default search action
Dragana Calic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Steven E. Davis, Mirela Stjelja, Dragana Calic:
A Systematic Review of Persuasive Technology in Defence and National Security: Extended Abstract. PERSUASIVE (Adjunct) 2024: 96 - [c18]Lana Edwards, Mirela Stjelja, Dragana Calic, Steven E. Davis:
Exploring Persuasive Tools to Enhance Digital Resilience to Misinformation - Extended Abstract. PERSUASIVE (Adjunct) 2024: 97 - 2023
- [j11]Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
"Generic and unusable"1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. Comput. Secur. 128: 103137 (2023) - 2022
- [c17]Holly Mason, Kathryn Parsons, Dragana Calic, Clemence Due:
A Separate Phone to Work and Play: Protection Motivation Theory and Smartphone Security Behaviour. ACIS 2022: 19 - 2021
- [j10]Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
"Get a red-hot poker and open up my eyes, it's so boring"1: Employee perceptions of cybersecurity training. Comput. Secur. 106: 102281 (2021) - 2020
- [j9]Ashleigh Wiley, Agata McCormac, Dragana Calic:
More than the individual: Examining the relationship between culture and Information Security Awareness. Comput. Secur. 88 (2020) - [j8]Marcus A. Butavicius, Kathryn Parsons, Meredith Lillie, Agata McCormac, Malcolm R. Pattinson, Dragana Calic:
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Comput. Secur. 98: 102020 (2020) - [j7]Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac:
Matching training to individual learning styles improves information security awareness. Inf. Comput. Secur. 28(1): 1-14 (2020) - [c16]Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity? HCI (30) 2020: 217-231 - [c15]Andrew Reeves, Kathryn Parsons, Dragana Calic:
Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness? HCI (30) 2020: 232-249
2010 – 2019
- 2019
- [c14]Malcolm R. Pattinson, Jane Sweeney, Marcus A. Butavicius, Andrew Reeves, Kathryn Parsons, Agata McCormac, Dragana Calic:
Aligning Cyber-Security Training to Individual Cognitive Style. HAISA 2019: 132-142 - 2018
- [j6]Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie:
The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 26(3): 277-289 (2018) - [c13]Kathryn Parsons, Marcus A. Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm R. Pattinson:
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience? HAISA 2018: 1-11 - [c12]Malcolm R. Pattinson, Marcus A. Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac:
Adapting Cyber-Security Training to Your Employees. HAISA 2018: 67-79 - [c11]Dragana Calic, Mary Brushe, Kathryn Parsons, Christopher Brittain:
Self-disclosing on Facebook can be Risky: Examining the Role of Trust and Social Capital. HAISA 2018: 225-235 - 2017
- [j5]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Tara Zwaans, Malcolm R. Pattinson:
A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australas. J. Inf. Syst. 21 (2017) - [j4]Agata McCormac, Tara Zwaans, Kathryn Parsons, Dragana Calic, Marcus A. Butavicius, Malcolm Robert Pattinson:
Individual differences and Information Security Awareness. Comput. Hum. Behav. 69: 151-156 (2017) - [j3]Kathryn Parsons, Dragana Calic, Malcolm Robert Pattinson, Marcus A. Butavicius, Agata McCormac, Tara Zwaans:
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 66: 40-51 (2017) - [j2]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Managing information security awareness at an Australian bank: a comparative study. Inf. Comput. Secur. 25(2): 181-189 (2017) - [c10]Kathryn Parsons, Christopher Brittain, Dragana Calic, Mary Brushe:
'Anti'-Social Media: Narcissism and Self-Control as Predictors of Facebook Self-Disclosure. ACIS 2017: 51 - [c9]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. HAISA 2017: 12-23 - [c8]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. HAISA 2017: 80-90 - [c7]Andrew Reeves, Kathryn Parsons, Dragana Calic:
Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness. HAISA 2017: 145-155 - 2016
- [j1]Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac, Dragana Calic:
Assessing information security attitudes: a comparison of two studies. Inf. Comput. Secur. 24(2): 228-240 (2016) - [c6]Kathryn Parsons, Dragana Calic, Carlos Barca:
Self-Disclosure on Facebook: Comparing two Research Organisations. ACIS 2016: 47 - [c5]Agata McCormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus A. Butavicius, Malcolm Robert Pattinson:
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2016: 56 - [c4]Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac:
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. HAISA 2016: 12-21 - [c3]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:
The Information Security Awareness of Bank Employees. HAISA 2016: 189-198 - [i1]Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Dragana Calic, Agata McCormac, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? CoRR abs/1605.04717 (2016) - 2015
- [c2]Kathryn Parsons, Marcus A. Butavicius, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? ACIS 2015: 6 - [c1]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Factors that Influence Information Security Behavior: An Australian Web-Based Study. HCI (22) 2015: 231-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 16:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint