default search action
Matthew J. Warren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Ruwan Nagahawatta, Matthew J. Warren, Scott Salzman, Sachithra Lokuge:
Towards an Understanding of Cloud Computing Adoption in SMEs: The Role of Security and Privacy Factors. Int. J. Cyber Warf. Terror. 14: 1-13 (2024) - 2022
- [j41]Mohammad Alamgir Hossain, Mohammed Quaddus, Matthew J. Warren, Shahriar Akter, Ilias O. Pappas:
Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach. Int. J. Inf. Manag. 66: 102537 (2022) - [j40]Philip Patrick Allport, Seddik Benhammadi, Robert Ross Bosley, Jens Dopke, Lucian Fasselt, Samuel Flynn, Laura Gonella, Nicola Guerrini, Cigdem Issever, Kostas Nikolopoulos, Ioannis Kopsalis, Peter Philips, Tony Price, Iain Sedgwick, Giulio Villani, Matt Warren, Nigel Watson, Hannsjorg Weber, Alasdair Winter, Fergus Wilson, Steven Worm, Zhige Zhang:
DECAL: A Reconfigurable Monolithic Active Pixel Sensor for Tracking and Calorimetry in a 180 nm Image Sensor Process. Sensors 22(18): 6848 (2022) - [c58]Ruwan Nagahawatta, Chintha Kaluarachchi, Matthew J. Warren, Darshana Sedera:
Strategic Use of Social Media in COVID-19 Pandemic. Pandemic Management by Sri Lankan Leaders and Health Organisations Using the CERC Model. ACIS 2022: 99 - [c57]Chintha Dammi Kaluarachchi, Darshana Sedera, Matthew J. Warren:
Cyberbullying Among Adults: A Qualitative Content Analysis of the Legal Responses to a Complex Social Problem. ICIS 2022 - [c56]Alberto Annovi, Alessandro Cerri, Pascal Corona, Francesco Crescioli, David Martin, Eric Pierre, Sebastian Dittmeier, Gunnar Föhner, Dirk Gottschalk, André Schöning, Luca Frontini, Valentino Liberali, Alberto Stabile, Kostas Kordas, Tommaso Lari, Matteo Monti, Erdem Motuk, Matt Warren, Andreas Vgenopoulos:
The AM08 Associative Memory ASIC Design, Architecture and Evaluation methodology. MOCAST 2022: 1-5 - [c55]Mohammad Alamgir Hossain, Mohammed Quaddus, Shahriar Akter, Matthew J. Warren:
Social Media Trolling: An fsQCA Approach. TDIT (2) 2022: 119-131 - 2021
- [c54]Ruwan Nagahawatta, Sachithra Lokuge, Matthew J. Warren, Scott Salzman:
Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises. ACIS 2021: 45 - [c53]Chintha Kaluarachchi, Darshana Sedera, Matthew J. Warren:
A Review of Adult Cyberbullying Research from Multi-disciplinary Archives and Directions for Future Studies. ACIS 2021: 72 - [c52]Ruwan Nagahawatta, Matthew J. Warren, Sachithra Lokuge, Scott Salzman:
Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review. AMCIS 2021 - [c51]Shah Khalid Khan, Nirajan Shiwakoti, Peter Stasinopoulos, Matthew J. Warren:
Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks. ISCSIC 2021: 154-158 - [c50]Ruwan Nagahawatta, Matthew J. Warren, Scott Salzman, Sachithra Lokuge:
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs. PACIS 2021: 7 - [c49]Chintha Kaluarachchi, Darshana Sedera, Matthew J. Warren:
An Investigative Model of Adult Cyberbullying: A Court Case Analysis. PACIS 2021: 8 - [i3]Chintha Kaluarachchi, Darshana Sedera, Matthew J. Warren:
An Investigative Model of Adult Cyberbullying: A Court Case Analysis. CoRR abs/2111.04446 (2021) - [i2]Ruwan Nagahawatta, Sachithra Lokuge, Matthew J. Warren, Scott Salzman:
Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises. CoRR abs/2111.05993 (2021) - 2020
- [j39]Yaozhong Zhang, Kangjia Yao, Jiandong Zhang, Frank Jiang, Matthew J. Warren:
