default search action
Sean B. Maynard
Person information
- affiliation: University of Melbourne, School of Computing and Information Systems, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Jia Xu, Humza Naseer, Sean B. Maynard, Justin Filippou:
Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework. Australas. J. Inf. Syst. 28 (2024) - [j28]Humza Naseer, Kevin C. Desouza, Sean B. Maynard, Atif Ahmad:
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. Eur. J. Inf. Syst. 33(2): 200-220 (2024) - [c42]Burkan Hawash, Umi Asma' Mokhtar, Jongkil Jay Jeong, Sean B. Maynard, Zarina Shukur, Siti Norul Huda Sheikh Abdullah, Rozilawati Razali, Joo Soon Lim:
Cyber Situational Awareness in Security Operation Centres. PACIS 2024 - 2023
- [j27]Scott Ainslie, Dean Thompson, Sean B. Maynard, Atif Ahmad:
Cyber-threat intelligence for security decision-making: A review and research agenda for practice. Comput. Secur. 132: 103352 (2023) - [j26]Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui:
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities. Comput. Secur. 135: 103525 (2023) - [j25]Stuart Black, Michael J. Davern, Sean B. Maynard, Humza Naseer:
Data governance and the secondary use of data: The board influence. Inf. Organ. 33(2): 100447 (2023) - [c41]Duy Dang-Pham, Nik Thompson, Atif Ahmad, Sean B. Maynard:
Exploring the Antecedents of Shadow Information Security Practices. ACIS 2023 - [c40]Jia Xu, Humza Naseer, Sean B. Maynard, Justin Filippou:
Managing and Making Sense of Data to Drive Digital Transformation: A Case Study. ICIS 2023 - [i18]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations. CoRR abs/2308.10689 (2023) - [i17]Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations. CoRR abs/2308.10920 (2023) - 2022
- [j24]Atif Ahmad, Sean B. Maynard, Richard L. Baskerville:
Editorial. Comput. Secur. 112: 102530 (2022) - [c39]Ashley O'Neill, Sean B. Maynard, Atif Ahmad, Justin Filippou:
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training. ACIS 2022: 35 - [i16]Jia Xu, Humza Naseer, Sean B. Maynard, Justin Filippou:
Leveraging Data and Analytics for Digital Business Transformation through DataOps: An Information Processing Perspective. CoRR abs/2201.09617 (2022) - [i15]Antra Arshad, Atif Ahmad, Sean B. Maynard:
Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda. CoRR abs/2208.12875 (2022) - [i14]Sean B. Maynard, Atif Ahmad:
Information Security Management in High Quality IS Journals: A Review and Research Agenda. CoRR abs/2208.13087 (2022) - 2021
- [j23]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad:
Applying social marketing to evaluate current security education training and awareness programs in organisations. Comput. Secur. 100: 102090 (2021) - [j22]Atif Ahmad, Sean B. Maynard, Kevin C. Desouza, James Kotsias, Monica T. Whitty, Richard L. Baskerville:
How can organizations develop situation awareness for incident response: A case study of management practice. Comput. Secur. 101: 102122 (2021) - [j21]Humza Naseer, Sean B. Maynard, Kevin C. Desouza:
Demystifying analytical information processing capability: The case of cybersecurity incident response. Decis. Support Syst. 143: 113476 (2021) - [j20]Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui:
Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis. Int. J. Inf. Manag. 59: 102334 (2021) - [j19]Nik Thompson, Atif Ahmad, Sean B. Maynard:
Do privacy concerns determine online information disclosure? The case of internet addiction. Inf. Comput. Secur. 29(3): 558-569 (2021) - [j18]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Ashley Baines Anderson:
Case-based learning in the management practice of information security: an innovative pedagogical instrument. Pers. Ubiquitous Comput. 25(5): 853-877 (2021) - [c38]Jia Xu, Humza Naseer, Sean B. Maynard, Justin Filippou:
Leveraging Data and Analytics for Digital Business Transformation through DataOps: An Information Processing Perspective. ACIS 2021: 54 - [c37]Ritu Lakshmi, Humza Naseer, Sean B. Maynard, Atif Ahmad:
Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals. ECIS 2021 - [i13]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh:
Teaching Information Security Management Using an Incident of Intellectual Property Leakage. CoRR abs/2103.14838 (2021) - [i12]Atif Ahmad, Sean B. Maynard, Sameen Motahhir:
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries. CoRR abs/2103.14839 (2021) - [i11]Abhineet Gupta, Sean B. Maynard, Atif Ahmad:
The Dark Web Phenomenon: A Review and Research Agenda. CoRR abs/2104.07138 (2021) - [i10]Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad:
Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls. CoRR abs/2104.07140 (2021) - [i9]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
Dynamic Information Security Management Capability: Strategising for Organisational Performance. CoRR abs/2104.07141 (2021) - [i8]Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer:
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices. CoRR abs/2104.07144 (2021) - [i7]Ritu Lakshmi, Humza Naseer, Sean B. Maynard, Atif Ahmad:
Sensemaking in Cybersecurity Incident Response: The Interplay of Organizations, Technology and Individuals. CoRR abs/2107.02941 (2021) - [i6]Ashley O'Neill, Atif Ahmad, Sean B. Maynard:
Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training. CoRR abs/2108.04996 (2021) - 2020
- [j17]Atif Ahmad, Kevin C. Desouza, Sean B. Maynard, Humza Naseer, Richard L. Baskerville:
How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 71(8): 939-953 (2020) - [c36]Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh:
Teaching Information Security Management Using an Incident of Intellectual Property Leakage. ACIS 2020: 36 - [c35]Atif Ahmad, Sean B. Maynard, Sameen Motahhir:
Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries. ACIS 2020: 54 - [c34]Humza Naseer, Sean B. Maynard, Jia Xu:
Modernizing business analytics capability with DataOps: A decision-making agility perspective. ECIS 2020 - [c33]Atif Ahmad, Kevin C. Desouza, Sean B. Maynard, Monica T. Whitty, James Kotsias, Richard L. Baskerville:
Situation-Awareness in Incident Response: An In-depth Case Study and Process Model. ICIS 2020 - [c32]Chee Kong Wong, Sean B. Maynard, Atif Ahmad, Humza Naseer:
Information Security Governance: A Process Model and Pilot Case Study. ICIS 2020 - [c31]Stuart Black, Michael J. Davern, Sean B. Maynard, Humza Naseer:
Opportunity or Threat: Board Perspectives on the Secondary Use of Data. PACIS 2020: 112
2010 – 2019
- 2019
- [c30]Abhineet Gupta, Sean B. Maynard, Atif Ahmad:
The Dark Web Phenomenon: A Review and Research Agenda. ACIS 2019: 1 - [c29]Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad:
Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls. ACIS 2019: 8 - [c28]Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer:
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices. ACIS 2019: 48 - [c27]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
Dynamic Information Security Management Capability: Strategising for Organisational Performance. ACIS 2019: 72 - [c26]Moneer Alshaikh, Humza Naseer, Atif Ahmad, Sean B. Maynard:
Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness. ECIS 2019 - 2018
- [j16]Sean B. Maynard, Mazino Onibere, Atif Ahmad:
Defining the Strategic Role of the Chief Information Security Officer. Pac. Asia J. Assoc. Inf. Syst. 10(3): 3 (2018) - [j15]Sean B. Maynard, Terrence H. Tan, Atif Ahmad, Tobias Ruighaver:
Towards a Framework for Strategic Security Context in Information Security Governance. Pac. Asia J. Assoc. Inf. Syst. 10(4): 4 (2018) - [c25]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations. ECIS 2018: 72 - [c24]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. HICSS 2018: 1-10 - [c23]Humza Naseer, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach. ICIS 2018 - 2017
- [j14]Craig A. Horne, Sean B. Maynard, Atif Ahmad:
Organisational Information Security Strategy: Review, Discussion and Future Research. Australas. J. Inf. Syst. 21 (2017) - [c22]Sam Pitruzzello, Atif Ahmad, Sean B. Maynard:
A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups. ACIS 2017: 58 - [c21]Humza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard:
Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective. ECIS 2017 - [c20]Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study. ICIS 2017 - [c19]Jeb Webb, Atif Ahmad, Sean B. Maynard, Richard L. Baskerville, Graeme G. Shanks:
Organizational Security Learning from Incident Response. ICIS 2017 - [c18]Terrence H. Tan, Sean B. Maynard, Atif Ahmad, Tobias Ruighaver:
Information Security Governance: A Case Study of the Strategic Context of Information Security. PACIS 2017: 43 - [c17]Mazino Onibere, Atif Ahmad, Sean B. Maynard:
The Chief Information Security Officer and the Five Dimensions of a Strategist. PACIS 2017: 77 - [c16]Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations. PACIS 2017: 224 - 2016
- [j13]Xavier Caron, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Comput. Law Secur. Rev. 32(1): 4-15 (2016) - [j12]Jeb Webb, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
Foundations for an Intelligence-driven Information Security Risk-management System. J. Inf. Technol. Theory Appl. 17(3): 3 (2016) - [c15]Daniel Alejandro Arregui, Sean B. Maynard, Atif Ahmad:
