Seguir
Dragana Calic
Dragana Calic
Dirección de correo verificada de adelaide.edu.au
Título
Citado por
Citado por
Año
The human aspects of information security questionnaire (HAIS-Q): two further validation studies
K Parsons, D Calic, M Pattinson, M Butavicius, A McCormac, T Zwaans
Computers & Security 66, 40-51, 2017
4532017
Individual differences and information security awareness
A McCormac, T Zwaans, K Parsons, D Calic, M Butavicius, M Pattinson
Computers in Human Behavior 69, 151-156, 2017
4382017
More than the individual: Examining the relationship between culture and Information Security Awareness
A Wiley, A McCormac, D Calic
Computers & security 88, 101640, 2020
2022020
Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue
A Reeves, P Delfabbro, D Calic
SAGE open 11 (1), 21582440211000049, 2021
1082021
Factors that influence information security behavior: An Australian web-based study
M Pattinson, M Butavicius, K Parsons, A McCormac, D Calic
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
832015
For whom do we forgive? A functional analysis of forgiveness
P Strelan, IAN McKee, D Calic, L Cook, L Shaw
Personal Relationships 20 (1), 124-139, 2013
692013
The effect of resilience and job stress on information security awareness
A McCormac, D Calic, K Parsons, M Butavicius, M Pattinson, M Lillie
Information & Computer Security 26 (3), 277-289, 2018
632018
A reliable measure of information security awareness and the identification of bias in responses
A McCormac, D Calic, M Butavicius, K Parsons, T Zwaans, M Pattinson
Australasian Journal of Information Systems 21, 2017
562017
“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training
A Reeves, D Calic, P Delfabbro
Computers & security 106, 102281, 2021
552021
Do users focus on the correct cues to differentiate between phishing and genuine emails?
K Parsons, M Butavicius, M Pattinson, D Calic, A Mccormac, C Jerram
arXiv preprint arXiv:1605.04717, 2016
542016
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale
M Butavicius, K Parsons, M Lillie, A McCormac, M Pattinson, D Calic
Computers & Security 98, 102020, 2020
472020
Matching training to individual learning styles improves information security awareness
M Pattinson, M Butavicius, M Lillie, B Ciccarello, K Parsons, D Calic, ...
Information & Computer Security 28 (1), 1-14, 2020
472020
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.
MA Butavicius, K Parsons, MR Pattinson, A McCormac, D Calic, M Lillie
HAISA, 12-23, 2017
442017
Managing information security awareness at an Australian bank: A comparative study
M Pattinson, M Butavicius, K Parsons, A McCormac, D Calic
Information & Computer Security 25 (2), 181-189, 2017
442017
Assessing information security attitudes: a comparison of two studies
M Pattinson, K Parsons, M Butavicius, A McCormac, D Calic
Information & Computer Security 24 (2), 228-240, 2016
422016
Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q)
A McCormac, D Calic, K Parsons, T Zwaans, M Butavicius, M Pattinson
352016
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.
D Calic, MR Pattinson, K Parsons, MA Butavicius, A McCormac
HAISA, 12-21, 2016
352016
Adapting Cyber-Security Training to Your Employees.
MR Pattinson, MA Butavicius, B Ciccarello, M Lillie, K Parsons, D Calic, ...
HAISA, 67-79, 2018
222018
Whose risk is it anyway: How do risk perception and organisational commitment affect employee information security awareness?
A Reeves, K Parsons, D Calic
International Conference on Human-Computer Interaction, 232-249, 2020
162020
Which individual, cultural, organisational and interventional factors explain phishing resilience?
K Parsons, MA Butavicius, M Lillie, D Calic, A McCormac, MR Pattinson
HAISA, 1-11, 2018
132018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20