Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dragana Calic is active.

Publication


Featured researches published by Dragana Calic.


Computers & Security | 2017

The Human Aspects of Information Security Questionnaire (HAIS-Q)

Kathryn Parsons; Dragana Calic; Malcolm Robert Pattinson; Marcus A. Butavicius; Agata McCormac; Tara Zwaans

Information security awareness (ISA) is integral to protecting an organisation from cyber threats. The aim of this paper is to further establish the validity of the Human Aspects of Information Security Questionnaire (HAIS-Q), as an effective instrument for measuring ISA. We present two studies to further establish the construct validity of this instrument. In Study 1, 112 university students completed the HAIS-Q and also took part in an empirical lab-based phishing experiment. Results indicated that participants who scored more highly on the HAIS-Q had better performance in the phishing experiment. This means the HAIS-Q can predict an aspect of information security behaviour, and provides evidence for its convergent validity. In Study 2, the HAIS-Q was administered to a larger and more representative population of 505 working Australians to further establish the construct validity of the instrument. The results of a factor analysis and other statistical techniques provide evidence for the validity of the HAIS-Q as a robust measure of ISA. We also describe the practical implications of the HAIS-Q, particularly how it could be used by information security practitioners.


Information and Computer Security | 2016

Assessing information security attitudes: a comparison of two studies

Malcolm Robert Pattinson; Kathryn Parsons; Marcus A. Butavicius; Agata McCormac; Dragana Calic

Purpose The purpose of this paper is to report on the use of two studies that assessed the attitudes of typical computer users. The aim of the research was to compare a self-reporting online survey with a set of one-on-one repertory grid technique interviews. More specifically, this research focussed on participant attitudes toward naive and accidental information security behaviours. Design/methodology/approach In the first study, 23 university students responded to an online survey within a university laboratory setting that captured their attitudes toward behaviours in each of seven focus areas. In the second study, the same students participated in a one-on-one repertory grid technique interview that elicited their attitudes toward the same seven behaviours. Results were analysed using Spearman correlations. Findings There were significant correlations for three of the seven behaviours, although attitudes relating to password management, use of social networking sites, information handling and reporting of security incidents were not significantly correlated. Research limitations/implications The small sample size (n = 23) and the fact that participants were not necessarily representative of typical employees, may have impacted on the results. Practical implications This study contributes to the challenge of developing a reliable instrument that will assess individual InfoSec awareness. Senior management will be better placed to design intervention strategies, such as training and education of employees, if individual attitudes are known. This, in turn, will reduce risk-inclined behaviour and a more secure organisation. Originality/value The literature review indicates that this study addresses a genuine gap in the research.


international conference on human-computer interaction | 2015

Factors that Influence Information Security Behavior: An Australian Web-Based Study

Malcolm Robert Pattinson; Marcus A. Butavicius; Kathryn Parsons; Agata McCormac; Dragana Calic

Information Security professionals have been attempting to convince senior management for many years that humans represent a major risk to the security of an organizations computer systems and the information that these systems process. This major threat relates to the behavior of employees whilst they are using a computer at work. This paper examines the non-malicious computer-based behavior and how it is influenced by a mixture of individual, organizational and interventional factors. The specific factors reported herein include an employees age; education level; ability to control impulsivity; familiarity with computers; and personality. This research utilized the Qualtrics online web-based survey software to develop and distribute a questionnaire that resulted in 500 valid responses. The major conclusions of this research are that an employees accidental-naive behavior is likely to be less risky if they are more conscientious; older; more agreeable; less impulsive; more open; and, surprisingly, less familiar with computers.


Information and Computer Security | 2017

Managing information security awareness at an Australian bank: a comparative study

Malcolm Robert Pattinson; Marcus A. Butavicius; Kathryn Parsons; Agata McCormac; Dragana Calic

Purpose The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second to identify the major factors that contributed to this bank’s high levels of information security awareness (ISA). Design/methodology/approach A Web-based questionnaire (the Human Aspects of Information Security Questionnaire – HAIS-Q) was used in two separate studies to assess the ISA of individuals who used computers at their workplace. The first study assessed 198 employees at an Australian bank and the second study assessed 500 working Australians from various industries. Both studies used a Qualtrics-based questionnaire that was distributed via an email link. Findings The results showed that the average level of ISA among bank employees was consistently 20 per cent higher than that among general workforce participants in all focus areas and overall. There were no significant differences between the ISA scores for those who received more frequent training compared to those who received less frequent training. This result suggests that the frequency of training is not a contributing factor to an employee’s level of ISA. Research limitations/implications This current research did not investigate the information security (InfoSec) culture that prevailed within the bank in question because the objective of the research was to compare a bank’s employees with general workforce employees rather than compare organisations. The Research did not include questions relating to the type of training participants had received at work. Originality/value This study provided the bank’s InfoSec management with evidence that their multi-channelled InfoSec training regime was responsible for a substantially higher-than-average ISA for their employees. Future research of this nature should examine the effectiveness of various ISA programmes in light of individual differences and learning styles. This would form the basis of an adaptive control framework that would complement many of the current international standards, such as ISO’s 27000 series, NIST’s SP800 series and ISACA’s COBIT5.


Computers in Human Behavior | 2017

Individual differences and Information Security Awareness

Agata McCormac; Tara Zwaans; Kathryn Parsons; Dragana Calic; Marcus A. Butavicius; Malcolm Robert Pattinson


arXiv: Computers and Society | 2016

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails

Kathryn Parsons; Marcus A. Butavicius; Malcolm Robert Pattinson; Dragana Calic; Agata McCormac; Cate Jerram


Archive | 2016

Self-Disclosure on Facebook: Comparing two Research Organisations

Kathryn Parsons; Dragana Calic; Carlos Barca


HAISA | 2016

Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think.

Dragana Calic; Malcolm Robert Pattinson; Kathryn Parsons; Marcus A. Butavicius; Agata McCormac


Australasian Journal of Information Systems | 2017

A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses

Agata McCormac; Dragana Calic; Marcus A. Butavicius; Kathryn Parsons; Tara Zwaans; Malcolm Robert Pattinson


Information and Computer Security | 2018

The effect of resilience and job stress on information security awareness

Agata McCormac; Dragana Calic; Kathryn Parsons; Marcus A. Butavicius; Malcolm Robert Pattinson; Meredith Lillie

Collaboration


Dive into the Dragana Calic's collaboration.

Top Co-Authors

Avatar

Kathryn Parsons

Defence Science and Technology Organisation

View shared research outputs
Top Co-Authors

Avatar

Agata McCormac

Defence Science and Technology Organisation

View shared research outputs
Top Co-Authors

Avatar

Marcus A. Butavicius

Defence Science and Technology Organisation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tara Zwaans

University of Adelaide

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cate Jerram

University of Adelaide

View shared research outputs
Researchain Logo
Decentralizing Knowledge