Dr Atif Ahmad

  • Room: Level: 10 Room: 10.10
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Information Security Management

Personal webpage

http://people.eng.unimelb.edu.au/atif/home.html

Biography

Dr Atif Ahmad CPP is interested in how organisations practice Information Security Management. Over the last fifteen years Dr Ahmad has developed innovative security practices in strategy, risk, culture, governance, training and policy. He is particularly interested in how organisations can protect their competitively sensitive knowledge from leakage and how they can effectively learn from past security incidents.

Recent publications

  1. Pitruzzello S, Ahmad A, Maynard S. A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups. Australasian Conference on Information Systems. 2017.
  2. Agudelo Serna C, Bosua R, Maynard S, Ahmad A. Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations. Societal Transformation through IS/IT. AISel. 2017.
  3. Tan T, Maynard S, Ahmad A, Ruighaver AB. Information Security Governance: A Case Study of the Strategic Context of Information Security. Pacific Asia Conference on Information Systems. Association for Information Systems. 2017.
  4. Horne C, Maynard S, Ahmad A. Organisational Information Security Strategy: Review, Discussion and Future Research. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS. University of Canberra, School of Information Sciences and Engineering. 2017, Vol. 21. DOI: 10.3127/ajis.v21i0.1427
  5. Webb J, Ahmad A, Maynard S, Baskerville R, Shanks G. Organizational Security Learning from Incident Response. ICIS 2017 Proceedings. Association of Information Systems. 2017.
  6. Agudelo Serna C, Bosua R, Ahmad A, Maynard S. Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study. International Conference on Information Systems. Association for Information Systems. 2017.
  7. Onibere M, Ahmad A, Maynard S. The Chief Information Security Officer and the Five Dimensions of a Strategist. Pacific Asia Conference on Information Systems. 2017.
  8. Naseer H, Shanks G, Ahmad A, Maynard S. TOWARDS AN ANALYTICS-DRIVEN INFORMATION SECURITY RISK MANAGEMENT: A CONTINGENT RESOURCE BASED PERSPECTIVE. European Conference on Information Systems. Association for Information Systems. 2017.
  9. Richardson M, Bosua R, Clark K, Webb J, Ahmad A, Maynard S. Towards responsive regulation of the Internet of Things: Australian perspectives. Internet Policy Review. 2017, Vol. 6, Issue 1. DOI: 10.14763/2017.1.455
  10. Horne C, Ahmad A, Maynard S. A Theory on Information Security. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  11. Shedden P, Ahmad A, Smith M, Tscherning H, Scheepers R. Asset Identification in Information Security Risk Assessment: A Business Practice Approach. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS. Association for Information Systems. 2016, Vol. 39, Issue 1.
  12. Naseer H, Maynard S, Ahmad A. Business analytics in information security risk management: The contingent effect on security performance. 24th European Conference on Information Systems, ECIS 2016. 2016.
  13. Naseer H, Shanks G, Ahmad A, Maynard S. Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  14. Webb J, Ahmad A, Maynard S, Shanks G. Foundations for an Intelligence-driven Information Security Risk-management System. Journal of Information Technology Theory and Application. JITTA. 2016, Vol. 17, Issue 3.
  15. Arregui DA, Maynard S, Ahmad A. Mitigating BYOD Information Secuirty Risks. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile