Dr Cate Jerram

Academic - Management Information Systems
Dr Cate Jerram
  Org Unit Business School Office
  Email cate.jerram@adelaide.edu.au
  Telephone +61 8 8313 4757
  Location Floor/Room 9 03 ,  Nexus 10 Tower ,   North Terrace

Cate is the Manager, Special Academic Projects, for the Faculty of the Professions, and a member of the faculty's Centre for Academic Support & Innovation, contributing to application of the Faculty's and the University's Learning & Teaching strategy. Previously, Cate was the Stephen Cole the Elder Fellow for the Professions. Cate is also the designer, author and moderator of the Faculty of the Professions' Pedagogical Possibilities website and blog.

Cate is Director of the Information Management & Systems Research (IMSR) team, and co-leader of the research collaboration Human Aspects of Cyber Security (HACS) with co-researchers in the Defence Science and Technology (DST) Group (formerly DSTO). The HACS team's tool the HAIS-Q has been a well-received contribution to 21st century cyber security efforts. She is also an executive and founding member of the university's interfaculty and interdepartmental Smart and Safe Cities initiative.

Cate is currently developing a number of undergraduate and postgraduate programs and courses in both Information Management and Systems, and in Cyber Security. The Business School will be offering the first of these in 2017.

Cate designed and is Course Coordinator for the Qualitative Methods course for Higher Degree Research students and the Business Research Methods course for all postgraduate students in the Business School; and is also the primary educator in the use of NVivo to support research for the University of Adelaide and the Adelaide Graduate Centre. 

Cate has a dual disciplinary background in Information Systems and in Adult Education. From 2007 to 2012, she was Course Coordinator for the large first year course (IS-1) in Management Information Systems in which she used innovative teaching design combining Gamification and Flipped Classroom (particularly Team Based Learning). 

Prior to coming to Adelaide, she conducted Information Systems and Tertiary Education research with School of Information Systems, Technology and Management at the University of New South Wales, and the School of Management, UWS; and taught in Commerce / Management Information Systems and in ECommerce; EBusiness; IT Information Systems; Education; and Social Psychology; at University of Western Sydney, University of New South Wales and University of Technology Sydney.

Cate spent (carefully unspecified) years in Performing Arts  and in Management in Ministry in Australia, NZ, USA, Canada, UK and Germany before coming to academia.

PhD (Sensemaking; Information Systems; Knowledge Management; Organisational Change Management)
Bachelor Education (Hons) (Use of Drama for Education)
Bachelor Adult Education
Certificate IV in Assessment & Workplace Training
Certificate IV in Small Business Management
Adventure Training Systems High Ropes & Low Ropes Trainer

Cate's primary interest as an educator is in improving the quality of teaching, learning and assessment, regardless of the subject being taught.

Research Methods & Thesis Writing

Information and Cyber Security and Safety (Human Aspects)

Information Systems - management approach & perspective, and 'soft' skills
Tertiary & Adult Education

Knowledge Management

Awards

2001  College of Law & Business (UWS) Award for Excellence in Individual Teaching

2010  University of Adelaide Business School: Scott Henderson Award for Excellence in Teaching

ISR & HACS - Humans and Cyber Security research partnerships and alliances

Cate is Director of the Information Systems Research (ISR) team. ISR is a network of Systems researchers in the Business School, engaged in seven areas of research concentration. The majority of Cate's research is with partnerships and alliances to target specific aspects of human cyber-security and cyber-safety. ISR’s most prolific work to date has been with the Human Aspects of Cyber Security (HACS) team.

HACS is an established partnership with researchers from the Human and Social Modelling and Analysis team, National Security & Intelligence, Surveillance and Reconnaissance Division (NSID), unit of the DST Group.  HACS' first client was the Department of Defence, researching human vulnerability to phishing. This research has expanded to incorporate broader understandings of the effect of human behaviour on organisational information and cyber security, and to work with other federal and state government organisations. ISR and HACS have received over $200,000 funding since commencing research into human aspects of cyber security in 2010.

Secondary partnerships currently being developed by ISR's Information & Cyber Security & Safety team include a partnership with researchers the School of Education to investigate cyber-security and cyber-safety for children, and another with researchers from Humanities & Social Sciences to explore issues of cyber-security and cyber-safety for senior citizens, the aging and elderly. Future partnerships will broaden the research to other sectors of society to ensure a broad-scale and global approach to an increasingly critical distributed global problem.

Grants and Funding

2014-2015

 $120,580 

"Development of an Advanced Security Audit Tool" South Australian Collaboration Pathways Program, DFEEST (Department of Further Education, Employment, Science and Technology).

2012

$   20,000

“Employee Awareness of Information Security” DST Group

2011

$   20,000

“Employee Awareness of Information Security” DST Group

2009

$   10,000

“Human Factors in Phishing_2” DST Group and the Department of Defence

2008

$   10,000

“Human Factors in Phishing” DSTO and the Department of Defence

 

Topics of Interest

Information Security and Cyber Security & Safety
Human factors in organisational information and cyber security

Human factors in personal and social information and cyber security and safety
Awareness and training issues in information and cyber security
The role of human behaviour in the management of information security
Social engineering tactics used by cyber-criminals
Human factors driving responses and susceptibility to social engineering
Trust and credibility aspects of website and email design and phishing

 

Management Information Systems, Human Resources Information Systems& Knowledge Management
Unique issues of MIS in Australian environment
Critical MIS Issues for Human Resources in Organisations
Payroll Systems & the unique issues of HRIS in Australian environment
Role of KM & KMIS in management of organisational change

Tertiary and Adult Education 
Flipped Classroom and Dynamic & Multi-Cultural Team Based Learning
ELearning & use of technology to support learning & teaching
Gamification and Authentic learning
Pedagogy and methodology of assessment for Thesis submission in Higher Degree Research
Applying adult education principles to tertiary education
Addressing learner needs (particularly: making assessment more relevant and reliable)
First year transition: laying foundations and embedding graduate attributes
First year transition: readiness of high school & articulating students for tertiary education

Management Information Systems Education & Employment
Employer & Industry needs in MIS graduates and implications for MIS education
Exploring reasons for critical need of management trained MIS graduates & employees
Marketing MIS industry & discipline as a future career
Blended learning & the role of MIS to facilitate education and learning

Research Students (Completed/Graduated)

  • Santiago-Brown, Irina: 2014. Sustainability Assessment in Wine Grape Growing. (PhD thesis). [Dean's Commendation]
  • Pattinson, Malcolm: 2012. An Examination of Information System Risk Perceptions Using the Repertory Grid Technique. (PhD thesis). [Dean's Commendation & nomination to ACPHIS Doctoral Medal]
  • Moschakis, Nicole: 2010. The Motivations behind Voluntary Financial Disclosures by Independent Schools of South Australia: An Exploratory Study. (MBR Thesis).

Current Research Students

  • Eglinton-Warner, Stephanie: Institutional Policy and Educational Practice: A Holistic Analysis of Policy Development, Implementation and its Impact on Teaching and Learning in Australian Universities
  • Golsby, Mark: Student Global Mobility –  An Investigation of Risk & Perceived Obligations of Safety
  • Griffiths, Neil: Improving caecal health by removing or reducing antimicrobials in meat rabbit production: use of Specified Pathogen Free (SPF) rabbits to study the influence of diet on the caecum and its microbiota.
  • Isaacson, David: An evidence-based framework for measuring and representing the effectiveness of e-learning
  • Lewin, Claire: eLearning and management implementation of Blended Learning at Australian Business Schools (academic perceptions)
  • McLean, Josie: Embedding sustainability into organisational DNA: a story of complexity
  • Moschakis, Nicole: The impact of the Australian not-for-profit regulatory reforms on the reporting practices of charities