Mitigating BYOD Information Security Risks. ACIS 2016: 8 - [c14]Humza Naseer, Graeme G. Shanks, Atif Ahmad, Sean B. Maynard:
Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective. ACIS 2016: 61 - [c13]Carlos Andres Agudelo, Rachelle Bosua, Sean B. Maynard, Atif Ahmad:
Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach. ACIS 2016: 79 - [c12]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
A Theory on Information Security. ACIS 2016: 87 - [c11]Humza Naseer, Sean B. Maynard, Atif Ahmad:
Business Analytics in Information Security Risk Management: the contingent effect on Security Performance. ECIS 2016: Research-in-Progress Paper 13 - [i5]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Policy: A Management Practice Perspective. CoRR abs/1606.00890 (2016) - [i4]Harry Zurita, Sean B. Maynard, Atif Ahmad:
Evaluating the Utility of Research Articles for Teaching Information Security Management. CoRR abs/1606.01448 (2016) - [i3]Carlos Andres Agudelo, Rachelle Bosua, Atif Ahmad, Sean B. Maynard:
Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective. CoRR abs/1606.01450 (2016) - [i2]Mohammad Moniruzzaman, Sherah Kurnia, Alison Parkes, Sean B. Maynard:
Business Intelligence and Supply Chain Agility. CoRR abs/1606.03511 (2016) - [i1]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions. CoRR abs/1606.03528 (2016) - 2015
- [j11]Ranko Cosic, Graeme G. Shanks, Sean B. Maynard:
A business analytics capability framework. Australas. J. Inf. Syst. 19 (2015) - [j10]Mohamed Elyas, Atif Ahmad, Sean B. Maynard, Andrew Lonie:
Digital forensic readiness: Expert perspectives on a theoretical framework. Comput. Secur. 52: 70-89 (2015) - [j9]Joo Soon Lim, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Culture: Towards an Instrument for Assessing Security Management Practices. Int. J. Cyber Warf. Terror. 5(2): 31-52 (2015) - [j8]Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
A case analysis of information systems and security incident responses. Int. J. Inf. Manag. 35(6): 717-723 (2015) - [c10]Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang:
Information Security Policy: A Management Practice Perspective. ACIS 2015: 12 - [c9]Harry Zurita, Sean B. Maynard, Atif Ahmad:
Evaluating the Utility of Research Articles for Teaching Information Security Management. ACIS 2015: 47 - [c8]Craig A. Horne, Atif Ahmad, Sean B. Maynard:
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions. ACIS 2015: 156 - 2014
- [j7]Jeb Webb, Sean B. Maynard, Atif Ahmad, Graeme G. Shanks:
Information Security Risk Management: An Intelligence-Driven Approach. Australas. J. Inf. Syst. 18(3) (2014) - [j6]Jeb Webb, Atif Ahmad, Sean B. Maynard, Graeme G. Shanks:
A situation awareness model for information security risk management. Comput. Secur. 44: 1-15 (2014) - [j5]Atif Ahmad, Sean B. Maynard:
Teaching information security management: reflections and experiences. Inf. Manag. Comput. Secur. 22(5): 513-536 (2014) - [j4]Mohamed Elyas, Sean B. Maynard, Atif Ahmad, Andrew Lonie:
Towards A Systemic Framework for Digital Forensic Readiness. J. Comput. Inf. Syst. 54(3): 97-105 (2014) - [j3]Atif Ahmad, Sean B. Maynard, Sangseo Park:
Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2): 357-370 (2014) - 2013
- [c7]Jeb Webb, Sean B. Maynard, Atif Ahmad, Graeme G. Shanks:
Towards an Intelligence-Driven Information Security Risk Management Process for Organisations. ACIS 2013: 52 - 2012
- [c6]Ranko Cosic, Graeme G. Shanks, Sean B. Maynard:
Towards a Business Analytics Capability Maturity Model. ACIS 2012 - 2011
- [c5]Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Towards Understanding Deterrence: Information Security Managers' Perspective. ICITCS 2011: 21-37 - 2010
- [j2]Anthonie B. Ruighaver, Sean B. Maynard, Matthew J. Warren:
Ethical decision making: Improving the quality of acceptable use policies. Comput. Secur. 29(7): 731-736 (2010) - [c4]Joo Soon Lim, Atif Ahmad, Shanton Chang, Sean B. Maynard:
Embedding Information Security Culture Emerging Concerns and Challenges. PACIS 2010: 43
2000 – 2009
- 2007
- [j1]Anthonie B. Ruighaver, Sean B. Maynard, Shanton Chang:
Organisational security culture: Extending the end-user perspective. Comput. Secur. 26(1): 56-62 (2007) - 2006
- [c3]Anthonie B. Ruighaver, Sean B. Maynard:
Organizational Security Culture: More Than Just an End-User Phenomenon. SEC 2006: 425-430 - 2005
- [c2]Andrew Lonie, Sean B. Maynard, Tobias Ruighaver, David Wei:
A Case Study of Organisational Response to Electronic and Non-electronic Financial Crimes. ACIS 2005 - [c1]K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Security Governance: Its Impact on Security Culture. AISM 2005: 47-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint