Prof Matthew Warren

STAFF PROFILE

Position

Professor of Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Bachelor of Arts (Honours), University of Sunderland, 1992
Doctor of Philosophy, University of Plymouth, 1996

Biography summary

Professor Warren is a Professor of Cyber Security at Deakin University, Australia. Professor Warren is a Fellow of the Australian Computer Society.

Professor Warren is a researcher in the areas of Cyber Security and Computer Ethics. He has authored and co-authored over 300 books, book chapters, journal papers and conference papers. He has received numerous grants and awards from national and international funding bodies, such as: Australian Research Council (ARC); Engineering Physical Sciences Research Council (EPSRC) in the United Kingdom; National Research Foundation (NRF) in South Africa and the European Union. Professor Warren regularly reviews research proposals submitted to the Australian Research Council and the South African National Research Foundation.

Professor Warren gained his PhD in Information Security Risk Analysis from the University of Plymouth, United Kingdom and he has taught in Australia, Finland, Hong Kong and the United Kingdom.

Knowledge areas

Professor Warren is a researcher in the areas of Cyber Security and Computer Ethics.

Expertise

Professor Warren has gained international recognition for his scholarly work in the areas of Information Security, Computer Ethics and Cyber Security (including Critical Infrastructure Protection, Cyber Warfare and SCADA Security). Professor Warren aims to undertake research that will help to safeguard Australia and the greater community.

Professional activities

Professor Warren is a Fellow of the Australian Computer Society and a member of the Australian Institute of Professional Intelligence Officers.

Professor Warren currently has the following  industry and professional roles:

  • Former academic observer on the SCADA Community of Interest, Department of Broadband, Communications & the Digital Economy;
  • Member of the Australian Computer Society – Computer Ethics Sub Committee;
  • Member of the Australian Computer Society – Information Security Specialist Advisory Group;
  • Coordinator of the Australian Computer Society – Victoria – Special Interest Group on Information Security.


Professor Warren has previously undertaken the following industry and professional roles:

  • Member of the Geelong ICT Cluster Steering Committee;
  • Member of the Australian Computer Society – Cyber Security Task Force;
  • Member of the Australian Computer Society – Victoria State Board;
  • Member of the Australian Computer Society – Higher Education Committee;
  • Chair of the IFIP TC11 – Working Group 11.1- Security Management;
  • Member of the IFIP TC11 Council;
  • Member of the NOIE (National Office of Information Economy) advisory group on IT Security Education;
  • Director of the Australian Institute of Computer Ethics;
  • Member of the Australian Standards Committee – IT/12/4 Security Techniques;
  • Member of the BS7799 International Advisory Committee.

Media appearances

Professor Warren has been quoted by the IT news media and general news media (TV, radio, print and online) in Australia, Brunei, Denmark, France, New Zealand, The Peoples Republic of China, South Africa, Singapore, Sweden, UK, USA and by the US Government in areas relating to Information Security, Computer Ethics and Cyber Security.

Notable media outlets include: Australian Broadcasting Company, Australian Financial Review, British Broadcasting Company, CNNfn (Online), Sunday Telegraph (UK), Sydney Morning Herald, The Age, The Australian, The Brunei Times, Radio New Zealand, Yahoo and Xinhua News Agency.

Publications

Filter by

2017

Social media as an information system : improving the technological agility

V Senadheera, M Warren, S Leitch

(2017), Vol. 11, pp. 512-533, Enterprise information systems, Abingdon, Eng., C1

journal
2016

Security and privacy concerns for Australian SMEs cloud adoption: empirical study of metropolitan vs regional SMEs

I Senarathna, G Yeoh, M Warren, S Salzman

(2016), Vol. 20, pp. 1-20, Australasian journal of information systems, Canberra, A.C.T., C1

journal

Understanding the use of social media by organisations for crisis communication

M Roshan Kokabha, M Warren, R Carr

(2016), Vol. 63, pp. 350-361, Computers in human behavior, Amsterdam, The Netherlands, C1

journal

The Syrian electronic army - a hacktivist group

M Warren, S Leitch

(2016), Vol. 14, pp. 200-212, Journal of information, communication and ethics in society, Bingley, Eng., C1

journal

Ethics and ICT: why all the fuss?

M Warren, R Lucas

(2016), Vol. 14, pp. 167-169, Journal of information, communication and ethics in society, Bingley, Eng., C1

journal

Unauthorised disclosure of organisational information through social media : a policy perspective

D Pallegedara, M Warren

(2016), pp. 86-93, IDIMC 2016: Exploring our digital shadow : from data to intelligence, Loughborough, England, E1

conference
2015

A conceptual model for cloud computing adoption by SMEs in Australia

I Senarathna, M Warren, W Yeoh, S Salzman

(2015), pp. 100-128, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations, Hershey PA, USA, B1

chapter

Applying classification controls to internet content in Australia

S Leitch, M Warren

(2015), Vol. 13, pp. 82-97, Journal of information, communication and ethics in society, London, Eng., C1

journal

Cyber security and protection of ICS systems: An australian example

M Warren, S Leitch

(2015), Vol. 78, pp. 215-228, Cyber security : analytics, technology and automation, Berlin, Germany, B1

chapter

Understanding stakeholders' expectations of organisational crisis communication by social media

M Roshan Kokabha, M Warren, R Carr

(2015), pp. 382-389, ECSM 2015 : Proceedings of the 2nd European Conference on Social Media 2015, Porto, Portugal, E1-1

conference
2014

The influence of organisation culture on e-commerce adoption

I Senarathna, M Warren, W Yeoh, S Salzman

(2014), Vol. 114, pp. 1007-1021, Industrial management & data systems, Bingley, Eng., C1

journal

Evaluating Australian social media policies in relation to the issue of information disclosure

D Pallegedara, M Warren

(2014), pp. 1-10, Proceedings of the 25th Australian Conference on Information Systems, ACIS 2014, Auckland, N. Z., E1

conference
2013

An empirical study of the influence of different organisation cultures on e-commerce adoption maturity

I Senarathna, M Warren, W Yeoh, S Salzman

(2013), pp. 1-10, ACIS 2013 : Proceedings of the Information Systems 2013 Australasian Conference, Melbourne, Vic., E1

conference

WikiLeaks and Information Disclosure: The Bradley Manning Case

M Warren, S Leitch, I Rosewall

(2013), Vol. 21, pp. 3-16, The Journal of the Australian Institute of Professional Intelligence Officers, Canberra, ACT, C1

journal

Understanding the role of social media in incident crisis communication

M Roshan, M Warren, R Carr

(2013), pp. 1-9, Proceedings of the 24th Australasian Conference on Information Systems, ACIS 2013, Melbourne, Vic., E1

conference
2012

New media and web 2.0 : an Irish republican example

M Warren, S Leitch

(2012), Vol. 11, pp. 1-11, Journal of information warfare, Mt. Eliza, Vic., C1

journal

Safeguarding Australia from cyber-terrorism : a SCADA risk framework

C Beggs, M Warren

(2012), pp. 369-384, Strategic and practical approaches for information security governance, Hershey, Pa., B1

chapter

Loss of data : reflective case studies

I Rosewall, M Warren

(2012), pp. 405-420, Strategic and practical approaches for information security governance, Hershey, Pa., B1

chapter
2011

The ethics of security of personal information upon facebook

S Leitch, M Warren

(2011), pp. 46-65, ICT ethics and security in the 21st century : new developments and applications, Hershey, Pa., B1

chapter

Critical infrastructure protection : an ethical choice

G Pye, M Warren, W Hutchinson

(2011), pp. 214-230, ICT ethics and security in the 21st century : new developments and applications, Hershey Pa., B1

chapter

Modelling relational aspects of critical infrastructure systems

G Pye, M Warren

(2011), pp. 202-210, ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Tallinn, Estonia, E1

conference

Australian national critical infrastructure protection : a case study

M Warren, S Leitch

(2011), pp. 275-280, ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Tallinn,, Estonia, E1

conference

Analysis and modelling of critical infrastructure systems

G Pye, M Warren

(2011), ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Tallinn, Estonia, E1

conference

Social networking and teaching : an Australian case study

S Leitch, M Warren

(2011), pp. 315-326, InSITE 2011 : Proceedings of Informing Science & IT Education Conference, Novi Sad, Serbia, E1

conference

A study into how Australian banks use social media

V Senadheera, M Warren, S Leitch

(2011), pp. 1-12, PACIS 2011 : Proceedings of the 15th Pacific Asia Conference on Information Systems, Brisbane, Qld., E1

conference

Corporate governance and information technology : findings from an exploratory survey of Australian organizations

P Couchman, A Zutshi, C Wilkin, M Warren, A Sohal

(2011), pp. 1-19, ANZAM 2011 : 25th Annual Australian And New Zealand Academy of Management conference : the future of work and organisations, Wellington, New Zealand, E1

conference

Meeting the challenge of information system security : an exploratory study of the communication of IS security management capabilities

P Couchman, C Wilkin, A Zutshi, A Sohal, M Warren

(2011), BAM 2011 : Building and sustaining high performance organisations in a challenging environment, Birmingham, U. K., E1

conference

Australia and the question of internet control

M Warren, S Leitch

(2011), pp. 488-493, ETHICOMP 2011 : The Social Impact of Social Computing : Proceedings of the 12th International Conference, Sheffield, U. K., E1

conference

Attack vectors against social networking systems : the Facebook example

M Warren, S Leitch, I Rosewall

(2011), Proceedings of The 9th Australian Information Security Management Conference, Perth, W. A., E1

conference

Protection of Australia in the cyber age

M Warren, S Leitch

(2011), Vol. 1, pp. 35-40, International journal of cyber warfare and terrorism, Hershey, Pa., C1

journal

Does traditional security risk assessment have a future in information security?

A Ruighaver, M Warren, A Ahmad

(2011), Vol. 10, pp. 16-28, Journal of information warfare, Mt. Eliza, Vic., C1-1

journal

Towards the human information security firewall

R Solms, M Warren

(2011), Vol. 1, pp. 10-17, International Journal of Cyber Warfare and Terrorism (IJCWT), Hershey, Pa., C1-1

journal
2010

An applied framework for modelling a critical infrastructure system incident

G Pye, M Warren

(2010), pp. 245-260, ECIW 2010 : Proceedings of the 8th European Conference on Information Warfare and Security, Thessaloniki, Greece, E1

conference

Ethics : the past, present and future of socio-tehnical systems design

S Leitch, M Warren

(2010), pp. 189-197, History of computing : learning form the past, Germany, B1

chapter

Ethical decision making : improving the quality of acceptable use policies

A Ruighaver, S Maynard, M Warren

(2010), Vol. 29, pp. 731-736, Computers & security, Oxon, England, C1

journal

Micro-blogging in the workplace

C Lee, M Warren

(2010), pp. 42-48, Proceedings of the 8th Australian Information Security Management Conference, Perth, W.A., E1

conference

Wikileaks : the truth or not?

