Prof Matthew Warren

STAFF PROFILE

Position

Chair in Information Systems

Faculty

Faculty of Business and Law

Department

BL Deakin Business School

Campus

Melbourne Burwood Campus

Qualifications

Bachelor of Arts (Honours), University of Sunderland, 1992
Doctor of Philosophy, University of Plymouth, 1996

Biography summary

Professor Warren is a Professor of Information Systems at Deakin University, Australia. He is currently the Associate Head of School (Research) and the former Head of School. Professor Warren is a Fellow of the Australian Computer Society.

Professor Warren is a researcher in the areas of Information Security, Computer Ethics and Cyber Security. He has authored and co-authored over 300 books, book chapters, journal papers and conference papers. He has received numerous grants and awards from national and international funding bodies, such as: Australian Research Council (ARC); Engineering Physical Sciences Research Council (EPSRC) in the United Kingdom; National Research Foundation (NRF) in South Africa and the European Union. Professor Warren regularly reviews research proposals submitted to the Australian Research Council and the South African National Research Foundation.

Professor Warren gained his PhD in Information Security Risk Analysis from the University of Plymouth, United Kingdom and he has taught in Australia, Finland, Hong Kong and the United Kingdom.

Knowledge areas

Professor Warren is a researcher in the areas of Information Security, Computer Ethics and Cyber Security.

Expertise

Professor Warren has gained international recognition for his scholarly work in the areas of Information Security, Computer Ethics and Cyber Security (including Critical Infrastructure Protection, Cyber Warfare and SCADA Security). Professor Warren aims to undertake research that will help to safeguard Australia and the greater community.

Professional activities

Professor Warren is a Fellow of the Australian Computer Society and a member of the Australian Institute of Professional Intelligence Officers.

Professor Warren currently has the following  industry and professional roles:

  • Academic observer on the SCADA Community of Interest, Department of Broadband, Communications & the Digital Economy;
  • Member of the Australian Computer Society – Computer Ethics Sub Committee;
  • Member of the Australian Computer Society – Information Security Specialist Advisory Group;
  • Coordinator of the Australian Computer Society – Victoria – Special Interest Group on Information Security.


Professor Warren has previously undertaken the following industry and professional roles:

  • Member of the Geelong ICT Cluster Steering Committee;
  • Member of the Australian Computer Society – Cyber Security Task Force;
  • Member of the Australian Computer Society – Victoria State Board;
  • Member of the Australian Computer Society – Higher Education Committee;
  • Chair of the IFIP TC11 – Working Group 11.1- Security Management;
  • Member of the IFIP TC11 Council;
  • Member of the NOIE (National Office of Information Economy) advisory group on IT Security Education;
  • Director of the Australian Institute of Computer Ethics;
  • Member of the Australian Standards Committee – IT/12/4 Security Techniques;
  • Member of the BS7799 International Advisory Committee.

Media appearances

Professor Warren has been quoted by the IT news media and general news media (TV, radio, print and online) in Australia, Brunei, Denmark, France, New Zealand, The Peoples Republic of China, South Africa, Singapore, Sweden, UK, USA and by the US Government in areas relating to Information Security, Computer Ethics and Cyber Security.

Notable media outlets include: Australian Broadcasting Company, Australian Financial Review, British Broadcasting Company, CNNfn (Online), Sunday Telegraph (UK), Sydney Morning Herald, The Age, The Australian, The Brunei Times, Radio New Zealand, Yahoo and Xinhua News Agency.

Publications

Filter by

2016

Security and privacy concerns for Australian SMEs cloud adoption: empirical study of metropolitan vs regional SMEs

Dr Ishan Senarathna, Dr William Yeoh, Prof Matthew Warren, Dr Scott Salzman

(2016), Vol. 20, pp. 1-20, Australasian journal of information systems, Canberra, A.C.T., C1

journal

Unauthorised disclosure of organisational information through social media : a policy perspective

Miss Dinithi Pallegedara, Prof Matthew Warren

(2016), pp. 86-93, IDIMC 2016 : Exploring our digital shadow : from data to intelligence, Loughborough, Eng., E1

conference
2015

A Conceptual Model for Cloud Computing Adoption by SMEs in Australia

Dr Ishan Senarathna, Prof Matthew Warren, Dr William Yeoh, Dr Scott Salzman

(2015), pp. 100-128, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations, Hershey PA, USA, B1

chapter

Applying classification controls to internet content in Australia

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2015), Vol. 13, pp. 82-97, Journal of information, communication and ethics in society, London, Eng., C1

journal

Cyber security and protection of ICS systems: An australian example

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2015), pp. 215-228, Cyber security : analytics, technology and automation, Berlin, Germany, B1

chapter
2014

The influence of organisation culture on e-commerce adoption

Dr Ishan Senarathna, Prof Matthew Warren, Dr William Yeoh, Dr Scott Salzman

(2014), Vol. 114, pp. 1007-1021, Industrial management & data systems, Bingley, Eng., C1

journal

Evaluating Australian social media policies in relation to the issue of information disclosure

Miss Dinithi Pallegedara, Prof Matthew Warren

(2014), pp. 1-10, Integral IS: The Embedding of Information Systems in Business, Government and Society, Auckland, N.Z., E1

conference
2013

An empirical study of the influence of different organisation cultures on e-commerce adoption maturity

Dr Ishan Senarathna, Prof Matthew Warren, Dr William Yeoh, Dr Scott Salzman

(2013), pp. 1-10, Proceedings of the 24th Australasian Conference on Information Systems; ACIS 2013, Melbourne, Vic., E1

conference

Understanding the role of social media in incident crisis communication

Ms Mina Roshan Kokabha, Prof Matthew Warren, Dr Rodney Carr

(2013), pp. 1-9, Proceedings of the 24th Australasian Conference on Information Systems, ACIS 2013, Melbourne, Vic., E1

conference

WikiLeaks and Information Disclosure: The Bradley Manning Case

Prof Matthew Warren, A/Prof Shona Margaret Leitch, Mr Ian Rosewall

(2013), Vol. 21, pp. 3-16, The Journal of the Australian Institute of Professional Intelligence Officers, Canberra, ACT, C1

journal
2012

New media and web 2.0 : an Irish republican example

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2012), Vol. 11, pp. 1-11, Journal of information warfare, Mt. Eliza, Vic., C1

journal

Safeguarding Australia from cyber-terrorism : a SCADA risk framework

Christopher Beggs, Prof Matthew Warren

(2012), pp. 369-384, Strategic and practical approaches for information security governance, Hershey, Pa., B1

chapter

Loss of data : reflective case studies

Mr Ian Rosewall, Prof Matthew Warren

(2012), pp. 405-420, Strategic and practical approaches for information security governance, Hershey, Pa., B1

chapter
2011

Corporate governance and information technology : findings from an exploratory survey of Australian organizations

Prof Paul Couchman, A/Prof Ambika Zutshi, Carla Wilkin, Prof Matthew Warren, Amrik Sohal

(2011), pp. 1-19, ANZAM 2011 : 25th Annual Australian And New Zealand Academy of Management conference : the future of work and organisations, Wellington, N.Z., E1

conference

Meeting the challenge of information system security : an exploratory study of the communication of IS security management capabilities

Prof Paul Couchman, Carla Wilkin, A/Prof Ambika Zutshi, Amrik Sohal, Prof Matthew Warren

(2011), pp. -, BAM 2011 : Building and sustaining high performance organisations in a challenging environment, Birmingham, U. K., E1

conference

Protection of Australia in the cyber age

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2011), Vol. 1, pp. 35-40, International journal of cyber warfare and terrorism, Hershey, Pa., C1

journal

Attack vectors against social networking systems : the Facebook example

Prof Matthew Warren, A/Prof Shona Margaret Leitch, Mr Ian Rosewall

(2011), pp. -, Proceedings of The 9th Australian Information Security Management Conference, Perth, W. A., E1

conference

Australia and the question of internet control

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2011), pp. 488-493, ETHICOMP 2011 : The Social Impact of Social Computing : Proceedings of the 12th International Conference, Sheffield, U. K., E1

conference

Social networking and teaching : an Australian case study

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2011), pp. 315-326, InSITE 2011 : Proceedings of Informing Science & IT Education Conference, Novi Sad, Serbia, E1

conference

A study into how Australian banks use social media

Mr Vindaya Asanga Senadheera, Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2011), pp. 1-12, PACIS 2011 : Proceedings of the 15th Pacific Asia Conference on Information Systems, Brisbane, Qld., E1

conference

The ethics of security of personal information upon facebook

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2011), pp. 46-65, ICT ethics and security in the 21st century : new developments and applications, Hershey, Pa., B1

chapter

Modelling relational aspects of critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2011), pp. 202-210, ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Reading, England, E1

conference

Critical infrastructure protection : an ethical choice

Dr Graeme Pye, Prof Matthew Warren, Dr William Hutchinson

(2011), pp. 214-230, ICT ethics and security in the 21st century : new developments and applications, Hershey Pa., B1

chapter

Analysis and modelling of critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2011), pp. -, ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Reading, England, E1

conference

Australian national critical infrastructure protection : a case study

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2011), pp. 275-280, ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Reading, England, E1

conference

Does traditional security risk assessment have a future in information security?

Anthonie B Ruighaver, Prof Matthew Warren, Dr Atif Ahmad

(2011), Vol. 10, pp. 16-28, Journal of information warfare, Mt. Eliza, Vic., C1-1

journal
2010

An applied framework for modelling a critical infrastructure system incident

Dr Graeme Pye, Prof Matthew Warren

(2010), pp. 245-260, ECIW 2010 : Proceedings of the 8th European Conference on Information Warfare and Security, London, England, E1

conference

Information security disclosure : a Victorian case study

Mr Ian Rosewall, Prof Matthew Warren

(2010), pp. 112-118, Proceedings of the 8th Australian Information Security Management Conference, Perth, W.A., E1

conference

Wikileaks : the truth or not?

Mr Ian Rosewall, Prof Matthew Warren

(2010), pp. 26-29, Proceedings of The 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Development of a supply chain management security risk management method : a conceptual model

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2010), pp. 327-333, ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, Thessaloniki, Greece, E1

conference

Micro-blogging in the workplace

Chia Yao Lee, Prof Matthew Warren

(2010), pp. 42-48, Proceedings of the 8th Australian Information Security Management Conference, Perth, W.A., E1

conference

Critical supply chain systems and critical infrastructure protection

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2010), Vol. 2, pp. 107-117, International journal of logistics economics and globalisation, Onley, England, C1

journal

Australian critical infrastructure protection : a case of two tales

Prof Matthew Warren, Dr Graeme Pye, Dr William Hutchinson

(2010), pp. 30-36, SECAU 2010 : Proceedings of the 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Influence operations and behavioural change

Dr William Hutchinson, Prof Matthew Warren

(2010), pp. 116-119, ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, Thessaloniki, Greece, E1

conference

Enabling information security culture : influences and challenges for Australian SMEs

Dr Sneza Dojkovski, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2010), pp. -, ACIS 2010 : Proceedings of the 21st Australasian Conference on Information Systems, Brisbane, Qld., E1

conference

ICT corporate governance : a case study of a not-for-profit community healthcare organisation

A/Prof Ambika Zutshi, Carla Wilkin, Prof Paul Couchman, Amrik Sohal, Prof Greg Wood, Prof Matthew Warren

(2010), pp. -, ANZAM 2010 : Refereed Papers of the 24th Annual Australian and New Zealand Academy of Management Conference, Adelaide, S.Aust., E1

conference

Ethical decision making : improving the quality of acceptable use policies

Anthonie B Ruighaver, Sean Maynard, Prof Matthew Warren

(2010), Vol. 29, pp. 731-736, Computers & security, Oxon, England, C1

journal

Ethics : the past, present and future of socio-tehnical systems design

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2010), pp. 189-197, History of computing : learning form the past, Germany, B1

chapter
2009

Multi-tier phishing email classification with an impact of classifier rescheduling

Dr Rafiq Islam, Prof Jemal Abawajy, Prof Matthew Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Security as an element in environmental assessment and decision making

Dr William Hutchinson, Prof Matthew Warren

(2009), pp. 1-11, ANZSEE 2009 : Green milage in the global meltdown: an ecological economics way forward. Proceedings of the conference of the Australia New Zealand Society for Ecological Economics, Palmerston North, N.Z., E1

conference

Hacker taggers: a new type of hackers

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2009), pp. 1-7, Information systems frontiers, Amsterdam, The Netherlands, C1

journal

Security analysis and modelling framework for critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2009), pp. 198-207, ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, London, England, E1

conference

Impact of ICT governance within Australian companies

Breanna O' Donohue, Dr Graeme Pye, Prof Matthew Warren

(2009), pp. 163-177, Information technology governance and service management : frameworks and adaptations, Hershey, Pa., B1

chapter

An emergent security risk : critical infrastructures and information warfare

Dr Graeme Pye, Prof Matthew Warren

(2009), Vol. 8, pp. 14-26, Journal of information warfare, Melbourne, Vic., C1

journal

Information security disclosure : a case study

Mr Ian Rosewall, Prof Matthew Warren

(2009), pp. 39-47, Proceedings of 7th Australian Information Security Management Conference, Perth, W.A., E1

conference

Security Issue challenging facebook

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2009), pp. 137-142, Proceedings of the 7th Australian Information Security Management Conference, Perth, W.A., E1

conference

Supply chain management security : the weak link of Australian critical infrastructure protection

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2009), pp. -, ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, Reading, England, E1

conference

Information security management curriculum development : an Australian example

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2009), pp. 25-33, INSITE 2009 : Proceedings of the 2009 Informing Science + Information Technology Education Conference, Macon, Georgia, E1

conference
2008

Attention IT managers : why you can't trust security surveys

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2008), Vol. 1, pp. 32-37, Deakin business review, Geelong, Vic., C1

journal

Analysing online teaching and learning systems using MEAD

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2008), Vol. 4, pp. 259-266, Interdisciplinary journal of knowledge and learning objects, Santa Rosa, Calif., C1

journal

Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for Australia

Christopher Beggs, Prof Matthew Warren

(2008), Vol. 7, pp. 24-35, Journal of information warfare, Mt. Eliza, Vic., C1

journal

Designing on-line learning systems using participation

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2008), pp. 1-8, ANZSYS 2008 : Proceedings of the 14th international Australia and New Zealand Systems Conference 2008, Perth, Western Australia, E1

conference

Designing ethical systems for online systems

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2008), pp. 130-136, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Burwood, Vic., E1

conference

Young people and the internet : what is the solution?

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2008), pp. 137-142, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Burwood, Vic., E1

conference

Visualisation of critical infrastructure failure

Dr David Wilde, Prof Matthew Warren

(2008), pp. 48-63, Proceedings of the 9th Australian Information Warfare and Security Conference 2008, Perth, Western Australia, E1

conference

Considerations for modelling critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2008), pp. 185-196, ECIW 2009 : Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, England, E1

conference

Hackers and cyber terrorists

Prof Matthew Warren

(2008), pp. 304-311, Encyclopedia of information ethics and security, Hershey, PA, B1

chapter

Security protection for critical infrastructure

Prof Matthew Warren, Tyrone Busuttil

(2008), pp. 609-615, Encyclopedia of information ethics and security, Hershey, Pa., B1

chapter

IT security certifications : stakeholder evaluation and selection

Nicholas J.A. Tate, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2008), pp. 991-1001, ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand, E1

conference

Terrorism and the internet

Prof Matthew Warren

(2008), pp. 42-49, Cyber warfare and cyber terrorism, Hershey, Pa., B1

chapter

Using the sociotechnical approach in global software developments : Is the theory relevant today?

Mrs Merete Ruth Crofts, Mr Bardo Fraunholz, Prof Matthew Warren

(2008), pp. 250-260, ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand, E1

conference
2007

Modelling critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2007), Vol. 6, pp. 41-53, Journal of information warfare, Australia, C1

journal

Evaluating the effectiveness of an e-business security methodology using a case study approach

Dr Damien Hutchinson, Prof Matthew Warren

(2007), pp. 1-14, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Vic., E1

conference

Using problem based learning to teach future Australian IS professionals

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2007), pp. 417-424, Proceedings of the Computer Science and IT Education Conference, Mauritius, E1

conference

A model and framework for online security benchmarking

Dr Graeme Pye, Prof Matthew Warren

(2007), Vol. 31, pp. 209-215, Informatica : journal of computing and informatics, Ljubljana, Jugoslavija, C1

journal

Teaching future Australian information systems professionals

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2007), pp. 63-70, Education, training and lifelong learning, Laxenburg, Austria, E1

conference

E-business security benchmarking : a model and framework

Dr Graeme Pye, Prof Matthew Warren

(2007), Vol. 1, pp. 378-390, International journal of information and computer security, Olney, N.S.W., C1

journal

Supporting user evaluation of IT security certification schemes

Nicholas J.A. Tate, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2007), pp. 70-81, ACIS2007 Toowoomba 5 to 7 December 2007 : Proceedings of the 18th Australasian Conference on Information Systems, Toowoomba, QLD, E1

conference

The impact of security surveys within Australia and New Zealand

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2007), pp. 152-156, Proceedings of the 5th Australian Information Security Management Conference, Perth, W.A., E1

conference

Institutionalising information security culture in Australian SMEs: framework and key issues

Dr Sneza Dojkovski, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2007), pp. 10-24, Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, Plymouth, England, E1

conference

A conceptual model for security outsourcing

Mr Kanishka Samarasinghe, Prof Matthew Warren, Dr Graeme Pye

(2007), pp. 187-194, Proceedings of the 5th Australian Information Security Management Conference, Perth, W.A., E1

conference

Benchmarks for critical infrastructure systems modelling

Dr Graeme Pye, Prof Matthew Warren

(2007), pp. 207-216, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Reading, England, E1

conference

Developing information security culture in small and medium size enterprises: Australian case studies

Dr Sneza Dojkovski, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2007), pp. 55-65, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Reading, England, E1

conference

A proposed cyber-terroism SCADA risk framework concept for Australia

Christopher Beggs, Prof Matthew Warren

(2007), pp. 17-26, ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, Reading, England, E1

conference

Fostering information security culture in small and medium size enterprises: an interpretive study in Australia

Dr Sneza Dojkovski, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2007), pp. 1560-1571, Proceedings of the 15th European Conference on Information Systems, St. Gallen, Switzerland, E1

conference

Locating risk through modelling critical infrastructure systems

Dr Graeme Pye, Prof Matthew Warren

(2007), pp. 87-98, Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, Plymouth, England, E1

conference

Toward user evaluation of IT security certification schemes: a preliminary framework

Nicholas J.A. Tate, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2007), pp. -, New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference, New York, N.Y., E1

conference

Security issues within virtual worlds such as second life

Chia Yao Lee, Prof Matthew Warren

(2007), pp. 142-, Proceedings of the 5th Australian Information Security Management Conference, Perth, W.A., E1

conference

A case study of e-business security management for Australia medium SME's

Dr Damien Hutchinson, Prof Matthew Warren

(2007), pp. 1-12, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Vic., E1

conference
2006

A methodology of health information security evaluation

Warren Brooks, Prof Matthew Warren

(2006), pp. 1-7, HIC 2006 : Primary care & beyond: building the e-birdge to intergrated care, 9-11 August 2006, Auckland NZ, Auckland, N. Z., E1-1

conference

Improving ICT governance in Australian companies

Breanna O' Donohue, Dr Graeme Pye, Prof Matthew Warren

(2006), pp. -, Proceedings of the 17th Australasian Conference on Information Systems, Adelaide Convention Centre, 6th-8th December 2006 : thought leadership in IS, Sydney, N.S.W., E1

conference

The design and rationale of the Australian small to medium enterprise e-business security methodology (ASME-EBSM)

Dr Damien Hutchinson, Prof Matthew Warren

(2006), pp. 247-258, 7th International We-b (Working for E-Business) Conference: e-Business: how far have we come?, Melbourne, Vic., E1

conference

Critical infrastructure protection, modelling and management: an Australian commercial case study

Dr Graeme Pye, Prof Matthew Warren

(2006), pp. 177-190, Proceedings of the 5th European Conference on Information Warfare and Security : National Defence College, Helsinki, Finland, 1 - 2 June 2006, Reading, England, E1

conference

A conceptual model of and framework for benchmarking online security

Dr Graeme Pye, Prof Matthew Warren

(2006), pp. 501-508, e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Challenges in fostering an information security culture in Australian small and medium sized enterprises

Dr Sneza Dojkovski, A/Prof Sharman Lichtenstein, Prof Matthew Warren

(2006), pp. 31-40, ECIW2006 : proceedings of the 5th European conference on Information Warfare and Security, reading, England, E1

conference

Conceptual modelling: choosing a critical infrastructure modelling methodology

Dr Graeme Pye, Prof Matthew Warren

(2006), pp. 103-113, Proceedings of the 7th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

E-business security management for Australian micro SMEs - a case study

Dr Damien Hutchinson, Prof Matthew Warren

(2006), pp. 69-72, GITMA 2006 : Proceedings of the Seventh Annual Global Information Technology Management World Conference, Greensboro, NC., E1

conference

E-business security management for Australian small SMEs - a case study

Dr Damien Hutchinson, Prof Matthew Warren

(2006), pp. 65-74, 7th International We-b (Working for E-Business) Conference : e-Business : how far have we come?, Melbourne, Vic., E1

conference

Outsourcing system security: a theoretical perspective

Dr David Wilde, Prof Matthew Warren, Dr William Hutchinson

(2006), pp. 1-10, Proceedings of the 17th Australasian Conference on Information Systems, Adelaide Convention Centre, 6th-8th December 2006 : thought leadership in IS, Sydney, N.S.W., E1

conference

The derivation of a conceptual model for outsourcing IT security

Dr David Wilde, Prof Matthew Warren, Dr William Hutchinson

(2006), pp. 234-238, Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland., E1

conference

A participational security method for healthcare organisations

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2006), pp. -, e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Social engineering and its impact via the internet

