default search action
Atif Ahmad
Person information
- affiliation: University of Melbourne, School of Computing and Information Systems, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Humza Naseer, Kevin C. Desouza, Sean B. Maynard, Atif Ahmad:
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. Eur. J. Inf. Syst. 33(2): 200-220 (2024) - [j34]Ashley Anderson, Atif Ahmad, Shanton Chang:
Case-based learning for cybersecurity leaders: A systematic review and research agenda. Inf. Manag. 61(7): 104015 (2024) - 2023
- [j33]Scott Ainslie, Dean Thompson, Sean B. Maynard, Atif Ahmad:
Cyber-threat intelligence for security decision-making: A review and research agenda for practice. Comput. Secur. 132: 103352 (2023) - [j32]Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui:
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities. Comput. Secur. 135: 103525 (2023) - [j31]James Kotsias, Atif Ahmad, Rens Scheepers:
Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf. Syst. 32(1): 35-51 (2023) - [c46]Duy Dang-Pham, Nik Thompson, Atif Ahmad, Sean B. Maynard:
Exploring the Antecedents of Shadow Information Security Practices. ACIS 2023 - [i17]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations. CoRR abs/2308.10689 (2023) - [i16]Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations. CoRR abs/2308.10920 (2023) - 2022
- [j30]Atif Ahmad, Sean B. Maynard, Richard L. Baskerville:
Editorial. Comput. Secur. 112: 102530 (2022) - [j29]Nor Hasnul Azirah Abdul Hamid, Normalina Ibrahim @ Mat Nor, Fazlin Marini Hussain, Rajeswari Raju, Humza Naseer, Atif Ahmad:
Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations. Comput. Secur. 122: 102893 (2022) - [c45]Ashley O'Neill, Sean B. Maynard, Atif Ahmad, Justin Filippou:
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training. ACIS 2022: 35 - [c44]Ashley Baines Anderson, Atif Ahmad, Shanton Chang:
Competencies of Cybersecurity Leaders: A Review and Research Agenda. ICIS 2022 - [i15]Antra Arshad, Atif Ahmad, Sean B. Maynard:
Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda. CoRR abs/2208.12875 (2022) - [i14]Sean B. Maynard, Atif Ahmad:
Information Security Management in High Quality IS Journals: A Review and Research Agenda. CoRR abs/2208.13087 (2022) - 2021
- [j28]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad:
Applying social marketing to evaluate current security education training and awareness programs in organisations. Comput. Secur. 100: 102090 (2021) - [j27]Atif Ahmad, Sean B. Maynard, Kevin C. Desouza, James Kotsias, Monica T. Whitty, Richard L. Baskerville:
How can organizations develop situation awareness for incident response: A case study of management practice. Comput. Secur. 101: 102122 (2021) - [j26]Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui:
Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis. Int. J. Inf. Manag. 59: 102334 (2021) - [j25]Nik Thompson, Atif Ahmad, Sean B. Maynard:
Do privacy concerns determine online information disclosure? The case of internet addiction. Inf. Comput. Secur. 29(3): 558-569 (2021) - [j24]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Ashley Baines Anderson:
Case-based learning in the management practice of information security: an innovative pedagogical instrument. Pers. Ubiquitous Comput. 25(5): 853-877 (2021) - [c43]Ritu Lakshmi, Humza Naseer, Sean B. Maynard, Atif Ahmad:
Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals. ECIS 2021 - [i13]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh:
Teaching Information Security Management Using an Incident of Intellectual Property Leakage. CoRR abs/2103.14838 (2021) - [i12]Atif Ahmad, Sean B. Maynard, Sameen Motahhir:
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries. CoRR abs/2103.14839 (2021) - [i11]Atif Ahmad, Jeb Webb, Kevin C. Desouza, James Boorman:
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack. CoRR abs/2103.15005 (2021) - [i10]Abhineet Gupta, Sean B. Maynard, Atif Ahmad:
The Dark Web Phenomenon: A Review and Research Agenda. CoRR abs/2104.07138 (2021) - [i9]Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad:
Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls. CoRR abs/2104.07140 (2021) - [i8]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
Dynamic Information Security Management Capability: Strategising for Organisational Performance. CoRR abs/2104.07141 (2021) - [i7]Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer:
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices. CoRR abs/2104.07144 (2021) - [i6]Ritu Lakshmi, Humza Naseer, Sean B. Maynard, Atif Ahmad:
Sensemaking in Cybersecurity Incident Response: The Interplay of Organizations, Technology and Individuals. CoRR abs/2107.02941 (2021) - [i5]Ashley O'Neill, Atif Ahmad, Sean B. Maynard:
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training. CoRR abs/2108.04996 (2021) - 2020
- [j23]Aimi Nadrah Maseri, Azah Anir Norman, Christopher Ifeanyi Eke, Atif Ahmad, Nurul Nuha Abdul Molok:
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping. IEEE Access 8: 92929-92944 (2020) - [j22]Kevin C. Desouza, Atif Ahmad, Humza Naseer, Munish Sharma:
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). Comput. Secur. 88 (2020) - [j21]Atif Ahmad, Kevin C. Desouza, Sean B. Maynard, Humza Naseer, Richard L. Baskerville:
How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 71(8): 939-953 (2020) - [c42]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh:
Teaching Information Security Management Using an Incident of Intellectual Property Leakage. ACIS 2020: 36 - [c41]Atif Ahmad, Sean B. Maynard, Sameen Motahhir:
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries. ACIS 2020: 54 - [c40]Atif Ahmad, Kevin C. Desouza, Sean B. Maynard, Monica T. Whitty, James Kotsias, Richard L. Baskerville:
Situation-Awareness in Incident Response: An In-depth Case Study and Process Model. ICIS 2020 - [c39]Chee Kong Wong, Sean B. Maynard, Atif Ahmad, Humza Naseer:
Information Security Governance: A Process Model and Pilot Case Study. ICIS 2020
2010 – 2019
- 2019
- [j20]Atif Ahmad, Jeb Webb, Kevin C. Desouza, James Boorman:
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. Comput. Secur. 86: 402-418 (2019) - [c38]Abhineet Gupta, Sean B. Maynard, Atif Ahmad:
The Dark Web Phenomenon: A Review and Research Agenda. ACIS 2019: 1 - [c37]Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad:
Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls. ACIS 2019: 8 - [c36]Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer:
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices. ACIS 2019: 48 - [c35]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
Dynamic Information Security Management Capability: Strategising for Organisational Performance. ACIS 2019: 72 - [c34]Moneer Alshaikh, Humza Naseer, Atif Ahmad, Sean B. Maynard:
Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness. ECIS 2019 - 2018
- [j19]Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang:
A case analysis of securing organisations against information leakage through online social networking. Int. J. Inf. Manag. 43: 351-356 (2018) - [j18]Sean B. Maynard, Mazino Onibere, Atif Ahmad:
Defining the Strategic Role of the Chief Information Security Officer. Pac. Asia J. Assoc. Inf. Syst. 10(3): 3 (2018) - [j17]Sean B. Maynard, Terrence H. Tan, Atif Ahmad, Tobias Ruighaver:
Towards a Framework for Strategic Security Context in Information Security Governance. Pac. Asia J. Assoc. Inf. Syst. 10(4): 4 (2018) - [c33]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations. ECIS 2018: 72 - [c32]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. HICSS 2018: 1-10 - [c31]Humza Naseer, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach. ICIS 2018 - 2017
- [j16]Craig A. Horne, Sean B. Maynard, Atif Ahmad:
Organisational Information Security Strategy: Review, Discussion and Future Research. Australas. J. Inf. Syst. 21 (2017) - [c30]Sam Pitruzzello, Atif Ahmad, Sean B. Maynard:
A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups. ACIS 2017: 58 - [c29]Humza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard:
Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective. ECIS 2017 - [c28]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study. ICIS 2017 - [c27]Jeb Webb, Atif Ahmad, Sean B. Maynard, Richard L. Baskerville, Graeme G. Shanks:
Organizational Security Learning from Incident Response. ICIS 2017 - [c26]Terrence H. Tan, Sean B. Maynard, Atif Ahmad, Tobias Ruighaver:
Information Security Governance: A Case Study of the Strategic Context of Information Security. PACIS 2017: 43 - [c25]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
The Chief Information Security Officer and the Five Dimensions of a Strategist. PACIS 2017: 77 - [c24]Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations. PACIS 2017: 224 - 2016
- [j15]Piya Shedden, Atif Ahmad, Wally Smith, Heidi Tscherning, Rens Scheepers:
Asset Identification in Information Security Risk Assessment: A Business Practice Approach. Commun. Assoc. Inf. Syst. 39: 15 (2016) - [j14]Xavier Caron, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Comput. Law Secur. Rev. 32(1): 4-15 (2016) - [j13]Jeb Webb, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
Foundations for an Intelligence-driven Information Security Risk-management System. J. Inf. Technol. Theory Appl. 17(3): 3 (2016) - [c23]Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad:
Mitigating BYOD Information Security Risks. ACIS 2016: 8 - [c22]Humza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard:
Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective. ACIS 2016: 61 - [c21]Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach. ACIS 2016: 79 - [c20]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
A Theory on Information Security. ACIS 2016: 87 - [c19]Humza Naseer, Sean B. Maynard, Atif Ahmad:
Business Analytics in Information Security Risk Management: the contingent effect on Security Performance. ECIS 2016: Research-in-Progress Paper 13 - [i4]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Policy: A Management Practice Perspective. CoRR abs/1606.00890 (2016) - [i3]Harry Zurita, Sean B. Maynard, Atif Ahmad:
