Atif Ahmad
Atif Ahmad
Associate Professor, School of Computing and Information Systems, University of Melbourne
Verified email at - Homepage
Cited by
Cited by
Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective
A Ahmad, R Bosua, R Scheepers
Computers & Security, 27-39, 2014
A Situation Awareness Model for Information Security Risk Management
J Webb, A Ahmad, S Maynard, G Shanks
Computers & Security 44, 1-15, 2014
Incident Response Teams - Challenges in Supporting the Organisational Security Function
A Ahmad, J Hadgkiss, AB Ruighaver
Computers & Security 31 (5), 643-652, 2012
Information Security Strategies: Towards an Organizational Multi-Strategy Perspective
A Ahmad, SB Maynard, S Park
Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective
X Caron, R Bosua, SB Maynard, A Ahmad
Computer Law & Security Review 32 (1), 4-15, 2016
Incorporating a Knowledge Perspective into Security Risk Assessments
P Shedden, R Scheepers, W Smith, A Ahmad
VINE Journal of Knowledge Management 41 (2), 152-166, 2011
A Case Analysis of Information Systems and Security Incident Responses
A Ahmad, S Maynard, G Shanks
International Journal of Information Management 35 (6), 717-723, 2015
Exploring the Relationship between Organizational Culture and Information Security Culture
JS Lim, S Chang, S Maynard, A Ahmad
Australian Information Security Management Conference, 88-97, 2009
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack
A Ahmad, J Webb, K Desouza, J Boorman
Computers & Security, 2019
Embedding Information Security Culture Emerging Concerns and Challenges
JS Lim, A Ahmad, S Chang, S Maynard
Pacific Asia Conference on Information Systems, 463-474, 2010
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
NN Abdul-Molok, S Chang, A Ahmad
Information Security Management Conference, 76-88, 2010
Risk Management Standards-The Perception of Ease of Use.
P Shedden, AB Ruighaver, A Ahmad
Journal Of Information System Security 6 (3), 1-19, 2010
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework
M Elyas, A Ahmad, S Maynard, A Lonie
Computers & Security 52, 70-89, 2015
Information Security Risk Assessment: Towards a Business Practice Perspective
P Shedden, W Smith, A Ahmad
Information Security Management Conference, 127-138, 2010
Towards a Systemic Framework for Digital Forensic Readiness
M Elyas, S Maynard, A Ahmad, A Lonie
Journal of Computer Information Systems 54 (3), 97-105, 2014
Security Governance: its Impact on Security Culture
K Koh, AB Ruighaver, S Maynard, A Ahmad
Australian Information Security Management Conference, 1-11, 2005
Teaching information security management: reflections and experiences
A Ahmad, S Maynard
Information Management & Computer Security 22 (5), 513-536, 2014
Incident Handling: Where the Need for Planning is Often Not Recognised
T Tan, AB Ruighaver, A Ahmad
Australian Computer Network, Information & Forensics Conference, 1-10, 2003
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations
M Alshaikh, SB Maynard, A Ahmad, S Chang
Hawaii International Conference on System Sciences, 1-10, 2018
Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process
P Shedden, A Ahmad, AB Ruighaver
Information Security Management Conference, 139-150, 2010
The system can't perform the operation now. Try again later.
Articles 1–20