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2006), pp. 184-189, Proceedings of the 4th Australian Information Security Management Conference, Perth, WA, E1

conference

The derivation of a conceptual model for IT security outsourcing

Dr David Wilde, Prof Matthew Warren, Dr William Hutchinson

(2006), pp. 1-16, Proceedings of the 4th Australian Information Security Management Conference, Perth, W.A., E1

conference

Security management : modelling critical infrastructure

Dr Graeme Pye, Prof Matthew Warren

(2006), Vol. 5, pp. 46-61, Journal of information warfare, Churchlands, W. A., C1

journal

A methodology of health information security evaluation

Warren Brooks, Prof Matthew Warren

(2006), pp. 1-8, Health care and informatics review online, Auckland, New Zealand, C1

journal

Penetration testing professional ethics : a conceptual model and taxonomy

Mr Justin Daniel Pierce, Ashley G Jones, Prof Matthew Warren

(2006), Vol. 13, pp. 193-200, Australasian journal of information systems, North Sydney, N.S.W., C1

journal

Striking a balance between ethics and ICT governance

Dr Graeme Pye, Prof Matthew Warren

(2006), Vol. 13, pp. 201-207, Australian journal of information systems, Canberra, A.C.T., C1

journal
2005

In pursuit of a standard penetration testing methodology

Mr Justin Daniel Pierce, Prof Matthew Warren, Mr Xavier Corray

(2005), Vol. 4, pp. 26-39, Journal of information warfare, Perth, W.A., C1-1

journal

Australian commercial-critical infrastructure management protection

Dr Graeme Pye, Prof Matthew Warren

(2005), pp. 249-259, Proceedings of the 4th European Conference on Information Warfare and Security, Reading, England, E1

conference

An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?

Mr Justin Daniel Pierce, David William Mackay, Prof Matthew Warren, Mr Jason Wells

(2005), pp. -, E-links : community, business and university : proceedings of the 6th International We-B (Working for E-Business) Conference, 23rd to 25th November, 2005, Melbourne, Melbourne, Vic., E1

conference

A review of Australian internet banking client-side authentication models

Mr Justin Daniel Pierce, David William Mackay, Prof Matthew Warren, Mr Jason Wells

(2005), pp. -, Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Geelong, Vic., E1

conference

A taxonomy of penetration testing ethics

Mr Justin Daniel Pierce, Ashley G Jones, Prof Matthew Warren

(2005), pp. -, Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Vic., E1

conference

Understanding transition towards information security culture change

Dr Leanne Ngo, Prof Wanlei Zhou, Prof Matthew Warren

(2005), pp. 67-73, Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, Perth, W.A., E1

conference

An approach for critical information infrastructure protection

Tyrone Busuttil, Prof Matthew Warren

(2005), pp. -, 4th European Conference on Information Warfare and Security: University of Glamorgan, [Pontypridd], UK, 11 - 12 July 2005 ; [ECIW 2005], Reading, England, E1

conference

RFID and ethics

A/Prof Caroline Chan, Prof Matthew Warren

(2005), pp. -, Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, E1

conference

A systems approach to security

Prof Matthew Warren, Dr William Hutchinson

(2005), pp. 302-305, Systems Thinking and Complexity Science: Insights for Action Proceedings of the 11th Annual ANZSYS / Managing the Complex V conference, Mansfield, Mass., E1

conference

A conceptual model security for IT security outsourcing

Prof Matthew Warren, Dr Sneza Dojkovski, Dr William Hutchinson

(2005), pp. -, Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Geelong, Vic., E1

conference

Information security culture in small and medium sized enterprises: a socio-cultural framework

Dr Sneza Dojkovski, Prof Matthew Warren, A/Prof Sharman Lichtenstein

(2005), pp. -, Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Vic., E1

conference

Modelling critical infrastructure dependency relationships

Dr Graeme Pye, Prof Matthew Warren

(2005), pp. -, Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005., Geelong, Vic., E1

conference

Benchmarking e-business security : a model and framework

Dr Graeme Pye, Prof Matthew Warren

(2005), pp. 1-8, Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, Perth, W.A., E1

conference

Ethics or ICT governance: striking an ethical balance

Dr Graeme Pye, Prof Matthew Warren

(2005), pp. -, Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Vic., E1

conference

System survivability: a critical security problem

J Redman, Prof Matthew Warren, Dr William Hutchinson

(2005), Vol. 13, pp. 182-188, Information management & computer security, Bingley, England, C1

journal

The ethics of hacking and computer abuse: Australian case studies

Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2005), pp. 35-48, Electronic monitoring in the workplace: controversies and solutions, Hershey, Pa, B1

chapter
2004

PKI - advantages and obstacles

Ana Jancic, Prof Matthew Warren

(2004), pp. 1-9, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, WA, E1

conference

Critical infrastructure protection: comparison of countries

Pasquale Marasea, Prof Matthew Warren

(2004), pp. 249-260, 3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004], Reading, England, E1

conference

System survivability : a new security concept

J Redman, Prof Matthew Warren, Dr William Hutchinson

(2004), pp. 337-343, INC 2004 : Proceedings of the 4th International Network Conference, Plymouth, England, E1

conference

A risk analysis approach to critical information infrastructure protection

Tyrone Busuttil, Prof Matthew Warren

(2004), pp. 1-11, 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations, Churchlands, W.A., E1

conference

Health information security evaluation: continued development of an object-oriented method

Warren Brooks, Prof Matthew Warren

(2004), pp. 1-15, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, WA, E1

conference

Cyber crime influencing businesses in South Africa

Marlien Herselman, Prof Matthew Warren

(2004), Vol. 1, pp. 253-266, Journal of issues in informing science and information technology, Santa Rosa, Calif., C1

journal

An empirical study of e-business security in Geelong small to medium business enterprises (SMEs)

Dr Damien Hutchinson, Prof Matthew Warren

(2004), pp. 1-11, We-B 2004 : 5th International WE-B (Working for e-Business) Conference : Enterprise value from e-business, conference proceedings, Joondalup, Western Australia, E1

conference

Graphical authentication : an architectural design specification

Mr Justin Daniel Pierce, Prof Matthew Warren, David William Mackay, Mr Jason Wells