Journals, Conferences & Proceedings

  • Pattinson, M; Butavicius, M; Parsons, K; McCormac, A;  Jerram, C.  2015.  (Eds: Steven Furnell & Nathan Clarke) Examining Attitudes toward Information Security Behaviour using Mixed Methods. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015). Centre for Security, Communicatios & Network Research, Plymouth University, UK. iSBN: 978-1-84102-388-5
  • Pattinson, M; Butavicius, M; Parsons, K; McCormac, A;  Calic, D; Jerram, C.  2015. Factors that Influence Information Security Behaviour: An Australian Web-based Study.  HCI International. Lecture Notes in Computer Science series, Volume 9190, Chapter 21. (Springer Computer Science).
  • Moschakis, N; Jerram, C; & Loftus, J.  (forthcoming) Voluntary Financial Reporting Strategies of South Australian Independent Schools. Third Sector Review. 
  • Santiago-Brown, I; Metcalfe, A; Jerram, C; & Collins, C.  (2015)  Sustainability assessment in wine grape growing: economic, environmental and social indicators for agricultural businesses.  Sustainability. (Sustainable Agriculture, Food and Wildlife). 7(7), 8178-8204; doi:10.3390/su7078178
  • Parsons, K.M., Young, E., Butavicius, M.A., McCormac, A., Pattinson, M.R. & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117-129.
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2015. The Design of Phishing Studies: Challenges for researchers. Computers & Security. online first 9 March 2015. doi:10.1016/j.cose.2015.02.008
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2014.  Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. in [Eds: Furnell, SM; Clarke, NL] Proceedings of the Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014).   Plymouth, UK.
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2014. A Study of Information Security Awareness in Australian Government Organisations. Information Management and Computer Security.
  • Santiago-Brown, I; Jerram, C; Metcalfe, A; & Collins, C.  2014.  What Does Sustainability Mean? Knowledge Gleaned from Applying Mixed Methods Research to Wine Grape Growing. Journal of Mixed Methods Research. (Online first, 19 May 2014)  doi: 10.1177/1558689814534919.
  • Santiago-Brown, I; Metcalfe, A; Jerram, C; & Collins, C.  2014.  Transnational Comparison of Sustainability Assessment Programs for Viticulture and a Case-Study on Programs’ Engagement Processes. Sustainability. (Sustainable Agriculture, Food and Wildlife). 6 (4), 2031-2066.   doi:10.3390/su6042031
  • Parsons, K; McCormac, A; Butavicius, M; Pattinson, M & Jerram, C.  2014. Determining Employee Awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) Computers and Security.  42 (2014) 165 - 176.   DOI: 10.1016/j.cose.2013.12.003.  
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2013.  The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q), Proceedings of the 24th Australasian Conference on Information Systems (ACIS), Melbourne, 4-6 December 2013.
  • Pattinson, M & Jerram, C.   2013.  A Study of Information System Risk Perceptions in a Local Government Organisation, Proceedings of the 24th Australasian Conference on Information Systems (ACIS), Melbourne, 4-6 December 2013.
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C. 2013  Information Security Awareness: An analysis of knowledge, attitude and behaviour, Proceedings of Oceania Control, Audit & Computer Security (CACS) 2013 conference, Adelaide, September 2013.
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2013. Phishing for the truth: A scenario-based experiment of users' behavioural response to emails. 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference. Auckland, New Zealand, 8-10 July 2013 (IFIP Advances in Information and Communication Technology series, volume 0405)
  • Parsons, K; McCormac, A; Pattinson, M; Butavicius, M & Jerram, C.  2013.  An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. Seventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2013) 8-10 May 2013 [European Information Security Multi-Conference (EISMC 2013)] Lisbon, Portugal
  • Pattinson, M; Jerram, C; Parsons, K; McCormac, A; Butavicius, M.  2012.  Why Do Some People Manage Phishing Emails Better Than Others?  Information Management and Computer Security. Vol 20, No 1.   ISSN: 0968-5227.
  • Pattinson, M; Jerram, C; Parsons, K; McCormac, A; Butavicius, M.  2011 Managing Phishing Emails: A Scenario-Based Experiment. in [Eds: Furnell, SM; Clarke, NL] Proceedings of the Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2011) pp74-85.   Plymouth, UK.
