Dr Cate Jerram
Cate is chief investigator on the Information Systems Research team (ISR), and the research partnership Human Aspects of Cyber Security (HACS) with co-researchers in the Defence Science and Technology Group (formerly DSTO).
As the Stephen Cole the Elder Fellow for the Faculty of the Professions, Cate is responsible for a portfolio supporting the learning and teaching in the faculty, with a focus on blended and online learning.
Cate designed and became Lecturer in Charge for both the Qualitative Methods course for Higher Degree Research students, and Business Research Methods for all Post Graduate students in the Business School; and is also the primary educator in the use of NVivo to support research for the University of Adelaide and the Adelaide Graduate Centre. Cate designed and leads the Tutor Induction Program and classes for all new Tutors in the Business School, and designed and ran the original Faculty Tutor Professional Development Program.
While previously seconded to the Faculty of the Professions, with a brief to design and implement projects to assist full-time and sessional teaching academics to improve their teaching and students’ learning, Cate became the designer, author and moderator of the Faculty of the Professions' Pedagogical Possibilities website and blog.
From 2007 to 2012, Cate was Lecturer in Charge for the large first year course (IS-1) in Management Information Systems. In IS-1 she used innovative teaching design combining Gamification and Flipped Classroom (particularly Team Based Learning).
Prior to coming to Adelaide, she conducted Information Systems and Tertiary Education research with School of Information Systems, Technology and Management at the University of New South Wales, and the School of Management, UWS; and taught in Commerce / Management Information Systems and in ECommerce; EBusiness; IT Information Systems; Education; and Social Psychology; at University of Western Sydney, University of New South Wales and University of Technology Sydney.
Cate spent (carefully unspecified) years in Performing Arts and in Management in Ministry in Australia, NZ, USA, Canada, UK and Germany before coming to academia.
ISR & HACS - Humans and Cyber Security research partnerships and alliances
Cate is Director of the Information Systems Research (ISR) team. ISR is a network of Systems researchers in the Business School, engaged in seven areas of research concentration. The majority of Cate's research is with partnerships and alliances to target specific aspects of human cyber-security and cyber-safety. ISR’s most prolific work to date has been with the Human Aspects of Cyber Security (HACS) team.
HACS is an established partnership with researchers from the Human and Social Modelling and Analysis team, National Security & Intelligence, Surveillance and Reconnaissance Division (NSID), unit of the DST Group. HACS' first client was the Department of Defence, researching human vulnerability to phishing. This research has expanded to incorporate broader understandings of the effect of human behaviour on organisational information and cyber security, and to work with other federal and state government organisations. ISR and HACS have received over $200,000 funding since commencing research into human aspects of cyber security in 2010.
Secondary partnerships currently being developed by ISR's Information & Cyber Security & Safety team include a partnership with researchers the School of Education to investigate cyber-security and cyber-safety for children, and another with researchers from Humanities & Social Sciences to explore issues of cyber-security and cyber-safety for senior citizens, the aging and elderly. Future partnerships will broaden the research to other sectors of society to ensure a broad-scale and global approach to an increasingly critical distributed global problem.
|2015||Stephen Cole the Elder Fellow||University of Adelaide|
|2007||Academic||University of Adelaide Business School|
|2010||Award||Scott Henderson Award for Excellence in Teaching||University of Adelaide Business School|
|2001 - 2001||Award||Award for Excellence in Individual Teaching||Western Sydney University|
|2004||University of Western Sydney||Australia||PhD|
|1999||University of Western Sydney||Australia||BEd(Hons)|
|1997 - 1999||University of Western Sydney||Australia||BAdEd|
|Certificate IV in Assessment & Workplace Training||VET Australia||Australia|
|High Ropes & Low Ropes Instructor & Coach||Adventure Training Systems||Australia|
|2016||Moschakis, N. D., Jerram, C. & Loftus, J. (2016). Voluntary financial reporting strategies of South Australian independent schools. Third Sector Review, 22, 1, 25-48.|
|2015||Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. & Jerram, C. (2015). The design of phishing studies: challenges for researchers. Computers and Security, 52, 194-206.
|2015||Santiago-Brown, I., Metcalfe, A., Jerram, C. & Collins, C. (2015). Sustainability assessment in wine-grape growing in the New World: economic, environmental, and social indicators for agricultural businesses. Sustainability, 7, 7, 8178-8204.