(2004), pp. 76-82, 2nd Australian Computer,Networks & Information Forensics Conference Proceedings, Perth, W.A., E1

conference

A critical review of penetration testing methodologies

Mr Justin Daniel Pierce, Prof Matthew Warren, Mr Xavier Corray

(2004), pp. 167-173, 5th Australian Information Warfare and Security Conference 2004 Proceedings, Perth, W.A., E1

conference

Graphical authentication: justifications and objectives

Mr Justin Daniel Pierce, Prof Matthew Warren, David William Mackay, Mr Jason Wells

(2004), pp. 49-55, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, W.A., E1

conference

CIIP-RAM- a security risk analysis methodology for critical information infrastructure protection

Tyrone Busuttil, Prof Matthew Warren

(2004), pp. 33-49, Information securtiy management, education and privacy, Boston, Mass., B1

chapter
2003

A national information infrastructure model for information warfare defence

Mr Vernon Stagg, Prof Matthew Warren

(2003), pp. 97-110, Current security management and ethical issues of information technology, Hershey, Pa., B1-1

chapter

Designing systems for e-commerce

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2003), Vol. 10, pp. 139-143, AJIS Australian journal of information systems, Canberra, ACT, C1-1

journal

Australian hackers and ethics

Prof Matthew Warren, Dr William Hutchinson

(2003), Vol. 10, pp. 151-156, Australasian journal of information systems, Canberra, ACT, C1-1

journal

A quality indicator of Australian e-business

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2003), Vol. III, pp. 149-152, E-business review: a publication of the International Academy of E-Business., Nacogdoches, Tex., C1-1

journal

The law and cyber terrorism

Prof Matthew Warren, Dr William Hutchinson

(2003), Vol. 2, pp. 27-32, Journal of information warfare, Mt. Eliza, Vic.; Perth, WA, C1-1

journal

A security risk management approach for e-commerce

Prof Matthew Warren, Dr William Hutchinson

(2003), Vol. 11, pp. 238-242, Information management & computer security, Bingley, England, C1-1

journal

Object-oriented security modelling for healthcare

Warren Brooks, Prof Matthew Warren

(2003), pp. 1-10, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, W.A., E1

conference

Information security, cyber crime, and infrastructure protection : information security management within Australian healthcare organisations

Warren Brooks, Prof Matthew Warren, Dr William Hutchinson

(2003), pp. -, The Information Institute ISOneWorld Conference and Convention, Washington, DC, E1

conference

An Australian supply chain risk assessment model

Mr Justin Daniel Pierce, Prof Matthew Warren, David William Mackay

(2003), pp. 109-112, IS 2003 : Proceedings of the 6th International Multi-Conference on Intelligent and Computer Systems : New information society, Ljubljana, Slolvenia, E1

conference

A retail supply chain risk assessment conceptual model

Mr Justin Daniel Pierce, David William Mackay, Prof Matthew Warren

(2003), pp. 1-6, 4th International We-B Conference (working with e-business), 24-25 November 2003, Perth, Western Australia, Perth, W.A., E1

conference

Quantum cryptography - one step closer to reality

Ana Jancic, Prof Matthew Warren

(2003), pp. 181-189, Proceedings 4th Australian Information Warfare and IT Security Conference : Enhancing trust, Adelaide, SA, E1

conference

CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection

Tyrone Busuttil, Prof Matthew Warren

(2003), pp. 91-103, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, S. Aust., E1

conference

An analysis of CSI/FBI and AusCERT surveys

Mr Justin Daniel Pierce, Prof Matthew Warren, David William Mackay

(2003), pp. 1-11, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, W.A., E1

conference

A conceptual model for graphical authentication

Mr Justin Daniel Pierce, Mr Jason Wells, Prof Matthew Warren, David William Mackay

(2003), pp. 1-8, InfoSec03 : 1st Australian Information Security Management Conference, Perth, W.A., E1

conference

Three strategic dimensions of information security in ecommerce : a literature review based conceptual model

Mr Lucian Vasiu, Prof Matthew Warren, David William Mackay

(2003), pp. 1-10, Surfing the waves: management challenges, management solutions: proceedings of the 17th ANZAM conference, Joondalup, W.A., E1

conference

The tri-dimensional role of information security in E-business : a managerial perspective

Mr Lucian Vasiu, David William Mackay, Prof Matthew Warren

(2003), pp. 1-9, 2003 Hawaii International Conference on Business, Honolulu, T.H., E1

conference

A review of critical information infrastructure protection within IT security guidelines

Tyrone Busuttil, Prof Matthew Warren

(2003), pp. 105-113, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, S. Aust., E1

conference

Modelling e-business security recommendations for Australian small to medium business enterprises (SMEs)

Dr Damien Hutchinson, Prof Matthew Warren

(2003), pp. -, 4th International WE-B Conference 2003 - e-Business and Information Systems, Perth, W.A., E1

conference

Security for internet banking: a framework

Dr Damien Hutchinson, Prof Matthew Warren

(2003), Vol. 16, pp. 64-73, Journal of enterprise information management, Bingley, England, C1

journal

Australian SMES and e-security guides on trusting the internet

Dr Damien Hutchinson, Prof Matthew Warren

(2003), pp. 88-91, GITMA 2003 : Proceedings of the Fourth Annual Global Information Technology Management World Conference, Marietta, Ga., E1

conference

A process based security framework for e-business and Australian SMES

Dr Damien Hutchinson, Prof Matthew Warren

(2003), pp. 155-158, Proceedings of the Fourth Annual Global Information Technology Management World Conference, Marietta, Ga., E1

conference

Defining fraud: issues for organizations from an information systems perspective

Mr Lucian Vasiu, Prof Matthew Warren, David William Mackay

(2003), pp. 971-979, Proceedings of the Seventh Pacific Asia Conference on Information Systems, Adelaide, S.Aust., E1

conference

Information security : an e-learning problem

Prof Matthew Warren, Dr William Hutchinson

(2003), pp. 21-26, Advances in web-based learning - ICWL 2003, Heidelberg, Germany, B1-1

chapter
2002

Information superiority and the role of an organisation's network

Dr William Hutchinson, Prof Matthew Warren

(2002), pp. 567-572, Papers from the Third International Network Conference 2002 : 16-18 July 2002, Plymouth, United Kingdom, Bradford, England, E1

conference

Developing a postgraduate course in information security: a confusion of terms

Dr William Hutchinson, Prof Matthew Warren

(2002), pp. 805-812, Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, Melbourne, Australia, E1

conference

Network theory - the demise of systems thinking?

