Name
Papers
Collaborators
MATTHEW J. WARREN
49
44
Citations 
PageRank 
Referers 
174
50.28
337
Referees 
References 
277
127
Search Limit
100337
Title
Citations
PageRank
Year
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs.00.342021
An Investigative Model of Adult Cyberbullying - A Court Case Analysis.00.342021
The Impact Of Self-Efficacy On Accountants' Behavioral Intention To Adopt And Use Accounting Information Systems00.342020
Data Retention: An Assessment Of A Proposed National Scheme00.342019
Preface to Research on Applied Ethics (Cybersecurity)10.342019
Factors that influence adoption of cloud computing: an empirical study of Australian SMEs00.342018
Editorial: Research on Applied Ethics Involving Emerging ICT Technologies00.342017
Social media as an information system: improving the technological agility.20.382017
A Hybrid Location Privacy Protection Scheme in Big Data Environment.10.352017
Ethics And Ict: Why All The Fuss?10.372016
Understanding the use of social media by organisations for crisis communication.40.402016
Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan vs Regional SMEs00.342016
The Syrian Electronic Army - A Hacktivist Group00.342016
An Empirical Study of Factors Influencing Accounting Information Systems Adoption00.342015
Applying classification controls to Internet content in Australia00.342015
The Influence Of Organisation Culture On E-Commerce Adoption40.422014
A Study Into How Australian Banks Use Social Media.90.562011
Protection Of Australia In The Cyber Age10.542011
Ethics: The Past, Present And Future Of Socio-Technical Systems Design00.342010
Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia.120.512007
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework00.342007
A Model And Framework For Online Security Benchmarking00.342007
E-business security benchmarking: a model and framework.00.342007
Striking A Balance Between Ethics And Ict Governance10.482006
Penetration Testing Professional Ethics: A Conceptual Model And Taxonomy40.582006
Australian Commercial - Critical Infrastructure Management Protection00.342005
An Approach for Critical Information Infrastructure Protection00.342005
Benchmarking E-business Security: A Model and Framework00.342005
Ciip-Ram - A Security Risk Analysis Methodology For Critical Information Infrastructure Protection10.402004
Graphical Authentication: An Architectural Design Specification00.342004
PKI - Advantages and Obstacles10.372004
Health Information Security Evaluation: Continued Development of an Object-Oriented Method00.342004
Graphical Authentication: Justifications and Objectives00.342004
A security risk management approach for e-commerce20.412003
ISO 17799 and Australian Healthcare Organisations00.342003
Australian Hackers and Ethics10.632003
Information Security - An E-learning Problem30.472003
Security Management: An Information Systems Setting20.492002
Deception: a tool and curse for security management00.342001
Attitudes of Australian information system managers against online attackers00.342001
A Security Method for Healthcare Organisations10.422001
Security authentication for on-line Internet banking00.342001
Information Warfare and Ethics00.342001
Information Warfare: Fact or Fiction?10.632000
The use of deception in systems10.432000
ICSTM2000, International Conference on Systems Thinking in Management, Geelong, Australia, November 8-10, 200010429.372000
The Future of Australian & New Zealand Security Standard AS/NZS 4444?10.631999
Computer Hacking And Cyber Terrorism: The Real Threats In The New Millennium?121.991999
Computer Abuse: Vandalizing The Information Society40.671997