Mark W. Patton

Senior Lecturer in Management Information Systems
Program Administrator, AZSecure Cybersecurity Scholarship Program
Mark Patton

McClelland Hall 430JJ
1130 E. Helen St.
P.O. Box 210108
Tucson, Arizona 85721-0108

Areas of Expertise

Cybersecurity and security informatics
Decision support systems for automated deception identification
Organizational modeling and simulation
Agent-based systems

Current Research

  • Enterprise security management
  • Information systems
  • Management information systems
  • Security informatics

Courses

  • MIS 111 Computers and the Internetworked Society
  • MIS 514 Information Technology Audit
  • MIS 416 Information Security, Risk Mgmt., Disaster Recovery
  • MIS 585 Strategic Management of Information Systems
  • MIS 304 Using and Managing Information Systems
  • MIS 513 Business Foundations for IT
  • MIS 307 Business Data Communications

Publications and Working Papers

  • Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
  • Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
  • Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
  • Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
  • Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
  •  Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
  • M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
  • Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
  • Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
  • Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
  • Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.

Degree(s)

  • PhD, University of Arizona, 2009
  • MBA, University of Michigan, 1999
  • BS in Mining Engineering, Montana Tech of the University of Montana, 1990
  • BS in Computer Science, Montana Tech of the University of Montana, 1990