2007 |
27 | EE | Nicholas Tate,
Sharman Lichtenstein,
Matthew J. Warren:
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework.
SEC 2007: 473-478 |
2005 |
26 | | Graeme Pye,
Matthew J. Warren:
Benchmarking E-business Security: A Model and Framework.
AISM 2005: 80-87 |
25 | | Graeme Pye,
Matthew J. Warren:
Australian Commercial - Critical Infrastructure Management Protection.
ECIW 2005: 249-360 |
24 | | T. B. Busuttil,
Matthew J. Warren:
An Approach for Critical Information Infrastructure Protection.
ECIW 2005: 53-62 |
2004 |
23 | | A. Jancic,
Matthew J. Warren:
PKI - Advantages and Obstacles.
AISM 2004: 104-114 |
22 | | Warren Brooks,
Matthew J. Warren:
Health Information Security Evaluation: Continued Development of an Object-Oriented Method.
AISM 2004: 135-150 |
21 | | Justin D. Pierce,
Matthew J. Warren,
David R. Mackay,
Jason G. Wells:
Graphical Authentication: Justifications and Objectives.
AISM 2004: 49-63 |
20 | | Justin D. Pierce,
Matthew J. Warren,
David R. Mackay,
Jason G. Wells:
Graphical Authentication: An Architectural Design Specification.
Australian Computer, Network & Information Forensics Conference 2004: 76-82 |
19 | | T. B. Busuttil,
Matthew J. Warren:
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.
International Information Security Workshops 2004: 33-50 |
2003 |
18 | EE | Matthew J. Warren,
William Hutchinson:
Information Security - An E-learning Problem.
ICWL 2003: 21-26 |
17 | | W. J. Brooks,
Matthew J. Warren,
William Hutchinson:
ISO 17799 and Australian Healthcare Organisations.
SEC 2003: 417-420 |
16 | | Matthew J. Warren:
Australia's Agenda for E-Security Education and Research.
World Conference on Information Security Education 2003: 109-114 |
15 | EE | Matthew J. Warren,
William Hutchinson:
A security risk management approach for e-commerce.
Inf. Manag. Comput. Security 11(5): 238-242 (2003) |
2002 |
14 | EE | Matthew J. Warren,
Lynn Margaret Batten:
Security Management: An Information Systems Setting.
ACISP 2002: 257-270 |
13 | | W. J. Brooks,
Matthew J. Warren,
William Hutchinson:
A Security Evaluation Criteria for Baseline Security Standards.
SEC 2002: 79-90 |
2001 |
12 | | Matthew J. Warren,
William Hutchinson:
A Security Method for Healthcare Organisations.
Conference on Information Security Management & Small Systems Security 2001: 157-166 |
11 | | Matthew J. Warren,
William Hutchinson:
Deception: A Tool and Curse for Security Management.
SEC 2001: 327-338 |
10 | EE | William Hutchinson,
Matthew J. Warren:
Attitudes of Australian information system managers against online attackers.
Inf. Manag. Comput. Security 9(3): 106-111 (2001) |
9 | | D. Hutchinson,
Matthew J. Warren:
Security authentication for on-line Internet banking.
Informatica (Slovenia) 25(3): (2001) |
2000 |
8 | | Graeme Altmann,
John Lamp,
Peter E. D. Love,
Purnendu Mandal,
Ross Smith,
Matthew J. Warren:
ICSTM2000, International Conference on Systems Thinking in Management, Geelong, Australia, November 8-10, 2000
CEUR-WS.org 2000 |
7 | EE | William Hutchinson,
Matthew J. Warren:
The use of deception in systems.
ICSTM 2000 |
6 | | William Hutchinson,
Matthew J. Warren:
Deception and reality: a challenge for the information and knowledge management function.
IRMA Conference 2000: 88-91 |
5 | | Matthew J. Warren,
William Hutchinson:
Information Warfare: Fact or Fiction?
SEC 2000: 411-420 |
1999 |
4 | | Matthew J. Warren,
William Hutchinson:
The Future of Australian & New Zealand Security Standard AS/NZS 4444?.
Conference on Information Security Management & Small Systems Security 1999: 41-50 |
3 | EE | Steven Furnell,
Matthew J. Warren:
Computer hacking and cyber terrorism: the real threats in the new millennium?
Computers & Security 18(1): 28-34 (1999) |
1997 |
2 | | Matthew J. Warren,
Steven Furnell,
Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis.
SEC 1997: 391-402 |
1996 |
1 | | Steven Furnell,
Nichola Jane Salmons,
Peter W. Sanders,
Colin T. Stockel,
Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems.
Communications and Multimedia Security 1996: 25-36 |