Dr William Hutchinson, Prof Matthew Warren

(2002), pp. -, ANZIIS 2003 : proceedings of the Eighth Australia and New Zealand Intelligent Information Systems Conference, Dec. 10-12, Sydney, Australia, Brisbane, Qld., E1

conference

Truth, lies, reality and deception : an issue for e-commerce

Dr William Hutchinson, Prof Matthew Warren

(2002), Vol. 3, pp. 208-221, International journal of services technology and management, London, England, C1

journal

Will new laws be effective in reducing web sponsorship of terrorist groups?

Prof Matthew Warren, Dr William Hutchinson

(2002), pp. 156-161, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, WA, E1

conference

Security management: an information systems setting

Prof Matthew Warren, Prof Lynn Batten

(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Berlin/Heidelberg, Germany, E1

conference

E-security guides for Australian SMEs

Dr Damien Hutchinson, Prof Matthew Warren

(2002), pp. 1-11, E-conomy - from here to where? : proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Churchlands, W.A., E1

conference

Swarming attacks and agents

Prof Matthew Warren, Mrs Michelle Cyganowski, K Pascoe

(2002), pp. 209-217, Protecting the infrastructure: proceedings of the 3rd Australian Information Warfare and Security conference 2002, Perth, WA, E1

conference

Personal privacy issues in B2C eCommerce : a theoretical framework

Mr Lucian Vasiu, Prof Matthew Warren, David William Mackay

(2002), pp. 1-8, CollECTeR 2002: Proceedings of the Seventh CollECTeR Conference on Electronic Commerce, Wollongong, N.S.W., E1

conference

A security evaluation criteria

Warren Brooks, Prof Matthew Warren, Dr William Hutchinson

(2002), Vol. 15, pp. 377-384, Logistics information management, Bingley, England, C1

journal

Deception and reality: a challenge for the information and knowledge management function

Dr William Hutchinson, Prof Matthew Warren

(2002), pp. 287-295, Human factors in information systems, Hershey, PA, B1

chapter

E-universities : - business and technology (an Australian viewpoint)

Ms Penelope Goward, Prof Matthew Warren, A/Prof Shona Margaret Leitch

(2002), pp. 7-10, Euromedia 2002 : proceedings of the seventh annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications, Ghent, Belgium, E1

conference

A formalisation of an information infrastructure security risk analysis approach

Tyrone Busuttil, Prof Matthew Warren

(2002), pp. 174-182, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Churchlands, W.A., E1

conference

Security risk analysis e-commerce

Prof Matthew Warren, Dr William Hutchinson

(2002), pp. 397-404, Proceedings of the Third International Network Conference (INC2002), Plymouth, England, E1

conference

Information security management within Australian healthcare organisations

Warren Brooks, Prof Matthew Warren

(2002), pp. 318-331, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Internet banking: security, ethics and trust

Dr Damien Hutchinson, Prof Matthew Warren

(2002), pp. 52-62, Conference proceedings of AiCE 2002, Third Australian Institute of Computer Ethics Conference, Geelong, Vic., E1

conference

Australian hackers: an ethical perspective

Prof Matthew Warren, Dr William Hutchinson

(2002), pp. 131-138, Third Australian Institute of Computer Ethics Conference Proceedings: Computer Ethics: Its Impact for Australia, Geelong, Vic., E1

conference

Information warfare: using the viable system model as a framework to attack organisations

Bill Hutchinson, Prof Matthew Warren

(2002), Vol. 9, pp. 67-74, AJIS : Australian journal of information systems, Wollongong, N.S.W., C1

journal

Defending infrastructures against information warfare

Mr Vernon Stagg, Prof Matthew Warren

(2002), pp. -, Issues and trends of information technology management in contemporary organizations : 2002 Information Resources Management Association International Conference, Seattle, Washington, USA, May 19-22, 2002, Hershey, Pa., E1

conference

Designing ethical systems for electronic commerce

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2002), pp. 68-74, Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, Geelong, Vic., E1

conference

Security practice: survey evidence from three countries

Prof Matthew Warren

(2002), Vol. 15, pp. 347-351, Logistics information management, Bingley, England, C1

journal

Information warfare incident monitoring - government or public responsibility?

Prof Lynn Batten, Prof Matthew Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Churchlands, W.A., E1

conference

Protection of New Zealand in the age of information warfare

Prof Matthew Warren, John McIntyre

(2002), pp. 235-240, Protecting the infrastructure: proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Perth, WA, E1

conference

Baseline security standards evaluation

Warren Brooks, Prof Matthew Warren

(2002), pp. 162-173, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Manipulating reality: deception on the web

