Atif Ahmad
Atif Ahmad
Associate Professor, School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage
Title
Cited by
Cited by
Year
Protecting Organizational Competitive Advantage: A Knowledge Leakage Perspective
A Ahmad, R Bosua, R Scheepers
Computers & Security, 27-39, 2014
2022014
Information Security Strategies: Towards an Organizational Multi-Strategy Perspective
A Ahmad, SB Maynard, S Park
Journal of Intelligent Manufacturing (Special Issue on Cybersecurity) 25 (2 …, 2014
1582014
Incident Response Teams - Challenges in Supporting the Organisational Security Function
A Ahmad, J Hadgkiss, AB Ruighaver
Computers & Security 31 (5), 643-652, 2012
1542012
A Situation Awareness Model for Information Security Risk Management
J Webb, A Ahmad, S Maynard, G Shanks
Computers & Security 44, 1-15, 2014
1462014
The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective
X Caron, R Bosua, SB Maynard, A Ahmad
Computer Law & Security Review 32 (1), 4-15, 2016
922016
Incorporating a Knowledge Perspective into Security Risk Assessments
P Shedden, R Scheepers, W Smith, A Ahmad
VINE Journal of Knowledge Management 41 (2), 152-166, 2011
902011
A Case Analysis of Information Systems and Security Incident Responses
A Ahmad, S Maynard, G Shanks
International Journal of Information Management 35 (6), 717-723, 2015
762015
Exploring the Relationship between Organizational Culture and Information Security Culture
JS Lim, S Chang, S Maynard, A Ahmad
Australian Information Security Management Conference, 88-97, 2009
732009
Embedding Information Security Culture Emerging Concerns and Challenges
JS Lim, A Ahmad, S Chang, S Maynard
Pacific Asia Conference on Information Systems, 463-474, 2010
692010
Risk Management Standards-The Perception of Ease of Use.
P Shedden, AB Ruighaver, A Ahmad
Journal Of Information System Security 6 (3), 1-19, 2010
652010
Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
NN Abdul-Molok, S Chang, A Ahmad
Information Security Management Conference, 76-88, 2010
63*2010
Information Security Risk Assessment: Towards a Business Practice Perspective
P Shedden, W Smith, A Ahmad
Information Security Management Conference, 127-138, 2010
522010
Security Governance: its Impact on Security Culture
K Koh, AB Ruighaver, S Maynard, A Ahmad
Australian Information Security Management Conference, 1-11, 2005
462005
Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework
M Elyas, A Ahmad, S Maynard, A Lonie
Computers & Security 52, 70-89, 2015
422015
Towards a Systemic Framework for Digital Forensic Readiness
M Elyas, S Maynard, A Ahmad, A Lonie
Journal of Computer Information Systems 54 (3), 97-105, 2014
392014
Incident Handling: Where the Need for Planning is Often Not Recognised
T Tan, AB Ruighaver, A Ahmad
Australian Computer Network, Information & Forensics Conference, 1-10, 2003
392003
Teaching information security management: reflections and experiences
A Ahmad, S Maynard
Information Management & Computer Security 22 (5), 513-536, 2014
342014
Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process
P Shedden, A Ahmad, AB Ruighaver
Information Security Management Conference, 139-150, 2010
342010
The Forensic Chain of Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures
A Ahmad
Pacific Asia Conference on Information Systems, 1-5, 2002
302002
An Information-Centric Approach to Data Security in Organizations
A Ahmad, AB Ruighaver, WT Teo
TENCON 2005 IEEE Region 10, 1-5, 2005
292005
The system can't perform the operation now. Try again later.
Articles 1–20