Matthew Warren

Matt Warren is the Head of School and a professor in the School of Information System, Deakin University (Australia). He previously taught at the School of Information Technology - Deakin University (Australia), and before that, he was a Information Systems Lecturer at the Plymouth Business School (UK). He has a PhD in Information Security Management from Plymouth University (UK). During that time, he worked on several large European Union research projects.

Professor Warren is the former Chair of IFIP TC 11 Working Group 11.1 - Security Management and a former Director of the Australian Institute of Computer Ethics. Professor Warren has taught within Australia, Finland, Hong Kong, and the United Kingdom.

Publications

Political Cyber Operations: A South Pacific Case Study
Matthew Warren. © 2020. 13 pages.
Social media impacts all aspects of society from citizens to businesses, but also political parties. The article proposes a new social media engagement model that evaluates...
Risks of Critical Infrastructure Adoption of Cloud Computing by Government
Mansoor Al-Gharibi, Matthew Warren, William Yeoh. © 2020. 12 pages.
The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing...
A Study of Cyber Security Issues in Sri Lanka
Ruwan Nagahawatta, Matthew Warren, William Yeoh. © 2020. 14 pages.
Cybersecurity is focused on helping the community to make knowledgeable decisions on its adaptation and mitigation. This survey evaluated the level of cybersecurity awareness and...
Facebook Content Analysis: A Study into Australian Banks' Social Media Community Engagement
Vindaya Senadheera, Matthew Warren, Shona Leitch, Graeme Pye. © 2017. 21 pages.
Understanding the motives that encourage users to adopt social media to communicate with businesses is very important. This research study was conducted with Australian banks and...
A Conceptual Model for Cloud Computing Adoption by SMEs in Australia
Ishan Senarathna, Matthew Warren, William Yeoh, Scott Salzman. © 2016. 28 pages.
Cloud Computing is an increasingly important worldwide development in business service provision. The business benefits of Cloud Computing usage include reduced IT overhead...
A Conceptual Model for Cloud Computing Adoption by SMEs in Australia
Ishan Senarathna, Matthew Warren, William Yeoh, Scott Salzman. © 2015. 29 pages.
Cloud Computing is an increasingly important worldwide development in business service provision. The business benefits of Cloud Computing usage include reduced IT overhead...
Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework
Christopher Beggs, Matthew Warren. © 2014. 16 pages.
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a...
Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework
Christopher Beggs, Matthew Warren. © 2012. 16 pages.
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a...
The Ethics of Security of Personal Information upon Facebook
Shona Leitch, Matthew Warren. © 2011. 20 pages.
Social networking systems are an ever evolving and developing means of social interaction which is not only being used to disseminate information to family, friends and...
Critical Infrastructure Protection: An Ethical Choice
Graeme Pye, Matthew Warren, William Hutchinson. © 2011. 17 pages.
The protection of Australian critical infrastructures and the choices made in terms of priorities and cost all impact upon the planning, precautions, and security aspects of...
Protection of Australia in the Cyber Age
Matthew Warren, Shona Leitch. © 2011. 6 pages.
Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical...
Towards the Human Information Security Firewall
Rossouw von Solms, Matthew Warren. © 2011. 8 pages.
Human security is often forgotten as a major information security factor. This paper explores the security issues that relate to human security and in particular the relationship...
The Impact of ICT Governance within Australian Companies
Breanna O’Donohue, Graeme Pye, Matthew J. Warren. © 2009. 15 pages.
This chapter focuses upon the Australian Standard for the Corporate Governance of Information and Communication Technology (ICT) AS8015 (Standards Australia, 2005) and presents...
A National Information Infrastructure Model for Information Warfare Defence
Vernon Stagg, Matthew Warren. © 2008. 13 pages.
Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations....
The Ethics of Hacking and Computer Abuse: Australian Case Studies
Matthew Warren, Shona Leitch. © 2005. 15 pages.
Organisations spend large sums of money to ensure that they are protected against the risks associated with external threats. The perceived threats against organisations are well...
A National Information Infrastructure Model for Information Warfare Defence
Vernon Stagg, Matthew Warren. © 2003. 14 pages.
Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations....
Cyberspace Ethics and Information Warfare
Matthew Warren, William Hutchinson. © 2002. 10 pages.
We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer security attacks against the...
Deception and Reality: A Challenge for the Information and Knowledge Management Function
William Hutchinson, Matthew Warren. © 2002. 9 pages.
Decisions are based on information. The decision maker naturally assumes that it reflects reality. Yet data, which is used to create information, is easily manipulated, and the...
Aggression on the Networks: An Australian Viewpoint
William Hutchinson, Matthew Warren. © 2002. 12 pages.
This chapter examines the attitudes of Australian IS/IT managers to the concept of cyber-vigilantism. Also, it explores the policies and procedures which have been set in place...
Cyberspace Ethics and Information Warfare
Matthew Warren, William Hutchinson. © 2002. 9 pages.
We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer security attacks against the...
Cyber Terrorism and the Contemporary Corporation
Matthew Warren, William Hutchinson. © 2001. 12 pages.
During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown from a solely military/academic...
The Use of the Internet by Terrorists and Its Impact Upon Electronic Commerce
Matthew Warren, William Hutchinson. © 2000. 10 pages.
In the developed world, the influence of information systems can now be seen in most operational areas of business. A significant result of these advances is that organizations...