Dr William Hutchinson, Prof Matthew Warren

(2002), pp. 300-312, Make or break issues in IT management, Oxford, England, B1

chapter

A conceptual approach to information warfare : security risk analysis

Tyrone Busuttil, Prof Matthew Warren

(2002), pp. 35-41, ECIW2003 : proceedings of the 2nd European conference on Information Warfare and Security, Reading, England, E1

conference

A conceptual framework of eFraud from a supply chain management perspective

Mr Lucian Vasiu, David William Mackay, Prof Matthew Warren

(2002), pp. 1-9, E-conomy - from here to where? : Proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Churchlands, W.A., E1

conference

A security evaluation criteria for baseline security standards

Warren Brooks, Prof Matthew Warren, Dr William Hutchinson

(2002), pp. 79-89, Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives, Berlin/Heidelberg, Germany; The Netherlands, E1

conference

Asymmetric scalability: the unfair advantage of information warfare

Mr Vernon Stagg, Prof Matthew Warren

(2002), pp. 290-297, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Western Australia, 28 & 29 November 2002, Churchlands, W.A., E1

conference

A conceptual model for security and trust within internet banking transactions

Dr Damien Hutchinson, Prof Matthew Warren

(2002), pp. 2228-2234, Association for Information Systems 8th Americas Conference on Information Systems : AMCIS 2002 ; August 8 - 11, 2002, Dallas, Texas., Atlanta, Ga., E1

conference
2001

The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system

Dr William Hutchinson, Prof Matthew Warren

(2001), pp. 97-103, Information systems in the digital world : proceedings of the 6th UKAIS Conference, Manchester, England, E1

conference

The design, development and implementation of an e-commerce system for procuring materials in construction

Stephen Kong, Dr Heng Li, A/Prof Peter Love, Prof Matthew Warren

(2001), pp. 315-325, Working for excellence in the e-conomy: proceedings: 2nd International We-B Conference 2001, Churchlands, W.A., E1

conference

The nature of data: illusions of reality

Dr William Hutchinson, Prof Matthew Warren

(2001), pp. 262-267, Informing Science and IT Education Conference: proceedings and schedule, Santa Rosa, Calif., E1

conference

Cyber terrorism and the contemporary corporation

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 53-64, Information security management : global challenges in the new millennium, Hershey, Pa., B1

chapter

A business information infrastructure

Mr Vernon Stagg, Prof Matthew Warren

(2001), pp. 173-181, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, Western Australia, 29 & 30 November 2001, Churchlands, W.A., E1

conference

A security method for healthcare organisations

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 157-166, Advances in information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security, Boston, E1

conference

A security training approach for UK small and medium sized enterprises

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 197-207, WISE 2 : proceedings of the IFIP TC11 WG 11.8 Second World Conference on Information Security Education, 2001, Perth, WA, E1

conference

Attitudes of Australian information system managers against online attackers

Dr William Hutchinson, Prof Matthew Warren

(2001), Vol. 9, pp. 106-111, Information management & computer security, Bradford, England, C1

journal

Information warfare and hacking

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 195-206, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

Intelligent agent technology within information warfare

Tyrone Busuttil, Prof Matthew Warren

(2001), Vol. 1, pp. 52-61, Journal of information warfare, Melbourne, Vic., C1

journal

Teaching small and medium sized enterprises about security

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 207-217, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

Principles of information warfare

Dr William Hutchinson, Prof Matthew Warren

(2001), Vol. 1, pp. 1-6, Journal of information warfare, Mt. Eliza, Vic., C1

journal

Information warfare and ethics

Prof Matthew Warren, Dr William Hutchinson

(2001), Vol. 8, pp. 58-62, Australasian journal of information systems, Wollongong, NSW; Clayton, Vic., C1

journal

Current state and research trends in the area of process visualization in workflow system for e-commerce applications

Pawel Wojcieszak, Prof Matthew Warren

(2001), pp. 289-296, EUROMEDIA 2001, featuring WEBTEC, MEDIATEC, COMTEC, APTEC, April 18 - 20, 2001, Valencia, Spain, Valencia, Spain, E1

conference

Security issues of M-Commerce

Dr Damien Hutchinson, Prof Matthew Warren

(2001), pp. 478-485, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Perth, W.A., E1

conference

A duality security risk analysis method for e-commerce

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 259-266, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Churchlands, W.A., E1

conference

A framework of security authentication for internet banking

Dr Damien Hutchinson, Prof Matthew Warren

(2001), pp. 467-477, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Churchlands, W.A., E1

conference

Deception: a tool and curse for security management

Prof Matthew Warren, Dr William Hutchinson

(2001), pp. 327-337, Trusted information : the new decade challenge : IFIP TC11 16th International Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France, Boston, E1

conference

E-commerce: a Victorian case study

Prof Matthew Warren, A/Prof Shona Margaret Leitch, A/Prof Peter Love

(2001), pp. 255-263, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Churchlands, W.A., E1

conference

An application of soft systems in determining user requirements

Dr Damien Hutchinson, Tyrone Busuttil, Prof Matthew Warren

(2001), pp. 132-140, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Churchlands, W.A., E1

conference

A risk analysis model to reduce computer security risks among healthcare organizations

Prof Matthew Warren

(2001), Vol. 3, pp. 27-37, Risk Management, Leicester, England, C1

journal

A review of IT benefits and costs in construction

Mr Clayton Cowley, A/Prof Peter Love, Prof Matthew Warren

(2001), pp. 120-131, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Churchlands, W.A., E1

conference

Security authentication for on-line internet banking

Dr Damien Hutchinson, Prof Matthew Warren

(2001), Vol. 25, pp. 349-355, Informatica (Slovenia), Ljubljana, Slovenia, C1

journal

Intelligent agents and their information warfare implications

Tyrone Busuttil, Prof Matthew Warren

(2001), pp. 109-118, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Churchlands, W.A., E1

conference
2000

Ethics and electronic commerce

A/Prof Shona Margaret Leitch, Prof Matthew Warren

(2000), pp. 1-4, Computer ethics 2000 : selected papers from the Second Australian Institute of Computer Ethics Conference (AICE2000), Sydney, N.S.W., E1

conference
1999

Computer hacking and cyber terrorism: The real threats in the new millennium?

S Furnell, Prof Matthew Warren

(1999), Vol. 18, pp. 28-34, Computers and Security, Amsterdam, The Netherlands, C1-1

journal