ECU offers innovative and practical courses across a variety of disciplines and we have a vibrant research culture. ECU is a leader in developing alternative entry pathways to higher education.
We have three campuses in Western Australia. Joondalup and Mount Lawley in the Perth metropolitan area and our South West campus in Bunbury, 200km south of the Perth CBD.
ECU provides a variety of services and facilities that go beyond the classroom, with opportunities for personal development and social interaction for students and staff.
We collaborate with all types of businesses, including new start-ups, small to medium enterprises, not-for-profits, community organisations, government and large corporates in the resources sector.
Children's University Edith Cowan aims to inspire students between seven and fourteen to develop confidence and a love of learning through validated activities beyond the school curriculum.
The Inspiring Minds scholarship program are equity scholarships that give students an opportunity to access an education that may otherwise be out of reach.
Bill Hutchinson is an Adjunct Professor at secau – Security Research Centre, ECU and Deakin University and until his retirement in 2010 was IBM Chair at ECU.
Founding Director of secau Security Research Centre
Co-founder of the Journal of Information Warfare and written extensively in this area.
Bill has worked in the oil and finance industries as well as government in various roles.
Research Areas and Interests
Information Warfare
Cyber Security
Counter Terrorism
Environmental Security
Information Operations
Critical Infrastructure Protection
Qualifications
Doctor of Philosophy, Murdoch University.
, The University of Western Australia, 1989.
, Open Universities Australia, 1981.
A study into the demise of the North Sea Herring Industry, England, 1972.
Hutchinson, B. (2020). Deceiving autonomous drones. International Journal of Cyber Warfare and Terrorism, 10(3), 1-14. https://doi.org/10.4018/IJCWT.2020070101.
Conference Publications
Lehto, M., Hutchinson, B. (2020). Mini-drones swarms and their potential in conflict situations. Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 (326-334). Academic Conferences and Publishing International Limited. https://doi.org/10.34190/ICCWS.20.084.
Pye, G., Warren, M., Hutchinson, B. (2011). Critical infrastructure Protection: An Ethical Choice. ICT Ethics and Security in the 21st Century: New Developments and Applications (214-230). IGI Global. https://doi.org/10.4018/978-1-60960-573-5.ch011.
Hutchinson, B. (2010). New technologies: dissonance, influence and radical behaviours. Journal of Information Warfare, 9(3), 14-25.
Conference Publications
Warren, M., Pye, G., Hutchinson, B. (2010). Australian critical infrastructure protection: A case of two tales. Proceedings of the 11th Australian Information Warfare and Security Conference (30-36). Security Research Centre, Edith Cowan University.
Hutchinson, B., Warren, M. (2010). Influence operations and behavioural change. Proceedings of the 9th European Conference on Information Warfare and Security (116-119). Academic Publishing Limited.
Hutchinson, B. (2010). Influence Operations : Action and Attitude. Proceedings of 11th Australian Information Warfare Conference (13-17). Security Research Centre, Edith Cowan University.
Hutchinson, B., Warren, M. (2009). Security as an element in environmental assessment and decision making. Proceedings of The 2009 Conference of the Australia and New Zealand Society for Ecological Economics (ANZSEE): Green Mileage in the Global Meltdown: An Ecological Economics Way Forward (11). Australian and New Zealand Society for Ecological Economics.
Hutchinson, B. (2009). Cyber Influence. Proceedings of the 10th Australian Information Warfare and Security Conference (1-4). Centre for Security Research, Edith Cowan University.
Hutchinson, B. (2008). Media, Government and Manipulation: The Cases of the Two Gulf Wars. Proceedings of the 9th Australian Information Warfare and Security Conference (35-40). Centre for Security Research, Edith Cowan University.
Hutchinson, B. (2008). The Ethics of Information Operations. Conference Proceedings of AiCE 2008 Fifth Australian Institute of Computer Ethics Conference (pp63-67). School of Information Systems, Deakin University.
Hutchinson, B. (2008). Propaganda Dilemmas for Environmental Security. Proceedings of the 7th European Conference on Information Warfare and Security (pp103-110). University of Plymouth.
Hutchinson, B., Huhtinen, A., Rantapelkonenj, . (2007). The Impact of Perspective on the Effects and Outcomes of Conflict. Journal of Information Warfare, 6(1), 1-6.
Hutchinson, B. (2007). The Systemic Roots of Suicide Bombing. Systems Research and Behavioral Science, 24(2), 191-200.
Hutchinson, B. (2007). An Information-centric and Proactive Approach to Information Security teaching. International Journal of Information and Computer Security, 1(4), 106.
Conference Publications
Hutchinson, B. (2007). Using Digital systems for deception and influence. Proceedings of the International Conference on Human Aspects of Information Security (170). Information Security and Network Research Group, University of Plymouth.
Hutchinson, B. (2006). Information Warfare and Deception. Informing Science: The international Journal of Emerging Science, 9, 213-223.