I Rosewall, M Warren

(2010), pp. 26-29, Proceedings of The 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Information security disclosure : a Victorian case study

I Rosewall, M Warren

(2010), pp. 112-118, Proceedings of the 8th Australian Information Security Management Conference, Perth, W.A., E1

conference

Australian critical infrastructure protection : a case of two tales

M Warren, G Pye, W Hutchinson

(2010), pp. 30-36, SECAU 2010 : Proceedings of the 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Critical supply chain systems and critical infrastructure protection

M Warren, S Leitch

(2010), Vol. 2, pp. 107-117, International journal of logistics economics and globalisation, Onley, England, C1

journal

Development of a supply chain management security risk management method : a conceptual model

M Warren, S Leitch

(2010), pp. 327-333, ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, Thessaloniki, Greece, E1

conference

Influence operations and behavioural change

W Hutchinson, M Warren

(2010), pp. 116-119, ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, Thessaloniki, Greece, E1

conference

Enabling information security culture : influences and challenges for Australian SMEs

S Dojkovski, S Lichtenstein, M Warren

(2010), ACIS 2010 : Proceedings of the 21st Australasian Conference on Information Systems, Brisbane, Qld., E1

conference

ICT corporate governance : a case study of a not-for-profit community healthcare organisation

A Zutshi, C Wilkin, P Couchman, A Sohal, G Wood, M Warren

(2010), ANZAM 2010 : Refereed Papers of the 24th Annual Australian and New Zealand Academy of Management Conference, Adelaide, S.Aust., E1

conference
2009

Impact of ICT governance within Australian companies

B O'Donohue, G Pye, M Warren

(2009), pp. 163-177, Information technology governance and service management : frameworks and adaptations, Hershey, Pa., B1

chapter

Security analysis and modelling framework for critical infrastructure systems

G Pye, M Warren

(2009), pp. 198-207, ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, Braga, Portugal, E1

conference

An emergent security risk : critical infrastructures and information warfare

G Pye, M Warren

(2009), Vol. 8, pp. 14-26, Journal of information warfare, Melbourne, Vic., C1

journal

Information security management curriculum development : an Australian example

M Warren, S Leitch

(2009), pp. 25-33, INSITE 2009 : Proceedings of the 2009 Informing Science + Information Technology Education Conference, Macon, Georgia, E1

conference

Supply chain management security : the weak link of Australian critical infrastructure protection

M Warren, S Leitch

(2009), ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, Braga, Portugal, E1

conference

Security Issue challenging facebook

S Leitch, M Warren

(2009), pp. 137-142, Proceedings of the 7th Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Information security disclosure : a case study

I Rosewall, M Warren

(2009), pp. 39-47, Proceedings of 7th Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Security as an element in environmental assessment and decision making

W Hutchinson, M Warren

(2009), pp. 1-11, ANZSEE 2009 : Green milage in the global meltdown: an ecological economics way forward. Proceedings of the conference of the Australia New Zealand Society for Ecological Economics, Darwin, Northern Terroritory, E1

conference

Hacker taggers: a new type of hackers

M Warren, S Leitch

(2009), pp. 1-7, Information systems frontiers, Amsterdam, The Netherlands, C1

journal

Multi-tier phishing email classification with an impact of classifier rescheduling

M Islam, J Abawajy, M Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference
2008

Terrorism and the internet

M Warren

(2008), pp. 42-49, Cyber warfare and cyber terrorism, Hershey, Pa., B1

chapter

Hackers and cyber terrorists

M Warren

(2008), pp. 304-311, Encyclopedia of information ethics and security, Hershey, PA, B1

chapter

Security protection for critical infrastructure

M Warren, T Busuttil

(2008), pp. 609-615, Encyclopedia of information ethics and security, Hershey, Pa., B1

chapter

Attention IT managers : why you can't trust security surveys

M Warren, S Leitch

(2008), Vol. 1, pp. 32-37, Deakin business review, Geelong, Vic., C1

journal

Analysing online teaching and learning systems using MEAD

S Leitch, M Warren

(2008), Vol. 4, pp. 259-266, Interdisciplinary journal of knowledge and learning objects, Santa Rosa, Calif., C1

journal

Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for Australia

C Beggs, M Warren

(2008), Vol. 7, pp. 24-35, Journal of information warfare, Mt. Eliza, Vic., C1

journal

Considerations for modelling critical infrastructure systems

G Pye, M Warren

(2008), pp. 185-196, ECIW 2008 : Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, England, E1

conference

Using the sociotechnical approach in global software developments : Is the theory relevant today?

M Crofts, B Fraunholz, M Warren

(2008), pp. 250-260, ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand, E1

conference

Designing on-line learning systems using participation

S Leitch, M Warren

(2008), pp. 1-8, ANZSYS 2008 : Proceedings of the 14th international Australia and New Zealand Systems Conference 2008, Perth, Western Australia, E1

conference

Designing ethical systems for online systems

S Leitch, M Warren

(2008), pp. 130-136, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Melbourne, Vic., E1

conference

Young people and the internet : what is the solution?

S Leitch, M Warren

(2008), pp. 137-142, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Melbourne, Vic., E1

conference

Visualisation of critical infrastructure failure

W Wilde, M Warren

(2008), pp. 48-63, Proceedings of the 9th Australian Information Warfare and Security Conference 2008, Perth, Western Australia, E1

conference

IT security certifications : stakeholder evaluation and selection

N Tate, S Lichtenstein, M Warren

(2008), pp. 991-1001, ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand, E1

conference
2007

Modelling critical infrastructure systems

G Pye, M Warren

(2007), Vol. 6, pp. 41-53, Journal of information warfare, Australia, C1

journal

A model and framework for online security benchmarking

G Pye, M Warren

(2007), Vol. 31, pp. 209-215, Informatica : journal of computing and informatics, Ljubljana, Jugoslavija, C1

journal

E-business security benchmarking : a model and framework

G Pye, M Warren

(2007), Vol. 1, pp. 378-390, International journal of information and computer security, Olney, N.S.W., C1

journal

Benchmarks for critical infrastructure systems modelling

G Pye, M Warren

(2007), pp. 207-216, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, England, E1

conference

Locating risk through modelling critical infrastructure systems

G Pye, M Warren

(2007), pp. 87-98, Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, Plymouth, England, E1

conference

A conceptual model for security outsourcing

K Samarasinghe, M Warren, G Pye

(2007), pp. 187-194, Proceedings of the 5th Australian Information Security Management Conference, Perth, W.A., E1

conference

Evaluating the effectiveness of an e-business security methodology using a case study approach