A New Markov Decision Process Based Behavioral Prediction System for Airborne Crews. IEEE Access 8: 28021-28032 (2020) - [j38]Chintha Kaluarachchi, Matthew J. Warren, Frank Jiang:
Review: Responsible use of technology to combat Cyberbullying among adolescents. Australas. J. Inf. Syst. 24 (2020) - [j37]Matthew J. Warren:
Fake News Case Study during the Australian 2019 General Election. Australas. J. Inf. Syst. 24 (2020) - [j36]Matt Warren, Kirsten Wahlstrom, Marcus R. Wigan, Oliver Kisalay Burmeister:
Preface Ethics in the Cyber Age and exploring emerging themes and relationships between ethics, governance and emerging technologies. Australas. J. Inf. Syst. 24 (2020) - [j35]Matthew J. Warren:
Political Cyber Operations: A South Pacific Case Study. Int. J. Cyber Warf. Terror. 10(3): 15-27 (2020) - [j34]Mansoor Al-Gharibi, Matthew J. Warren, William Yeoh:
Risks of Critical Infrastructure Adoption of Cloud Computing by Government. Int. J. Cyber Warf. Terror. 10(3): 47-58 (2020) - [j33]Ruwan Nagahawatta, Matthew J. Warren, William Yeoh:
A Study of Cyber Security Issues in Sri Lanka. Int. J. Cyber Warf. Terror. 10(3): 59-72 (2020) - [j32]Adel Alamin, Carla L. Wilkin, William Yeoh, Matthew J. Warren:
The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems. J. Inf. Syst. 34(3): 31-46 (2020) - [c48]Chintha Kaluarachchi, Darshana Sedera, Matthew J. Warren:
An Intervention Model for Cyberbullying Based on the General Theory of Crime and Routine Activity Theory. ACIS 2020: 8 - [c47]Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere:
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. CISIS 2020: 3-12 - [i1]Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere:
Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies. CoRR abs/2004.01855 (2020)
2010 – 2019
- 2019
- [j31]Matthew J. Warren, Oliver K. Burmeister:
Preface to Research on Applied Ethics (Cybersecurity). Australas. J. Inf. Syst. 23 (2019) - [j30]Matthew J. Warren, Shona Leitch:
Data retention: an assessment of a proposed national scheme. J. Inf. Commun. Ethics Soc. 17(1): 98-112 (2019) - [c46]Younis AL Husaini, Matthew J. Warren, Lei Pan, Mansoor Al-Gharibi:
Cloud Forensics Investigations Relationship: A Model And Instrument. ACIS 2019: 83 - 2018
- [j29]Ishan Senarathna, Carla Wilkin, Matthew J. Warren, William Yeoh, Scott Salzman:
Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs. Australas. J. Inf. Syst. 22 (2018) - 2017
- [j28]Matthew J. Warren, Oliver K. Burmeister:
Editorial: Research on Applied Ethics Involving Emerging ICT Technologies. Australas. J. Inf. Syst. 21 (2017) - [j27]Vindaya Senadheera, Matthew J. Warren, Shona Leitch:
Social media as an information system: improving the technological agility. Enterp. Inf. Syst. 11(4): 512-533 (2017) - [c45]Mohammad Reza Nosouhi, Vu Viet Hoang Pham, Shui Yu, Yong Xiang, Matthew J. Warren:
A Hybrid Location Privacy Protection Scheme in Big Data Environment. GLOBECOM 2017: 1-6 - 2016
- [j26]Ishan Senarathna, William Yeoh, Matthew J. Warren, Scott Salzman:
Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan Vs Regional SMEs. Australas. J. Inf. Syst. 20 (2016) - [j25]Mina Roshan, Matthew J. Warren, Rodney Carr:
Understanding the use of social media by organisations for crisis communication. Comput. Hum. Behav. 63: 350-361 (2016) - [j24]Matthew J. Warren, Richard Lucas:
Ethics and ICT: Why all the fuss? J. Inf. Commun. Ethics Soc. 14(2): 167-169 (2016) - [j23]Matthew J. Warren, Shona Leitch:
