default search action
Cate Jerram
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c18]Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:
The Information Security Awareness of Bank Employees. HAISA 2016: 189-198 - [i1]Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Dragana Calic, Agata McCormac, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? CoRR abs/1605.04717 (2016) - 2015
- [j5]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
The design of phishing studies: Challenges for researchers. Comput. Secur. 52: 194-206 (2015) - [c17]Kathryn Parsons, Marcus A. Butavicius, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Cate Jerram:
Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? ACIS 2015: 6 - [c16]Malcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram:
Examining Attitudes toward Information Security Behaviour using Mixed Methods. HAISA 2015: 57-70 - 2014
- [j4]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm Robert Pattinson, Cate Jerram:
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42: 165-176 (2014) - [j3]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
A study of information security awareness in Australian government organisations. Inf. Manag. Comput. Secur. 22(4): 334-345 (2014) - [c15]Kathryn Marie Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus Antanas Butavicius, Cate Jerram:
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. HAISA 2014: 30-41 - 2013
- [c14]Malcolm R. Pattinson, Cate Jerram:
A Study of Information System Risk Perceptions at a Local Government Organisation. ACIS 2013: 6 - [c13]Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm R. Pattinson, Cate Jerram:
The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q). ACIS 2013: 31 - [c12]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. EISMC 2013: 34-44 - [c11]Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. SEC 2013: 366-378 - 2012
- [j2]Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Why Do Some People Manage Phishing Emails Better Than Others? Inf. Manag. Comput. Secur. 20(1): 18-28 (2012) - 2011
- [c10]Malcolm R. Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Managing Phishing Emails: A Scenario-Based Experiment. HAISA 2011: 74-85 - 2010
- [j1]Indrit Troshani, Cate Jerram, Sally Rao Hill:
Exploring the Public Sector Adoption of HRIS. Ind. Manag. Data Syst. 111(3): 470-488 (2010) - [c9]Indrit Troshani, Cate Jerram, Michael Gerrard:
Exploring the organizational adoption of Human Resources Information Systems (HRIS) in the Australian public sector. ACIS 2010 - [c8]Malcolm Robert Pattinson, Cate Jerram:
Examining End-user Perceptions of Information Risks: An Application for the Repertory Grid Technique. SAISMC 2010: 7-12
2000 – 2009
- 2005
- [c7]Cate Jerram:
Information Systems Rollout for Knowledge Management at the ABS. ACIS 2005 - [c6]Cate Jerram:
Synthesising Sensemaking Approaches for Understanding Distributed Knowledge in Organisations. ACIS 2005 - 2004
- [c5]Claire Lewin, Cate Jerram:
Creating Learning Communities: Using CMC Tools in Large Class Situations. ACIS 2004 - 2003
- [c4]Cate Jerram, Lesley Treleaven, Dubravka Cecez-Kecmanovic:
Knowledge Sharing as a KM Strategy: Panacea or Tyranny. ACIS 2003 - 2002
- [c3]Cate Jerram, Dubravka Cecez-Kecmanovic, Lesley Treleaven, Chris Sykes:
Email and Assumptions: a study in electronic (mis)understandings. ACIS 2002 - [c2]Dubravka Cecez-Kecmanovic, Cate Jerram:
A Sensemaking Model Of Knowledge Management In Organisations. ECIS 2002: 894-904 - 2001
- [c1]Dubravka Cecez-Kecmanovic, Cate Jerram:
Understanding Crisis from a Sense-Making Perspective: An IS Operation Change. ACIS 2001
Coauthor Index
aka: Marcus Antanas Butavicius
aka: Kathryn Marie Parsons
aka: Malcolm R. Pattinson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-23 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint