?
Proceedings of the Australasian Conference on Information Systems, 2015

2014
A study of information security awareness in Australian government organisations.
Inf. Manag. Comput. Secur., 2014

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q).
Comput. Secur., 2014

Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

A Study of Information System Risk Perceptions at a Local Government Organisation.
Proceedings of the Australasian Conference on Information Systems, 2013

The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q).
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Why Do Some People Manage Phishing Emails Better Than Others?
Inf. Manag. Comput. Secur., 2012

2011
Managing Phishing Emails: A Scenario-Based Experiment.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

2010
Exploring the Public Sector Adoption of HRIS.
Ind. Manag. Data Syst., 2010

Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique.
Proceedings of the South African Information Security Multi-Conference, 2010

2002
A Sensemaking Model Of Knowledge Management In Organisations.
Proceedings of the 10th European Conference on Information Systems, 2002


  Loading...