Prof Matthew Warren

STAFF PROFILE

Contact

Publications

Filter by

2021

Attacking with Bitcoin: Using Bitcoin to build resilient botnet armies

Dimitri Kamenski, Arash Shaghaghi, Matthew Warren, Salil Kanhere

(2021), Vol. 1267, pp. 3-12, CISIS 2020 : Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, Burgos, Spain, E1

conference
2020

A new Markov decision process based behavioral prediction system for airborne crews

Yaozhong Zhang, Kangjia Yao, Jiandong Zhang, Frank Jiang, Matthew Warren

(2020), Vol. 8, pp. 28021-28032, IEEE Access, Piscataway, N.J., C1

journal article

Sri Lankan politics and social media participation: A case study of the Presidential Election 2019

Chintha Kaluarachchi, Ruwan Nagahawatta, Matthew Warren

(2020), pp. 191-200, ETHICOMP 2020 : Proceedings of the International Conference on the Social and Ethical Impacts of Information and Communication Technology, Logroo, Spain, E1

conference
2019

The impact of self-efficacy on accountants' behavioral intention to adopt and use accounting information systems

Adel Alamin, Carla Wilkin, William Yeoh, Matthew Warren

(2019), Journal of information systems, Sarasota, Fla., C1

journal article

Responsible use of technology to protect young people who are experiencing cyberbullying in Australia

Chintha Kaluarachchi, Matthew Warren, Frank Jiang

(2019), pp. 1-6, AiCE 2019 : Proceedings of 8th Australian Institute of Computer Ethics Conference, Melbourne, Victoria, E1

conference

Ethical Issues Relating to Cyber Security in Australian SMEs

Ruwan Nagahawatta, Matthew Warren, Ging Yeoh

(2019), pp. 1-6, AICE 2019 : Proceedings of the 8th Australian Institute Of Computer Ethics Conference, Melbourne, Victoria, E1

conference

Cloud Forensics Investigations Relationship: A Model And Instrument

Younis Al Husaini, Matthew Warren, Lei Pan, Mansoor Al Gharibi

(2019), pp. 778-788, ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, Perth, Western Australia, E1

conference

Cyber secure Geelong: determining SME cyber-security preparedness

Graeme Pye, Scott Salzman, Matthew Warren, Damien Manual, Bernadette Uzelac

(2019), pp. 62-69, CWAR 2019 : Proceedings of the 18th Australian Cyber Warfare Conference 2019, Melbourne, Vic., E1

conference
2018

The use of social media and new knowledge to eesearchers in the new age

M Warren, S Leitch

(2018), pp. 245-260, Positioning Research Shifting Paradigms, Interdisciplinarity and Indigeneity, New Delhi, India, B1

book chapter

Data retention: an assessment of a proposed national scheme

M Warren, S Leitch

(2018), Vol. 17, pp. 98-112, Journal of information, communication and ethics in society, Bingley, Eng., C1

journal article

Factors that influence adoption of cloud computing: an empirical study of Australian SMEs

I Senarathna, C Wilkin, M Warren, W Yeoh, S Salzman

(2018), Vol. 22, pp. 1-31, Australasian journal of information systems, Wollongong, N.S.W., C1

journal article

A hybrid location privacy protection scheme in big data environment

M Nosouhi, V Pham, S Yu, Y Xiang, M Warren

(2018), pp. 1-6, GLOBECOM 2017 : Global hub: connecting east and west : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

Australian cyber security policy through a European lens

M Warren, S Leitch

(2018), pp. 489-495, ECCWS 2018 : Proceedings of the 17th European Conference on Cyber Warfare and Security, Oslo, Norway, E1

conference

A Study of Cybersecurity Awareness in Sri Lanka

Ruwan Nagahawatta, Matthew Warren, G Yeoh

(2018), CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1

conference

Cloud forensics relationship between the law enforcement and cloud service providers

Younis Al Husaini, Matthew Warren, Lei Pan

(2018), pp. 79-88, CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1

conference
2017

Social media as an information system : improving the technological agility

V Senadheera, M Warren, S Leitch

(2017), Vol. 11, pp. 512-533, Enterprise information systems, Abingdon, Eng., C1

journal article
2016

Security and privacy concerns for Australian SMEs cloud adoption: empirical study of metropolitan vs regional SMEs

I Senarathna, G Yeoh, M Warren, S Salzman

(2016), Vol. 20, pp. 1-20, Australasian journal of information systems, Canberra, A.C.T., C1

journal article

Understanding the use of social media by organisations for crisis communication

M Roshan, M Warren, R Carr

(2016), Vol. 63, pp. 350-361, Computers in Human Behavior, C1

journal article

The Syrian electronic army - a hacktivist group

M Warren, S Leitch

(2016), Vol. 14, pp. 200-212, Journal of information, communication and ethics in society, Bingley, Eng., C1

journal article

Ethics and ICT: why all the fuss?

M Warren, R Lucas

(2016), Vol. 14, pp. 167-169, Journal of information, communication and ethics in society, Bingley, Eng., C1

journal article

Unauthorised disclosure of organisational information through social media : a policy perspective

D Pallegedara, M Warren

(2016), pp. 86-93, IDIMC 2016: Exploring our digital shadow : from data to intelligence, Loughborough, England, E1

conference
2015

A conceptual model for cloud computing adoption by SMEs in Australia

I Senarathna, M Warren, W Yeoh, S Salzman

(2015), pp. 100-128, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations, Hershey PA, USA, B1

book chapter

Cyber security and protection of ICS systems: An australian example

M Warren, S Leitch

(2015), Vol. 78, pp. 215-228, Cyber security : analytics, technology and automation, Berlin, Germany, B1

book chapter

Applying classification controls to internet content in Australia

S Leitch, M Warren

(2015), Vol. 13, pp. 82-97, Journal of information, communication and ethics in society, London, Eng., C1

journal article

Understanding stakeholders' expectations of organisational crisis communication by social media

M Roshan Kokabha, M Warren, R Carr

(2015), pp. 382-389, ECSM 2015 : Proceedings of the 2nd European Conference on Social Media 2015, Porto, Portugal, E1-1

conference

Adoption of social media as a communication medium: a study of theoretical foundations

