Mark W. Patton
Senior Lecturer in Management Information Systems
Program Administrator, AZSecure Cybersecurity Program
McClelland Hall 430JJ
1130 E. Helen St.
P.O. Box 210108
Tucson, Arizona 85721-0108
Areas of Expertise
Agent-based systems
Cybersecurity and security informatics
Decision support systems for automated deception identification
Organizational modeling and simulation
Current Research
- Enterprise security management
- Information systems
- Management information systems
- Security informatics
Courses
- MIS 111 Computers and the Internetworked Society
- MIS 514 Information Technology Audit
- MIS 416 Information Security, Risk Mgmt., Disaster Recovery
- MIS 585 Strategic Management of Information Systems
- MIS 304 Using and Managing Information Systems
- MIS 513 Business Foundations for IT
- MIS 307 Business Data Communications
Publications and Working Papers
- Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
- Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
- Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
- Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
- Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
- Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
- M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
- Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
- Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
- Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
- Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.
Degree(s)
- PhD, University of Arizona, 2009
- MBA, University of Michigan, 1999
- BS in Mining Engineering, Montana Tech of the University of Montana, 1990
- BS in Computer Science, Montana Tech of the University of Montana, 1990