CMM Ambassador

Professor Matt Warren

Connect with Matt

Dimensions 2 and 3

Matthew Warren is the Director of the RMIT Centre of Cyber Security Research and Innovation and a Professor of Cyber Security at RMIT University, Australia and holds the position as a Research Council member at the OCSC. Professor Warren is a researcher in the areas of Cyber Security and Computer Ethics. He has authored and co-authored over 300 books, book chapters, journal papers and conference papers. He has received numerous grants and awards from national and international funding bodies, such as AustCyber, Australian Research Council (ARC); CyberCRC, Engineering Physical Sciences Research Council (EPSRC) in the UK; National Research Foundation in South Africa and the European Union.

Professor Warren gained his PhD in Information Security Risk Analysis from the University of Plymouth, United Kingdom and he has taught within Australia, Finland, Hong Kong and the United Kingdom.

Professor Warren is a Fellow of the Australian Computer Society.

Work in Practice

Matthew Warren has extensive experience in Cyber education, training and skills including:

  • The Director of the RMIT University Centre for Cyber Security Research and Innovation;

  • The Australian representative on the Joint Taskforce on Cyber Security Global Education developing a global standard for Cyber Security curriculum design;

  • Member of the Australian Computer Society Taskforce developing Australia’s only Cyber Security Professional accreditations;

  • Chair of the Australian Computer Society Taskforce developing Australia’s accreditation framework for Cyber Security tertiary courses;

  • Member of Australian Computer Society Accreditation committee being the ACS subject matter expert of Cyber Security Education; and

  • At Deakin University, being the course director of the Masters of Cyber Security and the Bachelor of Cyber Security.

Dimension 2 Journal Publications

  • Warren, M and Leitch, S (2009), Hacker taggers: a new type of hackers, Information systems frontiers, Online First, pp. 1-7, Springer Direct

    Abstract: “Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker subgroups, their rationale and ethical views. This paper focuses upon hacker subgroups and their activities and in particular the new hacker subgroup identified as ‘Hacker Taggers’.”

  • Warren, M. (2020). Fake News Case Study during the Australian 2019 General Election. Australasian Journal of Information Systems24. https://doi.org/10.3127/ajis.v24i0.2803

  • Kaluarachchi, C., Warren , M., & Jiang, F. (2020). Review: Responsible use of technology to combat Cyberbullying among adolescents. Australasian Journal of Information Systems24. https://doi.org/10.3127/ajis.v24i0.2791

  • Warren, M and Leitch, S (2019), Data retention: an assessment of a proposed national scheme, Journal of information, communication and ethics in society, vol. 17, no. 1, pp. 98-112, doi: 10.1108/JICES-12-2017-0073

  • Senadheera, V, Warren, M and Leitch, S (2017), Social media as an information system : improving the technological agility, Enterprise information systems, vol. 11, no. 4, pp. 512-533, doi: 10.1080/17517575.2016.1245872

  • Warren, M and Leitch, S (2016), The Syrian electronic army – a hacktivist group, Journal of information, communication and ethics in society, vol. 14, no. 2, pp. 200-212, doi: 10.1108/JICES-12-2015-0042.

  • Leitch, S and Warren, M (2015), Applying classification controls to internet content in Australia, Journal of information, communication and ethics in society, vol. 13, no. 2, pp. 82-97, doi: 10.1108/JICES-08-2014-0037

  • Senarathna, I, Warren, M, Yeoh, W and Salzman, S (2014), The influence of organisation culture on e-commerce adoption, Industrial management & data systems, vol. 114, no. 7, pp. 1007-1021, doi: 10.1108/IMDS-03-2014-0076.

  • Warren, M and Leitch, S (2012), New media and web 2.0 : an Irish republican example, Journal of information warfare, vol. 11, no. 1, pp. 1-11.

  • Warren, M., & Hutchinson, W. (1). Information Warfare and Ethics. Australasian Journal of Information Systems8(2). https://doi.org/10.3127/ajis.v8i2.242

Dimension 3 Journal Publications

  • von Solms, R and Warren, M (2011), Towards the human information security firewall, International Journal of Cyber Warfare and Terrorism (IJCWT), vol. 1, IGI Global

    Abstract: “Human security is often forgotten as a major information security factor. This paper explores the security issues that relate to human security and in particular the relationship to risk. The paper also uses case studies of real-life security incidents to show the problems and issues that relate to a younger workforce and their lack of security awareness due to their own background and the use of social systems, such as Facebook. The paper also proposes a risk framework that can be used to understand human security issues.”

  • Al Husaini, Y, Salim S,, Warren, M, Pan, L and Al Gharibi, M (2019), Cloud Forensics Investigations Relationship: A Model And Instrument, in ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, ACIS, [Perth, W.A.], pp. 778-788.

  • Alamin, A, Wilkin, C, Yeoh, William Gi and Warren, Matthew (2019), The impact of self-efficacy on accountants’ behavioral intention to adopt and use accounting information systems, Journal of information systems, doi: 10.2308/isys-52617.

  • Al Husaini, Y, Warren, M and Pan, L (2018), Cloud forensics relationship between the law enforcement and cloud service providers, in CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Deakin University, Geelong, Vic., pp. 79-88.

  • Roshan, M, Warren, M and Carr, R (2016), Understanding the use of social media by organisations for crisis communication, Computers in human behavior, vol. 63, pp. 350-361, doi: 10.1016/j.chb.2016.05.016

  • Leitch, S and Warren, M (2011), Social networking and teaching : an Australian case study, in InSITE 2011 : Proceedings of Informing Science & IT Education Conference, Informing Science Institute, [Novi Sad, Serbia], pp. 315-326.

  • von Solms, R and Warren, M (2011), Towards the human information security firewall, International Journal of Cyber Warfare and Terrorism (IJCWT), vol. 1, no. 2, pp. 10-17, doi: 10.4018/ijcwt.2011040102.

  • Leitch, Shona and Warren, Matthew J. 2008, Analysing online teaching and learning systems using MEAD, Interdisciplinary journal of knowledge and learning objects, vol. 4, pp. 259-266.

  • Tate, N, Lichtenstein, S and Warren, M (2007), Toward user evaluation of IT security certification schemes: a preliminary framework, in New approaches for security, privacy and trust in complex environments : proceedings of the IFIP TC-11 22nd International Information Security Conference, Springer, New York, N.Y.

  • Tate, N, Lichtenstein, S and Warren, M (2007), Supporting user evaluation of IT security certification schemes, in ACIS2007 Toowoomba 5 to 7 December 2007 : Proceedings of the 18th Australasian Conference on Information Systems, University of Southern Queensland, Toowoomba, QLD, pp. 70-81.

  • Leitch, S and Warren, M (2007), Teaching future Australian information systems professionals, in Education, training and lifelong learning, International Federation for Information Processing Conference Proceedings, Laxenburg, Austria, pp. 63-70.