V Senadheera, M Warren, S Leitch, G Pye

(2015), pp. 1-19, UKAIS 2015 : Proceedings of the UK Academy for Information Systems Conference 2015, Oxford, Eng., E1-1

conference
2014

The influence of organisation culture on E-commerce adoption

I Senarathna, M Warren, W Yeoh, S Salzman

(2014), Vol. 114, pp. 1007-1021, Industrial Management and Data Systems, C1

journal article

Applications and techniques in information security

L Batten, G Li, W Niu, M Warren

(2014), Vol. 490, pp. III-IV, Communications in Computer and Information Science, A7

edited book

Evaluating Australian social media policies in relation to the issue of information disclosure

D Pallegedara, M Warren

(2014), pp. 1-10, Proceedings of the 25th Australian Conference on Information Systems, ACIS 2014, Auckland, N. Z., E1

conference
2013

WikiLeaks and Information Disclosure: The Bradley Manning Case

M Warren, S Leitch, I Rosewall

(2013), Vol. 21, pp. 3-16, The Journal of the Australian Institute of Professional Intelligence Officers, Canberra, ACT, C1

journal article

An empirical study of the influence of different organisation cultures on e-commerce adoption maturity

I Senarathna, M Warren, W Yeoh, S Salzman

(2013), Proceedings of the 24th Australasian Conference on Information Systems, E1

conference

Understanding the role of social media in incidentcrisis communication

M Roshan, M Warren, R Carr

(2013), Proceedings of the 24th Australasian Conference on Information Systems, E1

conference
2012

Manipulating reality: Deception on the Web

W Hutchinson, M Warren

(2012), pp. 300-312, Make or Break Issues in IT Management, B1

book chapter

Safeguarding Australia from Cyber-Terrorism: A SCADA risk framework

C Beggs, M Warren

(2012), pp. 369-384, Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, B1

book chapter

Loss of data : reflective case studies

I Rosewall, M Warren

(2012), pp. 405-420, Strategic and practical approaches for information security governance, Hershey, Pa., B1

book chapter

New media and web 2.0 : an Irish republican example

M Warren, S Leitch

(2012), Vol. 11, pp. 1-11, Journal of information warfare, Mt. Eliza, Vic., C1

journal article
2011

The ethics of security of personal information upon facebook

S Leitch, M Warren

(2011), pp. 46-65, ICT Ethics and Security in the 21st Century: New Developments and Applications, B1

book chapter

Critical infrastructure protection: An ethical choice

G Pye, M Warren, W Hutchinson

(2011), pp. 214-230, ICT Ethics and Security in the 21st Century: New Developments and Applications, B1

book chapter

Protection of Australia in the Cyber Age

Matthew Warren, Shona Leitch

(2011), Vol. 1, pp. 35-40, International Journal of Cyber Warfare and Terrorism, C1

journal article

Does traditional security risk assessment have a future in information security?

A Ruighaver, M Warren, A Ahmad

(2011), Vol. 10, pp. 16-28, Journal of information warfare, Mt. Eliza, Vic., C1-1

journal article

Towards the human information security firewall

R Solms, M Warren

(2011), Vol. 1, pp. 10-17, International Journal of Cyber Warfare and Terrorism (IJCWT), Hershey, Pa., C1-1

journal article

Modelling relational aspects of critical infrastructure systems

G Pye, M Warren

(2011), pp. 202-210, 10th European Conference on Information Warfare and Security 2011, ECIW 2011, E1

conference

Australian national critical infrastructure protection: A case study

M Warren, S Leitch

(2011), pp. 275-280, 10th European Conference on Information Warfare and Security 2011, ECIW 2011, E1

conference

Analysis and modelling of critical infrastructure systems

G Pye, M Warren

(2011), pp. 194-201, 10th European Conference on Information Warfare and Security 2011, ECIW 2011, E1

conference

Social networking and teaching : an Australian case study

S Leitch, M Warren

(2011), pp. 315-326, InSITE 2011 : Proceedings of Informing Science & IT Education Conference, Novi Sad, Serbia, E1

conference

A study into how Australian banks use social media

V Senadheera, M Warren, S Leitch

(2011), PACIS 2011 - 15th Pacific Asia Conference on Information Systems: Quality Research in Pacific, E1

conference

Corporate governance and information technology : findings from an exploratory survey of Australian organizations

P Couchman, A Zutshi, C Wilkin, M Warren, A Sohal

(2011), pp. 1-19, ANZAM 2011 : 25th Annual Australian And New Zealand Academy of Management conference : the future of work and organisations, Wellington, New Zealand, E1

conference

Meeting the challenge of information system security : an exploratory study of the communication of IS security management capabilities

P Couchman, C Wilkin, A Zutshi, A Sohal, M Warren

(2011), BAM 2011 : Building and sustaining high performance organisations in a challenging environment, Birmingham, U. K., E1

conference

Australia and the question of internet control

M Warren, S Leitch

(2011), pp. 488-493, ETHICOMP 2011 : The Social Impact of Social Computing : Proceedings of the 12th International Conference, Sheffield, U. K., E1

conference

Attack vectors against social networking systems : the Facebook example

M Warren, S Leitch, I Rosewall

(2011), Proceedings of The 9th Australian Information Security Management Conference, Perth, W. A., E1

conference
2010

ETHICS: The past, present and future of socio-technical systems design

S Leitch, M Warren

(2010), Vol. 325, pp. 189-197, IFIP Advances in Information and Communication Technology, B1

book chapter

Hacker Taggers: A new type of hackers

M Warren, S Leitch

(2010), Vol. 12, pp. 425-431, Information Systems Frontiers, C1

journal article

Ethical decision making: Improving the quality of acceptable use policies

A Ruighaver, S Maynard, M Warren

(2010), Vol. 29, pp. 731-736, Computers and Security, C1

journal article

Critical supply chain systems and critical infrastructure protection

Matthew Warren, Shona Leitch

(2010), Vol. 2, pp. 107-107, International Journal of Logistics Economics and Globalisation, C1

journal article

An applied framework for modelling a critical infrastructure system incident

G Pye, M Warren

(2010), pp. 245-260, 9th European Conference on Information Warfare and Security 2010, ECIW 2010, E1

conference

Micro-blogging in the workplace

C Lee, M Warren

(2010), pp. 42-48, Proceedings of the 8th Australian Information Security Management Conference, E1

conference

Wikileaks : the truth or not?

I Rosewall, M Warren

(2010), pp. 26-29, Proceedings of The 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Information security disclosure : a Victorian case study

I Rosewall, M Warren

(2010), pp. 112-118, Proceedings of the 8th Australian Information Security Management Conference, Perth, W.A., E1

conference

Australian critical infrastructure protection : a case of two tales

M Warren, G Pye, W Hutchinson

(2010), pp. 30-36, SECAU 2010 : Proceedings of the 11th Australian Information Warfare and Security Conference, Perth, W.A., E1

conference

Development of a supply chain management security risk management method: A conceptual model

M Warren, S Leitch

(2010), pp. 327-333, 9th European Conference on Information Warfare and Security 2010, ECIW 2010, E1

conference

Influence operations and behavioural change

W Hutchinson, M Warren

(2010), pp. 116-119, 9th European Conference on Information Warfare and Security 2010, ECIW 2010, E1

conference

Enabling information security culture: Influences and challenges for Australian SMEs

S Dojkovski, S Lichtenstein, M Warren

(2010), ACIS 2010 Proceedings - 21st Australasian Conference on Information Systems, E1

conference

ICT corporate governance : a case study of a not-for-profit community healthcare organisation

A Zutshi, C Wilkin, P Couchman, A Sohal, G Wood, M Warren

(2010), ANZAM 2010 : Refereed Papers of the 24th Annual Australian and New Zealand Academy of Management Conference, Adelaide, S.Aust., E1

conference
2009

An emergent security risk : critical infrastructures and information warfare

G Pye, M Warren

(2009), Vol. 8, pp. 14-26, Journal of information warfare, Melbourne, Vic., C1

journal article

Security analysis and modelling framework for critical infrastructure systems

G Pye, M Warren

(2009), pp. 198-207, 8th European Conference on Information Warfare and Security 2009, ECIW 2009, E1

conference

Information security management curriculum development : an Australian example

M Warren, S Leitch

(2009), pp. 25-33, INSITE 2009 : Proceedings of the 2009 Informing Science + Information Technology Education Conference, Macon, Georgia, E1

conference

Supply chain management security: The weak link of australian critical infrastructure protection

M Warren, S Leitch

(2009), pp. 240-246, 8th European Conference on Information Warfare and Security 2009, ECIW 2009, E1

conference

Security issues challenging Facebook

S Leitch, M Warren

(2009), pp. 137-142, Proceedings of the 7th Australian Information Security Management Conference, E1

conference

Information security disclosure : a case study

I Rosewall, M Warren

(2009), pp. 39-47, Proceedings of 7th Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Security as an element in environmental assessment and decision making

W Hutchinson, M Warren

(2009), pp. 1-11, ANZSEE 2009 : Green milage in the global meltdown: an ecological economics way forward. Proceedings of the conference of the Australia New Zealand Society for Ecological Economics, Darwin, Northern Terroritory, E1

conference

Multi-tier phishing email classification with an impact of classifier rescheduling

M Islam, J Abawajy, M Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference
2008

The impact of ICT governance within Australian companies

B O'Donohue, G Pye, M Warren

(2008), pp. 163-177, Information Technology Governance and Service Management: Frameworks and Adaptations, B1

book chapter

Attention IT managers : why you can't trust security surveys

M Warren, S Leitch

(2008), Vol. 1, pp. 32-37, Deakin business review, Geelong, Vic., C1

journal article

Analysing online teaching and learning systems using MEAD

S Leitch, M Warren

(2008), Vol. 4, pp. 259-266, Interdisciplinary journal of knowledge and learning objects, Santa Rosa, Calif., C1

journal article

Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for Australia

C Beggs, M Warren

(2008), Vol. 7, pp. 24-35, Journal of information warfare, Mt. Eliza, Vic., C1

journal article

Considerations for modelling critical infrastructure systems

G Pye, M Warren

(2008), pp. 185-195, 7th European Conference on Information Warfare and Security 2008, ECIW 2008, E1

conference

Using the sociotechnical approach in global software developments : Is the theory relevant today?

M Crofts, B Fraunholz, M Warren

(2008), pp. 250-260, ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, Christchurch, New Zealand, E1

conference

Designing on-line learning systems using participation

S Leitch, M Warren

(2008), pp. 1-8, ANZSYS 2008 : Proceedings of the 14th international Australia and New Zealand Systems Conference 2008, Perth, Western Australia, E1

conference

Designing ethical systems for online systems

S Leitch, M Warren

(2008), pp. 130-136, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Melbourne, Vic., E1

conference

Young people and the internet : what is the solution?

S Leitch, M Warren

(2008), pp. 137-142, AiCE 2008 : proceedings of the fifth Australian Institute of Computer Ethics Conference, Melbourne, Vic., E1

conference

Visualisation of critical infrastructure failure

W Wilde, M Warren

(2008), pp. 48-63, Proceedings of the 9th Australian Information Warfare and Security Conference 2008, Perth, Western Australia, E1

conference

IT security certifications: Stakeholder evaluation and selection

N Tate, S Lichtenstein, M Warren

(2008), pp. 991-1001, ACIS 2008 Proceedings - 19th Australasian Conference on Information Systems, E1

conference
2007

Terrorism and the internet

M Warren

(2007), pp. 42-49, Cyber Warfare and Cyber Terrorism, B1

book chapter

Hackers and cyber terrorists

M Warren

(2007), pp. 304-311, Encyclopedia of Information Ethics and Security, B1

book chapter

Security protection for critical infrastructure

M Warren, T Busuttil

(2007), pp. 609-615, Encyclopedia of Information Ethics and Security, B1

book chapter

Modelling critical infrastructure systems

G Pye, M Warren

(2007), Vol. 6, pp. 41-53, Journal of information warfare, Australia, C1

journal article

A model and framework for online security benchmarking

G Pye, M Warren

(2007), Vol. 31, pp. 209-215, Informatica (Ljubljana), C1

journal article

E-business security benchmarking: a model and framework

G Pye, M Warren

(2007), Vol. 1, pp. 378-390, International Journal of Information and Computer Security, C1

journal article

A conceptual model for security outsourcing

K Samarasinghe, M Warren, G Pye

(2007), pp. 187-194, Proceedings of the 5th Australian Information Security Management Conference, E1

conference

Benchmarks for critical infrastructure systems modelling

G Pye, M Warren

(2007), pp. 207-215, 6th European Conference on Information Warfare and Security 2007, ECIW 2007, E1

conference

Locating risk through modelling critical infrastructure systems

G Pye, M Warren

(2007), pp. 87-98, Proceedings of the International Symposium on Human Aspects of Information Security and Assurance, HAISA 2007, E1

conference

A conceptual model for security outsourcing

K Samarasinghe, M Warren, G Pye

(2007), pp. 187-194, Proceedings of the 5th Australian Information Security Management Conference, Perth, W.A., E1

conference

Evaluating the effectiveness of an e-business security methodology using a case study approach

