Research Services Division

Deakin Research

Research Output for Matthew Warren

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

2013 School of Information and Business Analytics

Warren, M J, Leitch, S and Rosewall, I (2013) WikiLeaks and Information Disclosure: The Bradley Manning Case, The Journal of the Australian Institute of Professional Intelligence Officers, vol. 21, no. 2, pp. 3-16, AIPIO, Canberra, ACT [C1]
ERA journal ID: 40340 – Scopus EID: Not tagged
DRO entry for this publication

Roshan, Mina, Warren, Matthew and Carr, Rodney (2013) Understanding the role of social media in incident crisis communication, in unknown (ed.), Proceedings of the 24th Australasian Conference on Information Systems, ACIS 2013, pp. 1-9, RMIT, Melbourne, Vic. [E1]
DRO entry for this publication

Senarathna, Ishan, Warren, Matthew, Yeoh, William and Salzman, Scott (2013) An empirical study of the influence of different organisation cultures on e-commerce adoption maturity, in unknown (ed.), ACIS 2013 : Proceedings of the Information Systems 2013 Australasian Conference, pp. 1-10, RMIT, Melbourne, Vic. [E1]
DRO entry for this publication

2012 School of Information and Business Analytics

Beggs, Christopher* and Warren, Matthew (2012) Safeguarding Australia from cyber-terrorism : a SCADA risk framework, in Gupta, Manish; Walp, John and Sharman, Raj (eds), Strategic and practical approaches for information security governance, pp. 369-384, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Rosewall, Ian and Warren, Matthew (2012) Loss of data : reflective case studies, in Gupta, Manish; Walp, John and Sharman, Raj (eds), Strategic and practical approaches for information security governance, pp. 405-420, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2012) New media and web 2.0 : an Irish republican example, Journal of information warfare, vol. 11, no. 1, pp. 1-11, Mindsystems Pty. Ltd., Mt. Eliza, Vic. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

2011 School of Information and Business Analytics

Leitch, Shona and Warren, Matthew (2011) The ethics of security of personal information upon facebook, in Quigley, Marian (eds), ICT ethics and security in the 21st century : new developments and applications, pp. 46-65, IGI Global, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Pye, Graeme, Warren, Matthew and Hutchinson, William* (2011) Critical infrastructure protection : an ethical choice, in Quigley, Marian (eds), ICT ethics and security in the 21st century : new developments and applications, pp. 214-230, IGI Global, Information Science Reference, Hershey Pa. [B1]
DRO entry for this publication

Warren, Matthew J. and Leitch, Shona (2011) Protection of Australia in the cyber age, International journal of cyber warfare and terrorism, vol. 1, no. 1, pp. 35-40, IGI Global, Hershey, Pa. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Ruighaver, A. B., Warren, M. and Ahmad, A.* (2011) Does traditional security risk assessment have a future in information security?, Journal of information warfare, vol. 10, no. 3, pp. 16-28, Mindsystems Pty. Ltd., Mt. Eliza, Vic. [C1.1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Couchman, Paul K., Wilkin, Carla*, Zutshi, Ambika, Sohal, Amrik* and Warren, Matthew (2011) Meeting the challenge of information system security : an exploratory study of the communication of IS security management capabilities, in Unknown (ed.), BAM 2011 : Building and sustaining high performance organisations in a challenging environment, British Academy of Management, Birmingham, U. K. [E1]
DRO entry for this publication

Couchman , Paul K., Zutshi, Ambika, Wilkin, Carla*, Warren, Matthew and Sohal, Amrik* (2011) Corporate governance and information technology : findings from an exploratory survey of Australian organizations, in unknown (ed.), ANZAM 2011 : 25th Annual Australian And New Zealand Academy of Management conference : the future of work and organisations, pp. 1-19, ANZAM, Wellington, N.Z. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew J. (2011) Social networking and teaching : an Australian case study, in unknown (ed.), InSITE 2011 : Proceedings of Informing Science & IT Education Conference, pp. 315-326, Informing Science Institute, Novi Sad, Serbia [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2011) Analysis and modelling of critical infrastructure systems, in Ottis, Rain (eds), ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, Academic Conference Limited, Reading, England [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2011) Modelling relational aspects of critical infrastructure systems, in Ottis, Rain (eds), ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, pp. 202-210, Academic Conference Limited, Reading, England [E1]
DRO entry for this publication

Senadheera, Vindaya, Warren, Matthew and Leitch, Shona (2011) A study into how Australian banks use social media, in unknown (ed.), PACIS 2011 : Proceedings of the 15th Pacific Asia Conference on Information Systems, pp. 1-12, The University of Queensland, Brisbane, Qld. [E1]
DRO entry for this publication

Warren, Matthew, Leitch, Shona and Rosewall, Ian (2011) Attack vectors against social networking systems : the Facebook example, in Bolan, Christopher and Valli, Craig (eds), Proceedings of The 9th Australian Information Security Management Conference, SECAU - Security Research Centre, Perth, W. A. [E1]
DRO entry for this publication

Warren, Mathew and Leitch, Shona (2011) Australia and the question of internet control, in Bissett, Andy; Bynum, Terrell Ward; Light, Ann; Lauener, Angela and Rogerson, Simon (eds), ETHICOMP 2011 : The Social Impact of Social Computing : Proceedings of the 12th International Conference, pp. 488-493, Sheffield Hallam University, Sheffield, U. K. [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2011) Australian national critical infrastructure protection : a case study, in Ottis, Rain (eds), ECIW 2011 : Proceedings of the 10th European Conference on Information Warfare and Security, pp. 275-280, Academic Conference Limited, Reading, England [E1]
DRO entry for this publication

2010 School of Information and Business Analytics

Leitch, Shona and Warren, Matthew J. (2010) Ethics : the past, present and future of socio-tehnical systems design, in Tatnall, Arthur (eds), History of computing : learning form the past, pp. 189-197, Springer Berlin Heidelberg, Germany [B1]
DRO entry for this publication

Ruighaver, A. B., Maynard, S. B.* and Warren, M. (2010) Ethical decision making : improving the quality of acceptable use policies, Computers & security, vol. 29, no. 7, pp. 731-736, Elsevier Advanced Technology, Oxon, England [C1]
ERA journal ID: 17813 – Scopus EID: 2-s2.0-77956395261
Citation counts: Scopus - 2
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2010) Critical supply chain systems and critical infrastructure protection, International journal of logistics economics and globalisation, vol. 2, no. 2, pp. 107-117, Inderscience Publishers, Onley, England [C1]
ERA journal ID: 18549 – Scopus EID: Not tagged
DRO entry for this publication

Dojkovski, Sneza, Lichtenstein, Sharman and Warren, Matthew (2010) Enabling information security culture : influences and challenges for Australian SMEs, in Unknown (ed.), ACIS 2010 : Proceedings of the 21st Australasian Conference on Information Systems, ACIS, Brisbane, Qld. [E1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2010) Influence operations and behavioural change, in Demergis, Josef (eds), ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, pp. 116-119, University of Macedonia, Thessaloniki, Greece [E1]
DRO entry for this publication

Lee, Chia Yao and Warren, Matthew (2010) Micro-blogging in the workplace, in Bolan, Chris (eds), Proceedings of the 8th Australian Information Security Management Conference, pp. 42-48, SECAU Security Research Centre, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2010) An applied framework for modelling a critical infrastructure system incident, in Demergis, Josef (eds), ECIW 2010 : Proceedings of the 8th European Conference on Information Warfare and Security, pp. 245-260, Academic Publishing Ltd, London, England [E1]
DRO entry for this publication

Rosewall, Ian and Warren, Matthew (2010) Information security disclosure : a Victorian case study, in Unknown (ed.), Proceedings of the 8th Australian Information Security Management Conference, pp. 112-118, SECAU Security Research Centre, Perth, W.A. [E1]
DRO entry for this publication

Rosewall, Ian and Warren, Matthew (2010) Wikileaks : the truth or not?, in Williams, Patricia A. H. (eds), Proceedings of The 11th Australian Information Warfare and Security Conference, pp. 26-29, SECAU - Security Research Centre, Perth, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2010) Development of a supply chain management security risk management method : a conceptual model, in Demergis, Josef (eds), ECIW 2010 : Proceedings of the 9th European Conference on Information Warfare and Security, pp. 327-333, University of Macedonia, Thessaloniki, Greece [E1]
DRO entry for this publication

Warren, Matthew, Pye, Graeme and Hutchinson, William* (2010) Australian critical infrastructure protection : a case of two tales, in Unknown (ed.), SECAU 2010 : Proceedings of the 11th Australian Information Warfare and Security Conference, pp. 30-36, SECAU Security Research Centre, Perth, W.A. [E1]
DRO entry for this publication

Zutshi, Ambika, Wilkin, Carla*, Couchman, Paul, Sohal, Amrik*, Wood, Greg and Warren, Matthew (2010) ICT corporate governance : a case study of a not-for-profit community healthcare organisation, in Unknown (ed.), ANZAM 2010 : Refereed Papers of the 24th Annual Australian and New Zealand Academy of Management Conference, ANZAM, Adelaide, S.Aust. [E1]
DRO entry for this publication

2009 School of Information and Business Analytics

O'Donohue, Breanna, Pye, Graeme and Warren, Matthew (2009) Impact of ICT governance within Australian companies, in Cater-Steel, Aileen (eds), Information technology governance and service management : frameworks and adaptations, pp. 163-177, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2009) An emergent security risk : critical infrastructures and information warfare, Journal of information warfare, vol. 8, no. 3, pp. 14-26, Mindsystems Pty. Ltd., Melbourne, Vic. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2009) Hacker taggers: a new type of hackers, Information systems frontiers, pp. 1-7, Springer Netherlands, Amsterdam, The Netherlands [C1]
ERA journal ID: 17912 – Scopus EID: 2-s2.0-78650172143
Citation counts: Scopus - 1
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2009) Security as an element in environmental assessment and decision making, in Unknown (ed.), ANZSEE 2009 : Green milage in the global meltdown: an ecological economics way forward. Proceedings of the conference of the Australia New Zealand Society for Ecological Economics, pp. 1-11, Australia New Zealand Society for Ecological Economics, Palmerston North, N.Z. [E1]
DRO entry for this publication

Islam, Md. Rafiqul, Abawajy, Jemal and Warren, Matthew (2009) Multi-tier phishing email classification with an impact of classifier rescheduling, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 789-793, ISPAN, Kaohsiung, Korea [E1]
Citation counts: Scopus - 9, Thomson - 1
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2009) Security Issue challenging facebook, in Unknown (ed.), Proceedings of the 7th Australian Information Security Management Conference, pp. 137-142, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2009) Security analysis and modelling framework for critical infrastructure systems, in Santos, Henrique (eds), ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, pp. 198-207, Academic Publishing Ltd, London, England [E1]
DRO entry for this publication

Rosewall, I. and Warren, M. J. (2009) Information security disclosure : a case study, in Unknown (ed.), Proceedings of 7th Australian Information Security Management Conference, pp. 39-47, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2009) Information security management curriculum development : an Australian example, in Unknown (ed.), INSITE 2009 : Proceedings of the 2009 Informing Science + Information Technology Education Conference, pp. 25-33, Informing Science Institute, Macon, Georgia [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2009) Supply chain management security : the weak link of Australian critical infrastructure protection, in Unknown (ed.), ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security, Academic Publishing, Reading, England [E1]
DRO entry for this publication

Beggs, Christopher* and Warren, Matthew (2009) Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for industry adoption, Proceedings of the 10th Australian Information Warfare and Security Conference, Edith Cowan University, Perth, W.A. [L1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2009) Appraising critical infrastructure systems with visualisation, Proceedings of the 10th Australian Information Warfare and Security Conference 2009, pp. 1-9, SECAU Security Research Centre, Perth, W.A. [L1]
DRO entry for this publication

Ruighaver, Tobias, Warren, Matthew and Ahmad, Atif* (2009) The ascent of asymmetric risk in information security: an initial evaluation, in Unknown (ed.), Proceedings of the 10th Australian Information Warfare and Security Conference, Edith Cowan University, Perth, W.A. [L1]
DRO entry for this publication

2008 School of Information and Business Analytics

Warren, M. J. and Busuttil, T. B. (2008) Security protection for critical infrastructure, in Quigley, Marian (eds), Encyclopedia of information ethics and security, pp. 609-615, Information Science Reference IGI Global, Hershey, Pa. [B1]
DRO entry for this publication

Warren, Matthew (2008) Hackers and cyber terrorists, in Quigley, Marian (eds), Encyclopedia of information ethics and security, pp. 304-311, Information Science Reference, Hershey, PA [B1]
DRO entry for this publication

Warren, M. (2008) Terrorism and the internet, in Janczewski, Lech J. and Colarik, Andrew M. (eds), Cyber warfare and cyber terrorism, pp. 42-49, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Warren, Matthew (2008) Computer crime, in McDermid, Donald (eds), Ethics in ICT : an Australian perspective, pp. 163-178, Pearson Education Australia, Frenchs Forest, N.S.W. [BN]
DRO entry for this publication

Beggs, Christopher* and Warren, Matthew (2008) Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for Australia, Journal of information warfare, vol. 7, no. 1, pp. 24-35, Teamlink, Mt. Eliza, Vic. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Leitch, Shona and Warren, Matthew J. (2008) Analysing online teaching and learning systems using MEAD, Interdisciplinary journal of knowledge and learning objects, vol. 4, pp. 259-266, Informing Science Institute, Santa Rosa, Calif. [C1]
ERA journal ID: 40906 – Scopus EID: Not tagged
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2008) Attention IT managers : why you can't trust security surveys, Deakin business review, vol. 1, no. 2, pp. 32-37, Deakin University, Geelong, Vic. [C1]
ERA journal ID: 40105 – Scopus EID: Not tagged
DRO entry for this publication

Crofts, Merete, Fraunholz, Bardo and Warren, Matthew (2008) Using the sociotechnical approach in global software developments : Is the theory relevant today?, in Mills, Annette and Huff, Sid (eds), ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, pp. 250-260, ACIS, Christchurch, New Zealand [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2008) Young people and the internet : what is the solution?, in Warren, Matthew (eds), AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, pp. 137-142, Deakin University, Burwood, Vic. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2008) Designing ethical systems for online systems, in Warren, Matthew (eds), AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, pp. 130-136, Deakin University, Burwood, Vic. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2008) Designing on-line learning systems using participation, in Cooper, Trudi (eds), ANZSYS 2008 : Proceedings of the 14th international Australia and New Zealand Systems Conference 2008, pp. 1-8, SECAU Security Research Centre, Perth, Western Australia [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2008) Considerations for modelling critical infrastructure systems, in Remenyi, Dan (eds), ECIW 2008 : Proceedings of the 7th European Conference on Information Warfare and Security, pp. 185-196, ECIW, Plymouth, England [E1]
DRO entry for this publication

Tate, Nicholas J. A., Lichtenstein, Sharman and Warren, Matthew J. (2008) IT security certifications : stakeholder evaluation and selection, in Mills, Annette and Huff, Sid (eds), ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, pp. 991-1001, ACIS, Christchurch, New Zealand [E1]
DRO entry for this publication

Wilde, W. D. and Warren, M. J. (2008) Visualisation of critical infrastructure failure, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 9th Australian Information Warfare and Security Conference 2008, pp. 48-63, SECAU Security Research Centre, Perth, Western Australia [E1]
DRO entry for this publication

Warren, Matthew (2008) The ethics of the hacker taggers : the new generation of hackers, ETHICOMP 2008 : Proceedings of the Tenth International Conference on the Social and Ethical Impacts of Information and Communication Technology, University of Pavia, Mantova, Italy [E2]
DRO entry for this publication

Leitch, Shona and Warren, Matthew J. (2008) Analysing online teaching and learning systems using MEAD, InSITE 2008 : Informing Science + IT Education Joint Conference Proceedings, Informing Science Press, Varna, Bulgaria [E3]
DRO entry for this publication

2007 School of Information and Business Analytics

Pye, Graeme and Warren, Matthew (2007) E-business security benchmarking : a model and framework, International journal of information and computer security, vol. 1, no. 4, pp. 378-390, Inderscience Publishers, Olney, N.S.W. [C1]
ERA journal ID: 32084 – Scopus EID: Not tagged
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2007) A model and framework for online security benchmarking, Informatica : journal of computing and informatics, vol. 31, no. 2, pp. 209-215, Slovensko Drustvo Informatika, Ljubljana, Jugoslavija [C1]
ERA journal ID: 32024 – Scopus EID: 2-s2.0-34547522696
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2007) Modelling critical infrastructure systems, Journal of information warfare, vol. 6, no. 1, pp. 41-53, Mindsystems Pty. Ltd., Australia [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Beggs, C.* and Warren, Matthew (2007) A proposed cyber-terroism SCADA risk framework concept for Australia, in Remenyi, Dan (eds), ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, pp. 17-26, Academic Conferences Limited, Reading, England [E1]
DRO entry for this publication

Dojkovski, Sneza, Lichtenstein, Sharman and Warren, Matthew (2007) Developing information security culture in small and medium size enterprises: Australian case studies, in Remenyi, Dan (eds), ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, pp. 55-65, Academic Conferences Limited, Reading, England [E1]
DRO entry for this publication

Dojkovski, S., Lichtenstein, Sharman and Warren, Matthew (2007) Institutionalising information security culture in Australian SMEs: framework and key issues, in Furnell, Steven and Clarke, Nathan (eds), Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, pp. 10-24, University of Plymouth, Plymouth, England [E1]
DRO entry for this publication

Dojkovski, S, Lichtenstein, Sharman and Warren, Matthew (2007) Fostering information security culture in small and medium size enterprises: an interpretive study in Australia, in Unknown (ed.), Proceedings of the 15th European Conference on Information Systems, pp. 1560-1571, University of St. Gallen, St. Gallen, Switzerland [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2007) A case study of e-business security management for Australia medium SME's, in Unknown (ed.), We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, pp. 1-12, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2007) Evaluating the effectiveness of an e-business security methodology using a case study approach, in Unknown (ed.), We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, pp. 1-14, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Lee, Chia Yao and Warren, Matthew (2007) Security issues within virtual worlds such as second life, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 5th Australian Information Security Management Conference, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2007) Using problem based learning to teach future Australian IS professionals, in Durbarry, Ramesh (eds), Proceedings of the Computer Science and IT Education Conference, pp. 417-424, Informing Science Institute, Mauritius [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2007) Teaching future Australian information systems professionals, in Tatnall, Arthur; Thompson, J.Barry and Edwards, Helen (eds), Education, training and lifelong learning, pp. 63-70, International Federation for Information Processing, Laxenburg, Austria [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2007) Benchmarks for critical infrastructure systems modelling, in Remenyi, Dan (eds), ECIW 2007 : Proceedings of the 6th European Conference on Information Warfare and Security, pp. 207-216, Academic Conferences Limited, Reading, England [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2007) Locating risk through modelling critical infrastructure systems, in Furnell, Steven and Clarke, Nathan (eds), Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, pp. 87-98, University of Plymouth, Plymouth, England [E1]
DRO entry for this publication

Samarasinghe, Kanishka, Warren, Matthew and Pye, Graeme (2007) A conceptual model for security outsourcing, in Vallie, Craig and Woodward, Andrew (eds), Proceedings of the 5th Australian Information Security Management Conference, pp. 187-194, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Tate, Nicholas, Lichtenstein, Sharman and Warren, Matthew (2007) Toward user evaluation of IT security certification schemes: a preliminary framework, in Vener, Hein (eds), New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference, Springer, New York, N.Y. [E1]
DRO entry for this publication

Tate, Nicholas, Lichtenstein, Sharman and Warren, Matthew (2007) Supporting user evaluation of IT security certification schemes, in Unknown (ed.), ACIS2007 Toowoomba 5 to 7 December 2007 : Proceedings of the 18th Australasian Conference on Information Systems, pp. 70-81, University of Southern Queensland, Toowoomba, QLD [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2007) The impact of security surveys within Australia and New Zealand, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 5th Australian Information Security Management Conference, pp. 152-156, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2007) Critical infrastructure systems modelling : benchmarking CPN tools, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 8th Australian Information Warfare and Security Conference, pp. 1-8, School of Computer and Information Science, Edith Cowan University, Perth, W.A. [L1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2007) Commercial critical systems and critical infrastructure protection : a future research agenda, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 8th Australian Information Warfare and Security Conference, pp. 9-14, School of Computer and Information Science, Edith Cowan University, Perth, W.A. [L1]
DRO entry for this publication

2006 School of Information and Business Analytics

Brooks, Warren and Warren, Matthew (2006) A methodology of health information security evaluation, Health care and informatics review online, vol. HINZ 2006 - Primary Care and Bey, pp. 1-8, Enigma Publications, Auckland, New Zealand [C1]
ERA journal ID: 40902 – Scopus EID: 2-s2.0-33749008784
DRO entry for this publication

Pierce, Justin D., Jones, Ashley G.* and Warren, Matthew (2006) Penetration testing professional ethics : a conceptual model and taxonomy, Australasian journal of information systems, vol. 13, no. 2, pp. 193-200, Australasian Association for Information Systems, North Sydney, N.S.W. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2006) Striking a balance between ethics and ICT governance, Australian journal of information systems, vol. 13, no. 2, pp. 201-207, Association for Information Systems, Canberra, A.C.T. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2006) Security management : modelling critical infrastructure, Journal of information warfare, vol. 5, no. 1, pp. 46-61, Edith Cowan University, Churchlands, W. A. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Dojkovski, Sneza, Lichtenstein, Sharman and Warren, Matthew (2006) Challenges in fostering an information security culture in Australian small and medium sized enterprises, in Remenyi, Dan (eds), ECIW2006 : proceedings of the 5th European conference on Information Warfare and Security, pp. 31-40, Academic Conferences Limited, reading, England [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2006) E-business security management for Australian small SMEs - a case study, in Shackleton, Peter (eds), 7th International We-b (Working for E-Business) Conference : e-Business : how far have we come?, pp. 65-74, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2006) The design and rationale of the Australian small to medium enterprise e-business security methodology (ASME-EBSM), in Sellitto, Carmine and Wenn, Andrew (eds), 7th International We-b (Working for E-Business) Conference: e-Business: how far have we come?, pp. 247-258, Electronic Commerce Research Unit ECRU, School of Information Systems, Faculty of Business and Law, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2006) E-business security management for Australian micro SMEs - a case study, in Palvia, Prashant; Pinjani, Praveen and Baqir, M. Naveed (eds), GITMA 2006 : Proceedings of the Seventh Annual Global Information Technology Management World Conference, pp. 69-72, GITMA, Greensboro, NC. [E1]
DRO entry for this publication

O'Donohue, B., Pye, Graeme and Warren, Matthew (2006) Improving ICT governance in Australian companies, in Koronios, Andy (eds), Proceedings of the 17th Australasian Conference on Information Systems, Adelaide Convention Centre, 6th-8th December 2006 : thought leadership in IS, Australasian Conference on Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2006) Conceptual modelling: choosing a critical infrastructure modelling methodology, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 7th Australian Information Warfare and Security Conference, pp. 103-113, Australian Information Warfare & Security Conference, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2006) A conceptual model of and framework for benchmarking online security, in Isaias, Pedro; McPherson, Maggie and Bannister, Frank (eds), e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, pp. 501-508, IADIS Press, Dublin, Ireland [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2006) Critical infrastructure protection, modelling and management: an Australian commercial case study, in Remenyi, Dan (eds), Proceedings of the 5th European Conference on Information Warfare and Security : National Defence College, Helsinki, Finland, 1 - 2 June 2006, pp. 177-190, Academic Conferences, Reading, England [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2006) Social engineering and its impact via the internet, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 4th Australian Information Security Management Conference, pp. 184-189, Australian Information Security Management, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2006) A participational security method for healthcare organisations, in Isaias, Pedro; McPherson, Maggie and Bannister, Frank (eds), e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, IADIS Press, Dublin, Ireland [E1]
DRO entry for this publication

Wilde, William, Warren, Matthew and Hutchinson, William* (2006) The derivation of a conceptual model for outsourcing IT security, in Isaias, Pedro; McPherson, Maggie and Bannister, Frank (eds), Proceedings of the IADIS International Conference e-Society 2006, pp. 234-238, IADIS Press, Dublin, Ireland. [E1]
DRO entry for this publication

Wilde, W. D., Warren, Matthew and Hutchinson, W.* (2006) The derivation of a conceptual model for IT security outsourcing, in Valli, Craig and Woodward, Andrew (eds), Proceedings of the 4th Australian Information Security Management Conference, pp. 214-226, Australian Information Security Management Conference, Perth, W.A. [E1]
DRO entry for this publication

Wilde, W., Warren, Matthew and Hutchinson, W.* (2006) Outsourcing system security: a theoretical perspective, in Spencer, S. and Jenkins, A. (eds), Proceedings of the 17th Australasian Conference on Information Systems, Adelaide Convention Centre, 6th-8th December 2006 : thought leadership in IS, Australasian Conference on Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Brooks, W and Warren, Matthew (2006) A methodology of health information security evaluation, in Warren, James (eds), HIC 2006 : Primary care & beyond: building the e-birdge to intergrated care, 9-11 August 2006, Auckland NZ, pp. 1-7, Health Informatics New Zealand, Auckland, NZ [E1.1]
DRO entry for this publication

Warren, M. (2006) Invited Speaker, 15th annual Conference of the Australian Institute of Professional Intelligence Officers,Brisbane, 17-19 October 2006 [Z]
no DRO entry yet for this publication