D Hutchinson, M Warren

(2007), pp. 1-14, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Victoria, E1

conference

A case study of e-business security management for Australia medium SME's

D Hutchinson, M Warren

(2007), pp. 1-12, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Australia, E1

conference

Fostering information security culture in small and medium size enterprises: an interpretive study in Australia

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 1560-1571, Proceedings of the 15th European Conference on Information Systems, St Gallen, Switzerland, E1

conference

Teaching future Australian information systems professionals

S Leitch, M Warren

(2007), pp. 63-70, Education, training and lifelong learning, Prague, Czech Republic, E1

conference

Supporting user evaluation of IT security certification schemes

N Tate, S Lichtenstein, M Warren

(2007), pp. 70-81, ACIS2007 Toowoomba 5 to 7 December 2007 : Proceedings of the 18th Australasian Conference on Information Systems, Toowoomba, QLD, E1

conference

Using problem based learning to teach future Australian IS professionals

S Leitch, M Warren

(2007), pp. 417-424, Proceedings of the Computer Science and IT Education Conference, Mauritius, E1

conference

Toward user evaluation of IT security certification schemes: a preliminary framework

N Tate, S Lichtenstein, M Warren

(2007), New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference, Sandton, South Africa, E1

conference

Security issues within virtual worlds such as second life

C Lee, M Warren

(2007), pp. 142-, Proceedings of the 5th Australian Information Security Management Conference, Perth, Western Australia, E1

conference

The impact of security surveys within Australia and New Zealand

M Warren, S Leitch

(2007), pp. 152-156, Proceedings of the 5th Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Institutionalising information security culture in Australian SMEs: framework and key issues

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 10-24, Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, Plymouth, England, E1

conference

Developing information security culture in small and medium size enterprises: Australian case studies

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 55-65, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, England, E1

conference

A proposed cyber-terroism SCADA risk framework concept for Australia

C Beggs, M Warren

(2007), pp. 17-26, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Shrivenham, England, E1

conference
2006

Security management : modelling critical infrastructure

G Pye, M Warren

(2006), Vol. 5, pp. 46-61, Journal of information warfare, Churchlands, W. A., C1

journal

Striking a balance between ethics and ICT governance

G Pye, M Warren

(2006), Vol. 13, pp. 201-207, Australian journal of information systems, Canberra, A.C.T., C1

journal

Penetration testing professional ethics : a conceptual model and taxonomy

J Pierce, A Jones, M Warren

(2006), Vol. 13, pp. 193-200, Australasian journal of information systems, North Sydney, N.S.W., C1

journal

A methodology of health information security evaluation

W Brooks, M Warren

(2006), Vol. HINZ 2006 - Primary Care and Beyond: Building the e-Bridge to Integrated Care, pp. 1-8, Health care and informatics review online, Auckland, New Zealand, C1

journal

Improving ICT governance in Australian companies

B O`Donohue, G Pye, M Warren

(2006), Proceedings of the 17th Australasian Conference on Information Systems, Adelaide Convention Centre, 6th-8th December 2006 : thought leadership in IS, Adelaide, South Australia, E1

conference

E-business security management for Australian micro SMEs - a case study

D Hutchinson, M Warren

(2006), pp. 69-72, GITMA 2006 : Proceedings of the Seventh Annual Global Information Technology Management World Conference, Orlando, Florida, E1

conference

The design and rationale of the Australian small to medium enterprise e-business security methodology (ASME-EBSM)

D Hutchinson, M Warren

(2006), pp. 247-258, 7th International We-b (Working for E-Business) Conference: e-Business: how far have we come?, Melbourne, Vic., E1

conference

E-business security management for Australian small SMEs - a case study

D Hutchinson, M Warren

(2006), pp. 65-74, 7th International We-b (Working for E-Business) Conference : e-Business : how far have we come?, Melbourne, Vic., E1

conference

Critical infrastructure protection, modelling and management: an Australian commercial case study

G Pye, M Warren

(2006), pp. 177-190, Proceedings of the 5th European Conference on Information Warfare and Security : National Defence College, Helsinki, Finland, 1 - 2 June 2006, Helsinki, Finland, E1

conference

A conceptual model of and framework for benchmarking online security

G Pye, M Warren

(2006), pp. 501-508, e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Challenges in fostering an information security culture in Australian small and medium sized enterprises

S Dojkovski, S Lichtenstein, M Warren

(2006), pp. 31-40, ECIW2006 : proceedings of the 5th European conference on Information Warfare and Security, Helsinki, Finland, E1

conference

Conceptual modelling: choosing a critical infrastructure modelling methodology

G Pye, M Warren

(2006), pp. 103-113, Proceedings of the 7th Australian Information Warfare and Security Conference, Perth, Western Australia, E1

conference

Outsourcing system security: a theoretical perspective

W Wilde, M Warren, W Hutchinson

(2006), pp. 1-10, IS 2006 : Thought leadership in IS : Proceedings of the 2006 Australasian Conference on Information Systems, Adelaide, S. A., E1

conference

The derivation of a conceptual model for outsourcing IT security

W Wilde, M Warren, W Hutchinson

(2006), pp. 234-238, Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

A participational security method for healthcare organisations

M Warren, S Leitch

(2006), e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Social engineering and its impact via the internet