D Hutchinson, M Warren

(2007), pp. 1-14, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Victoria, E1

conference

A case study of e-business security management for Australia medium SME's

D Hutchinson, M Warren

(2007), pp. 1-12, We-B 2007 : 8th International We-B (Working for E-Business) Conference 2007 E-Business: the Past, Present and Challenges for the Future, Melbourne, Australia, E1

conference

Fostering information security culture in small and medium size enterprises: An interpretive study in australia

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 1560-1571, Proceedings of the 15th European Conference on Information Systems, ECIS 2007, E1

conference

Teaching future Australian information systems professionals

S Leitch, M Warren

(2007), pp. 63-70, Education, training and lifelong learning, Prague, Czech Republic, E1

conference

Supporting user evaluation of IT security certification schemes

N Tate, S Lichtenstein, M Warren

(2007), pp. 70-81, ACIS 2007 Proceedings - 18th Australasian Conference on Information Systems, E1

conference

Using problem based learning to teach future Australian IS professionals

S Leitch, M Warren

(2007), pp. 417-424, Proceedings of the Computer Science and IT Education Conference, Mauritius, E1

conference

Toward user evaluation of IT security certification schemes: A preliminary framework

N Tate, S Lichtenstein, M Warren

(2007), Vol. 232, pp. 473-478, IFIP International Federation for Information Processing, E1

conference

Security issues within Virtual Worlds such as Second Life

C Lee, M Warren

(2007), pp. 142-151, Proceedings of the 5th Australian Information Security Management Conference, E1

conference

The impact of security surveys within Australia and New Zealand

M Warren, S Leitch

(2007), pp. 152-156, Proceedings of the 5th Australian Information Security Management Conference, E1

conference

Institutionalising information security culture in Australian SMEs: Framework and key issues

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 10-24, Proceedings of the International Symposium on Human Aspects of Information Security and Assurance, HAISA 2007, E1

conference

Developing information security culture in small and medium size enterprises: Australian case studies

S Dojkovski, S Lichtenstein, M Warren

(2007), pp. 55-65, 6th European Conference on Information Warfare and Security 2007, ECIW 2007, E1

conference

A proposed cyber-terrorism SCADA risk framework concept for Australia

C Beggs, M Warren

(2007), pp. 17-25, 6th European Conference on Information Warfare and Security 2007, ECIW 2007, E1

conference
2006

Security management : modelling critical infrastructure

G Pye, M Warren

(2006), Vol. 5, pp. 46-61, Journal of information warfare, Churchlands, W. A., C1

journal article

Striking a balance between ethics and ICT governance

G Pye, M Warren

(2006), Vol. 13, pp. 201-207, Australian journal of information systems, Canberra, A.C.T., C1

journal article

Penetration testing professional ethics : a conceptual model and taxonomy

J Pierce, A Jones, M Warren

(2006), Vol. 13, pp. 193-200, Australasian journal of information systems, North Sydney, N.S.W., C1

journal article

A methodology of health information security evaluation

W Brooks, M Warren

(2006), Vol. 10, Healthcare Review Online, C1

journal article

Improving ICT governance in Australian companies

B O'Donohue, G Pye, M Warren

(2006), ACIS 2006 Proceedings - 17th Australasian Conference on Information Systems, E1

conference

E-business security management for Australian micro SMEs - a case study

D Hutchinson, M Warren

(2006), pp. 69-72, GITMA 2006 : Proceedings of the Seventh Annual Global Information Technology Management World Conference, Orlando, Florida, E1

conference

The design and rationale of the Australian small to medium enterprise e-business security methodology (ASME-EBSM)

D Hutchinson, M Warren

(2006), pp. 247-258, 7th International We-b (Working for E-Business) Conference: e-Business: how far have we come?, Melbourne, Vic., E1

conference

E-business security management for Australian small SMEs - a case study

D Hutchinson, M Warren

(2006), pp. 65-74, 7th International We-b (Working for E-Business) Conference : e-Business : how far have we come?, Melbourne, Vic., E1

conference

Critical infrastructure protection, modelling and management: An australian commercial case study

G Pye, M Warren

(2006), pp. 177-189, 5th European Conference on Information Warfare and Security 2006, ECIW 2006, E1

conference

A conceptual model of and framework for benchmarking online security

G Pye, M Warren

(2006), pp. 501-508, e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Challenges in fostering an information security culture in australian small and medium sized enterprises

S Dojkovski, S Lichtenstein, M Warren

(2006), pp. 31-40, 5th European Conference on Information Warfare and Security 2006, ECIW 2006, E1

conference

Conceptual modelling: choosing a critical infrastructure modelling methodology

G Pye, M Warren

(2006), pp. 103-113, Proceedings of the 7th Australian Information Warfare and Security Conference, Perth, Western Australia, E1

conference

Outsourcing system security: A theoretical perspective

W Wilde, M Warren, W Hutchinson

(2006), ACIS 2006 Proceedings - 17th Australasian Conference on Information Systems, E1

conference

The derivation of a conceptual model for outsourcing IT security

W Wilde, M Warren, W Hutchinson

(2006), pp. 234-238, Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

A participational security method for healthcare organisations

M Warren, S Leitch

(2006), e-Society 2006 : Proceedings of the IADIS International Conference e-Society 2006, Dublin, Ireland, E1

conference

Social engineering and its impact via the internet

M Warren, S Leitch

(2006), Proceedings of 4th Australian Information Security Management Conference, E1

conference

The derivation of a conceptual model for IT security outsourcing

W Wilde, M Warren, W Hutchinson

(2006), Proceedings of 4th Australian Information Security Management Conference, E1

conference

A methodology of health information security evaluation

W Brooks, M Warren

(2006), pp. 1-7, HIC 2006 : Primary care & beyond: building the e-birdge to intergrated care, 9-11 August 2006, Auckland NZ, Auckland, New Zealand, E1-1

conference
2005

The ethics of hacking and computer abuse: Australian case studies

M Warren, S Leitch

(2005), pp. 35-48, Electronic monitoring in the workplace: controversies and solutions, Hershey, Pa, B1

book chapter

System survivability: a critical security problem

J Redman, M Warren, W Hutchinson

(2005), Vol. 13, pp. 182-188, Information management & computer security, Bingley, England, C1

journal article

In pursuit of a standard penetration testing methodology

J Pierce, M Warren, X Corray

(2005), Vol. 4, pp. 26-39, Journal of information warfare, Perth, W.A., C1-1

journal article

Australian commercial - Critical infrastructure management protection

G Pye, M Warren

(2005), pp. 249-259, 4th European Conference on Information Warfare and Security 2005, ECIW 2005, E1

conference

Information security culture in small and medium sized enterprises: a socio-cultural framework

S Dojkovski, M Warren, S Lichtenstein

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Vic., E1

conference

Modelling critical infrastructure dependency relationships

G Pye, M Warren

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005., Geelong, E1

conference

Ethics or ICT governance: striking an ethical balance

G Pye, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference

Benchmarking E-business security: A model and framework

G Pye, M Warren

(2005), pp. 80-87, Proceedings of 3rd Australian Information Security Management Conference, E1

conference

An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?

J Pierce, D Mackay, M Warren, J Wells

(2005), E-links : community, business and university : proceedings of the 6th International We-B (Working for E-Business) Conference, 23rd to 25th November, 2005, Melbourne, Melbourne, Victoria, E1

conference

A review of Australian internet banking client-side authentication models

J Pierce, D Mackay, M Warren, J Wells

(2005), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Geelong, Victoria, E1

conference

A taxonomy of penetration testing ethics

J Pierce, A Jones, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference

Understanding transition towards information security culture change

L Ngo, W Zhou, M Warren

(2005), pp. 67-73, Proceedings of 3rd Australian Information Security Management Conference, E1

conference

An approach for critical information infrastructure protection

T Busuttil, M Warren

(2005), pp. 53-62, 4th European Conference on Information Warfare and Security 2005, ECIW 2005, E1

conference

A systems approach to security

M Warren, W Hutchinson

(2005), pp. 302-305, Systems Thinking and Complexity Science: Insights for Action Proceedings of the 11th Annual ANZSYS / Managing the Complex V conference, Christchurch, NZ, E1

conference

RFID and ethics

C Chan, M Warren

(2005), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Geelong, Australia, E1

conference
2004

CIIP-RAM - a security risk analysis methodology for critical information infrastructure protection

T Busuttil, M Warren

(2004), Vol. 148, pp. 33-49, IFIP Advances in Information and Communication Technology, B1

book chapter

Cyber crime influencing businesses in South Africa

M Herselman, M Warren

(2004), Vol. 1, pp. 253-266, Journal of issues in informing science and information technology, Santa Rosa, Calif., C1

journal article

A critical review of penetration testing methodologies

J Pierce, M Warren, X Corray

(2004), pp. 167-173, 5th Australian Information Warfare and Security Conference 2004 Proceedings, Perth, Western Australia, E1

conference

Graphical authentication : an architectural design specification

J Pierce, M Warren, D Mackay, J Wells

(2004), pp. 76-82, 2nd Australian Computer,Networks & Information Forensics Conference Proceedings, Perth, Western Australia, E1

conference

Graphical authentication: justifications and objectives

J Pierce, M Warren, D Mackay, J Wells

(2004), pp. 49-55, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

An empirical study of e-business security in Geelong small to medium business enterprises (SMEs)

D Hutchinson, M Warren

(2004), pp. 1-11, We-B 2004 : 5th International WE-B (Working for e-Business) Conference : Enterprise value from e-business, conference proceedings, Perth, Western Australia, E1

conference

Health information security evaluation: continued development of an object-oriented method

W Brooks, M Warren

(2004), pp. 1-15, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

PKI - advantages and obstacles

A Jancic, M Warren

(2004), pp. 1-9, Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Perth, Western Australia, E1

conference

Critical infrastructure protection: comparison of countries

P Marasea, M Warren

(2004), pp. 249-260, 3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004], London, England, E1

conference

A risk analysis approach to critical information infrastructure protection

T Busuttil, M Warren

(2004), pp. 1-11, 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations, Perth, Western Australia, E1

conference

System survivability : a new security concept

J Redman, M Warren, W Hutchinson

(2004), pp. 337-343, INC 2004 : Proceedings of the 4th International Network Conference, University of Plymouth, England, E1

conference
2003

A national information infrastructure model for information warfare defence

V Stagg, M Warren

(2003), pp. 97-110, Current security management and ethical issues of information technology, Hershey, Pa., B1-1

book chapter

Information security - An e-learning problem

M Warren, W Hutchinson

(2003), Vol. 2783, pp. 21-26, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1-1

book chapter

Security for Internet banking: a framework

Damien Hutchinson, Matthew Warren

(2003), Vol. 16, pp. 64-73, Logistics Information Management, C1

journal article

A security risk management approach for e-commerce

M Warren, W Hutchinson

(2003), Vol. 11, pp. 238-242, Information Management and Computer Security, C1-1

journal article

Designing systems for e-commerce

S Leitch, M Warren

(2003), Vol. 10, pp. 139-143, AJIS Australian journal of information systems, Canberra, ACT, C1-1

journal article

Australian hackers and ethics

M Warren, W Hutchinson

(2003), Vol. 10, pp. 151-156, Australasian journal of information systems, Canberra, A.C.T., C1-1

journal article

A quality indicator of Australian e-business

S Leitch, M Warren

(2003), Vol. III, pp. 149-152, E-business review: a publication of the International Academy of E-Business., Nacogdoches, Tex., C1-1

journal article

The law and cyber terrorism

M Warren, W Hutchinson

(2003), Vol. 2, pp. 27-32, Journal of information warfare, [Mt. Eliza, Vic.]; Perth, WA, C1-1

journal article

Three strategic dimensions of information security in ecommerce : a literature review based conceptual model

L Vasiu, M Warren, D Mackay

(2003), pp. 1-10, Surfing the waves: management challenges, management solutions: proceedings of the 17th ANZAM conference, Fremantle, W.A., E1

conference

Quantum cryptography - one step closer to reality

A Jancic, M Warren

(2003), pp. 181-189, Proceedings 4th Australian Information Warfare and IT Security Conference : Enhancing trust, Adelaide, South Australia, E1

conference

Information security, cyber crime, and infrastructure protection : information security management within Australian healthcare organisations

W Brooks, M Warren, W Hutchinson

(2003), The Information Institute ISOneWorld Conference and Convention, Las Vegas, Nev., E1

conference

A conceptual model for graphical authentication

J Pierce, J Wells, M Warren, D Mackay

(2003), pp. 1-8, InfoSec03 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

An analysis of CSI/FBI and AusCERT surveys

J Pierce, M Warren, D Mackay

(2003), pp. 1-11, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Object-oriented security modelling for healthcare

W Brooks, M Warren

(2003), pp. 1-10, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

A retail supply chain risk assessment conceptual model

J Pierce, D Mackay, M Warren

(2003), pp. 1-6, 4th International We-B Conference (working with e-business), 24-25 November 2003, Perth, Western Australia, Perth, Australia, E1

conference

A process based security framework for e-business and Australian SMES

D Hutchinson, M Warren

(2003), pp. 155-158, Proceedings of the Fourth Annual Global Information Technology Management World Conference, Calgary, Canada, E1

conference

Australian SMES and e-security guides on trusting the internet

D Hutchinson, M Warren

(2003), pp. 88-91, GITMA 2003 : Proceedings of the Fourth Annual Global Information Technology Management World Conference, Calgary, Alta., E1

conference

Modelling e-business security recommendations for Australian small to medium business enterprises (SMEs)

D Hutchinson, M Warren

(2003), 4th International WE-B Conference 2003 - e-Business and Information Systems, Perth, West Australia, E1

conference

A review of critical information infrastructure protection within IT security guidelines

T Busuttil, M Warren

(2003), pp. 105-113, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, Australia, E1

conference

CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection

T Busuttil, M Warren

(2003), pp. 91-103, Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, Adelaide, Australia, E1

conference

An Australian supply chain risk assessment model

J Pierce, M Warren, D Mackay

(2003), pp. 109-112, IS 2003 : Proceedings of the 6th International Multi-Conference on Intelligent and Computer Systems : New information society, Ljubljana, Slolvenia, E1

conference

Defining fraud: issues for organizations from an information systems perspective

L Vasiu, M Warren, D Mackay

(2003), pp. 971-979, Proceedings of the Seventh Pacific Asia Conference on Information Systems, Adelaide, South Australia, E1

conference

The tri-dimensional role of information security in E-business : a managerial perspective

L Vasiu, D Mackay, M Warren

(2003), pp. 1-9, 2003 Hawaii International Conference on Business, Honolulu, T.H., E1

conference
2002

Deception and reality: a challenge for the information and knowledge management function

W Hutchinson, M Warren

(2002), pp. 287-295, Human factors in information systems, Hershey, PA, B1

book chapter

A security evaluation criteria

W Brooks, M Warren, W Hutchinson

(2002), Vol. 15, pp. 377-384, Logistics Information Management, C1

journal article

Security practice: survey evidence from three countries

M Warren

(2002), Vol. 15, pp. 347-351, Logistics Information Management, C1

journal article

Truth, lies, reality and deception : an issue for e-commerce

W Hutchinson, M Warren

(2002), Vol. 3, pp. 208-221, International journal of services technology and management, London, England, C1

journal article

Information warfare: using the viable system model as a framework to attack organisations

B Hutchinson, M Warren

(2002), Vol. 9, pp. 67-74, AJIS : Australian journal of information systems, Wollongong, N.S.W., C1

journal article

A security method for healthcare organisations

M Warren, W Hutchinson

(2002), Vol. 72, pp. 157-166, IFIP Advances in Information and Communication Technology, E1

conference

Deception: A tool and curse for security management

M Warren, W Hutchinson

(2002), Vol. 65, pp. 327-337, IFIP Advances in Information and Communication Technology, E1

conference

A conceptual framework of eFraud from a supply chain management perspective

L Vasiu, D Mackay, M Warren

(2002), pp. 1-9, E-conomy - from here to where? : Proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Perth, W. A., E1

conference

Personal privacy issues in B2C eCommerce : a theoretical framework

L Vasiu, M Warren, D Mackay

(2002), pp. 1-8, CollECTeR 2002: Proceedings of the Seventh CollECTeR Conference on Electronic Commerce, Wollongong, N. S. W., E1

conference

A conceptual approach to information warfare : security risk analysis

T Busuttil, M Warren

(2002), pp. 35-41, ECIW2003 : proceedings of the 2nd European conference on Information Warfare and Security, Uxbridge, United Kingdom, E1

conference

E-security guides for Australian SMEs

D Hutchinson, M Warren

(2002), pp. 1-11, E-conomy - from here to where? : proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, Perth, Western Australia, E1

conference

A security evaluation criteria for baseline security standards.

W Brooks, M Warren, W Hutchinson

(2002), Vol. 86, pp. 79-89, SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, CAIRO, EGYPT, E1

conference

Asymmetric scalability: the unfair advantage of information warfare

V Stagg, M Warren

(2002), pp. 290-297, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Western Australia, 28 & 29 November 2002, Perth, W.A., E1

conference

Security risk analysis e-commerce

M Warren, W Hutchinson

(2002), pp. 397-404, INC2002 : Proceedings of the Third International Network Conference, Plymouth, England, E1

conference

Protection of New Zealand in the age of information warfare

M Warren, J McIntyre

(2002), pp. 235-240, Protecting the infrastructure: proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Perth, Australia, E1

conference

A formalisation of an information infrastructure security risk analysis approach

T Busuttil, M Warren

(2002), pp. 174-182, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Australia, E1

conference

Baseline security standards evaluation

W Brooks, M Warren

(2002), pp. 162-173, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Will new laws be effective in reducing web sponsorship of terrorist groups?

M Warren, W Hutchinson

(2002), pp. 156-161, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Perth, WA, E1

conference

Swarming attacks and agents

M Warren, M McDougall, K Pascoe

(2002), pp. 209-217, Protecting the infrastructure: proceedings of the 3rd Australian Information Warfare and Security conference 2002, Perth, Australia, E1

conference

Information security management within Australian healthcare organisations

W Brooks, M Warren

(2002), pp. 318-331, Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, Churchlands, W.A., E1

conference

Information warfare incident monitoring - government or public responsibility?

L Batten, M Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1

conference

Security management: An information systems setting

M Warren, L Batten

(2002), Vol. 2384, pp. 257-270, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference

E-universities : - business and technology (an Australian viewpoint)

P Goward, M Warren, S Leitch

(2002), pp. 7-10, Euromedia 2002 : proceedings of the seventh annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications, Modena, Italy, E1

conference

Designing ethical systems for electronic commerce

S Leitch, M Warren

(2002), pp. 68-74, Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, Sydney, N.S.W., E1

conference

Australian hackers: an ethical perspective

M Warren, W Hutchinson

(2002), pp. 131-138, Third Australian Institute of Computer Ethics Conference Proceedings: Computer Ethics: Its Impact for Australia, Sydney, NSW, E1

conference

Internet banking: security, ethics and trust

D Hutchinson, M Warren

(2002), pp. 52-62, Conference proceedings of AiCE 2002, Third Australian Institute of Computer Ethics Conference, Sydney, N.S.W., E1

conference

Defending infrastructures against information warfare

V Stagg, M Warren

(2002), pp. 640-643, ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, SEATTLE, WA, E1

conference

A conceptual model for security and trust within internet banking transactions

D Hutchinson, M Warren

(2002), pp. 2228-2234, Association for Information Systems 8th Americas Conference on Information Systems : AMCIS 2002 ; August 8 - 11, 2002, Dallas, Texas., Dallas, Texas, USA, E1

conference

Information superiority and the role of an organisation's network

W Hutchinson, M Warren

(2002), pp. 567-572, Papers from the Third International Network Conference 2002 : 16-18 July 2002, Plymouth, United Kingdom, Plymouth, England, E1

conference

Developing a postgraduate course in information security: a confusion of terms

W Hutchinson, M Warren

(2002), pp. 805-812, Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, Melbourne, Victoria, E1

conference

Network theory - the demise of systems thinking?

W Hutchinson, M Warren

(2002), ANZIIS 2003 : proceedings of the Eighth Australia and New Zealand Intelligent Information Systems Conference, Dec. 10-12, Sydney, Australia, Mooloolaba, Qld, E1

conference
2001

Cyber terrorism and the contemporary corporation

M Warren, W Hutchinson

(2001), pp. 53-64, Information security management : global challenges in the new millennium, Hershey, Pa., B1

book chapter

Intelligent agent technology within information warfare

T Busuttil, M Warren

(2001), Vol. 1, pp. 52-61, Journal of information warfare, Melbourne, Vic., C1

journal article

Security authentication for on-line internet banking

D Hutchinson, M Warren

(2001), Vol. 25, pp. 349-355, Informatica (Ljubljana), C1

journal article

A Risk Analysis Model to Reduce Computer Security Risks Among Healthcare Organizations

M Warren

(2001), Vol. 3, pp. 27-37, Risk Management, C1

journal article

Information warfare and ethics

M Warren, W Hutchinson

(2001), Vol. 8, pp. 58-62, Australasian journal of information systems, Wollongong, NSW; Clayton, Vic., C1

journal article

Attitudes of Australian information system managers against online attackers

William Hutchinson, Matthew Warren

(2001), Vol. 9, pp. 106-111, Information Management & Computer Security, C1

journal article

Principles of information warfare

W Hutchinson, M Warren

(2001), Vol. 1, pp. 1-6, Journal of information warfare, Mt. Eliza, Vic., C1

journal article

Intelligent agents and their information warfare implications

T Busuttil, M Warren

(2001), pp. 109-118, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, WA, E1

conference

E-commerce: a Victorian case study

M Warren, S Leitch, P Love

(2001), pp. 255-263, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Perth, Western Australia, E1

conference

Security issues of M-Commerce

D Hutchinson, M Warren

(2001), pp. 478-485, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Perth, Western Australia, E1

conference

A framework of security authentication for internet banking

D Hutchinson, M Warren

(2001), pp. 467-477, Working for excellence in the e-conomy : proceedings : 2nd International We-B Conference 2001, Perth, Western Australia 29 & 30 November, 2001, Perth, Western Australia, E1

conference

An application of soft systems in determining user requirements

D Hutchinson, T Busuttil, M Warren

(2001), pp. 132-140, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Perth, West Australia, E1

conference

A security training approach for UK small and medium sized enterprises

M Warren, W Hutchinson

(2001), pp. 197-207, WISE 2 : proceedings of the IFIP TC11 WG 11.8 Second World Conference on Information Security Education, 2001, Perth, WA, E1

conference

A review of IT benefits and costs in construction

C Cowley, P Love, M Warren

(2001), pp. 120-131, Systems in management, 7th annual ANZSYS Conference 2001, Perth, Western Australia 27 & 28 November, 2001 : the relevance of systems thinking in the contemporary world : proceedings, Perth, WA, E1

conference

Information warfare and hacking

M Warren, W Hutchinson

(2001), pp. 195-206, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

Teaching small and medium sized enterprises about security

M Warren, W Hutchinson

(2001), pp. 207-217, Proceedings of the 5th Australian Security Research Symposium 2001, Perth, WA, E1

conference

A business information infrastructure

V Stagg, M Warren

(2001), pp. 173-181, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, Western Australia, 29 & 30 November 2001, Perth, Western Australia, E1

conference

A duality security risk analysis method for e-commerce

M Warren, W Hutchinson

(2001), pp. 259-266, Survival in the e-economy : proceedings : 2nd Australian Information Warfare & Security Conference 2001, Perth, WA, E1

conference

Current state and research trends in the area of process visualization in workflow system for e-commerce applications

