Mark W. Patton

Senior Lecturer in Management Information Systems

Program Administrator, AZSecure Cybersecurity Fellowship Program

Mark Patton

McClelland Hall 430JJ
1130 E. Helen St.
P.O. Box 210108
Tucson, Arizona 85721-0108

Areas of Expertise

  • Cybersecurity and security informatics
  • Decision support systems for automated deception identification
  • Organizational modeling and simulation
  • Agent-based systems

Degrees

PhD, University of Arizona, 2009

MBA, University of Michigan, 1999

BS in Mining Engineering, Montana Tech of the University of Montana, 1990

BS in Computer Science, Montana Tech of the University of Montana, 1990

Current Research

  • Enterprise security management
  • Information systems
  • Management information systems
  • Security informatics

Courses

  • MIS 111 Computers and the Internetworked Society
  • MIS 514 Information Technology Audit
  • MIS 416 Information Security, Risk Mgmt., Disaster Recovery
  • MIS 585 Strategic Management of Information Systems
  • MIS 304 Using and Managing Information Systems
  • MIS 513 Business Foundations for IT
  • MIS 307 Business Data Communications

Publications and Working Papers

  • Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
  • Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
  • Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
  • Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
  • Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
  •  Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
  • M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
  • Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
  • Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
  • Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
  • Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.