The Syrian Electronic Army - a hacktivist group. J. Inf. Commun. Ethics Soc. 14(2): 200-212 (2016) - 2015
- [j22]Shona Leitch, Matthew J. Warren:
Applying classification controls to Internet content in Australia. J. Inf. Commun. Ethics Soc. 13(2): 82-97 (2015) - [c44]Adel Alamin, William Yeoh, Matthew J. Warren, Scott Salzman:
An Empirical Study of Factors Influencing Accounting Information Systems Adoption. ECIS 2015 - [c43]Vindaya Senadheera, Matthew J. Warren, Shona Leitch, Graeme Pye:
Adoption of Social Media as a Communication Medium: A Study of Theoretical Foundations. UKAIS 2015: 10 - 2014
- [j21]Ishan Senarathna, Matthew J. Warren, William Yeoh, Scott Salzman:
The influence of organisation culture on E-commerce adoption. Ind. Manag. Data Syst. 114(7): 1007-1021 (2014) - 2013
- [c42]Mina Roshan, Matthew J. Warren, Rodney Carr:
Understanding the Role of Social Media in Incident/Crisis Communication. ACIS 2013: 77 - [c41]Ishan Senarathna, Matthew J. Warren, William Yeoh, Scott Salzman:
An Empirical Study of the Influence of Different Organisation Cultures on E-Commerce Adoption Maturity. ACIS 2013: 143 - 2011
- [j20]Matthew J. Warren, Shona Leitch:
Protection of Australia in the Cyber Age. Int. J. Cyber Warf. Terror. 1(1): 35-40 (2011) - [j19]Rossouw von Solms, Matthew J. Warren:
Towards the Human Information Security Firewall. Int. J. Cyber Warf. Terror. 1(2): 10-17 (2011) - [c40]Vindaya Senadheera, Matthew J. Warren, Shona Leitch:
A Study Into How Australian Banks Use Social Media. PACIS 2011: 172 - 2010
- [j18]Anthonie B. Ruighaver, Sean B. Maynard, Matthew J. Warren:
Ethical decision making: Improving the quality of acceptable use policies. Comput. Secur. 29(7): 731-736 (2010) - [j17]Matthew J. Warren, Shona Leitch:
Hacker Taggers: A new type of hackers. Inf. Syst. Frontiers 12(4): 425-431 (2010) - [c39]Sneza Dojkovski, Sharman Lichtenstein, Matthew J. Warren:
Enabling Information Security Culture: Influences and Challenges for Australian SMEs. ACIS 2010 - [c38]Shona Leitch, Matthew J. Warren:
ETHICS: The Past, Present and Future of Socio-Technical Systems Design. HC 2010: 189-197
2000 – 2009
- 2009
- [c37]Md. Rafiqul Islam, Jemal H. Abawajy, Matthew J. Warren:
Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. ISPAN 2009: 789-793 - 2008
- [c36]Merete R. Crofts, Bardo Fraunholz, Matthew J. Warren:
Using the Sociotechnical Approach in Global Software Developments: Is the Theory Relevant today? ACIS 2008 - [c35]Nicholas J. A. Tate, Sharman Lichtenstein, Matthew J. Warren:
IT Security Certifications: Stakeholder Evaluation and Selection. ACIS 2008 - 2007
- [j16]Graeme Pye, Matthew J. Warren:
E-business security benchmarking: a model and framework. Int. J. Inf. Comput. Secur. 1(4): 378-390 (2007) - [j15]Graeme Pye, Matthew J. Warren:
A Model and Framework for Online Security Benchmarking. Informatica (Slovenia) 31(2): 209-215 (2007) - [c34]Nicholas J. A. Tate, Sharman Lichtenstein, Matthew J. Warren:
Supporting User Evaluation of IT Security Certification Schemes. ACIS 2007 - [c33]Sneza Dojkovski, Sharman Lichtenstein, Matthew J. Warren:
Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia. ECIS 2007: 1560-1571 - [c32]Nicholas Tate, Sharman Lichtenstein, Matthew J. Warren:
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. SEC 2007: 473-478 - 2006
- [j14]Justin D. Pierce, Ashley Jones, Matthew J. Warren:
Penetration Testing Professional Ethics: a conceptual model and taxonomy. Australas. J. Inf. Syst. 13(2) (2006) - [j13]Graeme Pye, Matthew J. Warren:
Striking a Balance Between Ethics and ICT Governance. Australas. J. Inf. Syst. 13(2) (2006) - [j12]Matthew J. Warren:
Ethics in Information Systems. Australas. J. Inf. Syst. 13(2) (2006) - [c31]Breanna O'Donohue, Graeme Pye, Matthew J. Warren:
Improving ICT Governance in Australian Companies. ACIS 2006 - [c30]W. David Wilde, Matthew J. Warren, William Hutchinson:
Outsourcing System Security: A Theoretical Perspective. ACIS 2006 - 2005
- [j11]J. Redman, Matthew J. Warren, William Hutchinson:
System survivability: a critical security problem. Inf. Manag. Comput. Security 13(3): 182-188 (2005) - [c29]Leanne Ngo, Wanlei Zhou, Matthew J. Warren:
Understanding Transition towards Information Security Culture Change. AISM 2005: 67-73 - [c28]Graeme Pye, Matthew J. Warren:
Benchmarking E-business Security: A Model and Framework. AISM 2005: 80-87 - [c27]T. B. Busuttil, Matthew J. Warren:
An Approach for Critical Information Infrastructure Protection. ECIW 2005: 53-62 - [c26]Graeme Pye, Matthew J. Warren:
Australian Commercial - Critical Infrastructure Management Protection. ECIW 2005: 249-360 - 2004
- [c25]Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells:
Graphical Authentication: Justifications and Objectives. AISM 2004: 49-63 - [c24]A. Jancic, Matthew J. Warren:
PKI - Advantages and Obstacles. AISM 2004: 104-114 - [c23]Warren Brooks, Matthew J. Warren:
Health Information Security Evaluation: Continued Development of an Object-Oriented Method. AISM 2004: 135-150 - [c22]Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells:
Graphical Authentication: An Architectural Design Specification. Australian Computer, Network & Information Forensics Conference 2004: 76-82 - [c21]T. B. Busuttil, Matthew J. Warren:
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. International Information Security Workshops 2004: 33-50 - 2003
- [j10]Shona Leitch, Matthew J. Warren:
Designing Systems for E-Commerce. Australas. J. Inf. Syst. 10(2) (2003) - [j9]Matthew J. Warren, William Hutchinson:
Australian Hackers and Ethics. Australas. J. Inf. Syst. 10(2) (2003) - [j8]Matthew J. Warren, William Hutchinson:
A security risk management approach for e-commerce. Inf. Manag. Comput. Secur. 11(5): 238-242 (2003) - [c20]Steve McCombie, Matt Warren:
Computer Forensic: An Issue of Definitions. Australian Computer, Network & Information Forensics Conference 2003 - [c19]Matthew J. Warren, William Hutchinson:
Information Security - An E-learning Problem. ICWL 2003: 21-26 - [c18]Matthew J. Warren:
Australia's Agenda for E-Security Education and Research. World Conference on Information Security Education 2003: 109-114 - [c17]Lucian Vaisu, Matthew J. Warren, David R. Mackay:
Defining Fraud: Issues for Organizations from an Information Systems Perspective. PACIS 2003: 66 - [c16]W. J. Brooks, Matthew J. Warren, William Hutchinson:
ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420 - [e2]Craig Valli, Matt Warren:
1st Australian Computer, Network & Information Forensics Conference, 25 November 2003, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2003, ISBN 0-7298-0542-5 [contents] - [e1]Graeme Altmann, John W. Lamp, Peter E. D. Love, Purnendu Mandal, Ross Smith, Matthew J. Warren:
ICSTM2000, International Conference on Systems Thinking in Management, Geelong, Australia, November 8-10, 2000. CEUR Workshop Proceedings 72, CEUR-WS.org 2003 [contents] - 2002
- [j7]Bill Hutchinson, Mat Warren:
Information Warfare: using the viable system model as a framework to attack organisations. Australas. J. Inf. Syst. 9(2) (2002) - [j6]William Hutchinson, Matthew J. Warren:
Truth, lies, reality and deception: an issue for e-commerce. Int. J. Serv. Technol. Manag. 3(2): 208-221 (2002) - [c15]William Hutchinson, Matt Warren:
Developing a Postgraduate Course in Information Security: a confusion of terms. ACIS 2002 - [c14]Matthew J. Warren, Lynn Margaret Batten:
Security Management: An Information Systems Setting. ACISP 2002: 257-270 - [c13]W. J. Brooks, Matthew J. Warren, William Hutchinson:
A Security Evaluation Criteria for Baseline Security Standards. SEC 2002: 79-90 - 2001
- [j5]Matthew J. Warren, William Hutchinson:
Information Warfare and Ethics. Australas. J. Inf. Syst. 8(2) (2001) - [j4]William Hutchinson, Matthew J. Warren:
Attitudes of Australian information system managers against online attackers. Inf. Manag. Comput. Secur. 9(3): 106-111 (2001) - [j3]D. Hutchinson, Matthew J. Warren:
Security authentication for on-line Internet banking. Informatica (Slovenia) 25(3) (2001) - [c12]Matthew J. Warren, William Hutchinson:
A Security Method for Healthcare Organisations. Conference on Information Security Management & Small Systems Security 2001: 157-166 - [c11]Matthew J. Warren, William Hutchinson:
Deception: A Tool and Curse for Security Management. SEC 2001: 327-338 - 2000
- [c10]William Hutchinson, Matthew J. Warren:
The use of deception in systems. ICSTM 2000 - [c9]Jonathan D. Moizer, Jonathan Lean, Terry Mangles, Matthew J. Warren:
Teaching Introductory Management Using A Computer Simulation Game. ICSTM 2000 - [c8]Matthew J. Warren, Shona Warren:
The Role of Participation in Systems. ICSTM 2000 - [c7]William Hutchinson, Matthew J. Warren:
Deception and reality: a challenge for the information and knowledge management function. IRMA Conference 2000: 88-91 - [c6]Matthew J. Warren, William Hutchinson:
Information Warfare: Fact or Fiction? SEC 2000: 411-420
1990 – 1999
- 1999
- [j2]Steven Furnell, Matthew J. Warren:
Computer hacking and cyber terrorism: the real threats in the new millennium? Comput. Secur. 18(1): 28-34 (1999) - [c5]Matthew J. Warren, William Hutchinson:
The Future of Australian & New Zealand Security Standard AS/NZS 4444?. Conference on Information Security Management & Small Systems Security 1999: 41-50 - 1998
- [c4]Steven Furnell, Dimitris Gritzalis, Sokratis K. Katsikas, Konstantinos Mavroudakis, Peter W. Sanders, Matthew J. Warren:
Methods of Responding to Healthcare Security Incidents. MedInfo 1998: 1138-1142 - 1997
- [j1]Steven M. Furnell, Matthew J. Warren:
Computer abuse: vandalizing the information society. Internet Res. 7(1): 61-66 (1997) - [c3]Matthew J. Warren, Steven Furnell, Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402 - 1996
- [c2]Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36 - [c1]Steven Furnell, D. A. Hill, I. Rosewall, Matthew J. Warren:
A Telematics Security Training Application. EUROMEDIA 1996: 286-290 - [p1]Peter W. Sanders, Steven Furnell, Matthew J. Warren:
Baseline Security Guidelines for Health Care Management. Data Security for Health Care (1) 1996: 82-107
Coauthor Index
aka: Bill Hutchinson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint