Atif Ahmad

Orcid: 0000-0002-8862-5755

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia


According to our database1, Atif Ahmad authored at least 85 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Case-based learning for cybersecurity leaders: A systematic review and research agenda.
Inf. Manag., 2024

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics.
Eur. J. Inf. Syst., 2024

2023
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities.
Comput. Secur., December, 2023

Cyber-threat intelligence for security decision-making: A review and research agenda for practice.
Comput. Secur., September, 2023

Adopting and integrating cyber-threat intelligence in a commercial organisation.
Eur. J. Inf. Syst., January, 2023

Exploring the Antecedents of Shadow Information Security Practices.
Proceedings of the Australasian Conference on Information Systems, 2023

2022
Information Security Management in High Quality IS Journals: A Review and Research Agenda.
CoRR, 2022

Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda.
CoRR, 2022

Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations.
Comput. Secur., 2022

Editorial.
Comput. Secur., 2022

Competencies of Cybersecurity Leaders: A Review and Research Agenda.
Proceedings of the 43rd International Conference on Information Systems, 2022

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Case-based learning in the management practice of information security: an innovative pedagogical instrument.
Pers. Ubiquitous Comput., 2021

Do privacy concerns determine online information disclosure? The case of internet addiction.
Inf. Comput. Secur., 2021

Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis.
Int. J. Inf. Manag., 2021

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
CoRR, 2021

Applying social marketing to evaluate current security education training and awareness programs in organisations.
Comput. Secur., 2021

How can organizations develop situation awareness for incident response: A case study of management practice.
Comput. Secur., 2021

Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals.
Proceedings of the 29th European Conference on Information Systems, 2021

2020
How integration of cyber security management and incident response enables organizational learning.
J. Assoc. Inf. Sci. Technol., 2020

Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT).
Comput. Secur., 2020

Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping.
IEEE Access, 2020

Information Security Governance: A Process Model and Pilot Case Study.
Proceedings of the 41st International Conference on Information Systems, 2020

Situation-Awareness in Incident Response: An In-depth Case Study and Process Model.
Proceedings of the 41st International Conference on Information Systems, 2020

Teaching Information Security Management Using an Incident of Intellectual Property Leakage.
Proceedings of the Australasian Conference on Information Systems, 2020

Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack.
Comput. Secur., 2019

Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness.
Proceedings of the 27th European Conference on Information Systems, 2019

Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices.
Proceedings of the Australasian Conference on Information Systems, 2019

Dynamic Information Security Management Capability: Strategising for Organisational Performance.
Proceedings of the Australasian Conference on Information Systems, 2019

The Dark Web Phenomenon: A Review and Research Agenda.
Proceedings of the Australasian Conference on Information Systems, 2019

Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls.
Proceedings of the Australasian Conference on Information Systems, 2019

2018
Towards a Framework for Strategic Security Context in Information Security Governance.
Pac. Asia J. Assoc. Inf. Syst., 2018

Defining the Strategic Role of the Chief Information Security Officer.
Pac. Asia J. Assoc. Inf. Syst., 2018

A case analysis of securing organisations against information leakage through online social networking.
Int. J. Inf. Manag., 2018

Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach.
Proceedings of the International Conference on Information Systems, 2018

An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

2017
Organisational Information Security Strategy: Review, Discussion and Future Research.
Australas. J. Inf. Syst., 2017

Information Security Governance: A Case Study of the Strategic Context of Information Security.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

The Chief Information Security Officer and the Five Dimensions of a Strategist.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Organizational Security Learning from Incident Response.
Proceedings of the International Conference on Information Systems, 2017

Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study.
Proceedings of the International Conference on Information Systems, 2017

Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective.
Proceedings of the 25th European Conference on Information Systems, 2017

A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups.
Proceedings of the Australasian Conference on Information Systems, 2017

2016
Foundations for an Intelligence-driven Information Security Risk-management System.
J. Inf. Technol. Theory Appl., 2016

Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective.
CoRR, 2016

The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.
Comput. Law Secur. Rev., 2016

Asset Identification in Information Security Risk Assessment: A Business Practice Approach.
Commun. Assoc. Inf. Syst., 2016

Business Analytics in Information Security Risk Management: the contingent effect on Security Performance.
Proceedings of the 24th European Conference on Information Systems, 2016

Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective.
Proceedings of the Australasian Conference on Information Systems, 2016

A Theory on Information Security.
Proceedings of the Australasian Conference on Information Systems, 2016

Mitigating BYOD Information Security Risks.
Proceedings of the Australasian Conference on Information Systems, 2016

Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
A case analysis of information systems and security incident responses.
Int. J. Inf. Manag., 2015

Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks.
Int. J. Cyber Warf. Terror., 2015

Information Security Culture: Towards an Instrument for Assessing Security Management Practices.
Int. J. Cyber Warf. Terror., 2015

Digital forensic readiness: Expert perspectives on a theoretical framework.
Comput. Secur., 2015

Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model.
Proceedings of the International Conference on Information Systems, 2015

Understanding engagement with insurgents through retweet rhetoric.
Proceedings of the Australasian Language Technology Association Workshop, 2015

Evaluating the Utility of Research Articles for Teaching Information Security Management.
Proceedings of the Australasian Conference on Information Systems, 2015

Information Security Strategy in Organisations: Review, Discussion and Future Research Directions.
Proceedings of the Australasian Conference on Information Systems, 2015

Information Security Policy: A Management Practice Perspective.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
Information security strategies: towards an organizational multi-strategy perspective.
J. Intell. Manuf., 2014

Towards A Systemic Framework for Digital Forensic Readiness.
J. Comput. Inf. Syst., 2014

Teaching information security management: reflections and experiences.
Inf. Manag. Comput. Secur., 2014

A situation awareness model for information security risk management.
Comput. Secur., 2014

Protecting organizational competitive advantage: A knowledge leakage perspective.
Comput. Secur., 2014

Information Security Risk Management: An Intelligence-Driven Approach.
Australas. J. Inf. Syst., 2014

2013
Disclosure of Organizational Information on Social Media: Perspectives from Security Managers.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Towards an Intelligence-Driven Information Security Risk Management Process for Organisations.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats.
Int. J. Cyber Warf. Terror., 2012

Incident response teams - Challenges in supporting the organisational security function.
Comput. Secur., 2012

2011
Exploring The Use Of Online Social Networking By Employees: Looking At The Potential For Information Leakage.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

Towards Understanding Deterrence: Information Security Managers' Perspective.
Proceedings of the International Conference on IT Convergence and Security, 2011

Informal Learning in Security Incident Response Teams.
Proceedings of the Australasian Conference on Information Systems, 2011

2010
Information Security Governance: When Compliance Becomes More Important than Security.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Embedding Information Security Culture Emerging Concerns and Challenges.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information.
Proceedings of the Australasian Conference on Information Systems, 2010

2009
Towards a Knowledge Perspective in Information Security Risk Assessments - an Illustrative Case Study.
Proceedings of the Australasian Conference on Information Systems, 2009

2005
Security Governance: Its Impact on Security Culture.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
Towards Identifying Criteria for the Evidential Weight of System Event Logs.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

2003
Incident Handling: Where the need for planning is often not recognised.
Proceedings of the 1st Australian Computer, 2003

Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation.
Proceedings of the 1st Australian Computer, 2003


  Loading...