Matthew J. Warren
Orcid: 0000-0002-7529-431X
According to our database1,
Matthew J. Warren
authored at least 100 papers
between 1996 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
DECAL: A Reconfigurable Monolithic Active Pixel Sensor for Tracking and Calorimetry in a 180 nm Image Sensor Process.
Sensors, 2022
Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach.
Int. J. Inf. Manag., 2022
Proceedings of the Transfer, Diffusion and Adoption of Next-Generation Digital Technologies, 2022
Proceedings of the 11th International Conference on Modern Circuits and Systems Technologies, 2022
Cyberbullying Among Adults: A Qualitative Content Analysis of the Legal Responses to a Complex Social Problem.
Proceedings of the 43rd International Conference on Information Systems, 2022
Strategic Use of Social Media in COVID-19 Pandemic. Pandemic Management by Sri Lankan Leaders and Health Organisations Using the CERC Model.
Proceedings of the Australasian Conference on Information Systems, 2022
2021
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021
Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021
Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review.
Proceedings of the 27th Americas Conference on Information Systems, 2021
Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises.
Proceedings of the Australasian Conference on Information Systems, 2021
A Review of Adult Cyberbullying Research from Multi-disciplinary Archives and Directions for Future Studies.
Proceedings of the Australasian Conference on Information Systems, 2021
2020
The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems.
J. Inf. Syst., 2020
Int. J. Cyber Warf. Terror., 2020
Int. J. Cyber Warf. Terror., 2020
Preface Ethics in the Cyber Age and exploring emerging themes and relationships between ethics, governance and emerging technologies.
Australas. J. Inf. Syst., 2020
Australas. J. Inf. Syst., 2020
Australas. J. Inf. Syst., 2020
IEEE Access, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
An Intervention Model for Cyberbullying Based on the General Theory of Crime and Routine Activity Theory.
Proceedings of the Australasian Conference on Information Systems, 2020
2019
J. Inf. Commun. Ethics Soc., 2019
Australas. J. Inf. Syst., 2019
Proceedings of the Australasian Conference on Information Systems, 2019
2018
Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs.
Australas. J. Inf. Syst., 2018
2017
Enterp. Inf. Syst., 2017
Australas. J. Inf. Syst., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
Comput. Hum. Behav., 2016
Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan Vs Regional SMEs.
Australas. J. Inf. Syst., 2016
2015
J. Inf. Commun. Ethics Soc., 2015
Adoption of Social Media as a Communication Medium: A Study of Theoretical Foundations.
Proceedings of the UKAIS 2015, 2015
Proceedings of the 23rd European Conference on Information Systems, 2015
2014
Ind. Manag. Data Syst., 2014
2013
An Empirical Study of the Influence of Different Organisation Cultures on E-Commerce Adoption Maturity.
Proceedings of the Australasian Conference on Information Systems, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2011
Proceedings of the Pacific Asia Conference on Information Systems, 2011
2010
Comput. Secur., 2010
Proceedings of the History of Computing. Learning from the Past, 2010
Enabling Information Security Culture: Influences and Challenges for Australian SMEs.
Proceedings of the Australasian Conference on Information Systems, 2010
2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
2008
Proceedings of the Australasian Conference on Information Systems, 2008
Using the Sociotechnical Approach in Global Software Developments: Is the Theory Relevant today?
Proceedings of the Australasian Conference on Information Systems, 2008
2007
Int. J. Inf. Comput. Secur., 2007
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework.
Proceedings of the New Approaches for Security, 2007
Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia.
Proceedings of the Fifteenth European Conference on Information Systems, 2007
Proceedings of the Australasian Conference on Information Systems, 2007
2006
Australas. J. Inf. Syst., 2006
Proceedings of the Australasian Conference on Information Systems, 2006
Proceedings of the Australasian Conference on Information Systems, 2006
2005
Inf. Manag. Comput. Security, 2005
Australian Commercial - Critical Infrastructure Management Protection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
An Approach for Critical Information Infrastructure Protection.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Benchmarking E-business Security: A Model and Framework.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
2004
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.
Proceedings of the Information Security Management, Education and Privacy, 2004
Graphical Authentication: An Architectural Design Specification.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
Graphical Authentication: Justifications and Objectives.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
PKI - Advantages and Obstacles.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
Health Information Security Evaluation: Continued Development of an Object-Oriented Method.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
2003
ISO 17799 and Australian Healthcare Organisations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003
Australia's Agenda for E-Security Education and Research.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the Advances in Web-Based Learning, 2003
Computer Forensic: An Issue of Definitions.
Proceedings of the 1st Australian Computer, 2003
2002
Int. J. Serv. Technol. Manag., 2002
Information Warfare: using the viable system model as a framework to attack organisations.
Australas. J. Inf. Syst., 2002
A Security Evaluation Criteria for Baseline Security Standards.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Australasian Conference on Information Systems, 2002
2001
Security authentication for on-line Internet banking.
Informatica (Slovenia), 2001
Inf. Manag. Comput. Secur., 2001
Deception: A Tool and Curse for Security Management.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
A Security Method for Healthcare Organisations.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
2000
Information Warfare: Fact or Fiction?
Proceedings of the Information Security for Global Information Infrastructures, 2000
Deception and reality: a challenge for the information and knowledge management function.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
Proceedings of the ICSTM2000, 2000
1999
Comput. Secur., 1999
The Future of Australian & New Zealand Security Standard AS/NZS 4444?.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1998
Proceedings of the MEDINFO '98, 1998
1997
ODESSA - a new approach to healthcare risk analysis.
Proceedings of the Information Security in Research and Business, 1997
1996
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
A Telematics Security Training Application.
Proceedings of the EUROMEDIA 1996 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1996
Approaches to Security in Healthcare Multimedia Systems.
Proceedings of the Communications and Multimedia Security II, 1996