Mark W. Patton
Mark W. Patton
Senior Lecturer in Management Information Systems
Program Administrator, AZSecure Cybersecurity Scholarship Program
Image

McClelland Hall 430JJ
1130 E. Helen St.
P.O. Box 210108
Tucson, Arizona 85721-0108
Areas of Expertise
Cybersecurity and security informatics
Decision support systems for automated deception identification
Organizational modeling and simulation
Agent-based systems
Current Research
- Enterprise security management
- Information systems
- Management information systems
- Security informatics
Courses
- MIS 111 Computers and the Internetworked Society
- MIS 514 Information Technology Audit
- MIS 416 Information Security, Risk Mgmt., Disaster Recovery
- MIS 585 Strategic Management of Information Systems
- MIS 304 Using and Managing Information Systems
- MIS 513 Business Foundations for IT
- MIS 307 Business Data Communications
Publications and Working Papers
- Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
- Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
- Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
- Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
- Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
- Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
- M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
- Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
- Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
- Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
- Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.
Degree(s)
- PhD, University of Arizona, 2009
- MBA, University of Michigan, 1999
- BS in Mining Engineering, Montana Tech of the University of Montana, 1990
- BS in Computer Science, Montana Tech of the University of Montana, 1990