Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor William Hutchinson

Honorary Academic

Staff Member Details
Email: w.hutchinson@ecu.edu.au

Background

  • Bill Hutchinson is an Adjunct Professor at secau – Security Research Centre, ECU and Deakin University and until his retirement in 2010 was IBM Chair at ECU.
  • Founding Director of secau Security Research Centre
  • Co-founder of the Journal of Information Warfare and written extensively in this area.
  • Bill has worked in the oil and finance industries as well as government in various roles.

Research Areas and Interests

  • Information Warfare
  • Cyber Security
  • Counter Terrorism
  • Environmental Security
  • Information Operations
  • Critical Infrastructure Protection

Qualifications

  • Doctor of Philosophy, Murdoch University.
  • , The University of Western Australia, 1989.
  • , Open Universities Australia, 1981.
  • A study into the demise of the North Sea Herring Industry, England, 1972.

Research Outputs

Journal Articles

Conference Publications

  • Lehto, M., Hutchinson, B. (2020). Mini-drones swarms and their potential in conflict situations. Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 (326-334). Academic Conferences and Publishing International Limited. https://doi.org/10.34190/ICCWS.20.084.

Book Chapters

Book Chapters

  • Pye, G., Warren, M., Hutchinson, B. (2011). Critical infrastructure Protection: An Ethical Choice. ICT Ethics and Security in the 21st Century: New Developments and Applications (214-230). IGI Global. https://doi.org/10.4018/978-1-60960-573-5.ch011.

Journal Articles

  • Hutchinson, B. (2010). New technologies: dissonance, influence and radical behaviours. Journal of Information Warfare, 9(3), 14-25.

Conference Publications

  • Warren, M., Pye, G., Hutchinson, B. (2010). Australian critical infrastructure protection: A case of two tales. Proceedings of the 11th Australian Information Warfare and Security Conference (30-36). Security Research Centre, Edith Cowan University.
  • Hutchinson, B., Warren, M. (2010). Influence operations and behavioural change. Proceedings of the 9th European Conference on Information Warfare and Security (116-119). Academic Publishing Limited.
  • Hutchinson, B. (2010). Influence Operations : Action and Attitude. Proceedings of 11th Australian Information Warfare Conference (13-17). Security Research Centre, Edith Cowan University.

Conference Publications

  • Hutchinson, B., Warren, M. (2009). Security as an element in environmental assessment and decision making. Proceedings of The 2009 Conference of the Australia and New Zealand Society for Ecological Economics (ANZSEE): Green Mileage in the Global Meltdown: An Ecological Economics Way Forward (11). Australian and New Zealand Society for Ecological Economics.
  • Hutchinson, B. (2009). Cyber Influence. Proceedings of the 10th Australian Information Warfare and Security Conference (1-4). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Hutchinson, B. (2008). Propaganda Dilemmas for Environmental Security. Proceedings of the 7th European Conference on Information Warfare and Security (pp103-110). University of Plymouth.
  • Hutchinson, B. (2008). Media, Government and Manipulation: The Cases of the Two Gulf Wars. Proceedings of the 9th Australian Information Warfare and Security Conference (35-40). Centre for Security Research, Edith Cowan University.
  • Hutchinson, B. (2008). The Ethics of Information Operations. Conference Proceedings of AiCE 2008 Fifth Australian Institute of Computer Ethics Conference (pp63-67). School of Information Systems, Deakin University.

Journal Articles

  • Hutchinson, B. (2007). An Information-centric and Proactive Approach to Information Security teaching. International Journal of Information and Computer Security, 1(4), 106.
  • Hutchinson, B., Huhtinen, A., Rantapelkonenj, . (2007). The Impact of Perspective on the Effects and Outcomes of Conflict. Journal of Information Warfare, 6(1), 1-6.
  • Hutchinson, B. (2007). The Systemic Roots of Suicide Bombing. Systems Research and Behavioral Science, 24(2), 191-200.

Conference Publications

  • Hutchinson, B. (2007). Using Digital systems for deception and influence. Proceedings of the International Conference on Human Aspects of Information Security (170). Information Security and Network Research Group, University of Plymouth.

Journal Articles

  • Hutchinson, B. (2006). Information Warfare and Deception. Informing Science: The international Journal of Emerging Science, 9, 213-223.

Conference Publications

  • Hutchinson, B. (2006). Information Terrorism: networked influence. Proceedings of the 7th Australian Information Warfare and Security Conference (44-49). Edith Cowan University.
  • Wilde, D., Warren, M., Hutchinson, B. (2006). Outsourcing System Security: A Theoretical Perspective. Proceedings of the Australian Conference on Information Systems (6 pages). ACIS _-Australian Conference on Information Systems.
  • Wilde, D., Warren, M., Hutchinson, B. (2006). The Derivation of a Conceptual Model for Outsourcing IT Security. e-Society 2006 Proceedings Volume II (234-238). International Association for Development of the Information Society.
  • Hutchinson, B. (2006). Laughter and Humour as a Influence Agent in Contenporary Information. Proceedings of the 5th European Conference on Information Warfare and Security (97-100). Academic Conferences.

Journal Articles

  • Hutchinson, B. (2005). The'Flexibility' of Official Information during Contemporary Conflict. Journal of Information Warfare, 4(2), 38-44.
  • Redman, J., Warren, M., Hutchinson, B. (2005). System Survivability: A Critical Security Problem. Information Management and Computer Security, 13(3), 182-188.

Conference Publications

  • Hutchinson, B. (2005). Information Security: A Misnomer. Proceedings of 3rd Australian Information Security Management Conference (33-37). ECU.
  • Hutchinson, B. (2005). The Relationship between Western Governments, Military and the Media during conflicts since 1980. Protecting the Australian Homeland (182-187). Deakin University.
  • Dojkovski, S., Warren, M., Hutchinson, B. (2005). Issues of Australian IT: Security Outsourcing. 4th Australian Institute of Computer Ethics Conference (105-110). Deakin University.
  • Warren, M., Hutchinson, B. (2005). A Systems Approach to Security. Systems Thinking and Complexity Science: Insights for Action (1-6). ISCE Publishing.
  • Warren, M., Wilde, D., Dojkovski, S., Hutchinson, B. (2005). A conceptual Model Security for IT Security Outsourcing. Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference (257-263). Deakin University.
  • Hutchinson, B. (2005). The 'Will' and Information Operations. 4th European Conference on Information Warfare and Security (151-156). Academic Conferences.
  • Hutchinson, B. (2005). An Information Centric approach to Information Security Teaching. Developing Partnerships (24-31). School of Computer and Information Science, Univeristy of South Australia.

Journal Articles

  • Hutchinson, B. (2004). A critique of coalition propaganda before the second Gulf war. Journal of information warfare, 3(2), 29-41.

Conference Publications

  • Hutchinson, B. (2004). The role of deception on information operations. 5th Australian Information Warfare and Security Conference Proceedings (0). Edith Cowan University.
  • Redman, J., Warren, M., Hutchinson, B. (2004). System Survivability: A New Security Concept. Proceedings of the 4th International Network Conference (0). University of Plymouth.
  • Hutchinson, B. (2004). The Influence of Maskirovka on Contemporary Western Deception Theory. 3rd European Conference on Information Warfare and Security (0). Academic Conferences International.

Journal Articles

  • Warren, M., Hutchinson, B. (2003). The Law and Cyber Terrorism. Journal of Information Warfare, 2(2), 27-32.
  • Warren, M., Hutchinson, B. (2003). A Security Risk Management Approach for e-Commerce. Information Management and Computer Security, 11(5), 238-242.
  • Warren, M., Hutchinson, B. (2003). Australian Hackers and Ethics. Australian Journal of Information Systems, 10(2), 151-156.

