Atif Ahmad
Atif Ahmad
Professor, School of Computing and Information Systems, University of Melbourne
Verified email at - Homepage
Cited by
Cited by
Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective
A Ahmad, R Bosua, R Scheepers
Computers & Security, 27-39, 2014
A Situation Awareness Model for Information Security Risk Management
J Webb, A Ahmad, S Maynard, G Shanks
Computers & Security 44, 1-15, 2014
Incident Response Teams - Challenges in Supporting the Organisational Security Function
A Ahmad, J Hadgkiss, AB Ruighaver
Computers & Security 31 (5), 643-652, 2012
Information Security Strategies: Towards an Organizational Multi-Strategy Perspective
A Ahmad, SB Maynard, S Park
Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective
X Caron, R Bosua, SB Maynard, A Ahmad
Computer Law & Security Review 32 (1), 4-15, 2016
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack
A Ahmad, J Webb, K Desouza, J Boorman
Computers & Security, 402-418, 2019
A Case Analysis of Information Systems and Security Incident Responses
A Ahmad, S Maynard, G Shanks
International Journal of Information Management 35 (6), 717-723, 2015
How integration of security management and incident response enables organizational learning
A Ahmad, K Desouza, S Maynard, H Naseer, R Baskerville
Journal of the Association for Information Science and Technology, 1-15, 2020
Incorporating a Knowledge Perspective into Security Risk Assessments
P Shedden, R Scheepers, W Smith, A Ahmad
VINE Journal of Knowledge Management 41 (2), 152-166, 2011
How Can Organizations Develop Situation Awareness for Incident Response? A Case Study of Management Practice
A Ahmad, S Maynard, K Desouza, J Kotsias, M Whitty, R Baskerville
Computers & Security, 1-15, 2021
Exploring the Relationship between Organizational Culture and Information Security Culture
JS Lim, S Chang, S Maynard, A Ahmad
Australian Information Security Management Conference, 88-97, 2009
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework
M Elyas, A Ahmad, S Maynard, A Lonie
Computers & Security 52, 70-89, 2015
Embedding Information Security Culture Emerging Concerns and Challenges
JS Lim, A Ahmad, S Chang, S Maynard
Pacific Asia Conference on Information Systems, 463-474, 2010
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
NN Abdul-Molok, S Chang, A Ahmad
Information Security Management Conference, 76-88, 2010
Towards a Systemic Framework for Digital Forensic Readiness
M Elyas, S Maynard, A Ahmad, A Lonie
Journal of Computer Information Systems 54 (3), 97-105, 2014
Risk Management Standards-The Perception of Ease of Use.
P Shedden, AB Ruighaver, A Ahmad
Journal Of Information System Security 6 (3), 1-19, 2010
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations
M Alshaikh, SB Maynard, A Ahmad, S Chang
Hawaii International Conference on System Sciences, 1-10, 2018
Information Security Risk Assessment: Towards a Business Practice Perspective
P Shedden, W Smith, A Ahmad
Information Security Management Conference, 127-138, 2010
Real-Time Analytics, Incident Response Process Agility and Enterprise Cybersecurity Performance: A Contingent Resource-Based Analysis
A Naseer, H Naseer, A Ahmad, SB Maynard, AM Siddiqui
International Journal of Information Management, 1-10, 2021
Asset Identification in Information Security Risk Assessment: A Business Practice Approach
P Shedden, A Ahmad, W Smith, H Tscherning, R Scheepers
Communications of the Association for Information Systems 39 (1), 297-320, 2016
The system can't perform the operation now. Try again later.
Articles 1–20