dblp.uni-trier.dewww.uni-trier.de

Matthew J. Warren

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
27EENicholas Tate, Sharman Lichtenstein, Matthew J. Warren: Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. SEC 2007: 473-478
2005
26 Graeme Pye, Matthew J. Warren: Benchmarking E-business Security: A Model and Framework. AISM 2005: 80-87
25 Graeme Pye, Matthew J. Warren: Australian Commercial - Critical Infrastructure Management Protection. ECIW 2005: 249-360
24 T. B. Busuttil, Matthew J. Warren: An Approach for Critical Information Infrastructure Protection. ECIW 2005: 53-62
2004
23 A. Jancic, Matthew J. Warren: PKI - Advantages and Obstacles. AISM 2004: 104-114
22 Warren Brooks, Matthew J. Warren: Health Information Security Evaluation: Continued Development of an Object-Oriented Method. AISM 2004: 135-150
21 Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells: Graphical Authentication: Justifications and Objectives. AISM 2004: 49-63
20 Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells: Graphical Authentication: An Architectural Design Specification. Australian Computer, Network & Information Forensics Conference 2004: 76-82
19 T. B. Busuttil, Matthew J. Warren: CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. International Information Security Workshops 2004: 33-50
2003
18EEMatthew J. Warren, William Hutchinson: Information Security - An E-learning Problem. ICWL 2003: 21-26
17 W. J. Brooks, Matthew J. Warren, William Hutchinson: ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420
16 Matthew J. Warren: Australia's Agenda for E-Security Education and Research. World Conference on Information Security Education 2003: 109-114
15EEMatthew J. Warren, William Hutchinson: A security risk management approach for e-commerce. Inf. Manag. Comput. Security 11(5): 238-242 (2003)
2002
14EEMatthew J. Warren, Lynn Margaret Batten: Security Management: An Information Systems Setting. ACISP 2002: 257-270
13 W. J. Brooks, Matthew J. Warren, William Hutchinson: A Security Evaluation Criteria for Baseline Security Standards. SEC 2002: 79-90
2001
12 Matthew J. Warren, William Hutchinson: A Security Method for Healthcare Organisations. Conference on Information Security Management & Small Systems Security 2001: 157-166
11 Matthew J. Warren, William Hutchinson: Deception: A Tool and Curse for Security Management. SEC 2001: 327-338
10EEWilliam Hutchinson, Matthew J. Warren: Attitudes of Australian information system managers against online attackers. Inf. Manag. Comput. Security 9(3): 106-111 (2001)
9 D. Hutchinson, Matthew J. Warren: Security authentication for on-line Internet banking. Informatica (Slovenia) 25(3): (2001)
2000
8 Graeme Altmann, John Lamp, Peter E. D. Love, Purnendu Mandal, Ross Smith, Matthew J. Warren: ICSTM2000, International Conference on Systems Thinking in Management, Geelong, Australia, November 8-10, 2000 CEUR-WS.org 2000
7EEWilliam Hutchinson, Matthew J. Warren: The use of deception in systems. ICSTM 2000
6 William Hutchinson, Matthew J. Warren: Deception and reality: a challenge for the information and knowledge management function. IRMA Conference 2000: 88-91
5 Matthew J. Warren, William Hutchinson: Information Warfare: Fact or Fiction? SEC 2000: 411-420
1999
4 Matthew J. Warren, William Hutchinson: The Future of Australian & New Zealand Security Standard AS/NZS 4444?. Conference on Information Security Management & Small Systems Security 1999: 41-50
3EESteven Furnell, Matthew J. Warren: Computer hacking and cyber terrorism: the real threats in the new millennium? Computers & Security 18(1): 28-34 (1999)
1997
2 Matthew J. Warren, Steven Furnell, Peter W. Sanders: ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402
1996
1 Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren: Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36

Coauthor Index

1Graeme Altmann [8]
2Lynn Margaret Batten [14]
3W. J. Brooks [13] [17]
4Warren Brooks [22]
5T. B. Busuttil [19] [24]
6Steven Furnell [1] [2] [3]
7D. Hutchinson [9]
8William Hutchinson [4] [5] [6] [7] [10] [11] [12] [13] [15] [17] [18]
9A. Jancic [23]
10John Lamp [8]
11Sharman Lichtenstein [27]
12Peter E. D. Love [8]
13David R. Mackay [20] [21]
14Purnendu Mandal [8]
15Justin D. Pierce [20] [21]
16Graeme Pye [25] [26]
17Nichola Jane Salmons [1]
18Peter W. Sanders [1] [2]
19Ross Smith [8]
20Colin T. Stockel [1]
21Nicholas Tate [27]
22Jason G. Wells [20] [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)