|2015||Parsons, K., Young, E., Butavicius, M., McCormac, A., Pattinson, M. & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9, 2, 117-129.
|2014||Santiago-Brown, I., Metcalfe, A., Jerram, C. & Collins, C. (2014). Transnational comparison of sustainability assessment programs for viticulture and a case-study on programs' engagement processes. Sustainability, 6, 4, 2031-2066.
|2014||Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. & Jerram, C. (2014). A study of information security awareness in Australian government organisations. Information Management and Computer Security, 22, 4, 334-345.
|2014||Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. & Jerram, C. (2014). Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Computers & Security, 42, 165-176.
|2014||Santiago-Brown, I., Jerram, C., Metcalfe, A. & Collins, C. (2014). What does sustainability mean? Knowledge gleaned from applying mixed methods research to wine grape growing. Journal of Mixed Methods Research, Online, 3, 1-20.
|2012||Pattinson, M., Jerram, C., Parsons, K., McCormac, A. & Butavicius, M. (2012). Why do some people manage phishing e-mails better than others?. Information Management & Computer Security, 20, 1, 18-28.
|2011||Troshani, I., Jerram, C. & Rao Hill, S. (2011). Exploring the public sector adoption of HRIS. Industrial Management & Data Systems, 111, 3-4, 470-488.
|2006||Jerram, C. (2006). Applying adult education principles to an undergraduate subject. In T. Herrington & J. Herringon (Eds.), Authentic Learning Environments in Higher Education (pp. 107-119). Hershey, PA: IGI Global.|
|2003||Cecez-Kecmanovic, D., Jerram, C. & Treleaven, L. (2003). A sensemaking view of knowledge in organisations: The insiders’ tale. In H. Hasan & M. Handzic (Eds.), Australian Studies in Knowledge Management Wollongong, NSW: University of Wollongong Press.|
|2016||Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., Calic, D. & Jerram, C. (2016). The information security awareness of bank employees.|
|2015||Pattinson, M., Butavicius, M., Parsons, K., McCormac, A. & Jerram, C. (2015). Examining attitudes toward information security behaviour using mixed methods. 9th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2015. Lesvos, Greece.|
|2014||Parsons, K., Mccormac, A., Pattinson, M., Butavicius, M. & Jerram, C. (2014). Using actions and intentions to evaluate categorical responses to phishing and genuine emails. 8th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2014. Plymouth, United Kingdom.|
|2013||Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. & Jerram, C. (2013). The development of the human aspects of information security questionnaire (HAIS-Q).|
|2013||Pattinson, M. & Jerram, C. (2013). A study of information systems risk perceptions at a local government organisation.|
|2013||Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. & Jerram, C. (2013). An analysis of information security vulnerabilities at three Australian government organisations.|
|2013||Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. & Jerram, C. (2013). Phishing for the truth: A scenario-based experiment of users’ behavioural response to emails. 28th IFIP TC11 International Information Security and Privacy Conference (IFIP SEC). L. Janczewski, H. Wolfe & S. Shenoi (Eds.) Auckland, NEW ZEALAND.|
|2011||Pattinson, M., Jerram, C., Parsons, K., McCormac, A. & Butavicius, M. (2011). Managing phishing emails: A scenario-based experiment.|
|2010||Pattinson, M. & Jerram, C. (2010). Examining end-user perceptions of information risks: an application of the Repertory Grid Technique. South African Information Security Multi-Conference. South Africa.|
|2010||Troshani, I., Jerram, C. & Gerrard, M. (2010). Exploring the organizational adoption of Human Resources Information Systems (HRIS) in the Australian public sector. Australasian Conference on Information Systems (ACIS). Brisbane.|
|2007||Jerram, C. (2007). Taking the pain out of GroupWork assignments. Higher Education Research and Development Society of Australasia. Conference (Adelaide, S.A.). Adelaide, South Australia.|
|2007||Jerram, C. (2007). To ‘cheat’ or not to ‘cheat’ – use of student-prepared notes (cheat sheets) in exams. Erga Conference (Sept. University of Adelaide, Aust.). Adelaide, South Australia.|
|2005||Jerram, C. (2005). Synthesising Sensemaking Approaches for Understanding Distributed Knowledge in Organisations. ACIS Socialising ITThinking About the People (Nov. 30 - Dec. 2 Sydney, Australia). Sydney, Australia.|
