College of Humanities and Social Sciences staff

Contact details +64 (09) 414 0800  ext. 43439

Dr Andrew Colarik

Senior Lecturer

Centre for Defence and Security Studies

Dr Andrew Colarik is a Senior Lecturer with CDSS based at the Albany campus.  He has published multiple security books and publications in the areas of cyber terrorism, cyber warfare, and cyber security, and has at times provided insight to organisations such as the FBI, the US Secret Service and the US Department of State.  His research interests involve the technology impact on social, political, legal and economic structures in society; the design and implementation of secure communication systems; and the evolving applications and consequences of the global information infrastructure on businesses, governments and individuals. Andrew is a contributing cyber security and terrorism expert to news and media outlets such as Fox News, TV3 News, Radio Live, InformationWeek, and Information Age.

Dr. Andrew M. Colarik is a Senior Lecturer with the Centre for Defence and Security Studies at Massey University. He is an author, researcher, and inventor of information security technologies and has published multiple security books and publications in the areas of cyber terrorism, cyber warfare, and cyber security. For more information on Dr. Colarik, visit his website at www.AndrewColarik.com.

More about me...View less...

Professional

Contact details

  • Ph: +64 9 213 6439
    Location: AT2.29, Atrium
    Campus: Albany

Research Expertise

Research Interests

The technology impact on social, political, legal and economic structures in society; the design and implementation of secure communication systems; and the evolving applications and consequences of the global information infrastructure on businesses, governments and individuals.

Area of Expertise

Field of research codes
Computer Software (080300): Computer System Security (080303): Global Information Systems (080606): Information And Computing Sciences (080000): Information Systems (080600): Information Systems Development Methodologies (080608): Information Systems Management (080609): Information Systems Organisation (080610): Information Systems Theory (080611): Software Engineering (080309):
Technology (100000)

Keywords

Cyber Security, Cyber Terrorism, Cyber Warfare, Patents, Intellectual Property, Information and Communcations Technology (ICT)

Research Outputs

Journal

Colarik, AM., & Ball, R. (2016). Anonymous Versus ISIS: The Role of Non-state Actors in Self-defense. Global Security and Intelligence Studies. 2(1), 20-32 Retrieved from http://www.ipsonet.org/
[Journal article]Authored by: Ball, R., Colarik, A.
Hughes, D., & Colarik, AM. (2016). Predicting the proliferation of cyber-weapons into small states. Joint Force Quarterly. 4th Quarter 2016(83), 19-26
[Journal article]Authored by: Colarik, A.
Gilmour, N., & Colarik, AM. (2015). Why we need new ideas in the fight against cybercrime. : World Economic Forum
[Internet publication]Authored by: Colarik, A.
Colarik, AM., & Janczewski, LJ. (2012). Establishing cyber warfare doctrine. Journal of Strategic Security. 5(1), 31-48
[Journal article]Authored by: Colarik, A.

Book

Colarik, AM., Jang-Jaccard, J., & Mathrani, A. (Eds.) (2017). Cyber Security and Policy: A Substantive Dialogue. : Massey University Press
[Edited Book]Authored by: Mathrani, A.Edited by: Colarik, A., Jang-Jaccard, J., Mathrani, A.
Colarik, AM., & Janczewski, LJ. (2015). Establishing cyber warfare doctrine. In F. Lemieux (Ed.) Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice. (pp. 37 - 50). : Palgrave Macmillan
[Chapter]Authored by: Colarik, A.
Janczewski, LJ., & Colarik, AM. (Eds.) (2008). Cyber Warfare and Cyber Terrorism. : IGI Global
[Edited Book]Edited by: Colarik, A.
Colarik, AM.(2006). Cyber Terrorism: Political and Economic Implications. : IGI Global
[Authored Book]Authored by: Colarik, A.
Janczewski, LJ., & Colarik, AM.(2005). Managerial guide for handling cyber-terrorism and information warfare.
[Authored Book]Authored by: Colarik, A.

Conference

McDowell, RF., & Colarik, AM.Botnets: An Unsolvable Problem?. . Las Vegas, USA
[Conference Paper]Authored by: Colarik, A.
Neems, AJ., & Colarik, AM.The Future City? Mitigating the Technological Threat Cities Face in their Adoption of Smart Services and Infrastructure. . Las Vegas, USA
[Conference Paper]Authored by: Colarik, A.
Hughes, D., & Colarik, A. (2017). The hierarchy of cyber war definitions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10241 LNCS (pp. 15 - 33).
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Hughes, D., & Colarik, A. (2016). Small state acquisition of offensive Cyberwarfare capabilities: Towards building an analytical framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9650 (pp. 166 - 179).
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Colarik, AM., & Ball, R. (2016). The security codex - mapping a research domain. In A. Gomez Chova, A. Lopez Martinez, & I. Candel Torres (Eds.) Proceedings 10th International Technology, Education and Development Conference. (pp. 7551 - 7560). : 10th International Technology, Education and Development Conference (INTED2016)
[Conference Paper in Published Proceedings]Authored by: Ball, R., Colarik, A.
Colarik, AM., & Janczewski, LJ. (2012). A discussion on life systems security and the systems approach. CONF-IRM 2012 Proceedings. 56. : International Conference on Information Resources Management
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Colarik, AM., & Janczewski, LJ. (2011). Developing a grand strategy for Cyber War. Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011. (pp. 52 - 57).
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Colarik, A., Gutiérrez, J., & Janczewski, L. (2007). Securing data transfers: An integrity algorithm for error recovery triangulation. PACIS 2007 - 11th Pacific Asia Conference on Information Systems: Managing Diversity in Digital Enterprises.
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Colarik, A., Thomborson, C., & Janczewski, L. (2004). Update/patch management systems: A protocol taxonomy with security implications. IFIP Advances in Information and Communication Technology. Vol. 148 (pp. 67 - 80).
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Janczewski, LJ., & Colarik, AM. (2003). World framework for security benchmark changes. IFIP Advances in Information and Communication Technology. Vol. 122 (pp. 397 - 400).
[Conference Paper in Published Proceedings]Authored by: Colarik, A.
Janczewski, LJ., & Colarik, AM.Development of a framework for secure patch management. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2. (pp. 810 - 813).
[Conference]Authored by: Colarik, A.

Media and Links

Media

  • 30 Sep 2015 - Television
    GCSB dealing with more cyber attacks
    Live TV segment discussing the GCSB helping to stop cyber attacks hosted by Paul Henry
  • 28 Mar 2012 - Television
    Huawei and National Broadband Security
    A brief discussion on Huawei and National Broadband Security by Adam Ray of TV3 News
  • 25 Mar 2015 - Newspaper
    Cast light on value of intelligence networks
    A half-page Editorial on Cyber Security as a National Security Imperative co-authored with Rhys Ball
  • 19 May 2015 - Television
    Airplane Flight Controls Hacking
    Live TV segment on the airplane flight controls hacking by Paul Henry
  • 17 Feb 2015 - Radio
    Billion Dollar Bank Theft
    Brief interview with Rachel Smalley of KPMG Early Edition (Newstalk ZB) on the Billion Dollar Bank Theft
  • 17 Aug 2015 - Newspaper, Online
    Machine Gunners
    Contributed to an article by Bruce Munro of the Otago Daily Times
  • 13 Apr 2015 - Television
    Fair Go: Dangers of Social Media
    A full episode on the dangers of social media by Garth Bray of Fair Go
  • 12 Jul 2016 - Television
    Privacy issues with Pokemon Go
    A brief interview discussing the Privacy issues with Pokemon Go hosted by Anna Burns-Francis of TV1 News
  • 08 May 2012 - Television
    Frontline: Credit Card Security
    A brief discussion on Credit Card Security by Susie Nordqvist of Frontline
  • 08 Jul 2015 - Television
    Is your smart phone eavesdropping?
    A discussion about smart phones and surveillence hosted by Mark Crysell of Fair Go
  • 01 Apr 2016 - Magazine
    Cyber-attacks – the ominous shadow over SMEs
    Contributed to an article by Jason Walls of The National Business Review

Other Links

Massey Contact Centre Mon - Fri 8:30am to 5:00pm 0800 MASSEY (+64 6 350 5701) TXT 5222 contact@massey.ac.nz Web chat Staff Alumni News Māori @ Massey