Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective A Ahmad, R Bosua, R Scheepers Computers & Security, 27-39, 2014 | 214 | 2014 |
Information Security Strategies: Towards an Organizational Multi-Strategy Perspective A Ahmad, SB Maynard, S Park Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014 | 156 | 2014 |
Incident Response Teams - Challenges in Supporting the Organisational Security Function A Ahmad, J Hadgkiss, AB Ruighaver Computers & Security 31 (5), 643-652, 2012 | 156 | 2012 |
A Situation Awareness Model for Information Security Risk Management J Webb, A Ahmad, S Maynard, G Shanks Computers & Security 44, 1-15, 2014 | 151 | 2014 |
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective X Caron, R Bosua, SB Maynard, A Ahmad Computer Law & Security Review 32 (1), 4-15, 2016 | 99 | 2016 |
Incorporating a Knowledge Perspective into Security Risk Assessments P Shedden, R Scheepers, W Smith, A Ahmad VINE Journal of Knowledge Management 41 (2), 152-166, 2011 | 95 | 2011 |
A Case Analysis of Information Systems and Security Incident Responses A Ahmad, S Maynard, G Shanks International Journal of Information Management 35 (6), 717-723, 2015 | 79 | 2015 |
Exploring the Relationship between Organizational Culture and Information Security Culture JS Lim, S Chang, S Maynard, A Ahmad Australian Information Security Management Conference, 88-97, 2009 | 73 | 2009 |
Embedding Information Security Culture Emerging Concerns and Challenges JS Lim, A Ahmad, S Chang, S Maynard Pacific Asia Conference on Information Systems, 463-474, 2010 | 70 | 2010 |
Risk Management Standards-The Perception of Ease of Use. P Shedden, AB Ruighaver, A Ahmad Journal Of Information System Security 6 (3), 1-19, 2010 | 66 | 2010 |
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats NN Abdul-Molok, S Chang, A Ahmad Information Security Management Conference, 76-88, 2010 | 64* | 2010 |
Information Security Risk Assessment: Towards a Business Practice Perspective P Shedden, W Smith, A Ahmad Information Security Management Conference, 127-138, 2010 | 55 | 2010 |
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework M Elyas, A Ahmad, S Maynard, A Lonie Computers & Security 52, 70-89, 2015 | 49 | 2015 |
Security Governance: its Impact on Security Culture K Koh, AB Ruighaver, S Maynard, A Ahmad Australian Information Security Management Conference, 1-11, 2005 | 47 | 2005 |
Towards a Systemic Framework for Digital Forensic Readiness M Elyas, S Maynard, A Ahmad, A Lonie Journal of Computer Information Systems 54 (3), 97-105, 2014 | 43 | 2014 |
Incident Handling: Where the Need for Planning is Often Not Recognised T Tan, AB Ruighaver, A Ahmad Australian Computer Network, Information & Forensics Conference, 1-10, 2003 | 38 | 2003 |
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack A Ahmad, J Webb, K Desouza, J Boorman Computers & Security, 2019 | 32 | 2019 |
Teaching information security management: reflections and experiences A Ahmad, S Maynard Information Management & Computer Security 22 (5), 513-536, 2014 | 32 | 2014 |
Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process P Shedden, A Ahmad, AB Ruighaver Information Security Management Conference, 139-150, 2010 | 32 | 2010 |
An Information-Centric Approach to Data Security in Organizations A Ahmad, AB Ruighaver, WT Teo TENCON 2005 IEEE Region 10, 1-5, 2005 | 30 | 2005 |