M Warren, S Leitch

(2006), pp. 184-189, Proceedings of the 4th Australian Information Security Management Conference, Perth, WA, E1

conference

The derivation of a conceptual model for IT security outsourcing

W Wilde, M Warren, W Hutchinson

(2006), pp. 1-16, Proceedings of the 4th Australian Information Security Management Conference, Perth, W. A., E1

conference

A methodology of health information security evaluation

W Brooks, M Warren

(2006), pp. 1-7, HIC 2006 : Primary care & beyond: building the e-birdge to intergrated care, 9-11 August 2006, Auckland NZ, Auckland, New Zealand, E1-1

conference
2005

The ethics of hacking and computer abuse: Australian case studies

M Warren, S Leitch

(2005), pp. 35-48, Electronic monitoring in the workplace: controversies and solutions, Hershey, Pa, B1

chapter

System survivability: a critical security problem

J Redman, M Warren, W Hutchinson

(2005), Vol. 13, pp. 182-188, Information management & computer security, Bingley, England, C1

journal

Australian commercial-critical infrastructure management protection

G Pye, M Warren

(2005), pp. 249-259, Proceedings of the 4th European Conference on Information Warfare and Security, Glamorgan, Wales, E1

conference

Information security culture in small and medium sized enterprises: a socio-cultural framework

S Dojkovski, M Warren, S Lichtenstein

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Vic., E1

conference

Modelling critical infrastructure dependency relationships

G Pye, M Warren

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005., Geelong, E1

conference

Ethics or ICT governance: striking an ethical balance

G Pye, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference

Benchmarking e-business security : a model and framework

G Pye, M Warren

(2005), pp. 1-8, Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, Perth, Western Australia, E1

conference

An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?

J Pierce, D Mackay, M Warren, J Wells

(2005), E-links : community, business and university : proceedings of the 6th International We-B (Working for E-Business) Conference, 23rd to 25th November, 2005, Melbourne, Melbourne, Victoria, E1

conference

A review of Australian internet banking client-side authentication models

J Pierce, D Mackay, M Warren, J Wells

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Geelong, Victoria, E1

conference

A taxonomy of penetration testing ethics

J Pierce, A Jones, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference

Understanding transition towards information security culture change

L Ngo, W Zhou, M Warren

(2005), pp. 67-73, Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, Perth, Western Australia, E1

conference

An approach for critical information infrastructure protection

T Busuttil, M Warren

(2005), 4th European Conference on Information Warfare and Security: University of Glamorgan, [Pontypridd], UK, 11 - 12 July 2005 ; [ECIW 2005], Glamorgan, UK, E1

conference

A systems approach to security

M Warren, W Hutchinson

(2005), pp. 302-305, Systems Thinking and Complexity Science: Insights for Action Proceedings of the 11th Annual ANZSYS / Managing the Complex V conference, Christchurch, NZ, E1

conference

RFID and ethics

C Chan, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference

A conceptual model security for IT security outsourcing

M Warren, D Wilde, S Dojkovski, W Hutchinson

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Geelong, Vic., E1

conference

In pursuit of a standard penetration testing methodology

J Pierce, M Warren, X Corray

(2005), Vol. 4, pp. 26-39, Journal of information warfare, Perth, W.A., C1-1

journal
2004

CIIP-RAM- a security risk analysis methodology for critical information infrastructure protection

T Busuttil, M Warren

(2004), pp. 33-49, Information securtiy management, education and privacy, Boston, Mass., B1

chapter

A critical review of penetration testing methodologies

J Pierce, M Warren, X Corray

(2004), pp. 167-173, 5th Australian Information Warfare and Security Conference 2004 Proceedings, Perth, Western Australia, E1

conference

Graphical authentication : an architectural design specification

J Pierce, M Warren, D Mackay, J Wells

(2004), pp. 76-82, 2nd Australian Computer,Networks & Information Forensics Conference Proceedings, Perth, Western Australia, E1

conference

Graphical authentication: justifications and objectives

J Pierce, M Warren, D Mackay, J Wells

(2004), pp. 49-55, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

An empirical study of e-business security in Geelong small to medium business enterprises (SMEs)

D Hutchinson, M Warren

(2004), pp. 1-11, We-B 2004 : 5th International WE-B (Working for e-Business) Conference : Enterprise value from e-business, conference proceedings, Perth, Western Australia, E1

conference

Health information security evaluation: continued development of an object-oriented method

W Brooks, M Warren

(2004), pp. 1-15, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

PKI - advantages and obstacles

A Jancic, M Warren

(2004), pp. 1-9, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

Critical infrastructure protection: comparison of countries

P Marasea, M Warren

(2004), pp. 249-260, 3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004], London, England, E1

conference

A risk analysis approach to critical information infrastructure protection

T Busuttil, M Warren

(2004), pp. 1-11, 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations, Perth, Western Australia, E1

conference

System survivability : a new security concept

J Redman, M Warren, W Hutchinson

(2004), pp. 337-343, INC 2004 : Proceedings of the 4th International Network Conference, University of Plymouth, England, E1

conference

Cyber crime influencing businesses in South Africa

M Herselman, M Warren

(2004), Vol. 1, pp. 253-266, Journal of issues in informing science and information technology, Santa Rosa, Calif., C1

journal
2003

A national information infrastructure model for information warfare defence

V Stagg, M Warren

(2003), pp. 97-110, Current security management and ethical issues of information technology, Hershey, Pa., B1-1

chapter

Security for internet banking: a framework

D Hutchinson, M Warren

(2003), Vol. 16, pp. 64-73, Journal of enterprise information management, Bingley, England, C1

journal

A security risk management approach for e-commerce

M Warren, W Hutchinson

(2003), Vol. 11, pp. 238-242, Information management & computer security, Bingley, England, C1-1

journal

Designing systems for e-commerce

S Leitch, M Warren

(2003), Vol. 10, pp. 139-143, AJIS Australian journal of information systems, Canberra, ACT, C1-1

journal

Australian hackers and ethics

M Warren, W Hutchinson

(2003), Vol. 10, pp. 151-156, Australasian journal of information systems, Canberra, A.C.T., C1-1

journal

A quality indicator of Australian e-business

S Leitch, M Warren

(2003), Vol. III, pp. 149-152, E-business review: a publication of the International Academy of E-Business., Nacogdoches, Tex., C1-1

journal

The law and cyber terrorism

M Warren, W Hutchinson

(2003), Vol. 2, pp. 27-32, Journal of information warfare, [Mt. Eliza, Vic.]; Perth, WA, C1-1

journal

Three strategic dimensions of information security in ecommerce : a literature review based conceptual model

