Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) K Parsons, A McCormac, M Butavicius, M Pattinson, C Jerram Computers & security 42, 165-176, 2014 | 504 | 2014 |
Exploring the public sector adoption of HRIS I Troshani, C Jerram, S Rao Hill Industrial Management & Data Systems 111 (3), 470-488, 2011 | 324 | 2011 |
Why do some people manage phishing e‐mails better than others? M Pattinson, C Jerram, K Parsons, A McCormac, M Butavicius Information Management & Computer Security 20 (1), 18-28, 2012 | 171 | 2012 |
The influence of organizational information security culture on information security decision making KM Parsons, E Young, MA Butavicius, A McCormac, MR Pattinson, ... Journal of Cognitive Engineering and Decision Making 9 (2), 117-129, 2015 | 149 | 2015 |
The design of phishing studies: Challenges for researchers K Parsons, A McCormac, M Pattinson, M Butavicius, C Jerram Computers & Security 52, 194-206, 2015 | 130 | 2015 |
Phishing for the truth: A scenario-based experiment of users’ behavioural response to emails K Parsons, A McCormac, M Pattinson, M Butavicius, C Jerram Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 116 | 2013 |
A study of information security awareness in Australian government organisations K Parsons, A McCormac, M Pattinson, M Butavicius, C Jerram Information Management & Computer Security 22 (4), 334-345, 2014 | 102 | 2014 |
Sustainability assessment in wine-grape growing in the new world: Economic, environmental, and social indicators for agricultural businesses I Santiago-Brown, A Metcalfe, C Jerram, C Collins Sustainability 7 (7), 8178-8204, 2015 | 96 | 2015 |
The development of the human aspects of information security questionnaire (HAIS-Q) K Parsons, A McCormac, M Butavicius, M Pattinson, C Jerram ACIS 2013: Information systems: Transforming the Future: Proceedings of the …, 2013 | 52 | 2013 |
Do users focus on the correct cues to differentiate between phishing and genuine emails? K Parsons, M Butavicius, M Pattinson, D Calic, A Mccormac, C Jerram arXiv preprint arXiv:1605.04717, 2016 | 47 | 2016 |
Exploring the organizational adoption of Human Resources Information Systems (HRIS) in the Australian public sector I Troshani, C Jerram, M Gerrard | 46 | 2010 |
Transnational comparison of sustainability assessment programs for viticulture and a case-study on programs’ engagement processes I Santiago-Brown, A Metcalfe, C Jerram, C Collins Sustainability 6 (4), 2031-2066, 2014 | 37 | 2014 |
A sensemaking model of knowledge management in organizations D Cecez-Kecmanovic, C Jerram | 32 | 2002 |
What does sustainability mean? Knowledge gleaned from applying mixed methods research to wine grape growing I Santiago-Brown, C Jerram, A Metcalfe, C Collins Journal of Mixed Methods Research 9 (3), 232-251, 2015 | 31 | 2015 |
Managing Phishing Emails: A Scenario-Based Experiment. MR Pattinson, C Jerram, K Parsons, A McCormac, MA Butavicius HAISA, 74-85, 2011 | 23 | 2011 |
The Information Security Awareness of Bank Employees. MR Pattinson, MA Butavicius, K Parsons, A McCormac, D Calic, C Jerram HAISA, 189-198, 2016 | 20 | 2016 |
Examining Attitudes toward Information Security Behaviour using Mixed Methods. MR Pattinson, MA Butavicius, K Parsons, A McCormac, C Jerram HAISA, 57-70, 2015 | 20 | 2015 |
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. K Parsons, A McCormac, MR Pattinson, MA Butavicius, C Jerram EISMC, 34-44, 2013 | 19 | 2013 |
Applying adult education principles to university teaching C Jerram Research and Development in Higher Education: Quality Conversations 2002, 2002 | 14 | 2002 |
Applying adult education principles to an undergraduate subject C Jerram Authentic learning environments in higher education, 107-119, 2006 | 9 | 2006 |