|2005||Jerram, C. (2005). Information systems rollout for a knowledge management initiative at the ABS. Australasian Conference on Information Systems. Sydney, Australia.|
|2004||Lewin, C. & Jerram, C. (2004). Creating Learning Communities: Using CMC Tools in Large Class Situations. Australasian Conference on Information Systems. Hobart, Tasmania.|
|2003||Jerram, C. & Lewin, C. (2003). The changing face of teaching: Using CMC tools for large group interaction. HERDSA Annual Conference (Christchurch, NZ). Christchurch, New Zealand.|
|2002||Jerram, C., Cecez-Kecmanovic, D., Treleaven, L. & Sykes, C. (2002). Email and Assumptions: a study in electronic (mis)understandings. Australasian Conference on Information Systems. Melbourne, Australia.|
|2002||Cecez-Kecmanovic, D. & Jerram, C. (2002). A Sense-Making Model of Knowledge Management in Organisations. European Conference on Information Systems. Gdansk, Poland.|
|2002||Jerram, C. (2002). Applying adult education principles to university teaching. Perth, WA.|
|2001||Cecez-Kecmanovic, D. & Jerram, C. (2001). Understanding Crisis from a Sense-Making Perspective: An IS Operation Change. Australian Conference on Information Systems, 2001 IS Odyssey: Where are we going in Cyberspace?. Coffs Harbour, NSW.|
|2010||Willison, J., Jerram, C., Hazel, S., Davidson, R. & Foley, B. (2010). 'Team Based Learning': students do read in advance and transform lectures into zones of analytical discussion. ERGA Conference. Adelaide, Australia.|
|2003||Cecez-Kecmanovic, D., Jerram, C., Treleaven, L. & Sykes, C. (2003). Knowledge in Organisations: a sensemaking view. Organizational Knowledge, Learning, and Capabilities. Conference. Barcelona, Spain.|
"Development of an Advanced Security Audit Tool" South Australian Collaboration Pathways Program, DFEEST (Department of Further Education, Employment, Science and Technology).
“Employee Awareness of Information Security” DST Group
“Employee Awareness of Information Security” DST Group
“Human Factors in Phishing_2” DST Group and the Department of Defence
“Human Factors in Phishing” DSTO and the Department of Defence
Cate's primary interest as an educator is in improving the quality of teaching, learning and assessment, regardless of the subject being taught.
Research Methods & Thesis Writing
Information and Cyber Security and Safety (Human Aspects)
Information Systems - management approach & perspective, and 'soft' skills
Tertiary & Adult Education
Research Students (Completed/Graduated)
- Santiago-Brown, Irina: 2014. Sustainability Assessment in Wine Grape Growing. (PhD thesis). [Dean's Commendation]
- Pattinson, Malcolm: 2012. An Examination of Information System Risk Perceptions Using the Repertory Grid Technique. (PhD thesis). [Dean's Commendation & nomination to ACPHIS Doctoral Medal]
- Moschakis, Nicole: 2010. The Motivations behind Voluntary Financial Disclosures by Independent Schools of South Australia: An Exploratory Study. (MBR Thesis).
Current Research Students
- Eglinton-Warner, Stephanie: Institutional Policy and Educational Practice: A Holistic Analysis of Policy Development, Implementation and its Impact on Teaching and Learning in Australian Universities
- Golsby, Mark: Student Global Mobility – An Investigation of Risk & Perceived Obligations of Safety
- Griffiths, Neil: Improving caecal health by removing or reducing antimicrobials in meat rabbit production: use of Specified Pathogen Free (SPF) rabbits to study the influence of diet on the caecum and its microbiota.
- Isaacson, David: An evidence-based framework for measuring and representing the effectiveness of e-learning
- Lewin, Claire: eLearning and management implementation of Blended Learning at Australian Business Schools (academic perceptions)
- McLean, Josie: Embedding sustainability into organisational DNA: a story of complexity
- Moschakis, Nicole: The impact of the Australian not-for-profit regulatory reforms on the reporting practices of charities
|2013 - ongoing||Higher Education Research Group Adelaide||Australia|
|2009 - ongoing||Team-Based Learning Collaborative|
|2007 - ongoing||Australasian Society for Computers in Learning in Tertiary Education||Australia|
|2005 - ongoing||Higher Education Research and Development Society of Australasia||Australia|
|2000 - ongoing||Association for Information Systems||United States|
|2000 - ongoing||Australasian Association for Information Systems|
|Date||Engagement Type||Partner Name|
|2013 - ongoing||Consultant||Confidential - (Information Security partnerships)|