Skip to content

Cyber Security and Safety are an ongoing priority focus for the Information Systems Research team. Our most extensive and prolific work has been achieved through the research collaboration HACS (Human Aspects of Cyber Security).

HACS

The HACS team (a collaboration between University of Adelaide Business School and DST Group) has been engaging with projects about phishing, human vulnerabilities to social engineering, employee compliance with information security policies, and related cyber security fields since 2008. HACS' focus is on supporting organisations and management in information and cyber security.

HACS has been awarded several research grants, the most recently completed being a 2014-2016 Premier’s Research and Industry Fund (PRIF), grant from the SA government to develop an Information Security Auditing Tool (the HAIS-Q).

HACS' recent work has focused on the validation of the HAIS-Q.

ISR's Broader Cyber Security Concerns

Other areas of Cyber Security research currently or soon to be underway by ISR include:

  • mapping password management complexity - personal, social and organisational
  • cyber safety for seniors
  • cyber safety for children
  • vulnerability on social dating websites

Publications

Cyber Security and Information Security Publications by HACS and ISR include:

  1. Parsons, K; Butavicius, M; Pattinson, M; Calic, C; McCormac, A; Jerram, C. 2015. Do Users Focus on the correct Cues to Differentiate Between Phishing and Genuine Emails? Proceedings of the 26th Australasian Conference on Information Systems (ACIS 2015)
  2. Butavicius, M; Parsons, M; Pattinson, M; McCormac, A. 2015. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. Australasian Conference on Information Systems (ACIS 2015)
  3. Pattinson, M; Butavicius, M; Parsons, K; McCormac, A; Jerram, C. 2015. (Eds: Steven Furnell & Nathan Clarke) Examining Attitudes toward Information Security Behaviour using Mixed Methods. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015). Centre for Security, Communications & Network Research, Plymouth University, UK. ISBN: 978-1-84102-388-5
  4. Pattinson, M; Butavicius, M; Parsons, K; McCormac, A; Calic, D. 2015. Factors that Influence Information Security Behaviour: An Australian Web-based Study. HCI International. Lecture Notes in Computer Science series, Volume 9190, Chapter 21. (Springer Computer Science).
  5. Parsons, K.M., Young, E., Butavicius, M.A., McCormac, A., Pattinson, M.R. & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117-129.
  6. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2015. The Design of Phishing Studies: Challenges for researchers. Computers & Security. Online first 9 March 2015. doi:10.1016/j.cose.2015.02.008
  7. Parsons, K; McCormac, A; Butavicius, M; Pattinson, M & Jerram, C. 2014. Determining Employee Awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Computers and Security. 42 (2014) 165 - 176. DOI: 10.1016/j.cose.2013.12.003.
  8. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2014. A Study of Information Security Awareness in Australian Government Organisations. Information Management and Computer Security.
  9. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2014. Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. in [Eds: Furnell, SM; Clarke, NL] Proceedings of the Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014). Plymouth, UK.
  10. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2013. An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. Seventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2013) 8-10 May 2013 [European Information Security Multi-Conference (EISMC 2013)] Lisbon, Portugal.
  11. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2013. Phishing for the truth: A scenario-based experiment of users' behavioural response to emails. 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference. Auckland, New Zealand, 8-10 July 2013 (IFIP Advances in Information and Communication Technology series, volume 0405)
  12. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2013 Information Security Awareness: An analysis of knowledge, attitude and behaviour, Proceedings of Oceania Control, Audit & Computer Security (CACS) 2013 conference, Adelaide, September 2013.
  13. Pattinson, M & Jerram, C. 2013. A Study of Information System Risk Perceptions in a Local Government Organisation, Proceedings of the 24th Australasian Conference on Information Systems (ACIS), Melbourne, 4-6 December 2013.
  14. Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2013. The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q), Proceedings of the 24th Australasian Conference on Information Systems (ACIS), Melbourne, 4-6 December 2013.
  15. Pattinson, M; Jerram, C; Parsons, K; McCormac, A; Butavicius, M. 2012. Why Do Some People Manage Phishing Emails Better Than Others?  Information Management and Computer Security. Vol 20, No 1. ISSN: 0968-5227.
  16. Pattinson, M; Jerram, C; Parsons, K; McCormac, A; Butavicius, M. 2011 Managing Phishing Emails: A Scenario-Based Experiment. in [Eds: Furnell, SM; Clarke, NL] Proceedings of the Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2011) pp74-85. Plymouth, UK.
  17. Pattinson, MR & Jerram, C. 2010, Examining End-user Perceptions of Information Risks: An Application of the Repertory Grid Technique. Eds: NL Clarke, SM Furnell & Rvon Solms, Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May 2010.
  18. Parsons, K, McCormac, A, Butavicius, M, Pattinson, M & Jerram, C. 2010. Phishing for Answers: A Scenario-Based Experiment Assessing the Ability to Identify Fraudulent Email Messages. DSTO Report (Confidential), Command, Control, Communications & Intelligence Division, Defence Science and Technology Organisation.
Adelaide Business School

Faculty of the Professions

Address

Level 9
10 Pulteney Street
The University of Adelaide SA 5005
North Tce Campus Map

Contact

UG and PG Enquiries: +61 8 8313 4755
MBA Enquiries: +61 8 8313 0819
Staff Directory: Adelaide Business School
Enquire online now

Unified - Staff Intranet

AACSB Accredited

EFMD Accredited

AAPBS Accredited

PRME