L Vasiu, M Warren, D Mackay

(2003), pp. 1-10, Surfing the waves: management challenges, management solutions: proceedings of the 17th ANZAM conference, Fremantle, W.A., E1

conference

Quantum cryptography - one step closer to reality

A Jancic, M Warren

(2003), pp. 181-189, Proceedings 4th Australian Information Warfare and IT Security Conference : Enhancing trust, Adelaide, South Australia, E1

conference

Information security, cyber crime, and infrastructure protection : information security management within Australian healthcare organisations

W Brooks, M Warren, W Hutchinson

(2003), The Information Institute ISOneWorld Conference and Convention, Las Vegas, Nev., E1

conference

A conceptual model for graphical authentication

J Pierce, J Wells, M Warren, D Mackay

(2003), pp. 1-8, InfoSec03 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

An analysis of CSI/FBI and AusCERT surveys

J Pierce, M Warren, D Mackay

(2003), pp. 1-11, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Object-oriented security modelling for healthcare

W Brooks, M Warren

(2003), pp. 1-10, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

A retail supply chain risk assessment conceptual model

J Pierce, D Mackay, M Warren

(2003), pp. 1-6, 4th International We-B Conference (working with e-business), 24-25 November 2003, Perth, Western Australia, Perth, Australia, E1

conference

A process based security framework for e-business and Australian SMES

D Hutchinson, M Warren

(2003), pp. 155-158, Proceedings of the Fourth Annual Global Information Technology Management World Conference, Calgary, Canada, E1

conference

Australian SMES and e-security guides on trusting the internet

D Hutchinson, M Warren

(2003), pp. 88-91, GITMA 2003 : Proceedings of the Fourth Annual Global Information Technology Management World Conference, Calgary, Alta., E1

conference

Modelling e-business security recommendations for Australian small to medium business enterprises (SMEs)

D Hutchinson, M Warren

(2003), 4th International WE-B Conference 2003 - e-Business and Information Systems, Perth, West Australia, E1

conference

A review of critical information infrastructure protection within IT security guidelines

T Busuttil, M Warren

(2003), pp. 105-113, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, Australia, E1

conference

CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection

T Busuttil, M Warren

(2003), pp. 91-103, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, Australia, E1

conference

An Australian supply chain risk assessment model

J Pierce, M Warren, D Mackay

(2003), pp. 109-112, IS 2003 : Proceedings of the 6th International Multi-Conference on Intelligent and Computer Systems : New information society, Ljubljana, Slolvenia, E1

conference

Defining fraud: issues for organizations from an information systems perspective

L Vasiu, M Warren, D Mackay

(2003), pp. 971-979, Proceedings of the Seventh Pacific Asia Conference on Information Systems, Adelaide, South Australia, E1

conference

The tri-dimensional role of information security in E-business : a managerial perspective

L Vasiu, D Mackay, M Warren

(2003), pp. 1-9, 2003 Hawaii International Conference on Business, Honolulu, T.H., E1

conference

Information security : an e-learning problem

M Warren, W Hutchinson

(2003), pp. 21-26, Advances in web-based learning - ICWL 2003, Heidelberg, Germany, B1-1

chapter
2002

A security evaluation criteria

W Brooks, M Warren, W Hutchinson

(2002), Vol. 15, pp. 377-384, Logistics information management, Bingley, England, C1

journal

Security practice: survey evidence from three countries

M Warren

(2002), Vol. 15, pp. 347-351, Logistics information management, Bingley, England, C1

journal

A conceptual framework of eFraud from a supply chain management perspective

L Vasiu, D Mackay, M Warren

(2002), pp. 1-9, E-conomy - from here to where? : Proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Perth, W. A., E1

conference

Personal privacy issues in B2C eCommerce : a theoretical framework

L Vasiu, M Warren, D Mackay

(2002), pp. 1-8, CollECTeR 2002: Proceedings of the Seventh CollECTeR Conference on Electronic Commerce, Wollongong, N. S. W., E1

conference

A conceptual approach to information warfare : security risk analysis

T Busuttil, M Warren

(2002), pp. 35-41, ECIW2003 : proceedings of the 2nd European conference on Information Warfare and Security, Uxbridge, United Kingdom, E1

conference

E-security guides for Australian SMEs

D Hutchinson, M Warren

(2002), pp. 1-11, E-conomy - from here to where? : proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Perth, Western Australia, E1

conference

A security evaluation criteria for baseline security standards

W Brooks, M Warren, W Hutchinson

(2002), pp. 79-89, Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives, Egypt, E1

conference

Asymmetric scalability: the unfair advantage of information warfare

V Stagg, M Warren

(2002), pp. 290-297, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Western Australia, 28 & 29 November 2002, Perth, W.A., E1

conference

Security risk analysis e-commerce

M Warren, W Hutchinson

(2002), pp. 397-404, INC2002 : Proceedings of the Third International Network Conference, Plymouth, England, E1

conference

Protection of New Zealand in the age of information warfare

M Warren, J McIntyre

(2002), pp. 235-240, Protecting the infrastructure: proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Perth, Australia, E1

conference

A formalisation of an information infrastructure security risk analysis approach

T Busuttil, M Warren

(2002), pp. 174-182, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Australia, E1

conference

Baseline security standards evaluation

W Brooks, M Warren

(2002), pp. 162-173, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Will new laws be effective in reducing web sponsorship of terrorist groups?