Conference Publications

  • Hutchinson, B. (2003). The Changing Nature of Information Security. Proceedings (6 pages). We-B centre.
  • Brooks, WJ., Warren, M., Hutchinson, B. (2003). ISO 17799 and Australian Healthcare Organisations. Security and privacy in the age of uncertainty (417-420). Kluwer Academic Publishers.
  • Hutchinson, B., Warren, M. (2003). Emergence: The Achilles Heel of Systems Thinking. 9th ANZSYS Conference System in Action Proceedings (10 pages). Monash University.
  • Hutchinson, B. (2003). The Impact of Groupthink on the Intelligence Function. Enhancing Trust (171-180). University of South Australia.
  • Hutchinson, B. (2003). Integrating Information Security and Intelligence Courses. Security Education and Critical Infrastructures (8 pages). Kluwer Academic Publishers.
  • Busuttil, TB., Warren, M., Hutchinson, B. (2003). A formalisation of an information infrastructure security risk analysis approach. Proceedings from the the fourth annual IEEE SMC Information Assurance Workshop (282-288). West Point.
  • Hutchinson, B. (2003). Modern Asymmetric Warfare and the Failure of the West. 2nd European Conference on Information Warfare and Security (161-166). MCIL.
  • Warren, M., Hutchinson, B. (2003). Information Security - An E-Learning Problem. Proceedings, Second International Conference (21-26). Springer.

Book Chapters

  • Warren, M., Hutchinson, B. (2002). Cyberspace Ethics and Information Warfare. Social Responsibility in the Information Age (126-134). Idea Group Publishing.
  • Hutchinson, B., Warren, M. (2002). Aggression on the Networks: An Australian Viewpoint. Social Responsibility in the Information Age (114-125). Idea Group Publishing.

Journal Articles

  • Hutchinson, B. (2002). Concepts in Information Warfare. Logistics Information Management, 15, 410-413.
  • Hutchinson, B., Warren, M. (2002). Truth, Lies, Reality and Deception: An Issue for E-Commerce. International Journal of Services Technology and Management, 3(1), 208-221.
  • Brooks, WJ., Warren, M., Hutchinson, B. (2002). A Security Evaluation Criteria. Logistics Information Management, 15, 377-384.

Conference Publications

  • Sastrohardjono, S., Hutchinson, B. (2002). The Use of Local Systemic Action (LSA) to Develop Conceptual Models and to Solve Problem of Space Science and Technology Management in Indonesia. 8th Australian & New Zealand Systems Conference (). University of Sunshine Coast.
  • Hutchinson, B., Warren, M. (2002). Will New Laws be Effective in Reducing Web Sponsorship of Terrorist Groups. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
  • Hutchinson, B. (2002). The User Abuse of Logic in Contemporary Western Perception Management. European Conference on Information Warfare and Security (). MCIL.
  • Hutchinson, B. (2002). Network Theory - The Demise of Systems Thinking?. 8th Australian & New Zealand Systems Conference (). University of Sunshine Coast.
  • Hutchinson, B., Warren, M. (2002). Australian Hackers: An Ethical Perspective. Computer Ethics: Its Impact Upon Australia (). AiCE.
  • Hutchinson, B., Warren, M. (2002). Information Superiority and the Role of an Organisation's Network. 3rd International Network Conference (). Network Research Group, University of Plymouth.
  • Hutchinson, B. (2002). From Information Security to Information Warfare: a paradigm shift.. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
  • Hutchinson, B., Warren, M. (2002). Security Risk Analysis in E-Commerce. 3rd International Network Conference (). Network Research Group, University of Plymouth.

Books

  • Hutchinson, B., Warren, M. (2001). Information Warfare: Corporate attack and defence in a digital world. Butterworths- Heinemann.

Book Chapters

  • Hutchinson, B., Warren, M. (2001). Cyber Terrorism and the Contemporary Corporation. Information Security Management: Global Challenges in the New Millennium (53-64). Idea Group Publishing.

Journal Articles

  • Hutchinson, B., Warren, M. (2001). Attitudes of Australian Information System managers against online attackers. Information Management and Computer Security, 9, 106-111.
  • Hutchinson, B., Warren, M. (2001). Principles of Information Warfare. Journal of Information Warfare, 1, 1-6.

Conference Publications

  • Hutchinson, B., Warren, M. (2001). A security method for healthcare organisations. Eighth Annual Working Conference on Information Security Management & Small Systems Security (157-166). Kluwer Academic Publishers.
  • Hutchinson, B., Warren, M. (2001). Deception: a tool and curse for security management. Trusted Information. The New Decade Challenge (0). Kluwer Academic Publishers.
  • Hutchinson, B., Stoney, M. (2001). The implications of the United Kingdom's terrorism act on cyberspace. European Conference on e-Government (0). Trinity College, Dublin.
  • Hutchinson, B., Warren, M. (2001). The nature of data: Illusions of reality. 2001 Informing Science: e-Refereed Papers (0). Cracow University of Economics.
  • Hutchinson, B., Stoney, S. (2001). Fire, file and forget: why e-mails often fail. Working for Excellence in the E-conomy (67-72). We-B Centre, Edith Cowan University.
  • Hutchinson, B., Warren, M. (2001). The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system. 6th Annual Conference of U K A I S (502-510). Zeus Press, Manchester, UK.
  • Hutchinson, B., Warren, M. (2001). Information warfare and hacking. 5th Australian Security Research Symposium (0). Edith Cowan University.
  • Hutchinson, B., Stoney, S. (2001). Designing for diversity. 6th Annual Conference of U K A I S (502-510). Zeus Press, Manchester, UK.
  • Ash, C., Hutchinson, B., Burn, J. (2001). E-business change management through I-ERP. 6th Annual Conference of U K A I S (310-320). Zeus Press, Manchester, UK.
  • Hutchinson, B., Warren, M. (2001). A duality security risk analysis method for e-commerce. 2nd Australian Information Warfare and Security Conference (259-266). We-B Centre, Edith Cowan University.
  • Hutchinson, B., Warren, M. (2001). A security training approach for UK small and medium sized enterprises. IFIPT C11 WG 11.8: 2nd World Conference on Information Security Education (197-207). Edith Cowan University, WA.

Research Projects

  • Better Planning for and Managing Asymmetric Threats to Australia's Security: Applying the Field Anomaly Relaxation(FAR) Systems Thinking Approach., Australian Research Council, Grant - Linkage (Projects), 2004 ‑ 2007, $139,783.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector, Department of Defence, Defence Signals Directorate - Grant, 2005 ‑ 2006, $25,000.
  • A model for IT security outsourcing of critical services, Australian Research Council, Grant - Discovery Projects, 2004 ‑ 2006, $20,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies, Department of Defence, Defence Signals Directorate - Grant, 2004 ‑ 2005, $39,000.

Research Student Supervision

No data available

Principal Supervisor

  • Doctor of Philosophy, Transformation theory in e-commerce adoption.
  • Doctor of Philosophy, Compatibility of a Western systemic approach for handling complex, pluralist and coercive problems in developing countries.
  • Doctor of Philosophy, An intelligence model for terrorist incident prevention for Australian police: A systemic investigation
  • Doctor of Philosophy, Terroists conducting information warfare: Enhancing national security in Western nations.
  • Doctor of Philosophy, Evaluating the influence of it capability in the context of SMEs.
  • Doctor of Philosophy, The information strategy requirements of the unit states government from 2004 onwards.
  • Doctor of Philosophy, Vulnerabilities in class one electronic product code radio frequency identification systems
  • Master of Science (Computer Science), A knowledge-based approach to intrusion detection systems.
Skip to top of page