Evaluating the Utility of Research Articles for Teaching Information Security Management. CoRR abs/1606.01448 (2016) - [i2]Carlos Andres Agudelo, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective. CoRR abs/1606.01450 (2016) - [i1]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions. CoRR abs/1606.03528 (2016) - 2015
- [j12]Mohamed Elyas, Atif Ahmad, Sean B. Maynard, Andrew Lonie:
Digital forensic readiness: Expert perspectives on a theoretical framework. Comput. Secur. 52: 70-89 (2015) - [j11]Sohail Tamaddon, Atif Ahmad, Rachelle Bosua:
Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks. Int. J. Cyber Warf. Terror. 5(2): 1-20 (2015) - [j10]Joo Soon Lim, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Culture: Towards an Instrument for Assessing Security Management Practices. Int. J. Cyber Warf. Terror. 5(2): 31-52 (2015) - [j9]Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
A case analysis of information systems and security incident responses. Int. J. Inf. Manag. 35(6): 717-723 (2015) - [c18]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Policy: A Management Practice Perspective. ACIS 2015: 12 - [c17]Harry Zurita, Sean B. Maynard, Atif Ahmad:
Evaluating the Utility of Research Articles for Teaching Information Security Management. ACIS 2015: 47 - [c16]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions. ACIS 2015: 156 - [c15]Joel Nothman, Atif Ahmad, Christoph F. Breidbach, David Malet, Timothy Baldwin:
Understanding engagement with insurgents through retweet rhetoric. ALTA 2015: 122-127 - [c14]Atif Ahmad, Heidi Tscherning, Rachelle Bosua, Rens Scheepers:
Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model. ICIS 2015 - 2014
- [j8]Jeb Webb, Sean B. Maynard, Atif Ahmad, Graeme G. Shanks:
Information Security Risk Management: An Intelligence-Driven Approach. Australas. J. Inf. Syst. 18(3) (2014) - [j7]Atif Ahmad, Rachelle Bosua, Rens Scheepers:
Protecting organizational competitive advantage: A knowledge leakage perspective. Comput. Secur. 42: 27-39 (2014) - [j6]Jeb Webb, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
A situation awareness model for information security risk management. Comput. Secur. 44: 1-15 (2014) - [j5]Atif Ahmad, Sean B. Maynard:
Teaching information security management: reflections and experiences. Inf. Manag. Comput. Secur. 22(5): 513-536 (2014) - [j4]Mohamed Elyas, Sean B. Maynard, Atif Ahmad, Andrew Lonie:
Towards A Systemic Framework for Digital Forensic Readiness. J. Comput. Inf. Syst. 54(3): 97-105 (2014) - [j3]Atif Ahmad, Sean B. Maynard, Sangseo Park:
Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2): 357-370 (2014) - 2013
- [c13]Jeb Webb, Sean B. Maynard, Atif Ahmad, Graeme G. Shanks:
Towards an Intelligence-Driven Information Security Risk Management Process for Organisations. ACIS 2013: 52 - [c12]Nurul Nuha Abdul Molok, Shanton Chang, Atif Ahmad:
Disclosure of Organizational Information on Social Media: Perspectives from Security Managers. PACIS 2013: 108 - 2012
- [j2]Atif Ahmad, Justin Hadgkiss, Anthonie B. Ruighaver:
Incident response teams - Challenges in supporting the organisational security function. Comput. Secur. 31(5): 643-652 (2012) - [j1]Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang:
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats. Int. J. Cyber Warf. Terror. 2(1): 1-13 (2012) - 2011
- [c11]Piya Shedden, Atif Ahmad, Anthonie B. Ruighaver:
Informal Learning in Security Incident Response Teams. ACIS 2011 - [c10]Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Towards Understanding Deterrence: Information Security Managers' Perspective. ICITCS 2011: 21-37 - [c9]Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang:
Exploring The Use Of Online Social Networking By Employees: Looking At The Potential For Information Leakage. PACIS 2011: 138 - 2010
- [c8]Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang:
Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information. ACIS 2010 - [c7]Joo Soon Lim, Atif Ahmad, Shanton Chang, Sean B. Maynard:
Embedding Information Security Culture Emerging Concerns and Challenges. PACIS 2010: 43 - [c6]C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad:
Information Security Governance: When Compliance Becomes More Important than Security. SEC 2010: 55-67
2000 – 2009
- 2009
- [c5]Piya Shedden, Wally Smith, Rens Scheepers, Atif Ahmad:
Towards a Knowledge Perspective in Information Security Risk Assessments - an Illustrative Case Study. ACIS 2009 - 2005
- [c4]K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Security Governance: Its Impact on Security Culture. AISM 2005: 47-58 - 2004
- [c3]Atif Ahmad, Anthonie B. Ruighaver:
Towards Identifying Criteria for the Evidential Weight of System Event Logs. Australian Computer, Network & Information Forensics Conference 2004: 40-47 - 2003
- [c2]Atif Ahmad, Tobias Ruighaver:
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation. Australian Computer, Network & Information Forensics Conference 2003 - [c1]Tobias Ruighaver, C. C. Terence Tan, Atif Ahmad:
Incident Handling: Where the need for planning is often not recognised. Australian Computer, Network & Information Forensics Conference 2003
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint