Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective A Ahmad, R Bosua, R Scheepers Computers & Security, 27-39, 2014 | 257 | 2014 |
A Situation Awareness Model for Information Security Risk Management J Webb, A Ahmad, S Maynard, G Shanks Computers & Security 44, 1-15, 2014 | 194 | 2014 |
Incident Response Teams - Challenges in Supporting the Organisational Security Function A Ahmad, J Hadgkiss, AB Ruighaver Computers & Security 31 (5), 643-652, 2012 | 190 | 2012 |
Information Security Strategies: Towards an Organizational Multi-Strategy Perspective A Ahmad, SB Maynard, S Park Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014 | 181 | 2014 |
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective X Caron, R Bosua, SB Maynard, A Ahmad Computer Law & Security Review 32 (1), 4-15, 2016 | 136 | 2016 |
Incorporating a Knowledge Perspective into Security Risk Assessments P Shedden, R Scheepers, W Smith, A Ahmad VINE Journal of Knowledge Management 41 (2), 152-166, 2011 | 104 | 2011 |
A Case Analysis of Information Systems and Security Incident Responses A Ahmad, S Maynard, G Shanks International Journal of Information Management 35 (6), 717-723, 2015 | 101 | 2015 |
Exploring the Relationship between Organizational Culture and Information Security Culture JS Lim, S Chang, S Maynard, A Ahmad Australian Information Security Management Conference, 88-97, 2009 | 87 | 2009 |
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack A Ahmad, J Webb, K Desouza, J Boorman Computers & Security, 2019 | 80 | 2019 |
Embedding Information Security Culture Emerging Concerns and Challenges JS Lim, A Ahmad, S Chang, S Maynard Pacific Asia Conference on Information Systems, 463-474, 2010 | 78 | 2010 |
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats NN Abdul-Molok, S Chang, A Ahmad Information Security Management Conference, 76-88, 2010 | 73* | 2010 |
Risk Management Standards-The Perception of Ease of Use. P Shedden, AB Ruighaver, A Ahmad Journal Of Information System Security 6 (3), 1-19, 2010 | 70 | 2010 |
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework M Elyas, A Ahmad, S Maynard, A Lonie Computers & Security 52, 70-89, 2015 | 59 | 2015 |
Information Security Risk Assessment: Towards a Business Practice Perspective P Shedden, W Smith, A Ahmad Information Security Management Conference, 127-138, 2010 | 59 | 2010 |
Towards a Systemic Framework for Digital Forensic Readiness M Elyas, S Maynard, A Ahmad, A Lonie Journal of Computer Information Systems 54 (3), 97-105, 2014 | 54 | 2014 |
Security Governance: its Impact on Security Culture K Koh, AB Ruighaver, S Maynard, A Ahmad Australian Information Security Management Conference, 1-11, 2005 | 52 | 2005 |
Teaching information security management: reflections and experiences A Ahmad, S Maynard Information Management & Computer Security 22 (5), 513-536, 2014 | 46 | 2014 |
Incident Handling: Where the Need for Planning is Often Not Recognised T Tan, AB Ruighaver, A Ahmad Australian Computer Network, Information & Forensics Conference, 1-10, 2003 | 41 | 2003 |
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations M Alshaikh, SB Maynard, A Ahmad, S Chang Hawaii International Conference on System Sciences, 1-10, 2018 | 39 | 2018 |
Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process P Shedden, A Ahmad, AB Ruighaver Information Security Management Conference, 139-150, 2010 | 39 | 2010 |