Conference Publications
Wilde, D., Warren, M., Hutchinson, B. (2006). Outsourcing System Security: A Theoretical Perspective. Proceedings of the Australian Conference on Information Systems (6 pages). ACIS _-Australian Conference on Information Systems.
Hutchinson, B. (2006). Information Terrorism: networked influence. Proceedings of the 7th Australian Information Warfare and Security Conference (44-49). Edith Cowan University.
Wilde, D., Warren, M., Hutchinson, B. (2006). The Derivation of a Conceptual Model for Outsourcing IT Security. e-Society 2006 Proceedings Volume II (234-238). International Association for Development of the Information Society.
Hutchinson, B. (2006). Laughter and Humour as a Influence Agent in Contenporary Information. Proceedings of the 5th European Conference on Information Warfare and Security (97-100). Academic Conferences.
Hutchinson, B. (2005). The'Flexibility' of Official Information during Contemporary Conflict. Journal of Information Warfare, 4(2), 38-44.
Redman, J., Warren, M., Hutchinson, B. (2005). System Survivability: A Critical Security Problem. Information Management and Computer Security, 13(3), 182-188.
Conference Publications
Warren, M., Wilde, D., Dojkovski, S., Hutchinson, B. (2005). A conceptual Model Security for IT Security Outsourcing. Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference (257-263). Deakin University.
Warren, M., Hutchinson, B. (2005). A Systems Approach to Security. Systems Thinking and Complexity Science: Insights for Action (1-6). ISCE Publishing.
Hutchinson, B. (2005). The 'Will' and Information Operations. 4th European Conference on Information Warfare and Security (151-156). Academic Conferences.
Dojkovski, S., Warren, M., Hutchinson, B. (2005). Issues of Australian IT: Security Outsourcing. 4th Australian Institute of Computer Ethics Conference (105-110). Deakin University.
Hutchinson, B. (2005). The Relationship between Western Governments, Military and the Media during conflicts since 1980. Protecting the Australian Homeland (182-187). Deakin University.
Hutchinson, B. (2005). Information Security: A Misnomer. Proceedings of 3rd Australian Information Security Management Conference (33-37). ECU.
Hutchinson, B. (2005). An Information Centric approach to Information Security Teaching. Developing Partnerships (24-31). School of Computer and Information Science, Univeristy of South Australia.
Hutchinson, B. (2004). A critique of coalition propaganda before the second Gulf war. Journal of information warfare, 3(2), 29-41.
Conference Publications
Hutchinson, B. (2004). The role of deception on information operations. 5th Australian Information Warfare and Security Conference Proceedings (0). Edith Cowan University.
Redman, J., Warren, M., Hutchinson, B. (2004). System Survivability: A New Security Concept. Proceedings of the 4th International Network Conference (0). University of Plymouth.
Hutchinson, B. (2004). The Influence of Maskirovka on Contemporary Western Deception Theory. 3rd European Conference on Information Warfare and Security (0). Academic Conferences International.
Warren, M., Hutchinson, B. (2003). A Security Risk Management Approach for e-Commerce. Information Management and Computer Security, 11(5), 238-242.
Warren, M., Hutchinson, B. (2003). The Law and Cyber Terrorism. Journal of Information Warfare, 2(2), 27-32.
Warren, M., Hutchinson, B. (2003). Australian Hackers and Ethics. Australian Journal of Information Systems, 10(2), 151-156.
Conference Publications
Hutchinson, B. (2003). The Changing Nature of Information Security. Proceedings (6 pages). We-B centre.
Hutchinson, B., Warren, M. (2003). Emergence: The Achilles Heel of Systems Thinking. 9th ANZSYS Conference System in Action Proceedings (10 pages). Monash University.
Warren, M., Hutchinson, B. (2003). Information Security - An E-Learning Problem. Proceedings, Second International Conference (21-26). Springer.
Brooks, WJ., Warren, M., Hutchinson, B. (2003). ISO 17799 and Australian Healthcare Organisations. Security and privacy in the age of uncertainty (417-420). Kluwer Academic Publishers.
Hutchinson, B. (2003). Integrating Information Security and Intelligence Courses. Security Education and Critical Infrastructures (8 pages). Kluwer Academic Publishers.
Hutchinson, B. (2003). The Impact of Groupthink on the Intelligence Function. Enhancing Trust (171-180). University of South Australia.
Hutchinson, B. (2003). Modern Asymmetric Warfare and the Failure of the West. 2nd European Conference on Information Warfare and Security (161-166). MCIL.
Busuttil, TB., Warren, M., Hutchinson, B. (2003). A formalisation of an information infrastructure security risk analysis approach. Proceedings from the the fourth annual IEEE SMC Information Assurance Workshop (282-288). West Point.
Warren, M., Hutchinson, B. (2002). Cyberspace Ethics and Information Warfare. Social Responsibility in the Information Age (126-134). Idea Group Publishing.
Hutchinson, B., Warren, M. (2002). Aggression on the Networks: An Australian Viewpoint. Social Responsibility in the Information Age (114-125). Idea Group Publishing.
Journal Articles
Hutchinson, B. (2002). Concepts in Information Warfare. Logistics Information Management, 15, 410-413.
Brooks, WJ., Warren, M., Hutchinson, B. (2002). A Security Evaluation Criteria. Logistics Information Management, 15, 377-384.
Hutchinson, B., Warren, M. (2002). Truth, Lies, Reality and Deception: An Issue for E-Commerce. International Journal of Services Technology and Management, 3(1), 208-221.
Conference Publications
Hutchinson, B. (2002). The User Abuse of Logic in Contemporary Western Perception Management. European Conference on Information Warfare and Security (). MCIL.
Hutchinson, B., Warren, M. (2002). Australian Hackers: An Ethical Perspective. Computer Ethics: Its Impact Upon Australia (). AiCE.
Hutchinson, B. (2002). Network Theory - The Demise of Systems Thinking?. 8th Australian & New Zealand Systems Conference (). University of Sunshine Coast.
Hutchinson, B. (2002). From Information Security to Information Warfare: a paradigm shift.. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
Sastrohardjono, S., Hutchinson, B. (2002). The Use of Local Systemic Action (LSA) to Develop Conceptual Models and to Solve Problem of Space Science and Technology Management in Indonesia. 8th Australian & New Zealand Systems Conference (). University of Sunshine Coast.
Hutchinson, B., Warren, M. (2002). Information Superiority and the Role of an Organisation's Network. 3rd International Network Conference (). Network Research Group, University of Plymouth.
Hutchinson, B., Warren, M. (2002). Security Risk Analysis in E-Commerce. 3rd International Network Conference (). Network Research Group, University of Plymouth.
Hutchinson, B., Warren, M. (2002). Will New Laws be Effective in Reducing Web Sponsorship of Terrorist Groups. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
Hutchinson, B., Warren, M. (2001). Information Warfare: Corporate attack and defence in a digital world. Butterworths- Heinemann.
Book Chapters
Hutchinson, B., Warren, M. (2001). Cyber Terrorism and the Contemporary Corporation. Information Security Management: Global Challenges in the New Millennium (53-64). Idea Group Publishing.
Journal Articles
Hutchinson, B., Warren, M. (2001). Attitudes of Australian Information System managers against online attackers. Information Management and Computer Security, 9, 106-111.
Hutchinson, B., Warren, M. (2001). Principles of Information Warfare. Journal of Information Warfare, 1, 1-6.
Conference Publications
Hutchinson, B., Warren, M. (2001). The nature of data: Illusions of reality. 2001 Informing Science: e-Refereed Papers (0). Cracow University of Economics.
Hutchinson, B., Warren, M. (2001). A security method for healthcare organisations. Eighth Annual Working Conference on Information Security Management & Small Systems Security (157-166). Kluwer Academic Publishers.
Hutchinson, B., Stoney, M. (2001). The implications of the United Kingdom's terrorism act on cyberspace. European Conference on e-Government (0). Trinity College, Dublin.
Hutchinson, B., Warren, M. (2001). A security training approach for UK small and medium sized enterprises. IFIPT C11 WG 11.8: 2nd World Conference on Information Security Education (197-207). Edith Cowan University, WA.
Hutchinson, B., Warren, M. (2001). A duality security risk analysis method for e-commerce. 2nd Australian Information Warfare and Security Conference (259-266). We-B Centre, Edith Cowan University.
Hutchinson, B., Warren, M. (2001). Deception: a tool and curse for security management. Trusted Information. The New Decade Challenge (0). Kluwer Academic Publishers.
Hutchinson, B., Stoney, S. (2001). Fire, file and forget: why e-mails often fail. Working for Excellence in the E-conomy (67-72). We-B Centre, Edith Cowan University.
Hutchinson, B., Stoney, S. (2001). Designing for diversity. 6th Annual Conference of U K A I S (502-510). Zeus Press, Manchester, UK.
Hutchinson, B., Warren, M. (2001). Information warfare and hacking. 5th Australian Security Research Symposium (0). Edith Cowan University.
Hutchinson, B., Warren, M. (2001). The use of the viable systems model to develop attacks on and an understanding of the weaknesses of an information system. 6th Annual Conference of U K A I S (502-510). Zeus Press, Manchester, UK.
Ash, C., Hutchinson, B., Burn, J. (2001). E-business change management through I-ERP. 6th Annual Conference of U K A I S (310-320). Zeus Press, Manchester, UK.
Research Projects
Better Planning for and Managing Asymmetric Threats to Australia's Security: Applying the Field Anomaly Relaxation(FAR) Systems Thinking Approach., Australian Research Council, Grant - Linkage (Projects), 2004 ‑ 2007, $139,783.
An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector, Department of Defence, Defence Signals Directorate - Grant, 2005 ‑ 2006, $25,000.
A model for IT security outsourcing of critical services, Australian Research Council, Grant - Discovery Projects, 2004 ‑ 2006, $20,000.
Research into the use of deception as a potentially legitimate policy in Commonwealth agencies, Department of Defence, Defence Signals Directorate - Grant, 2004 ‑ 2005, $39,000.