default search action
Marcus A. Butavicius
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Andrew Reeves, Malcolm Pattinson, Marcus A. Butavicius:
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals. Inf. Comput. Secur. 32(4): 477-491 (2024) - [j23]Monica T. Whitty, Christopher Ruddy, David A. Keatley, Marcus A. Butavicius, Marthie Grobler:
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. Inf. Comput. Secur. 32(4): 509-522 (2024) - 2023
- [c24]Andrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius:
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals. HAISA 2023: 225-236 - [c23]Daniel G. Conway, Marcus A. Butavicius, Kun Yu, Fang Chen:
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address. HAISA 2023: 310-323 - 2022
- [j22]Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han:
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. Comput. Secur. 123: 102937 (2022) - 2020
- [j21]Marcus A. Butavicius, Kathryn Parsons, Meredith Lillie, Agata McCormac, Malcolm R. Pattinson, Dragana Calic:
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Comput. Secur. 98: 102020 (2020) - [j20]Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac:
Matching training to individual learning styles improves information security awareness. Inf. Comput. Secur. 28(1): 1-14 (2020)
2010 – 2019
- 2019
- [j19]Marcus A. Butavicius, Kathryn Marie Parsons, Agata McCormac, Simon J. Dennis, Aaron Ceglar, Derek Weber, Lael Ferguson, Kenneth Treharne, Richard Leibbrandt, David M. W. Powers:
Using Semantic Context to Rank the Results of Keyword Search. Int. J. Hum. Comput. Interact. 35(9): 725-741 (2019) - [j18]Kathryn Parsons, Marcus A. Butavicius, Paul H. Delfabbro, Meredith Lillie:
Predicting susceptibility to social influence in phishing emails. Int. J. Hum. Comput. Stud. 128: 17-26 (2019) - [c22]Malcolm R. Pattinson, Jane Sweeney, Marcus A. Butavicius, Andrew Reeves, Kathryn Parsons, Agata McCormac, Dragana Calic:
Aligning Cyber-Security Training to Individual Cognitive Style. HAISA 2019: 132-142 - [c21]Kun Yu, Ronnie Taib, Marcus A. Butavicius, Kathryn Parsons, Fang Chen:
Mouse Behavior as an Index of Phishing Awareness. INTERACT (1) 2019: 539-548 - 2018
- [j17]Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie:
The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 26(3): 277-289 (2018) - [c20]Kathryn Parsons, Marcus A. Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm R. Pattinson:
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience? HAISA 2018: 1-11 - [c19]Malcolm R. Pattinson, Marcus A. Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac:
Adapting Cyber-Security Training to Your Employees. HAISA 2018: 67-79 - 2017
- [j16]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Tara Zwaans, Malcolm R. Pattinson:
A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australas. J. Inf. Syst. 21 (2017) - [j15]Agata McCormac, Tara Zwaans, Kathryn Parsons, Dragana Calic, Marcus A. Butavicius, Malcolm Robert Pattinson:
Individual differences and Information Security Awareness. Comput. Hum. Behav. 69: 151-156 (2017) - [j14]Kathryn Parsons, Dragana Calic, Malcolm Robert Pattinson, Marcus A. Butavicius, Agata McCormac, Tara Zwaans:
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 66: 40-51 (2017) - [j13]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Managing information security awareness at an Australian bank: a comparative study. Inf. Comput. Secur. 25(2): 181-189 (2017) - [c18]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. HAISA 2017: 12-23 - [c17]Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. HAISA 2017: 80-90 - 2016
- [j12]Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac, Dragana Calic:
Assessing information security attitudes: a comparison of two studies. Inf. Comput. Secur. 24(2): 228-240 (2016) - [c16]Agata McCormac, Dragana Calic, Kathryn Parsons, Tara Zwaans, Marcus A. Butavicius, Malcolm Robert Pattinson:
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2016: 56 - [c15]Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac:
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. HAISA 2016: 12-21 - [c14]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:
The Information Security Awareness of Bank Employees. HAISA 2016: 189-198 - [i2]Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Dragana Calic, Agata McCormac, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? CoRR abs/1605.04717 (2016) - [i1]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac:
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. CoRR abs/1606.00887 (2016) - 2015
- [j11]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
The design of phishing studies: Challenges for researchers. Comput. Secur. 52: 194-206 (2015) - [c13]Kathryn Parsons, Marcus A. Butavicius, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? ACIS 2015: 6 - [c12]Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac:
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ACIS 2015: 98 - [c11]Malcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram:
Examining Attitudes toward Information Security Behaviour using Mixed Methods. HAISA 2015: 57-70 - [c10]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Factors that Influence Information Security Behavior: An Australian Web-Based Study. HCI (22) 2015: 231-241 - 2014
- [j10]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm Robert Pattinson, Cate Jerram:
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42: 165-176 (2014) - [j9]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
A study of information security awareness in Australian government organisations. Inf. Manag. Comput. Secur. 22(4): 334-345 (2014) - [c9]Kathryn Marie Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus Antanas Butavicius, Cate Jerram:
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. HAISA 2014: 30-41 - 2013
- [c8]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm R. Pattinson, Cate Jerram:
The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2013: 31 - [c7]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. EISMC 2013: 34-44 - [c6]Agata McCormac, Kathryn Parsons, Marcus A. Butavicius, Aaron Ceglar, Derek Weber, Tim Pattison, Richard Leibbrandt, Kenneth Treharne, David M. W. Powers:
Interfaces for discourse summarisation: a human factors analysis. OZCHI 2013: 139-142 - [c5]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. SEC 2013: 366-378 - 2012
- [j8]Marcus A. Butavicius, Michael D. Lee, Brandon M. Pincombe, Louise G. Mullen, Daniel J. Navarro, Kathryn Parsons, Agata McCormac:
An assessment of email and spontaneous dialog visualizations. Int. J. Hum. Comput. Stud. 70(6): 432-449 (2012) - [j7]Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Why Do Some People Manage Phishing Emails Better Than Others? Inf. Manag. Comput. Secur. 20(1): 18-28 (2012) - [c4]Katherine Hanton, Jadranka Sunde, Marcus A. Butavicius, Lakhmi C. Jain, Nicholas Burns:
How to Assess Human Visual Performance on an Operational Task. KES-AMSTA 2012: 406-413 - 2011
- [j6]Ray Johnson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Jadranka Sunde, Benjamin Hall:
Scenario testing methodology for the assessment of screening technologies. Int. J. Knowl. Learn. 7(1/2): 25-38 (2011) - [c3]Malcolm R. Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Managing Phishing Emails: A Scenario-Based Experiment. HAISA 2011: 74-85 - 2010
- [j5]Katherine Hanton, Marcus A. Butavicius, Ray Johnson, Jadranka Sunde:
Improving Infrared Images for Standoff Object Detection. J. Comput. Inf. Technol. 18(2) (2010) - [j4]Katherine Hanton, Jadranka Sunde, Marcus A. Butavicius, Nicholas Burns:
Super-resolution of Infrared Images: Does it Improve Operator Object Detection Performance? J. Comput. Inf. Technol. 18(2) (2010) - [j3]Katherine Hanton, Jadranka Sunde, Marcus A. Butavicius, Vido Gluscevic:
Infrared image enhancement and human detection performance measures. Int. J. Intell. Def. Support Syst. 3(1/2): 5-21 (2010)
2000 – 2009
- 2009
- [c2]Katherine Hanton, Marcus A. Butavicius, Ray Johnson, Jadranka Sunde:
Improving infrared images for standoff object detection. ITI 2009: 641-646 - 2008
- [c1]Marcus A. Butavicius, Chloë Mount, Veneta MacLeod, Robyn Vast, Ian Graves, Jadranka Sunde:
An Experiment on Human Face Recognition Performance for Access Control. KES (1) 2008: 141-148 - 2007
- [j2]Marcus A. Butavicius, Michael D. Lee:
An empirical evaluation of four data visualization techniques for displaying short news text similarities. Int. J. Hum. Comput. Stud. 65(11): 931-944 (2007) - 2003
- [j1]Michael D. Lee, Marcus A. Butavicius, Rachel E. Reilly:
Visualizations of binary data: A comparative evaluation. Int. J. Hum. Comput. Stud. 59(5): 569-602 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint