Mark W Patton

Lecturer in Management Information Systems
Program Administrator, AZSecure Cybersecurity Fellowship Program

Degrees

Ph.D., University of Arizona, 2009
MBA, University of Michigan, 1999
BS in Mining Engineering, Montana Tech of the University of Montana, 1990
BS in Computer Science, Montana Tech of the University of Montana, 1990

Areas of Expertise

  • Cybersecurity & Security Informatics
  • Decision support systems for automated deception identification
  • Organizational modeling and simulation
  • Agent based systems

Current Research

Courses

MIS 111 Computers and the Internetworked Society
MIS 514 Information Technology Audit
MIS 416 Information Security, Risk Mgmt., Disaster Recovery
MIS 585 Strategic Management of Information Systems
MIS 304 Using and Managing Information Systems
MIS 513 Business Foundations for IT
MIS 307 Business Data Communications

Publications and Working Papers

  • Rohrmann, R., Patton, M. W., & Chen, H. C. (2016). Anonymous Port Scanning Performing Network Reconnaissance Through Tor. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 217-217.
  • Samtani, S., Yu, S., Zhu, H. Y., Patton, M., & Chen, H. C. (2016). Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 25-30.
  • Ercolani, V. J., Patton, M. W., & Chen, H. C. (2016). Shodan Visualized. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 193-195.
  • Grisham, J., Barreras, C., Afarin, C., Patton, M., & Chen, H. C. (2016). Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 219-219.
  • Jicha, A., Patton, M., & Chen, H. C. (2016). SCADA Honeypots An In-depth Analysis of Conpot. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 196-198.
  •  Jicha, R., Patton, M. W., & Chen, H. C. (2016). Identifying Devices Across the IPv4 Address Space. Ieee International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, 199-201.
  • M. Patton, E. Gross, R. Chinn, S. Forbis, L.Walker, H. Chen, “Uninvited connections: A study of vulnerable devices on the Internet of Things,” IEEE Joint Intelligence and Security Informatics Conference, 2014.
  • Nunamaker, J. E., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent-Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-48. doi:10.2753/mis0742-1222280102
  • Patton, M. W.; Nunamaker, J. F.; Neumann; W. T.; Burgoon, J. K. (2010) “Developing a Prototype Kiosk for Delivering Deception Detection Decision Support” in Hawaii International Conference on System Science(HICSS'10) Hawaii 2010.
  • Patton, M. W. (2009) “Automated Assessment of Truth and Deception in a Rapid Assessment Environment using Kiosk Based Avatars” Dissertation
  • Patton, M. W.; Patton, W. E., and Dalton, L. S. (1994) “StockTracker”, Glencoe-McGraw Hill.