P Wojcieszak, M Warren

(2001), pp. 289-296, EUROMEDIA 2001, featuring WEBTEC, MEDIATEC, COMTEC, APTEC, April 18 - 20, 2001, Valencia, Spain, Valencia, Spain, E1

conference

The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system

W Hutchinson, M Warren

(2001), pp. 97-103, Information systems in the digital world : proceedings of the 6th UKAIS Conference, Portsmouth, England, E1

conference

The nature of data: illusions of reality

W Hutchinson, M Warren

(2001), pp. 262-267, Informing Science and IT Education Conference: proceedings and schedule, Krakow, Poland, E1

conference

The design, development and implementation of an e-commerce system for procuring materials in construction

S Kong, H Li, P Love, M Warren

(2001), pp. 315-325, Working for excellence in the e-conomy: proceedings: 2nd International We-B Conference 2001, Perth, W.A., E1

conference
2000

Ethics and electronic commerce

S Leitch, M Warren

(2000), pp. 1-4, Computer ethics 2000 : selected papers from the Second Australian Institute of Computer Ethics Conference (AICE2000), Canberra, A.C.T., E1

conference
1999

Computer hacking and cyber terrorism: The real threats in the new millennium?

S Furnell, M Warren

(1999), Vol. 18, pp. 28-34, Computers and Security, Amsterdam, The Netherlands, C1-1

journal article
1997

Computer abuse: vandalizing the information society

S Furnell, M Warren

(1997), Vol. 7, pp. 61-66, Internet research, Bingley, Eng., C1-1

journal article
1996

Assessing staff attitudes towards information security in a European healthcare establishment

S Furnell, P Gaunt, R Holben, P Sanders, C Stockel, M Warren

(1996), Vol. 21, pp. 105-112, Medical informatics, Abingdon, Eng., C1-1

journal article

Provision of healthcare security information services using the world-wide web

S Furnell, P Sanders, M Warren

(1996), Vol. 34, pp. 98-102, MIE 1996 : Human facets in information : Proceedings of the Medical Informatics Conference Europe, Copenhagen, Denmark, E1-1

conference
1995

Development of security guidelines for existing healthcare systems

S Furnell, P Sanders, M Warren

(1995), Vol. 20, pp. 139-148, Informatics for health and social care, Abingdon, Eng., C1-1

journal article
1994

A generic methodology for health care data security

S Furnell, P Gaunt, G Pangalos, P Sanders, M Warren

(1994), Vol. 19, pp. 229-245, Medical informatics, Abingdon, Eng., C1-1

journal article

Funded Projects at Deakin

Industry and Other Funding

Seeding Project - Corporate critical infrastructure protection - visualization

Prof Matthew Warren

  • 2007: $5,000

AMSI internship with Australian Information Security Assoc for Ishan Ruwan Senarathna

Prof Matthew Warren, Mr Ruwan Senarathna

  • 2016: $17,000

AMSI Internship - Mina Roshan - Customer behaviour modelling and marketing applications

Prof Matthew Warren, Ms Mina Roshan Kokabha

  • 2016: $29,000

Cybersecurity Executive Awareness Training for Department of Premier and Cabinet

Mr Damien Manuel, Prof John Yearwood, Prof Matthew Warren

  • 2017: $10,000

Other Funding Sources

Australian Cyber Security survey of Australian SMEs.

Prof Matthew Warren, Dr Graeme Pye, Dr Scott Salzman

  • 2019: $70,000

National Authentication Global Case Studies

Prof Matthew Warren

  • 2019: $35,000

Supervisions

Principal Supervisor
2017

Dinithi Pallegedara

Thesis entitled: Minimising the Unauthorised Disclosure of Organisational Information via Social Media

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2016

Mina Roshan Kokabha

Thesis entitled: Understanding Organisational Use of Social Media for Crisis Communication

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

Ishan Senarathna

Thesis entitled: Cloud Computing Adoption by SMEs in Australia

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2015

Vindaya Asanga Senadheera

Thesis entitled: The adoption of social media by australian banks to communicate with the public

Doctor of Philosophy, Dept. of Information Systems & Business Analytics

2013

Adel Alamin

Thesis entitled: Investigating Factors Influencing the Adoption of AIS: Libyan Accountants' Perspective

Doctor of Philosophy, School of Information and Business Analytics

2009

Merete Crofts

Thesis entitled: Exploring the Sociotechnical Systems Perspectives in Global Software Development

Master of Commerce, School of Information and Business Analytics

2008

Sneza Dojkovski

Thesis entitled: Influencees on Information Security Culture in Australian Small and Medium Enterprises

Doctor of Philosophy, School of Information and Business Analytics

2007

Justin Pierce

Thesis entitled: An Investigation into the Effectiveness of Graphical Authentication An Exploratory Study

Doctor of Philosophy, School of Information and Business Analytics

2006

Kamaljeet Sandhu

Thesis entitled: The Acceptance, Use and Continued Use of an E-Services System

Doctor of Philosophy, School of Information and Business Analytics

Damien Hutchinson

Thesis entitled: The Australian Small to Medium Enterprise E-business Security Methodology

Doctor of Philosophy (Information Technology), School of Information Technology

2005

Saranond Inthanond

Thesis entitled: The Meaning of information: A Study of Western Construction of Asian-ness in Film

Doctor of Philosophy, School of Information and Business Analytics

Konrad Peszynski

Thesis entitled: Power and Politics in Systems Implementation

Doctor of Philosophy, School of Information and Business Analytics

Associate Supervisor
2017

Michael Callaghan

Thesis entitled: The Development of a Quantitative Measure of Codes of Ethics

Doctor of Philosophy, Department of Management

2009

Nicholas Tate

Thesis entitled: A Framework for Assessing Certification Schemes for IT Security Professionals

Doctor of Philosophy, School of Information and Business Analytics

Leanne Ngo

Thesis entitled: Transitioning towards an Improved IT Security Culture in Organisations

Doctor of Philosophy (Information Technology), School of Information Technology

2003

Clayton Cowley

Thesis entitled: Costs, Benefits and Risks of IT in Construction

Master of Construction Management, School of Architecture and Built Environment