Atif Ahmad
Orcid: 0000-0002-8862-5755Affiliations:
- University of Melbourne, School of Computing and Information Systems, Australia
According to our database1,
Atif Ahmad
authored at least 85 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on atifahmad.me
-
on orcid.org
On csauthors.net:
Bibliography
2024
Case-based learning for cybersecurity leaders: A systematic review and research agenda.
Inf. Manag., 2024
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics.
Eur. J. Inf. Syst., 2024
2023
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities.
Comput. Secur., December, 2023
Cyber-threat intelligence for security decision-making: A review and research agenda for practice.
Comput. Secur., September, 2023
Eur. J. Inf. Syst., January, 2023
Proceedings of the Australasian Conference on Information Systems, 2023
2022
Information Security Management in High Quality IS Journals: A Review and Research Agenda.
CoRR, 2022
Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda.
CoRR, 2022
Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations.
Comput. Secur., 2022
Proceedings of the 43rd International Conference on Information Systems, 2022
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
Proceedings of the Australasian Conference on Information Systems, 2022
2021
Case-based learning in the management practice of information security: an innovative pedagogical instrument.
Pers. Ubiquitous Comput., 2021
Do privacy concerns determine online information disclosure? The case of internet addiction.
Inf. Comput. Secur., 2021
Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis.
Int. J. Inf. Manag., 2021
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
CoRR, 2021
Applying social marketing to evaluate current security education training and awareness programs in organisations.
Comput. Secur., 2021
How can organizations develop situation awareness for incident response: A case study of management practice.
Comput. Secur., 2021
Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals.
Proceedings of the 29th European Conference on Information Systems, 2021
2020
How integration of cyber security management and incident response enables organizational learning.
J. Assoc. Inf. Sci. Technol., 2020
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT).
Comput. Secur., 2020
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping.
IEEE Access, 2020
Proceedings of the 41st International Conference on Information Systems, 2020
Proceedings of the 41st International Conference on Information Systems, 2020
Teaching Information Security Management Using an Incident of Intellectual Property Leakage.
Proceedings of the Australasian Conference on Information Systems, 2020
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries.
Proceedings of the Australasian Conference on Information Systems, 2020
2019
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack.
Comput. Secur., 2019
Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness.
Proceedings of the 27th European Conference on Information Systems, 2019
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices.
Proceedings of the Australasian Conference on Information Systems, 2019
Dynamic Information Security Management Capability: Strategising for Organisational Performance.
Proceedings of the Australasian Conference on Information Systems, 2019
Proceedings of the Australasian Conference on Information Systems, 2019
Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls.
Proceedings of the Australasian Conference on Information Systems, 2019
2018
Towards a Framework for Strategic Security Context in Information Security Governance.
Pac. Asia J. Assoc. Inf. Syst., 2018
Pac. Asia J. Assoc. Inf. Syst., 2018
A case analysis of securing organisations against information leakage through online social networking.
Int. J. Inf. Manag., 2018
Proceedings of the International Conference on Information Systems, 2018
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
2017
Organisational Information Security Strategy: Review, Discussion and Future Research.
Australas. J. Inf. Syst., 2017
Information Security Governance: A Case Study of the Strategic Context of Information Security.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the International Conference on Information Systems, 2017
Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study.
Proceedings of the International Conference on Information Systems, 2017
Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective.
Proceedings of the 25th European Conference on Information Systems, 2017
A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups.
Proceedings of the Australasian Conference on Information Systems, 2017
2016
J. Inf. Technol. Theory Appl., 2016
Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective.
CoRR, 2016
The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.
Comput. Law Secur. Rev., 2016
Asset Identification in Information Security Risk Assessment: A Business Practice Approach.
Commun. Assoc. Inf. Syst., 2016
Business Analytics in Information Security Risk Management: the contingent effect on Security Performance.
Proceedings of the 24th European Conference on Information Systems, 2016
Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective.
Proceedings of the Australasian Conference on Information Systems, 2016
Proceedings of the Australasian Conference on Information Systems, 2016
Proceedings of the Australasian Conference on Information Systems, 2016
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach.
Proceedings of the Australasian Conference on Information Systems, 2016
2015
Int. J. Inf. Manag., 2015
Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks.
Int. J. Cyber Warf. Terror., 2015
Information Security Culture: Towards an Instrument for Assessing Security Management Practices.
Int. J. Cyber Warf. Terror., 2015
Comput. Secur., 2015
Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model.
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the Australasian Language Technology Association Workshop, 2015
Evaluating the Utility of Research Articles for Teaching Information Security Management.
Proceedings of the Australasian Conference on Information Systems, 2015
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions.
Proceedings of the Australasian Conference on Information Systems, 2015
Proceedings of the Australasian Conference on Information Systems, 2015
2014
Information security strategies: towards an organizational multi-strategy perspective.
J. Intell. Manuf., 2014
J. Comput. Inf. Syst., 2014
Inf. Manag. Comput. Secur., 2014
Comput. Secur., 2014
Comput. Secur., 2014
Australas. J. Inf. Syst., 2014
2013
Disclosure of Organizational Information on Social Media: Perspectives from Security Managers.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013
Towards an Intelligence-Driven Information Security Risk Management Process for Organisations.
Proceedings of the Australasian Conference on Information Systems, 2013
2012
Int. J. Cyber Warf. Terror., 2012
Incident response teams - Challenges in supporting the organisational security function.
Comput. Secur., 2012
2011
Exploring The Use Of Online Social Networking By Employees: Looking At The Potential For Information Leakage.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the Australasian Conference on Information Systems, 2011
2010
Information Security Governance: When Compliance Becomes More Important than Security.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Pacific Asia Conference on Information Systems, 2010
Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information.
Proceedings of the Australasian Conference on Information Systems, 2010
2009
Towards a Knowledge Perspective in Information Security Risk Assessments - an Illustrative Case Study.
Proceedings of the Australasian Conference on Information Systems, 2009
2005
Security Governance: Its Impact on Security Culture.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
2004
Towards Identifying Criteria for the Evidential Weight of System Event Logs.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
2003
Incident Handling: Where the need for planning is often not recognised.
Proceedings of the 1st Australian Computer, 2003
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation.
Proceedings of the 1st Australian Computer, 2003