default search action
William Hutchinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j10]William Hutchinson:
Deceiving Autonomous Drones. Int. J. Cyber Warf. Terror. 10(3): 1-14 (2020)
2000 – 2009
- 2007
- [j9]William Hutchinson:
An information-centric and proactive approach to Information Security teaching. Int. J. Inf. Comput. Secur. 1(4): 369-377 (2007) - 2006
- [j8]William Hutchinson:
Information Warfare and Deception. Informing Sci. Int. J. an Emerg. Transdiscipl. 9: 213-223 (2006) - [c15]W. David Wilde, Matthew J. Warren, William Hutchinson:
Outsourcing System Security: A Theoretical Perspective. ACIS 2006 - 2005
- [j7]J. Redman, Matthew J. Warren, William Hutchinson:
System survivability: a critical security problem. Inf. Manag. Comput. Security 13(3): 182-188 (2005) - [c14]William Hutchinson:
Information Security: a Misnomer. AISM 2005: 33-37 - [c13]William Hutchinson:
The 'Will' and Information Operations. ECIW 2005: 151-156 - 2003
- [j6]Matthew J. Warren, William Hutchinson:
Australian Hackers and Ethics. Australas. J. Inf. Syst. 10(2) (2003) - [j5]Matthew J. Warren, William Hutchinson:
A security risk management approach for e-commerce. Inf. Manag. Comput. Secur. 11(5): 238-242 (2003) - [c12]Matthew J. Warren, William Hutchinson:
Information Security - An E-learning Problem. ICWL 2003: 21-26 - [c11]William Hutchinson:
Integrating Information Security and Intelligence Courses. World Conference on Information Security Education 2003: 75-83 - [c10]W. J. Brooks, Matthew J. Warren, William Hutchinson:
ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420 - 2002
- [j4]Bill Hutchinson, Mat Warren:
Information Warfare: using the viable system model as a framework to attack organisations. Australas. J. Inf. Syst. 9(2) (2002) - [j3]William Hutchinson, Matthew J. Warren:
Truth, lies, reality and deception: an issue for e-commerce. Int. J. Serv. Technol. Manag. 3(2): 208-221 (2002) - [c9]William Hutchinson, Matt Warren:
Developing a Postgraduate Course in Information Security: a confusion of terms. ACIS 2002 - [c8]W. J. Brooks, Matthew J. Warren, William Hutchinson:
A Security Evaluation Criteria for Baseline Security Standards. SEC 2002: 79-90 - 2001
- [j2]Matthew J. Warren, William Hutchinson:
Information Warfare and Ethics. Australas. J. Inf. Syst. 8(2) (2001) - [j1]William Hutchinson, Matthew J. Warren:
Attitudes of Australian information system managers against online attackers. Inf. Manag. Comput. Secur. 9(3): 106-111 (2001) - [c7]Matthew J. Warren, William Hutchinson:
A Security Method for Healthcare Organisations. Conference on Information Security Management & Small Systems Security 2001: 157-166 - [c6]Matthew J. Warren, William Hutchinson:
Deception: A Tool and Curse for Security Management. SEC 2001: 327-338 - 2000
- [c5]William Hutchinson, Matthew J. Warren:
The use of deception in systems. ICSTM 2000 - [c4]William Hutchinson, Matthew J. Warren:
Deception and reality: a challenge for the information and knowledge management function. IRMA Conference 2000: 88-91 - [c3]Andrew Wenn, Steve Clarke, Elayne W. Coakes, M. Gordon Hunter, Bill Hutchinson, Eric Perotti, Valerie Perotti:
Human centred computing: interests, issues, expectations and results. IRMA Conference 2000: 1217-1218 - [c2]Matthew J. Warren, William Hutchinson:
Information Warfare: Fact or Fiction? SEC 2000: 411-420
1990 – 1999
- 1999
- [c1]Matthew J. Warren, William Hutchinson:
The Future of Australian & New Zealand Security Standard AS/NZS 4444?. Conference on Information Security Management & Small Systems Security 1999: 41-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-26 00:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint