Atif Ahmad
Atif Ahmad
School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage
TitleCited byYear
Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective
A Ahmad, R Bosua, R Scheepers
Computers & Security, 27-39, 2014
1612014
Incident Response Teams - Challenges in Supporting the Organisational Security Function
A Ahmad, J Hadgkiss, AB Ruighaver
Computers & Security 31 (5), 643-652, 2012
1372012
Information security strategies: towards an organizational multi-strategy perspective
A Ahmad, SB Maynard, S Park
Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014
1282014
A Situation Awareness Model for Information Security Risk Management
J Webb, A Ahmad, S Maynard, G Shanks
Computers & Security 44, 1-15, 2014
1192014
Incorporating a Knowledge Perspective into Security Risk Assessments
P Shedden, R Scheepers, W Smith, A Ahmad
VINE Journal of Knowledge Management 41 (2), 152-166, 2011
812011
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective
X Caron, R Bosua, SB Maynard, A Ahmad
Computer Law & Security Review 32 (1), 4-15, 2016
682016
Exploring the Relationship between Organizational Culture and Information Security Culture
JS Lim, S Chang, S Maynard, A Ahmad
Australian Information Security Management Conference, 88-97, 2009
662009
A Case Analysis of Information Systems and Security Incident Responses
A Ahmad, S Maynard, G Shanks
International Journal of Information Management 35 (6), 717-723, 2015
622015
Embedding Information Security Culture Emerging Concerns and Challenges
JS Lim, A Ahmad, S Chang, S Maynard
Pacific Asia Conference on Information Systems, 463-474, 2010
602010
Risk Management Standards-The Perception of Ease of Use.
P Shedden, AB Ruighaver, A Ahmad
Journal Of Information System Security 6 (3), 1-19, 2010
59*2010
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
NN Abdul-Molok, S Chang, A Ahmad
Information Security Management Conference, 76-88, 2010
56*2010
Information Security Risk Assessment: Towards a Business Practice Perspective
P Shedden, W Smith, A Ahmad
Information Security Management Conference, 127-138, 2010
452010
Security Governance: its Impact on Security Culture
K Koh, AB Ruighaver, S Maynard, A Ahmad
Australian Information Security Management Conference, 1-11, 2005
412005
Incident Handling: Where the Need for Planning is Often Not Recognised
T Tan, AB Ruighaver, A Ahmad
Australian Computer Network, Information & Forensics Conference, 1-10, 2003
372003
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework
M Elyas, A Ahmad, S Maynard, A Lonie
Computers & Security 52, 70-89, 2015
322015
Teaching information security management: reflections and experiences
A Ahmad, S Maynard
Information Management & Computer Security 22 (5), 513-536, 2014
322014
Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process
P Shedden, A Ahmad, AB Ruighaver
Information Security Management Conference, 139-150, 2010
322010
Towards a Systemic Framework for Digital Forensic Readiness
M Elyas, S Maynard, A Ahmad, A Lonie
Journal of Computer Information Systems 54 (3), 97-105, 2014
312014
An Information-Centric Approach to Data Security in Organizations
A Ahmad, AB Ruighaver, WT Teo
TENCON 2005 IEEE Region 10, 1-5, 2005
292005
Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information
NN Abdul-Molok, A Ahmad, S Chang
Australasian Conference on Information Systems, 1-11, 2010
272010
The system can't perform the operation now. Try again later.
Articles 1–20