Warren, M. (2006) Invited Speaker, ACISP 2006 Workshop Social Engineering [Z]
no DRO entry yet for this publication

Warren, M. (2006) Editorial Review Board Member, Journal of Electronic Commerce in Organizations [Z]
no DRO entry yet for this publication

Warren, M. (2006) Invited speaker, CIO City Summit 2006, 16th February 2006 [Z]
no DRO entry yet for this publication

Warren, M. (2006) Editorial and Advisory Board Member, International Journal of Information and Computer Security [Z]
no DRO entry yet for this publication

Warren, M. (2006) Chief Editor, The Journal of Information Warfare [Z]
no DRO entry yet for this publication

Warren, M. (2006) Distinguished Speaker, International Conference on Industry Academia Collaboration: Opportunities and Challenges, 3-4 March, 2006 [Z]
no DRO entry yet for this publication

Warren, M. (2006) International Board of Referees, Computers & Security, Elsevier [Z]
no DRO entry yet for this publication

2005 School of Information and Business Analytics

Warren, Matthew and Leitch, Shona (2005) The ethics of hacking and computer abuse: Australian case studies, in Weckert, John (eds), Electronic monitoring in the workplace: controversies and solutions, pp. 35-48, Idea Group Publishing, Hershey, Pa [B1]
DRO entry for this publication

Redman, J., Warren, Matthew and Hutchinson, Willam* (2005) System survivability: a critical security problem, Information management & computer security, vol. 13, no. 3, pp. 182-188, Emerald Group Publishing Ltd, Bingley, England [C1]
ERA journal ID: 17903 – Scopus EID: 2-s2.0-24144496839
Citation counts: Scopus - 1
DRO entry for this publication

Pierce, J., Warren, Matthew and Corray, X.* (2005) In pursuit of a standard penetration testing methodology, Journal of information warfare, vol. 4, no. 3, pp. 26-39, Edith Cowan University, Perth, W.A. [C1.1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Pye, Graeme, Pierce, Justin D., Warren, Matthew and Mackay, David (2005) Supply chain security: the need for continuous assessment, Supply chain practice, vol. 7, no. 1, pp. 56-68, Cranfield School of Management, Bedford, England [C3]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2005) An approach for critical information infrastructure protection, in Hutchinson, Bill (eds), 4th European Conference on Information Warfare and Security: University of Glamorgan, [Pontypridd], UK, 11 - 12 July 2005 ; [ECIW 2005], Academic Conferences Ltd, Reading, England [E1]
DRO entry for this publication

Chan, C. and Warren, Matthew (2005) RFID and ethics, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, c2005., Deakin University, School of Information Systems [E1]
DRO entry for this publication

Dojkovski, Sneza, Warren, Matthew and Lichtenstein, Sharman (2005) Information security culture in small and medium sized enterprises: a socio-cultural framework, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Ngo, Leanne, Zhou, Wanlei and Warren, Matthew (2005) Understanding transition towards information security culture change, in Valli, C. and Woodward, A. (eds), Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, pp. 67-73, Edith Cowan University, School of Computer and Information Science, Perth, W.A. [E1]
DRO entry for this publication

Pierce, Justin D., Jones, Ashley G.* and Warren, Matthew (2005) A taxonomy of penetration testing ethics, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason (2005) A review of Australian internet banking client-side authentication models, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason (2005) An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?, in Sellitto, Carmine and Wenn, Andrew (eds), E-links : community, business and university : proceedings of the 6th International We-B (Working for E-Business) Conference, 23rd to 25th November, 2005, Melbourne, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Benchmarking e-business security : a model and framework, in Valli, Craig and Woodward, Andrew (eds), Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, pp. 1-8, Edith Cowan University, School of Computer and Information Science, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Ethics or ICT governance: striking an ethical balance, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Modelling critical infrastructure dependency relationships, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005., Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Australian commercial-critical infrastructure management protection, in Hutchinson, Bill (eds), Proceedings of the 4th European Conference on Information Warfare and Security, pp. 249-259, Academic Conferences Limited, Reading, England [E1]
DRO entry for this publication

Warren, Matthew, Wilde, D., Dojkovski, S. and Hutchinson, W.* (2005) A conceptual model security for IT security outsourcing, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2005) A systems approach to security, in Richardon, Kurt; Gregory, Wendy and Midgley, Gerald (eds), Systems Thinking and Complexity Science: Insights for Action Proceedings of the 11th Annual ANZSYS / Managing the Complex V conference, pp. 302-305, ISCE, Mansfield, Mass. [E1]
DRO entry for this publication

Dojkovski, Sneza, Warren, Matthew and Hutchinson, W.* (2005) Issues of Australian IT security outsourcing, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, Geelong, Vic. [E2]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, in Pye, Graeme and Warren, Matthew (eds), Deakin University, Geelong, Vic. [E4]
DRO entry for this publication

2004 School of Information and Business Analytics

Busuttil, T.B. and Warren, Matthew (2004) CIIP-RAM- a security risk analysis methodology for critical information infrastructure protection, in Deswarte, Yves (eds), Information securtiy management, education and privacy, pp. 33-49, Kluwer Academic Publishers, Boston, Mass. [B1]
DRO entry for this publication

Herselman, Marlien* and Warren, Matthew (2004) Cyber crime influencing businesses in South Africa, Journal of issues in informing science and information technology, vol. 1, pp. 253-266, Informing Science Institute, Santa Rosa, Calif. [C1]
ERA journal ID: 22235 – Scopus EID: Not tagged
DRO entry for this publication

Brooks, Warren and Warren, Matthew (2004) Health information security evaluation: continued development of an object-oriented method, in Hutchinson, William and Valli, Craig (eds), Proceedings of the 2nd Australian Information Security Management Conference: securing the future, pp. 1-15, Edith Cowan University., Perth, WA [E1]
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2004) A risk analysis approach to critical information infrastructure protection, in Stockdale, Craig and Stockdale, Rosemary (eds), 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations, pp. 1-11, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2004) An empirical study of e-business security in Geelong small to medium business enterprises (SMEs), in Stockdale, Rosemary and Standing, Craig (eds), We-B 2004 : 5th International WE-B (Working for e-Business) Conference : Enterprise value from e-business, conference proceedings, pp. 1-11, Edith Cowen University, We-B centre, Joondalup, Western Australia [E1]
DRO entry for this publication

Jancic, A. and Warren, Matthew (2004) PKI - advantages and obstacles, in Hutchinson, William and Valli, Craig (eds), Proceedings of the 2nd Australian Information Security Management Conference: securing the future, pp. 1-9, Edith Cowan University, Perth, WA [E1]
DRO entry for this publication

Marasea, P. and Warren, Matthew (2004) Critical infrastructure protection: comparison of countries, in Jones, Andy (eds), 3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004], pp. 249-260, Academic Conferences, Reading, England [E1]
DRO entry for this publication

Pierce, J., Warren, Matthew, Mackay, David and Wells, Jason (2004) Graphical authentication: justifications and objectives, in Unknown (ed.), Proceedings of the 2nd Australian Information Security Management Conference: securing the future, pp. 49-55, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Pierce, J., Warren, Matthew, Mackay, David and Wells, Jason (2004) Graphical authentication : an architectural design specification, in Unknown (ed.), 2nd Australian Computer,Networks & Information Forensics Conference Proceedings, pp. 76-82, Australian Computer,Networks & Information Forensics Conference, Perth, W.A. [E1]
DRO entry for this publication

Pierce, J., Warren, Matthew and Corray, X.* (2004) A critical review of penetration testing methodologies, in Unknown (ed.), 5th Australian Information Warfare and Security Conference 2004 Proceedings, pp. 167-173, Edith Cowan University, School of Management Information Systems, We-B Centre, Perth, W.A. [E1]
DRO entry for this publication

Redman, J., Warren, Matthew and Hutchinson, W.* (2004) System survivability : a new security concept, in Furnell, Steven and Dowland, Paul (eds), INC 2004 : Proceedings of the 4th International Network Conference, pp. 337-343, University of Plymouth, Plymouth, England [E1]
DRO entry for this publication