M Warren, W Hutchinson

(2002), pp. 156-161, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Perth, WA, E1

conference

Swarming attacks and agents

M Warren, M McDougall, K Pascoe

(2002), pp. 209-217, Protecting the infrastructure: proceedings of the 3rd Australian Information Warfare and Security conference 2002, Perth, Australia, E1

conference

Information security management within Australian healthcare organisations

W Brooks, M Warren

(2002), pp. 318-331, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Information warfare incident monitoring - government or public responsibility?

L Batten, M Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1

conference

Security management: an information systems setting

M Warren, L Batten

(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Melbourne, Vic., E1

conference

E-universities : - business and technology (an Australian viewpoint)

P Goward, M Warren, S Leitch

(2002), pp. 7-10, Euromedia 2002 : proceedings of the seventh annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications, Modena, Italy, E1

conference

Designing ethical systems for electronic commerce

S Leitch, M Warren

(2002), pp. 68-74, Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, Sydney, N.S.W., E1

conference

Australian hackers: an ethical perspective

M Warren, W Hutchinson

(2002), pp. 131-138, Third Australian Institute of Computer Ethics Conference Proceedings: Computer Ethics: Its Impact for Australia, Sydney, NSW, E1

conference

Internet banking: security, ethics and trust

D Hutchinson, M Warren

(2002), pp. 52-62, Conference proceedings of AiCE 2002, Third Australian Institute of Computer Ethics Conference, Sydney, N.S.W., E1

conference

Defending infrastructures against information warfare

V Stagg, M Warren

(2002), Issues and trends of information technology management in contemporary organizations : 2002 Information Resources Management Association International Conference, Seattle, Washington, USA, May 19-22, 2002, Seattle, Washington DC, E1

conference

A conceptual model for security and trust within internet banking transactions

D Hutchinson, M Warren

(2002), pp. 2228-2234, Association for Information Systems 8th Americas Conference on Information Systems : AMCIS 2002 ; August 8 - 11, 2002, Dallas, Texas., Dallas, Texas, USA, E1

conference

Manipulating reality: deception on the web

W Hutchinson, M Warren

(2002), pp. 300-312, Make or break issues in IT management, Oxford, England, B1

chapter

Deception and reality: a challenge for the information and knowledge management function

W Hutchinson, M Warren

(2002), pp. 287-295, Human factors in information systems, Hershey, PA, B1

chapter

Truth, lies, reality and deception : an issue for e-commerce

W Hutchinson, M Warren

(2002), Vol. 3, pp. 208-221, International journal of services technology and management, London, England, C1

journal

Information warfare: using the viable system model as a framework to attack organisations

B Hutchinson, M Warren

(2002), Vol. 9, pp. 67-74, AJIS : Australian journal of information systems, Wollongong, N.S.W., C1

journal

Information superiority and the role of an organisation's network

W Hutchinson, M Warren

(2002), pp. 567-572, Papers from the Third International Network Conference 2002 : 16-18 July 2002, Plymouth, United Kingdom, Plymouth, England, E1

conference

Developing a postgraduate course in information security: a confusion of terms

W Hutchinson, M Warren

(2002), pp. 805-812, Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, Melbourne, Victoria, E1

conference

Network theory - the demise of systems thinking?

W Hutchinson, M Warren

(2002), ANZIIS 2003 : proceedings of the Eighth Australia and New Zealand Intelligent Information Systems Conference, Dec. 10-12, Sydney, Australia, Mooloolaba, Qld, E1

conference
2001

Cyber terrorism and the contemporary corporation

M Warren, W Hutchinson

(2001), pp. 53-64, Information security management : global challenges in the new millennium, Hershey, Pa., B1

chapter

Intelligent agent technology within information warfare

T Busuttil, M Warren

(2001), Vol. 1, pp. 52-61, Journal of information warfare, Melbourne, Vic., C1

journal

Security authentication for on-line internet banking

D Hutchinson, M Warren

(2001), Vol. 25, pp. 349-355, Informatica (Slovenia), Ljubljana, Slovenia, C1

journal

A risk analysis model to reduce computer security risks among healthcare organizations

M Warren

(2001), Vol. 3, pp. 27-37, Risk Management, Leicester, England, C1

journal

Information warfare and ethics

M Warren, W Hutchinson

(2001), Vol. 8, pp. 58-62, Australasian journal of information systems, Wollongong, NSW; Clayton, Vic., C1

journal

Intelligent agents and their information warfare implications

T Busuttil, M Warren

(2001), pp. 109-118, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, WA, E1

conference

A security method for healthcare organisations

M Warren, W Hutchinson

(2001), pp. 157-166, Advances in information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Nev., E1

conference

E-commerce: a Victorian case study

M Warren, S Leitch, P Love

(2001), pp. 255-263, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Perth, Western Australia, E1

conference

Security issues of M-Commerce

D Hutchinson, M Warren

(2001), pp. 478-485, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Perth, Western Australia, E1

conference

A framework of security authentication for internet banking

D Hutchinson, M Warren

(2001), pp. 467-477, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Perth, Western Australia, E1

conference

An application of soft systems in determining user requirements

D Hutchinson, T Busuttil, M Warren

(2001), pp. 132-140, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Perth, West Australia, E1

conference

A security training approach for UK small and medium sized enterprises

M Warren, W Hutchinson

(2001), pp. 197-207, WISE 2 : proceedings of the IFIP TC11 WG 11.8 Second World Conference on Information Security Education, 2001, Perth, WA, E1

conference

A review of IT benefits and costs in construction

C Cowley, P Love, M Warren

(2001), pp. 120-131, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Perth, WA, E1

conference

Deception: a tool and curse for security management

M Warren, W Hutchinson

(2001), pp. 327-337, Trusted information : the new decade challenge : IFIP TC11 16th International Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France, Paris, France, E1

conference

Information warfare and hacking

M Warren, W Hutchinson

(2001), pp. 195-206, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

Teaching small and medium sized enterprises about security

M Warren, W Hutchinson

(2001), pp. 207-217, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

A business information infrastructure

V Stagg, M Warren

(2001), pp. 173-181, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, Western Australia, 29 & 30 November 2001, Perth, Western Australia, E1

conference

A duality security risk analysis method for e-commerce

M Warren, W Hutchinson

(2001), pp. 259-266, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, WA, E1

conference

Current state and research trends in the area of process visualization in workflow system for e-commerce applications

