William Hutchinson

According to our database1, William Hutchinson authored at least 25 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deceiving Autonomous Drones.
Int. J. Cyber Warf. Terror., 2020

2007
An information-centric and proactive approach to Information Security teaching.
Int. J. Inf. Comput. Secur., 2007

2006
Information Warfare and Deception.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2006

Outsourcing System Security: A Theoretical Perspective.
Proceedings of the Australasian Conference on Information Systems, 2006

2005
System survivability: a critical security problem.
Inf. Manag. Comput. Security, 2005

The 'Will' and Information Operations.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Information Security: a Misnomer.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2003
A security risk management approach for e-commerce.
Inf. Manag. Comput. Secur., 2003

Australian Hackers and Ethics.
Australas. J. Inf. Syst., 2003

ISO 17799 and Australian Healthcare Organisations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Integrating Information Security and Intelligence Courses.
Proceedings of the Security Education and Critical Infrastructures, 2003

Information Security - An E-learning Problem.
Proceedings of the Advances in Web-Based Learning, 2003

2002
Truth, lies, reality and deception: an issue for e-commerce.
Int. J. Serv. Technol. Manag., 2002

Information Warfare: using the viable system model as a framework to attack organisations.
Australas. J. Inf. Syst., 2002

A Security Evaluation Criteria for Baseline Security Standards.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Developing a Postgraduate Course in Information Security: a confusion of terms.
Proceedings of the Australasian Conference on Information Systems, 2002

2001
Attitudes of Australian information system managers against online attackers.
Inf. Manag. Comput. Secur., 2001

Information Warfare and Ethics.
Australas. J. Inf. Syst., 2001

Deception: A Tool and Curse for Security Management.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

A Security Method for Healthcare Organisations.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
Information Warfare: Fact or Fiction?
Proceedings of the Information Security for Global Information Infrastructures, 2000

Human centred computing: interests, issues, expectations and results.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

Deception and reality: a challenge for the information and knowledge management function.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

The use of deception in systems.
Proceedings of the ICSTM2000, 2000

1999
The Future of Australian & New Zealand Security Standard AS/NZS 4444?.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999


  Loading...