2003 School of Information and Business Analytics

Stagg, Vernon and Warren, Matthew (2003) A national information infrastructure model for information warfare defence, in Azari, Rasool (eds), Current security management and ethical issues of information technology, pp. 97-110, IRM Press, Hershey, Pa. [B1.1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2003) A quality indicator of Australian e-business, E-business review: a publication of the International Academy of E-Business., vol. III, pp. 149-152, International Academy of E-Business, Nacogdoches, Tex. [C1.1]
ERA journal ID: 41505 – Scopus EID: Not tagged
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2003) Designing systems for e-commerce, AJIS Australian journal of information systems, vol. 10, no. 2, pp. 139-143, University of Canberra, School of Information Sciences and Engineering, Canberra, ACT [C1.1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2003) The law and cyber terrorism, Journal of information warfare, vol. 2, no. 2, pp. 27-32, Teamlink Australia]; School of Computer and Information Science, Edith Cowan University, WA, Mt. Eliza, Vic.]; Perth, WA [C1.1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2003) A security risk management approach for e-commerce, Information management & computer security, vol. 11, no. 5, pp. 238-242, Emerald Group Publishing, Bingley, England [C1.1]
ERA journal ID: 17903 – Scopus EID: 2-s2.0-0344896784
Citation counts: Scopus - 4
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2003) Australian hackers and ethics, Australasian journal of information systems, vol. 10, no. 2, pp. 151-156, University of Canberra, School of Information Sciences and Engineering, Canberra, ACT [C1.1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

2003 School of Information Technology

Hutchinson, Damien and Warren, Matthew (2003) Security for internet banking: a framework, Journal of enterprise information management, vol. 16, no. 1, pp. 64-73, Emerald, Bingley, England [C1]
ERA journal ID: 19262 – Scopus EID: Not tagged
DRO entry for this publication

Brooks, W., Warren, Matthew and Hutchinson, W.* (2003) Information security, cyber crime, and infrastructure protection : information security management within Australian healthcare organisations, in Dhanda, Kathy and Hunter, Gordon (eds), The Information Institute ISOneWorld Conference and Convention, The Information Institute, Washington, DC [E1]
DRO entry for this publication

Brooks, Warren and Warren, Matthew (2003) Object-oriented security modelling for healthcare, in Croft, Laima and Knight, Shirlee-ann (eds), AISMC 2003 : 1st Australian Information Security Management Conference, pp. 1-10, School of Information and Computer Management (SCISSEC research group), Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Busuttil, T. B. and Warren, M. J. (2003) CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection, in Slay, Jill (eds), Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, pp. 91-103, University of South Australia, Adelaide, S. Aust. [E1]
DRO entry for this publication

Busuttil, T. B. and Warren, M. J. (2003) A review of critical information infrastructure protection within IT security guidelines, in Slay, Jill (eds), Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, pp. 105-113, University of South Australia, Adelaide, S. Aust. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2003) Modelling e-business security recommendations for Australian small to medium business enterprises (SMEs), in Davies-Moore, Lindsay (eds), 4th International WE-B Conference 2003 - e-Business and Information Systems, We-B Centre, School of Management Information Systems, Perth, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2003) A process based security framework for e-business and Australian SMES, in Palvia, Prashant and Liu, Xinxin (eds), Proceedings of the Fourth Annual Global Information Technology Management World Conference, pp. 155-158, lobal Information Technology Management Association, Marietta, Ga. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2003) Australian SMES and e-security guides on trusting the internet, in Palvia, Prashant and Liu, Xinxin (eds), GITMA 2003 : Proceedings of the Fourth Annual Global Information Technology Management World Conference, pp. 88-91, Ivy League Publishing, Marietta, Ga. [E1]
DRO entry for this publication

Jancic, Ana and Warren, Matthew (2003) Quantum cryptography - one step closer to reality, in Slay, Jill (eds), Proceedings 4th Australian Information Warfare and IT Security Conference : Enhancing trust, pp. 181-189, University of South Australia, Adelaide, SA [E1]
DRO entry for this publication

Pierce, Justin D., Warren, Matthew and Mackay, David (2003) An Australian supply chain risk assessment model, in Bohanec, Marko (eds), IS 2003 : Proceedings of the 6th International Multi-Conference on Intelligent and Computer Systems : New information society, pp. 109-112, Information Society, Ljubljana, Slolvenia [E1]
DRO entry for this publication

Pierce, J., Mackay, David and Warren, Matthew (2003) A retail supply chain risk assessment conceptual model, in Croft, Laima (eds), 4th International We-B Conference (working with e-business), 24-25 November 2003, Perth, Western Australia, pp. 1-6, Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Pierce, Justin D., Warren, Matthew and Mackay, David (2003) An analysis of CSI/FBI and AusCERT surveys, in Croft, Laima and Knight, Shirlee-ann (eds), AISMC 2003 : 1st Australian Information Security Management Conference, pp. 1-11, School of Information and Computer Management (SCISSEC research group), Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Pierce, Justin D., Wells, Jason G., Warren, Matthew J. and Mackay, David R. (2003) A conceptual model for graphical authentication, in Croft, Laima and Knight, Shirlee-ann (eds), InfoSec03 : 1st Australian Information Security Management Conference, pp. 1-8, School of Information and Computer Management (SCISSEC research group), Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Vasiu, Lucian, Warren, Matthew and Mackay, David (2003) Defining fraud: issues for organizations from an information systems perspective, in Unknown (ed.), Proceedings of the Seventh Pacific Asia Conference on Information Systems, pp. 971-979, University of South Australia, Adelaide, S.Aust. [E1]
DRO entry for this publication

Vasiu, L., Warren, Matthew and Mackay, David (2003) Three strategic dimensions of information security in ecommerce : a literature review based conceptual model, in Brown, Alan (eds), Surfing the waves: management challenges, management solutions: proceedings of the 17th ANZAM conference, pp. 1-10, School of Management, ECU, Joondalup, W.A. [E1]
DRO entry for this publication

Vasiu, Lucian, Mackay, David and Warren, Matthew (2003) The tri-dimensional role of information security in E-business : a managerial perspective, in Burge, Andrew (eds), 2003 Hawaii International Conference on Business, pp. 1-9, Hawaii International Conference on Business, Honolulu, T.H. [E1]
DRO entry for this publication

Jancic, Ana and Warren, Matthew (2003) Public key infrastructure in Australia, in Bohanec, Marko (eds), Inteligentni in računalniški sistemi ; Kompleksni sistemi v e-poslovanju = Intelligent and computer systems = Complex systems in e-business : zbornik A 6. mednarodne multi-konference Informacijska družba IS 2003, 13. do 17. oktober 2003 = proceedings A, pp. 65-68, Institut "Jožef Stefan", Ljubljana, Slovenia [E2]
DRO entry for this publication

2002 School of Information Technology

Hutchinson, William* and Warren, Matthew (2002) Deception and reality: a challenge for the information and knowledge management function, Human factors in information systems, pp. 287-295, IRM Press, Hershey, PA [B1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2002) Manipulating reality: deception on the web, Make or break issues in IT management, pp. 300-312, Butterworth-Heinemann, Oxford, England [B1]
DRO entry for this publication

Brooks, Warren, Warren, Matthew and Hutchinson, W.* (2002) A security evaluation criteria, Logistics information management, vol. 15, no. 5/6, pp. 377-384, MCB University Press (Emerald), Bingley, England [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Hutchinson, Bill* and Warren, Matthew (2002) Information warfare: using the viable system model as a framework to attack organisations, AJIS : Australian journal of information systems, vol. 9, no. 2, pp. 67-74, University of Wollongong, Wollongong, N.S.W. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Hutchinson, W.* and Warren, Matthew (2002) Truth, lies, reality and deception: an issue for e-commerce, International journal of services technology and management, vol. 3, no. 2, pp. 208-221, Inderscience Enterprises Ltd, London, England [C1]
ERA journal ID: 19357 – Scopus EID: 2-s2.0-24644437279
DRO entry for this publication

Warren, Matthew (2002) Security practice: survey evidence from three countries, Logistics information management, vol. 15, no. 5/6, pp. 347-351, MCB University Press (Emerald), Bingley, England [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Batten, Lynn and Warren, Matthew (2002) Information warfare incident monitoring - government or public responsibility?, in William Hutchinson (ed.), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, pp. 261-274, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Brooks, W. and Warren, Matthew (2002) Information security management within Australian healthcare organisations, in Hutchinson, William (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 318-331, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Brooks, W. and Warren, Matthew (2002) Baseline security standards evaluation, in Hutchinson, William (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 162-173, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Brooks, Warren, Warren, Matthew and Hutchinson, W.* (2002) A security evaluation criteria for baseline security standards, in Ghonaimy, M. Adeeb; El-Hadidi, Mahmoud T. and Aslan, Heba K. (eds), Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives, pp. 79-89, 2002, Springer; Kluwer, B.V., Berlin/Heidelberg, Germany; The Netherlands [E1]
DRO entry for this publication

