Skip to main content

Showing 1–13 of 13 results for author: Maynard, S B

  1. arXiv:2308.10920  [pdf

    cs.CY

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad

    Abstract: Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$\$$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$\$$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: Pages 14. arXiv admin note: text overlap with arXiv:1606.01450

    Journal ref: PACIS 2017 Proceedings. 224 http://aisel.aisnet.org/pacis2017/224

  2. arXiv:2308.10689  [pdf

    cs.CY cs.SI

    Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

    Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard

    Abstract: The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls while neglecting human factors… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 22 pages, ECIS full paper 2018

    Journal ref: Research Papers. 72 (2018) https://aisel.aisnet.org/ecis2018_rp/72

  3. arXiv:2104.07144  [pdf

    cs.CR

    Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices

    Authors: Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer

    Abstract: In this short paper we argue that to combat APTs, organizations need a strategic level shift away from a traditional prevention centered approach to that of a response centered one. Drawing on the information warfare (IW) paradigm in military studies, and using Dynamic Capability Theory (DCT), this research examines the applicability of IW capabilities in the corporate domain. We propose a researc… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 8 pages

    Journal ref: ACIS, Perth, Australia. (pp. 449-455) 2019

  4. arXiv:2104.07141  [pdf

    cs.CR

    Dynamic Information Security Management Capability: Strategising for Organisational Performance

    Authors: Mazino Onibere, Atif Ahmad, Sean B Maynard

    Abstract: The increasing frequency, impact, consequence and sophistication of cybersecurity attacks is becoming a strategic concern for boards and executive management of organisations. Consequently, in addition to focusing on productivity and performance, organisations are prioritizing Information Security Management (ISM). However, research has revealed little or no conceptualisation of a dynamic ISM capa… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 7 pages

    Journal ref: ACIS, Perth, Australia. (pp. 674-680) 2019

  5. arXiv:2104.07140  [pdf

    cs.CR

    Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls

    Authors: Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad

    Abstract: Knowledge leakage poses a critical risk to the competitive advantage of knowledge-intensive organisations. Although knowledge leakage is a human-centric security issue, little is known about leakage resulting from individual behaviour and the protective strategies and controls that could be effective in mitigating leakage risk. Therefore, this research explores the perspectives of security practit… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages

    Journal ref: ACIS, Perth, Australia. (pp. 75-85) 2019

  6. arXiv:2104.07138  [pdf

    cs.CR

    The Dark Web Phenomenon: A Review and Research Agenda

    Authors: Abhineet Gupta, Sean B Maynard, Atif Ahmad

    Abstract: The internet can be broadly divided into three parts: surface, deep and dark. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. This review investigates how the dark web is being utilised with an emphasis on cybercrime, and how law enforcement plays the role of its adversary. The review describes these hidden spaces… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages, Paper presented at the 30th Australasian Conference on Information Systems, Perth, Australia (2019)

  7. arXiv:2103.14839  [pdf

    cs.CR

    Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries

    Authors: Atif Ahmad, Sean B. Maynard, Sameen Motahhir

    Abstract: Teaching cases based on stories about real organizations are a powerful means of storytelling. These cases closely parallel real-world situations and can deliver on pedagogical objectives as writers can use their creative license to craft a storyline that better focuses on the specific principles, concepts, and challenges they want to address in their teaching. The method instigates critical discu… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Journal ref: Australasian Conference on Information Systems, Wellington, 2020, pp. 1-12

  8. arXiv:2103.14838  [pdf

    cs.CR

    Teaching Information Security Management Using an Incident of Intellectual Property Leakage

    Authors: Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh

    Abstract: Case-based learning is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems. The real-world case is described in a legal ind… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Comments: 11 pages

    Journal ref: Australasian Conference on Information Systems, Wellington, 2020, pp. 1-11

  9. arXiv:1606.03528  [pdf

    cs.CY cs.CR

    Information Security Strategy in Organisations: Review, Discussion and Future Research Directions

    Authors: Craig A. Horne, Atif Ahmad, Sean B. Maynard

    Abstract: Dependence on information, including for some of the world's largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences continue to indicate that attacks are still escalating on organisations when conducting these information-based activities. Clearly, more researc… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/209

  10. arXiv:1606.03511  [pdf

    cs.CY

    Business Intelligence and Supply Chain Agility

    Authors: Mohammad Moniruzzaman, Sherah Kurnia, Alison Parkes, Sean B. Maynard

    Abstract: Supply Chain Agility is important for organisations to stay competitive in today's dynamic business environment. There is increasing interest in deploying Business Intelligence (BI) in the Supply Chain Management (SCM) context to improve Supply Chain (SC) Agility. However, there is limited research exploring BI contributions to SC Agility. In this research-in-progress paper we propose a model base… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: Research-in-progress ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/204

  11. arXiv:1606.01450  [pdf

    cs.CY

    Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective

    Authors: Carlos Andres Agudelo, Rachelle Bosua, Atif Ahmad, Sean B. Maynard

    Abstract: Knowledge sharing drives innovation and the opportunity to develop a sustainable competitive advantage. However, in the extant knowledge management and information security literature, leakage from sharing activities is neglected. The risk of knowledge leakage is exacerbated with the pervasive use of mobile devices and the adoption of BYOD (Bring Your Own Device). Thus, this research-in-progress p… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: Research-in-progress ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/146

  12. arXiv:1606.01448  [pdf

    cs.CY cs.CR

    Evaluating the Utility of Research Articles for Teaching Information Security Management

    Authors: Harry Zurita, Sean B. Maynard, Atif Ahmad

    Abstract: Research articles can support teaching by introducing the latest expert thinking on relevant topics and trends and describing practical real-world case studies to encourage discussion and analysis. However, from the point of view of the instructor, a common challenge is identifying the most suitable papers for classroom teaching amongst a very large pool of potential candidates that are not typica… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/143

  13. arXiv:1606.00890  [pdf

    cs.CY cs.CR

    Information Security Policy: A Management Practice Perspective

    Authors: Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang

    Abstract: Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security policy a… ▽ More

    Submitted 27 May, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/49