Matthew J. Warren

Orcid: 0000-0002-7529-431X

According to our database1, Matthew J. Warren authored at least 93 papers between 1996 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
DECAL: A Reconfigurable Monolithic Active Pixel Sensor for Tracking and Calorimetry in a 180 nm Image Sensor Process.
Sensors, 2022

Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach.
Int. J. Inf. Manag., 2022

Social Media Trolling: An fsQCA Approach.
Proceedings of the Transfer, Diffusion and Adoption of Next-Generation Digital Technologies, 2022

The AM08 Associative Memory ASIC Design, Architecture and Evaluation methodology.
Proceedings of the 11th International Conference on Modern Circuits and Systems Technologies, 2022

Cyberbullying Among Adults: A Qualitative Content Analysis of the Legal Responses to a Complex Social Problem.
Proceedings of the 43rd International Conference on Information Systems, 2022

Strategic Use of Social Media in COVID-19 Pandemic. Pandemic Management by Sri Lankan Leaders and Health Organisations Using the CERC Model.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

An Investigative Model of Adult Cyberbullying: A Court Case Analysis.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review.
Proceedings of the 27th Americas Conference on Information Systems, 2021

Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises.
Proceedings of the Australasian Conference on Information Systems, 2021

A Review of Adult Cyberbullying Research from Multi-disciplinary Archives and Directions for Future Studies.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems.
J. Inf. Syst., 2020

Political Cyber Operations: A South Pacific Case Study.
Int. J. Cyber Warf. Terror., 2020

A Study of Cyber Security Issues in Sri Lanka.
Int. J. Cyber Warf. Terror., 2020

Risks of Critical Infrastructure Adoption of Cloud Computing by Government.
Int. J. Cyber Warf. Terror., 2020

Preface Ethics in the Cyber Age and exploring emerging themes and relationships between ethics, governance and emerging technologies.
Australas. J. Inf. Syst., 2020

Fake News Case Study during the Australian 2019 General Election.
Australas. J. Inf. Syst., 2020

Review: Responsible use of technology to combat Cyberbullying among adolescents.
Australas. J. Inf. Syst., 2020

A New Markov Decision Process Based Behavioral Prediction System for Airborne Crews.
IEEE Access, 2020

Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

An Intervention Model for Cyberbullying Based on the General Theory of Crime and Routine Activity Theory.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
Data retention: an assessment of a proposed national scheme.
J. Inf. Commun. Ethics Soc., 2019

Preface to Research on Applied Ethics (Cybersecurity).
Australas. J. Inf. Syst., 2019

Cloud Forensics Investigations Relationship: A Model And Instrument.
Proceedings of the Australasian Conference on Information Systems, 2019

2018
Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs.
Australas. J. Inf. Syst., 2018

2017
Social media as an information system: improving the technological agility.
Enterp. Inf. Syst., 2017

Editorial: Research on Applied Ethics Involving Emerging ICT Technologies.
Australas. J. Inf. Syst., 2017

A Hybrid Location Privacy Protection Scheme in Big Data Environment.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
The Syrian Electronic Army - a hacktivist group.
J. Inf. Commun. Ethics Soc., 2016

Ethics and ICT: Why all the fuss?
J. Inf. Commun. Ethics Soc., 2016

Understanding the use of social media by organisations for crisis communication.
Comput. Hum. Behav., 2016

Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan Vs Regional SMEs.
Australas. J. Inf. Syst., 2016

2015
Applying classification controls to Internet content in Australia.
J. Inf. Commun. Ethics Soc., 2015

Adoption of Social Media as a Communication Medium: A Study of Theoretical Foundations.
Proceedings of the UKAIS 2015, 2015

An Empirical Study of Factors Influencing Accounting Information Systems Adoption.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
The influence of organisation culture on E-commerce adoption.
Ind. Manag. Data Syst., 2014

2013
An Empirical Study of the Influence of Different Organisation Cultures on E-Commerce Adoption Maturity.
Proceedings of the Australasian Conference on Information Systems, 2013

Understanding the Role of Social Media in Incident/Crisis Communication.
Proceedings of the Australasian Conference on Information Systems, 2013

2011
Protection of Australia in the Cyber Age.
Int. J. Cyber Warf. Terror., 2011

Towards the Human Information Security Firewall.
Int. J. Cyber Warf. Terror., 2011

A Study Into How Australian Banks Use Social Media.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

2010
Hacker Taggers: A new type of hackers.
Inf. Syst. Frontiers, 2010

Ethical decision making: Improving the quality of acceptable use policies.
Comput. Secur., 2010

ETHICS: The Past, Present and Future of Socio-Technical Systems Design.
Proceedings of the History of Computing. Learning from the Past, 2010

2009
Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

2007
A Model and Framework for Online Security Benchmarking.
Informatica (Slovenia), 2007

E-business security benchmarking: a model and framework.
Int. J. Inf. Comput. Secur., 2007

Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework.
Proceedings of the New Approaches for Security, 2007

Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2006
Ethics in Information Systems.
Australas. J. Inf. Syst., 2006

Striking a Balance Between Ethics and ICT Governance.
Australas. J. Inf. Syst., 2006

Penetration Testing Professional Ethics: a conceptual model and taxonomy.
Australas. J. Inf. Syst., 2006

2005
System survivability: a critical security problem.
Inf. Manag. Comput. Security, 2005

Australian Commercial - Critical Infrastructure Management Protection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

An Approach for Critical Information Infrastructure Protection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Benchmarking E-business Security: A Model and Framework.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.
Proceedings of the Information Security Management, Education and Privacy, 2004

Graphical Authentication: An Architectural Design Specification.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

Graphical Authentication: Justifications and Objectives.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

PKI - Advantages and Obstacles.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

Health Information Security Evaluation: Continued Development of an Object-Oriented Method.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

2003
A security risk management approach for e-commerce.
Inf. Manag. Comput. Secur., 2003

Australian Hackers and Ethics.
Australas. J. Inf. Syst., 2003

Designing Systems for E-Commerce.
Australas. J. Inf. Syst., 2003

ISO 17799 and Australian Healthcare Organisations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Defining Fraud: Issues for Organizations from an Information Systems Perspective.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

Australia's Agenda for E-Security Education and Research.
Proceedings of the Security Education and Critical Infrastructures, 2003

Information Security - An E-learning Problem.
Proceedings of the Advances in Web-Based Learning, 2003

Computer Forensic: An Issue of Definitions.
Proceedings of the 1st Australian Computer, 2003

2002
Truth, lies, reality and deception: an issue for e-commerce.
Int. J. Serv. Technol. Manag., 2002

Information Warfare: using the viable system model as a framework to attack organisations.
Australas. J. Inf. Syst., 2002

A Security Evaluation Criteria for Baseline Security Standards.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Security Management: An Information Systems Setting.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Security authentication for on-line Internet banking.
Informatica (Slovenia), 2001

Attitudes of Australian information system managers against online attackers.
Inf. Manag. Comput. Secur., 2001

Information Warfare and Ethics.
Australas. J. Inf. Syst., 2001

Deception: A Tool and Curse for Security Management.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

A Security Method for Healthcare Organisations.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
Information Warfare: Fact or Fiction?
Proceedings of the Information Security for Global Information Infrastructures, 2000

Deception and reality: a challenge for the information and knowledge management function.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

The Role of Participation in Systems.
Proceedings of the ICSTM2000, 2000

Teaching Introductory Management Using A Computer Simulation Game.
Proceedings of the ICSTM2000, 2000

The use of deception in systems.
Proceedings of the ICSTM2000, 2000

1999
Computer hacking and cyber terrorism: the real threats in the new millennium?
Comput. Secur., 1999

The Future of Australian & New Zealand Security Standard AS/NZS 4444?.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
Methods of Responding to Healthcare Security Incidents.
Proceedings of the MEDINFO '98, 1998

1997
Computer abuse: vandalizing the information society.
Internet Res., 1997

ODESSA - a new approach to healthcare risk analysis.
Proceedings of the Information Security in Research and Business, 1997

1996
Baseline Security Guidelines for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

A Telematics Security Training Application.
Proceedings of the EUROMEDIA 1996 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1996

Approaches to Security in Healthcare Multimedia Systems.
Proceedings of the Communications and Multimedia Security II, 1996


  Loading...