Busuttil, Tyrone and Warren, Matthew (2002) A conceptual approach to information warfare : security risk analysis, in Hutchinson, Bill (eds), ECIW2003 : proceedings of the 2nd European conference on Information Warfare and Security, pp. 35-41, Management Centre International Ltd, Reading, England [E1]
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2002) A formalisation of an information infrastructure security risk analysis approach, in Hutchinson, William (eds), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, pp. 174-182, Edith Cowan University, School of Management Information Systems, Churchlands, W.A. [E1]
DRO entry for this publication

Goward, Penelope, Warren, Matthew and Leitch, Shona (2002) E-universities : - business and technology (an Australian viewpoint), in Roccetti, Marco (eds), Euromedia 2002 : proceedings of the seventh annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications, pp. 7-10, EUROSIS, Ghent, Belgium [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) Internet banking: security, ethics and trust, in Warren, Matthew and Barlow, John (eds), Conference proceedings of AiCE 2002, Third Australian Institute of Computer Ethics Conference, pp. 52-62, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) A conceptual model for security and trust within internet banking transactions, in Unknown (ed.), Association for Information Systems 8th Americas Conference on Information Systems : AMCIS 2002 ; August 8 - 11, 2002, Dallas, Texas., pp. 2228-2234, Association for Information Systems, Atlanta, Ga. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) E-security guides for Australian SMEs, in Lethbridge, Nick (eds), E-conomy - from here to where? : proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, pp. 1-11, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, W.* and Warren, Matthew (2002) Network theory - the demise of systems thinking?, in Lovell, Brian C. (eds), ANZIIS 2003 : proceedings of the Eighth Australia and New Zealand Intelligent Information Systems Conference, Dec. 10-12, Sydney, Australia, Queensland University of Technology, Brisbane, Qld. [E1]
DRO entry for this publication

Hutchinson, W.* and Warren, Matthew (2002) Developing a postgraduate course in information security: a confusion of terms, in Wenn, A.; McGrath, M. and Burstein, F. (eds), Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, pp. 805-812, Victoria University, Melbourne, Australia [E1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2002) Information superiority and the role of an organisation's network, in Furnell, Steven (eds), Papers from the Third International Network Conference 2002 : 16-18 July 2002, Plymouth, United Kingdom, pp. 567-572, Emerald, Bradford, England [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2002) Designing ethical systems for electronic commerce, in Warren, Matthew (eds), Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, pp. 68-74, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Stagg, V. and Warren, Matthew (2002) Defending infrastructures against information warfare, in Khosrow-Pour, Mehdi (eds), Issues and trends of information technology management in contemporary organizations : 2002 Information Resources Management Association International Conference, Seattle, Washington, USA, May 19-22, 2002, Idea Group Pub., Hershey, Pa. [E1]
DRO entry for this publication

Stagg, V. and Warren, Matthew (2002) Asymmetric scalability: the unfair advantage of information warfare, in Hutchinson, William (eds), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Western Australia, 28 & 29 November 2002, pp. 290-297, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Vasiu, L., Warren, Matthew and Mackay, David (2002) Personal privacy issues in B2C eCommerce: a theoretical framework, in Cooper, Joan; Burgess, Lois; Alcock, Carole and Win, Khin Than (eds), CollECTeR 2002: Proceedings of the Seventh CollECTeR Conference on Electronic Commerce, pp. 1-8, Faculty of Informatics, University of Wollongong, Wollongong, N.S.W. [E1]
DRO entry for this publication

Vasiu, L., Mackay, David and Warren, Matthew (2002) A conceptual framework of eFraud from a supply chain management perspective, in Lethbridge, Nick (eds), E-conomy - from here to where? : Proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, pp. 1-9, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2002) Australian hackers: an ethical perspective, in Warren, Matthew and Barlow, John (eds), Third Australian Institute of Computer Ethics Conference Proceedings: Computer Ethics: Its Impact for Australia, pp. 131-138, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Warren, Matthew and Batten, Lynn (2002) Security management: an information systems setting, in Batten, Lynn (eds), Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, pp. 257-270, Springer Verlag, Berlin/Heidelberg, Germany [E1]
DRO entry for this publication

Warren, Matthew, McDougall, M. and Pascoe, K. (2002) Swarming attacks and agents, in Hutchinson, William (eds), Protecting the infrastructure: proceedings of the 3rd Australian Information Warfare and Security conference 2002, pp. 209-217, Edith Cowan University, School of Management Information Systems, We-B Centre, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2002) Will new laws be effective in reducing web sponsorship of terrorist groups?, in Hutchinson, William; Edith Cowan University School of Computer and Information Science and Edith Cowan University School of Management Information Systems. We-B Centre (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 156-161, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, WA [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2002) Security risk analysis e-commerce, in Furnell, Steven and Dowland, Paul (eds), INC2002 : Proceedings of the Third International Network Conference, pp. 397-404, Centre for Information Security & Network Research, University of Plymouth, Plymouth, England [E1]
DRO entry for this publication

Warren, Matthew and McIntyre, J. (2002) Protection of New Zealand in the age of information warfare, in Hutchinson, William (eds), Protecting the infrastructure: proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, pp. 235-240, Edith Cowan University, School of Management Information Systems, We-B Centre, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew and Barlow, John* (2002) AICE 2002 : Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, in Warren, Matthew and Barlow, John (eds), School of Information Technology, Deakin University, Geelong, Vic. [E4]
DRO entry for this publication

2001 School of Information Technology

Hutchinson, William* and Warren, Matthew (2001) Information warfare : corporate attack and defence in a digital world, Butterworth-Heinemann, Oxford, England [A2]
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2001) Cyber terrorism and the contemporary corporation, in Dhillon, Gurpreet (eds), Information security management : global challenges in the new millennium, pp. 53-64, Idea Group Publishing, Hershey, Pa. [B1]
DRO entry for this publication

Busuttil, T. B. and Warren, Matthew (2001) Intelligent agent technology within information warfare, Journal of information warfare, vol. 1, no. 2, pp. 52-61, Mindsystems, Melbourne, Vic. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2001) Security authentication for on-line internet banking, Informatica (Slovenia), vol. 25, no. 3, pp. 349-355, Slovene Society Informatika, Ljubljana, Slovenia [C1]
ERA journal ID: 32024 – Scopus EID: 2-s2.0-0035492886
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2001) Principles of information warfare, Journal of information warfare, vol. 1, pp. 1-6, Teamlink Australia Pty Ltd, Mt. Eliza, Vic. [C1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2001) Attitudes of Australian information system managers against online attackers, Information management & computer security, vol. 9, no. 3, pp. 106-111, MCB University Press (Emerald), Bradford, England [C1]
ERA journal ID: 17903 – Scopus EID: 2-s2.0-0035780673
DRO entry for this publication

Warren, Matthew (2001) A risk analysis model to reduce computer security risks among healthcare organizations, Risk Management, vol. 3, no. 1, pp. 27-37, Perpetuity Press, Leicester, England [C1]
ERA journal ID: 35893 – Scopus EID: Not tagged
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2001) Information warfare and ethics, Australasian journal of information systems, vol. 8, no. 2, pp. 58-62, Dept. of Business Systems, University of Wollongong & School of Computing and Information Technology, Monash University, Wollongong, NSW; Clayton, Vic. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2001) Intelligent agents and their information warfare implications, in Unknown (ed.), Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, pp. 109-118, Edith Cowan University, School of Management Information Systems, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2001) A framework of security authentication for internet banking, in Stoney, Sue and Burn, Janice (eds), Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, pp. 467-477, Edith Cowan University, School of Management Information Systems, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien, Busuttil, T. and Warren, Matthew (2001) An application of soft systems in determining user requirements, in Hutchinson, William and Warren, Matthew (eds), Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, pp. 132-140, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2001) Security issues of M-Commerce, in Stoney, Sue and Burn, Janice (eds), Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, pp. 478-485, The Conference, Perth, W.A. [E1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2001) The nature of data: illusions of reality, in Harriger, Alka (eds), Informing Science and IT Education Conference: proceedings and schedule, pp. 262-267, Informing Science Institute, Santa Rosa, Calif. [E1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2001) The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system, in Roberts, Martyn; Moulton, Mike; Hand, Steve and Adams, Carl (eds), Information systems in the digital world : proceedings of the 6th UKAIS Conference, pp. 97-103, Zeus Press, Manchester, England [E1]
DRO entry for this publication

Kong, S.*, Li, H.*, Love, P.* and Warren, Matthew (2001) The design, development and implementation of an e-commerce system for procuring materials in construction, in Stoney, Sue and Burn, Janice (eds), Working for excellence in the e-conomy: proceedings: 2nd International We-B Conference 2001, pp. 315-325, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2001) Ethics and electronic commerce, in Weckert, John (eds), Computer ethics 2000 : selected papers from the Second Australian Institute of Computer Ethics Conference (AICE2000), pp. 1-4, Australian Computer Society, Sydney, N.S.W. [E1]
DRO entry for this publication