P Wojcieszak, M Warren

(2001), pp. 289-296, EUROMEDIA 2001, featuring WEBTEC, MEDIATEC, COMTEC, APTEC, April 18 - 20, 2001, Valencia, Spain, Valencia, Spain, E1

conference

Attitudes of Australian information system managers against online attackers

W Hutchinson, M Warren

(2001), Vol. 9, pp. 106-111, Information management & computer security, Bradford, England, C1

journal

Principles of information warfare

W Hutchinson, M Warren

(2001), Vol. 1, pp. 1-6, Journal of information warfare, Mt. Eliza, Vic., C1

journal

The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system

W Hutchinson, M Warren

(2001), pp. 97-103, Information systems in the digital world : proceedings of the 6th UKAIS Conference, Portsmouth, England, E1

conference

The nature of data: illusions of reality

W Hutchinson, M Warren

(2001), pp. 262-267, Informing Science and IT Education Conference: proceedings and schedule, Krakow, Poland, E1

conference

The design, development and implementation of an e-commerce system for procuring materials in construction

S Kong, H Li, P Love, M Warren

(2001), pp. 315-325, Working for excellence in the e-conomy: proceedings: 2nd International We-B Conference 2001, Perth, W.A., E1

conference
2000

Ethics and electronic commerce

S Leitch, M Warren

(2000), pp. 1-4, Computer ethics 2000 : selected papers from the Second Australian Institute of Computer Ethics Conference (AICE2000), Canberra, A.C.T., E1

conference
1999

Computer hacking and cyber terrorism: The real threats in the new millennium?

S Furnell, M Warren

(1999), Vol. 18, pp. 28-34, Computers and Security, Amsterdam, The Netherlands, C1-1

journal

Funded Projects at Deakin

Industry and Other Funding

Seeding Project - Corporate critical infrastructure protection - visualization

Prof Matthew Warren

  • 2007: $5,000

AMSI internship with Australian Information Security Assoc for Ishan Ruwan Senarathna

Prof Matthew Warren, Mr Ruwan Senarathna

  • 2016: $17,000

AMSI Internship - Mina Roshan - Customer behaviour modelling and marketing applications

Prof Matthew Warren, Ms Mina Roshan Kokabha

  • 2016: $29,000

Cybersecurity Executive Awareness Training for Department of Premier and Cabinet

Mr Damien Manuel, Prof John Yearwood, Prof Matthew Warren

  • 2017: $10,000

Supervisions

Principal Supervisor
2017

Dinithi Pallegedara

Thesis entitled: Minimising the Unauthorised Disclosure of Organisational Information via Social Media

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2016

Mina Roshan Kokabha

Thesis entitled: Understanding Organisational Use of Social Media for Crisis Communication

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

Ishan Senarathna

Thesis entitled: Cloud Computing Adoption by SMEs in Australia

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2015

Vindaya Asanga Senadheera

Thesis entitled: The adoption of social media by australian banks to communicate with the public

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2013

Adel Alamin

Thesis entitled: Investigating Factors Influencing the Adoption of AIS: Libyan Accountants¿ Perspective

Doctor of Philosophy, School of Information and Business Analytics

2009

Merete Crofts

Thesis entitled: Exploring the Sociotechnical Systems Perspectives in Global Software Development

Master of Commerce, School of Information and Business Analytics

2008

Sneza Dojkovski

Thesis entitled: Influencees on Information Security Culture in Australian Small and Medium Enterprises

Doctor of Philosophy, School of Information and Business Analytics

2007

Justin Pierce

Thesis entitled: An Investigation into the Effectiveness of Graphical Authentication An Exploratory Study

Doctor of Philosophy, School of Information and Business Analytics

2006

Kamaljeet Sandhu

Thesis entitled: The Acceptance, Use and Continued Use of an E-Services System

Doctor of Philosophy, School of Information and Business Analytics

Damien Hutchinson

Thesis entitled: The Australian Small to Medium Enterprise E-business Security Methodology

Doctor of Philosophy (Information Technology), School of Information Technology

2005

Saranond Inthanond

Thesis entitled: The Meaning of information: A Study of Western Construction of Asian-ness in Film

Doctor of Philosophy, School of Information and Business Analytics

Konrad Peszynski

Thesis entitled: Power and Politics in Systems Implementation

Doctor of Philosophy, School of Information and Business Analytics

Associate Supervisor
2017

Michael Callaghan

Thesis entitled: The Development of a Quantitative Measure of Codes of Ethics

Doctor of Philosophy, Department of Management

2009

Nicholas Tate

Thesis entitled: A Framework for Assessing Certification Schemes for IT Security Professionals

Doctor of Philosophy, School of Information and Business Analytics

Leanne Ngo

Thesis entitled: Transitioning towards an Improved IT Security Culture in Organisations

Doctor of Philosophy (Information Technology), School of Information Technology

2003

Clayton Cowley

Thesis entitled: Costs, Benefits and Risks of IT in Construction

Master of Construction Management, School of Architecture and Built Environment