Dr Atif Ahmad CPP is interested in how organisations practice Information Security Management. Over the last fifteen years Dr Ahmad has developed innovative security practices in strategy, risk, culture, governance, training and policy.
He is particularly interested in how organisations can protect their competitively sensitive knowledge from leakage and how they can effectively learn from past security incidents.
Find out more about Atif Ahmad's experience
Atif Ahmad's highlights
Atif Ahmad's selected work
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and R..
Executive Learning In Cyber Security: Video-Enhanced Storytelling For Online Education
Displaying the 11 most recent projects by Atif Ahmad.
Internal Research Grant
Displaying the 93 most recent scholarly works by Atif Ahmad.
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT)
Kevin C Desouza, Atif Ahmad, Humza Naseer, Munish Sharma
Journal article | 2020 | Computers & Security
Information systems continue to be used by actors who want to undermine public institutions and disrupt political systems. In rece..
How integration of cyber security management and incident response enables organizational learning
Atif Ahmad, Kevin C Desouza, Sean B Maynard, Humza Naseer, Richard L Baskerville
Journal article | 2019 | Journal of the Association for Information Science and Technology
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, th..
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack
Atif Ahmad, Jeb Webb, Kevin C Desouza, James Boorman
Journal article | 2019 | Computers & Security
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refe..
Toward Sustainable Behaviour Change: An Approach for Cyber Security Education Training and Awareness
M Alshaikh, Humza Naseer, Atif Ahmad, Sean B Maynard
Conference Proceedings | 2019 | ECIS 2019
Effective information security education, training and awareness (SETA) is essential for protecting organisational information res..
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations
M alshaikh, S Maynard, A Ahmad, S Chang
Conference Proceedings | 2018
Effective information security training and awareness (ISTA) is essential to protect organizational information resources. Our rev..
Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach
Humza Naseer, A Ahmad, Sean Maynard, Graeme Shanks
Conference Proceedings | 2018 | International Conference on Information Systems 2018, ICIS 2018
The modern enterprise uses risk-driven and control-centered security management systems to protect information resources and susta..
Towards Responsive Regulation of the Internet of Things: Australian Perspectives
M Richardson, R Bosua, K Clark, J Webb, A Ahmad, S Maynard
Journal article | 2017 | Internet Policy Review
The Internet of Things (IoT) is considered to be one of the most significant disruptive technologies of modern times, and promises..
Information Security Governance: A Case Study of the Strategic Context of Information Security
TERRENCE Tan, S Maynard, A Ahmad, undefined Ruighaver
Conference Proceedings | 2017
Security governance influences the quality of strategic decision-making towards ensuring that investments in security are not wast..
The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective
X Caron, R Bosua, SB Maynard, A Ahmad
Journal article | 2016 | Computer Law & Security Review
© 2015 Rachelle Bosua. The Internet of Things (IoT) heralds a new era of computing whereby every imaginable object is equipped wit..
Business analytics in information security risk management: The contingent effect on security performance
H Naseer, S Maynard, A Ahmad
Conference Proceedings | 2016 | 24th European Conference on Information Systems, ECIS 2016
The process of information security risk management (ISRM) enables an organization to not only identify risks specific to its info..
Displaying the 2 most recent news articles by Atif Ahmad.
Computing And Information Systems
Certified Protection Professional
American Society for Industrial Security
University of Melbourne
Bachelor of Science/Bachelor of Engineering
University of Melbourne