Stagg, V. and Warren, Matthew (2001) A business information infrastructure, in Hutchinson, William; Warren, Matthew and Burn, Janice (eds), Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, Western Australia, 29 & 30 November 2001, pp. 173-181, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) Deception: a tool and curse for security management, in Dupuy, Michel and Paradinas, Pierre (eds), Trusted information : the new decade challenge : IFIP TC11 16th International Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France, pp. 327-337, Kluwer Academic Publishers, Boston [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) A security method for healthcare organisations, in Eloff, Jan; Labuschagne, Les; von Solms, Rossouw and Dhillon, Gurpreet (eds), Advances in information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security, pp. 157-166, Kluwer Academic Publishers, Boston [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) A security training approach for UK small and medium sized enterprises, in Armstrong, Helen and Yngstrom, Louise (eds), WISE 2 : proceedings of the IFIP TC11 WG 11.8 Second World Conference on Information Security Education, 2001, pp. 197-207, School of Computer and Information Science, Edith Cowan University, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) Information warfare and hacking, in Armstrong, Helen (eds), Proceedings of the 5th Australian Security Research Symposium 2001, pp. 195-206, School of Computer and Information Science, Faculty of Communications, Health Science, Edith Cowan University, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew, Leitch, Shona and Love, P. (2001) E-commerce: a Victorian case study, in Stoney, Sue and Burn, Janice (eds), Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, pp. 255-263, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) A duality security risk analysis method for e-commerce, in Hutchinson, William; Warren, Matthew and Burn, Janice (eds), Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, pp. 259-266, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2001) Teaching small and medium sized enterprises about security, in Armstrong, Helen (eds), Proceedings of the 5th Australian Security Research Symposium 2001, pp. 207-217, Edith Cowan University. Faculty of Communications, Health Science. School of Computer and Information Science., Perth, WA [E1]
DRO entry for this publication

Wojcieszak, P. and Warren, Matthew (2001) Current state and research trends in the area of process visualization in workflow system for e-commerce applications, in Domingo, M.E.; Cebollada, J.C.G. and Salvador, C.P. (eds), EUROMEDIA 2001, featuring WEBTEC, MEDIATEC, COMTEC, APTEC, April 18 - 20, 2001, Valencia, Spain, pp. 289-296, Euromedia, Valencia, Spain [E1]
DRO entry for this publication

Busuttil, Tyrone and Warren, Matthew (2001) An information warfare protection method, in Domingo, Manuel Esteve; Cebollada, Juan Carlos Guerri and Salvador, Carlos Palau (eds), Euromedia 2001 featuring WEBTEC - MEDIATEC - COMTEC - APTEC, pp. 132-134, Society for Computer Simulation International, Delft, Netherlands [E2]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2001) Relevance of systems thinking in the contemporary world. Proceedings of systems in management, 7th annual ANZSYS conference 2001., in Hutchinson, William and Warren, Matthew (eds), Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E4]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2001) A framework of security authentication for internet banking, Proceedings of the Third International Conference on Information Integration and Web-based Applications & Services (IIWAS 2001), pp. 489-492, Osterreichische Computer Gesellschaft, Linz, Austria [EN]
DRO entry for this publication

2001 External

Cowley, C., Love, P. and Warren, Matthew* (2001) A review of IT benefits and costs in construction, in Hutchinson, William and Warren, Matthew (eds), Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, pp. 120-131, Edith Cowan University, School of Management Information Systems, Churchlands, W.A. [E1]
DRO entry for this publication

2000 School of Information Technology

Warren, M. and Hutchinson, W.* (2000) The Use of the Internet by Terrorists and its Impact upon Electronic Commerce, in Syed Mahbubur Rahman and Mahesh S. Raisinghani (eds), Electronic Commerce: Opportunity and Challenges, pp. 352-361, Idea Group Publishing, USA & UK [B1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) The Australian & New Zealand Security Standard AS/NZS 4444, New Zealand Journal of Computing, vol. 0, no. 0, pp. 37-43, Computer Society Inc, New Zealand [C1]
ERA journal ID: Not matching ERA journal list
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) Cyber attacks against supply chain management systems: a short note, International Journal of Physical Distribution & Logistics Management, vol. 0, no. 0, pp. 710-716, MCB University Press, West Yorkshire, England [C1]
ERA journal ID: 3497 – Scopus EID: Not tagged
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) Deception and reality: a challenge for the information and knowledge management function, in J.Travers (ed.), Challenges of Information Technology Management in the 21st Century: 2000 Information Resources Management Association International Conference, pp. 88-91, Idea Group Publishing, London, UK [E1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) CONCEPTS IN INFORMATION WARFARE, in J.Burn, B.Hutchinson and S.Stoney (eds), WORKING FOR E-BUSINESS: CHALLENGES IF THE NEW ECONOMY: 1ST INTERNATIONAL WE-B CONFERENCE, pp. 136-142, Edith Cowan University, Perth - Western Australia [E1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) The use of deception in systems, in G.Altmann, J.Lamp, P.Love, P.Mandal, R.Smith, M.Warren (eds), Proceedings of the International Conference on Systems Thinking in Management, pp. 263-268, Deakin University, Geelong, Victoria [E1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) Deception and the Information Security function, in Steven M Furnell (ed.), Proceedings of the 2nd International Network Conference, pp. 273-280, University of Plymouth, UK [E1]
no DRO entry yet for this publication

Warren, S., Hutchinson, W.* and Warren, M. (2000) Healthcare IT Security: Can the European Union experiences assist Australia, in G.Gable and M.Vitale (eds), 11th Australasian Conference on Information Systems, Information Systems Management Research Centre, QUT, Brisbane, Queensland [E1]
no DRO entry yet for this publication

Love, P., Irani, Z.*, Warren, M., Coldwell, J. and Warren, S. (2000) Barriers to implementing E-commerce in construction SME's, in Richard Dunford (ed.), Anzam 2000: Managing for the New Millenium: Conference Proceedings, pp. 1-7, Australian and New Zealand Academy of Management, Macquarie University [E1]
no DRO entry yet for this publication

Moizer, J.*, Lean, J.*, Mangles, T.* and Warren, M. (2000) Teaching Introductory Management Using A Computer Simulation Game, in G.Altmann, J.Lamp, P.Love, P.Mandal, R.Smith & M.Warren (eds), Proceedings of the International Conference on Systems Thinking in Management, pp. 456-460, Deakin University, Geelong [E1]
no DRO entry yet for this publication

Warren, M., Warren, S. and Love, P. (2000) A Participational Managerial Method to Implement and Evaluate Information Security within an Healthcare Organisation, in H. Michael Chung (ed.), Proceedings of the he 2000 Americas Conference on Information Systems (AMCIS 2000), pp. 1136-1141, Omnipress, Long Beach, California [E1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) TERRORISM ON THE WEB, in P.Beynon-Davies, M.Williams and I.Beeson (eds), Information Systems - Research, Teaching and Practice: Proceedings of the 5th UKAIS Conference, pp. 154-164, McGraw-Hill Publishing Company, Berkshire, England [E1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) Information Warfare: Fact or Fiction?, in Sihan Qing and Jan Eloff (eds), Information Security for Global Information Infrastructures, pp. 411-420, International Federation for Info Processing, USA [E1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) An Information Warfare Risk Analysis Model (A Conceptual Model), in S. Furnell (ed.), Proceedings of the 2nd International Network Conference, pp. 331-337, University of Plymouth, Plymouth, UK [E1]
no DRO entry yet for this publication

Warren, S., Warren, M. and Coldwell, J. (2000) Global Education in the Cyber Age: An Australian Example, in Steven M Furnell (ed.), INC 20002nd International Network Conference, pp. 351-358, University of Plymouth, UK [E2]
no DRO entry yet for this publication

Stagg, V. and Warren, M. (2000) A GERMAN SECURITY STANDARD TRAINING SYSTEM, in F. Broeckx and L. Pauwels (eds), EUROMEDIA '2000, pp. 181-185, SCS Publication, Germany [E2]
no DRO entry yet for this publication

Warren, M. and Warren, S. (2000) The Role of Participation in Systems, in G.Altmann, J.Lamp, P.Love, P.Mandal, R.Smith, M.Warren (eds), International Conference on Systems Thinking in Management, pp. 638-642, Deakin University, Geelong [E2]
no DRO entry yet for this publication

Warren, M. (2000) Proceedings of the 1st Australian Information Security Management Workshop, in Matthew Warren (ed.), 1st Australian Information Security Management (AISM)Workshop, Deakin University, Geelong, Victoria [E4]
no DRO entry yet for this publication