  • Troshani, I,  Jerram, C & Rao Hill, S  2010, Exploring the Public Sector Adoption of HRIS. Industrial Management & Data Systems, Vol 111, No. 3, pp 470-488
  • Parsons, K, McCormac, A, Butavicius, M, Pattinson, M & Jerram, C.  2010. Phishing for Answers: A Scenario-Based Experiment Assessing the Ability to Identify Fraudulent Email Messages. DSTO Report (Confidential), Command, Control, Communications & Intelligence Division, Defence Science and Technology Organisation.
  • Pattinson, MR & Jerram, C.  2010, Examining End-user Perceptions of Information Risks: An Application of the Repertory Grid Technique. Eds: NL Clarke, SM Furnell & RvonSolms, Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May 2010.
  • Troshani, I., Jerram, C., Gerrard, M. 2010 Exploring the organizational adoption of Human Resources Information Systems (HRIS) in the Australian public sector. ACIS 2010 Proceedings - 21st Australasian Conference on Information Systems.
  • Willison J, Jerram C, Davidson, R. & Foley, B. (2010) ‘Team Based Learning’: students do read in advance and transform lectures into zones of analytical discussion, In Proceedings of the 5th ERGA Conference (Education Research Group of Adelaide), Adelaide, 23-24 Sept.
  • Jerram, C 2009, Trialling TBL in Large Classes: Success and Costs. ERGA: Feedback and Flexible Learning, 24-25 Sept 2009, Adelaide.
  • Jerram, C 2008, Increasing Relevance for Decreasing Student De-Motivation in a Mandatory Course: how to research it? ERGA, Sept 2008, Adelaide.
  • Jerram, C 2007, Taking the pain out of Groupwork assignments. Higher Education Research and Development Society of Australasia, 8-11 July, 2007, Adelaide, SA.
  • Jerram, C 2007, To Cheat or Not to Cheat – use of student-prepared notes (cheat sheets) in exams. ERGA, 19-20 Sept 2007, Adelaide.
  • Jerram, C 2005, Synthesising Sensemaking Approaches for Understanding Distributed Knowledge in Organisations, ACIS 2005, Sydney.
  • Jerram, C 2005, Information Systems Rollout for a Knowledge Management Initiative at the ABS, ACIS 2005, Sydney.
  • Lewin, C & Jerram, C 2004, Creating Learning Communities: Using CMC Tools in Large Class Situations, 15th Australasian Conference on Information Systems, Hobart, Tasmania, 1-3 December 2004.
  • Caddy, I., Jerram, C. and Lewin, C., 2004 Interest in ICT and Gender – A Current Australian Perspective, International Conference on Gender and Gender Research in the Information Society, 6 - 8 September 2004 Cadiz, Spain.
  • Lewin, C & Jerram, C 2003, The Changing Face of Teaching: Using CMC Tools for Large Group Interaction, HERDSA 2003, NZ.
  • Jerram, C, Treleaven, L & Cecez-Kecmanovic, D 2003, “Give Me Back My Word Processor”: Making sense of a KM Strategy, ACIS, 2003, Perth WA.
  • Jerram, C; Treleaven, L; and Cecez-Kecmanovic, D, "Knowledge Sharing as a KM Strategy: Panacea or Tyranny" (2003). ACIS 2003 Proceedings. Paper 48. http://aisel.aisnet.org/acis2003/48
  • Cecez-Kecmanovic, D, Jerram, C, Treleaven, L, & Sykes, C 2003, Knowledge in Organisations: a sensemaking view, Organisational Knowledge & Learning Conference 2003, Barcelona, Spain.
  • Lewin, C & Jerram, C 2003, Creating Learning Communities. IERA 2003, NZ.
  • Lewin,C., Jerram,C., and Chambers P. 2003, Old Dogs, New Tricks: Development of a Distance Education Learning Tool, IERA conference, Jan 29-31 - 2003. Christchurch New Zealand.
  • Jerram, C 2002, Applying Adult Education Principles to University Teaching, Higher Education Research and Development Society of Australasia: Perth, WA.
  • Cecez-Kecmanovic, D & Jerram, C 2002, A Sense-Making Model of Knowledge Management in Organisations, European Conference on Information Systems: Gdansk, Poland.
  • Jerram, C, Cecez-Kecmanovic, D, Treleaven, L & Sykes, C 2002, ‘Email and Assumptions: a study in electronic (mis)understandings’ in A Wenn, M McGrath & F Burstein (eds), Enabling Organisations and Society through Information Systems, Proceedings of the Thirteenth Australasian Conference on Information Systems ACIS 2002, Melbourne, Australia, 2, pp. 509-521.
  • Treleaven, L, Cecez-Kecmanovic, D & Jerram, C 2002, A Post-structural Reading of Knowledge Sharing in a University Restructuring Process, Organisational Knowledge And Learning Conference: Athens, Greece.
  • Cecez-Kecmanovic, D & Jerram, C 2001, Understanding Crisis from a Sense-Making Perspective: An IS Operation Change, Australian Conference on Information Systems: Coffs Harbour, NSW.

Books / Book Chapters

  • Jerram, C 2006, Applying adult education principles to an undergraduate subject, in Tony Herrington, Jan Herrington (Ed.) Authentic Learning Environments in Higher Education. Chapter 9 - Pages 107-119, IGI Global, Hershey PA, USA. DOI: 10.4018/978-1-59140-594-8.ch009
  • Cecez-Kecmanovic, D, Jerram, C & Treleaven, L 2003, A Sensemaking View of Knowledge in Organisations: The Insiders’ Tale, in (H Hasan & M Handzic, Eds) Australian Studies in Knowledge Management, University of Wollongong Press.

Theses

  • Jerram, C 2004, A Sensemaking Approach to Knowledge Management in Organisations for Information Systems Change, UWS.
  • Jerram, C 1999, Use of Drama as a Pedagogical Tool, UWS.
  • Trade Journals

    • Jerram, C 2007, Is VET Training Real Education? Back to Base, NSWFB & RFS (ESLD), Sydney. 2.2.Jun 07
    • Jerram, C 2006, Your Organization and You, Back to Base, NSWFB & RFS (ESLD), Sydney. 1.1.Mar 06
    • Jerram, C 2006, Those Dangerous Decisions, Back to Base, NSWFB & RFS (ESLD), Sydney, 1.4 Dec 06.

     

    AAIS (Australasian Assoc for Information Systems)
    AIS (Assoc for Information Systems)
    ASCILITE (Computers in Learning in Tertiary Education)
    HERDSA (Higher Education & Research Development Society of Australasia)
    HERGA (Higher Education Research Group of Adelaide)
    IFIP Working Group 8.2 (Information Systems and Organizations)
    SRITEC (Sydney Regional Information Technology Educators' Conventicle)
    TBLC (Team Based Learning Collaborative)

     

    CategoriesEducation, Information Management
    ExpertiseInformation Security; InfoSec; Cyber Security; CyberSec; Human Aspects of Information Security; Human Aspects of Cyber Security; Cyber Safety; Pedagogy; Andragogy; Small Groups; Team Learning; Team Based Learning;
    NotesCate is Chief Investigator of the Human Aspects of Information Systems Research (ISR) group; and of the Human Aspects of Cyber Security (HACS) research team in partnership with NSID personnel from Defence Science and Technology Organisation (DSTO). HACS work with the Department of Defence. http://business.adelaide.edu.au/research/specialisations/human-aspects-info-security-safety/

    The information in this directory is provided to support the academic, administrative and business activities of the University of Adelaide. To facilitate these activities, entries in the University Phone Directory are not limited to University employees. The use of information provided here for any other purpose, including the sending of unsolicited commercial material via email or any other electronic format, is strictly prohibited. The University reserves the right to recover all costs incurred in the event of breach of this policy.

    Entry last updated: Wednesday, 11 Jan 2017

    To link to this page, please use the following URL:  http://www.adelaide.edu.au/directory/cate.jerram