Mark W. Patton
Senior Lecturer in Management Information Systems
Program Administrator, AZSecure Cybersecurity Scholarship Program

McClelland Hall 430JJ
1130 E. Helen St.
P.O. Box 210108
Tucson, Arizona 85721-0108
Areas of Expertise
- Cybersecurity and security informatics
- Decision support systems for automated deception identification
- Organizational modeling and simulation
- Agent-based systems
Degrees
PhD, University of Arizona, 2009
MBA, University of Michigan, 1999
BS in Mining Engineering, Montana Tech of the University of Montana, 1990
BS in Computer Science, Montana Tech of the University of Montana, 1990
Current Research
- Enterprise security management
- Information systems
- Management information systems
- Security informatics
Courses
- MIS 111 Computers and the Internetworked Society
- MIS 514 Information Technology Audit
- MIS 416 Information Security, Risk Mgmt., Disaster Recovery
- MIS 585 Strategic Management of Information Systems
- MIS 304 Using and Managing Information Systems
- MIS 513 Business Foundations for IT
- MIS 307 Business Data Communications
Publications and Working Papers
- Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
- Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
- Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
- Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
- Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
- Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
- M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
- Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
- Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
- Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
- Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.