Warren, S. and Warren, M. (2000) Multi-Cultural Education: An Australian Example, in Larry Stillman (ed.), The Open Road Conference, Monash University, Melbourne, Australia [EN]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) Retaliation Against Information Attack: Attitudes and Practices of Australian Information System Managers, in W.Venema - Chair (ed.), 12th Annual FIRST Conference, pp. 1-13, CAPS Ltd, Chicago, USA [L1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (2000) USING THE VIABLE SYSTEMS MODEL TO DEVELOP AN UNDERSTANDING OF INFORMATION SYSTEM SECURITY THREATS TO AN ORGANISATION, in M.Warren (ed.), 1st Australian Information Security Management Workshop, Deakin University, Geelong [L1]
no DRO entry yet for this publication

Warren, S. and Warren, M. (2000) The Issues of Ethics in Electronic Commerce, in J.Barlow and M.Warren (eds), 2nd Australian Institute of Computer Ethics Conference, AICE2000, Australia [L1]
no DRO entry yet for this publication

Stagg, V. and Warren, M. (2000) Computer Hacker Information Still Available on the Internet!, in M. Warren (ed.), 1st Australian Information Security Management Workshop, Deakin University, Geelong, Victoria [L1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) On-line Attacks against Small and Medium sized Enterprises, in Matthew Warren (ed.), 1st Australian Information Security Management Workshop, Deakin University, Geelong [L1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (2000) Information Warfare and Ethics, in J.Barlow and M.Warren (eds), 2nd Australian Institute of Computer Ethics Conference, AICE 2000, Australia [L1]
no DRO entry yet for this publication

1999 School of Information Technology

Furnell, S.* and Warren, M. (1999) Computer abuse and cyber Terrorism: the real threats in the new Millenium, Computing and Security, vol. 0, no. 0, pp. 28-34, Elsiver Technology, Oxford UK [C3]
ERA journal ID: Not matching ERA journal list
no DRO entry yet for this publication

Warren, M., Furnell, S.* and Sanders, P.* (1999) A new approach towards sercurity training and awareness amongst the Healthcare Community, Informatics in Health Care Australia Journal, vol. 0, no. 0, pp. 20-26, Informatics Australia, Melbourne [C3]
ERA journal ID: Not matching ERA journal list
no DRO entry yet for this publication

Coldwell, J., Warren, M. and Garner, B. (1999) An Industrial Application of an On-line Help Desk Paradigm, ME'99: 2nd International Conference on Managing Enterprises., pp. 182-187, University of Newcastle, University of Newcastle, Australia [E1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (1999) Information Warfare: using the Viable System Model as a framework to attack organizations, in R. Cavana, J. Vennix, E. Rouwette, M. Stevenson-Wright (eds), 17th International Conference of the Systems Dynamics Society and 5th Australian New Zealand Systems Conference, System Dynamics Society, Albany, NY [E1]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (1999) Attacking the Attackers: Attitudes of Australian IT Managers to retaliation against Hackers, in B. Hope and P. Yoong (eds), 10th ACIS (Australisian Conference on Information Systems) 99, pp. 399-410, School of Communications and Information Management Victoria University of Wellington, Wellington [E1]
no DRO entry yet for this publication

Warren, M. and Hutchinson, W.* (1999) The Future of Australian and New Zealand Security Standard AS/NZS 4444?, in J. Eloff, L. Labuschagne, R. Von Solms and J. Ver (eds), 7th IFIP Conference on Information Security and Management, pp. 41-49, Kluwer Academic Publishers, Boston, MA [E1]
no DRO entry yet for this publication

Warren, M., Lean, J.*, Swain, M.* and Plumb, G.* (1999) A European Approach to Virtual IT Training for SME, Second International Conference on Managing Enterprise, pp. 216-221, School of Management, University of Newcastle, Callaghan, Australia [E1]
no DRO entry yet for this publication

Warren, M., Coldwell, J. and Hutchinson, D. (1999) A survey of Electronic Commerce in Geelong, 3rd Annual CollECTeR Conference on Electronic Commerce, University of Wellington, Wellington, New Zealand [E1]
no DRO entry yet for this publication

Warren, M., Coldwell, J., Willey, A.*, Hutchinson, D., Moosajee, D.*, Pempeit, P.* and Chan, R.* (1999) A training system relating to Australian Electronic Commerce, Euromedia 99, pp. 250-254, The Society for Computer Simulation International, Munich, Germany [E1]
no DRO entry yet for this publication

Warren, M. and Furnell, S.* (1999) Cyber-Terrorism - The political evolution of the computer hacker, in C Simpson (ed.), First AICE (Australian Institute of Computer Ethics), AICE, Melbourne [E2]
no DRO entry yet for this publication

Hutchinson, W.* and Warren, M. (1999) The attitude and practice of Australian Information Technology managers toward Cyber-Viglantism, InfoWarCon10, MIS Training Institute, Washington [L2]
no DRO entry yet for this publication

Warren, M., Lean, J.*, Swain, M.* and Plumb, G.* (1999) IT Security Training for SME's via the Internet, in Winfried Hahn, Ellen Walter-Klaus and Jan Knop (eds), Euromedia 99, pp. 210-214, GCS Publications, Germany [M]
no DRO entry yet for this publication

1998 School of Information Technology

Coldwell, J. and Warren, M. (1998) IWT-Information Warfare Toolkit - A Conceptual Model, EXPERSYS-98 Articial Intelligence Applications, pp. 119-124, IITT International, "Gournay Sur Marne, France" [E1]
no DRO entry yet for this publication

Warren, M. and Furnell, S.* (1998) Electronic Commerce: Winners and Losers, International Network Conference (INC '98) [E1]
no DRO entry yet for this publication

Warren, M. (1998) Cyber Terrorism, XV.IFIP World Computer Congress, pp. 429-438, Austrian Computer Society, "Vienna, Austria" [E1]
no DRO entry yet for this publication

Lean, J.*, Warren, M., Plumb, G.* and Moizer, J.* (1998) Developing a Management Learning Programme for Telematic Delivery: IT Security Training and ADAPT Through RATIO, Innovation and Change - Providing Flexible Approaches to Management Learning, pp. 73-83, Bolton Business School Press, Bolton UK [E2]
no DRO entry yet for this publication

Grants and Consultancies

All years

Research Income - National Competitive Grants

Warren, M and Hutchinson, W*. A model for IT Security Outsourcing of Critical Services, Australian Research Council, Project - Discovery - Projects [T]

  • 2005: $41,796
  • 2004: $40,936

Research Income - Other Public Sector Funding

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2005: $8,120
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Research Income - Industry and Other Funding - Australian

Warren, M. Seeding Project - Corporate critical infrastructure protection - visualization [V.1]

  • 2007: $5,000

Higher Degree by Research Completions supervised by Matthew Warren

2013

Adel Alamin
Doctor of Philosophy, Thesis entitled: Investigating Factors Influencing the Adoption of AIS: Libyan Accountants? Perspective.
School of Information and Business Analytics Requires an Internet connection

2009

Graeme Pye
Doctor of Philosophy, Thesis entitled: Formalising a Method for Modelling Critical Infrastructure Systems.
School of Information and Business Analytics Requires an Internet connection

Merete Ruth Crofts
Master of Commerce, Thesis entitled: Exploring the Sociotechnical Systems Perspectives in Global Software Development .
School of Information and Business Analytics Requires an Internet connection

2008

Sneza Dojkovski
Doctor of Philosophy, Thesis entitled: Establishing Information Security Culture in Australian Small and Medium Enterprises.
School of Information and Business Analytics Requires an Internet connection

2007

Justin Pierce
Doctor of Philosophy, Thesis entitled: The Effectiveness of Graphical Authentication: An Exploratory Study.
School of Information and Business Analytics Requires an Internet connection

2006

Damien Hutchinson
Doctor of Philosophy, Thesis entitled: The Australian Small to Medium Enterprise E-business Security Methodology . School of Engineering and Information Technology

Kamaljeet Sandhu
Doctor of Philosophy, Thesis entitled: The Acceptance, Use and Continued Use of an E-Services System.
School of Information and Business Analytics Requires an Internet connection

2005

Saranond Inthanond
Doctor of Philosophy, Thesis entitled: The Meaning of Information: A Study of Western Construction of Asian-ness in Film.
School of Information and Business Analytics Requires an Internet connection

Konrad Peszynski
Doctor of Philosophy, Thesis entitled: Power and Politics in a System Implementation.
School of Information and Business Analytics Requires an Internet connection

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Sunday 27th July 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

23rd July 2011