top of page

Publications

Journal articles refereed

  1. Ahmad, Atif; Maynard, Sean; Motahhir, Sameen; Anderson, Ashley (2021) Case-based learning in the management practice of information security: an innovative pedagogical instrument. Personal and Ubiquitous Computing, Forthcoming

  2. Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui, (2021) Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis, International Journal of Information Management, Volume 59, August, 10 pages. A*

  3. Humza Naseer, Sean B. Maynard, Kevin C. Desouza, (2021).  Demystifying analytical information processing capability: The case of cybersecurity incident response, Decision Support Systems, Volume 143, April, 11 pages. A*

  4. Thompson, Nik; Ahmad, Atif; Maynard, Sean, (2021). Do Privacy Concerns Determine Online Information Disclosure? The case of Internet Addiction, Information and Computer Security, forthcoming.

  5. Ahmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M., & Baskerville, R.L., (2021). Cybersecurity Incident Response in Organizations: An Exploratory Case Study and Process Model of Situation Awareness, Computers & Security. v101, February, pp. 1-22. 

  6. Alshaikh, M., Maynard, S.B., Ahmad, A. (2021) "Applying Social Marketing to Evaluate Current Security Education Training and Awareness Programs in Organisations", Computers & Security, v100, January, pp 1-19.

  7. Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H., and Baskerville, R. (2020). "How Integration of Security Management and Incident Response Enables Organizational Learning", Journal of the Association for Information Science and Technology. Vol. 71 : Iss. 8, pp 939-953. A*

  8. Maynard, Sean B; Tan, Terrence; Ahmad, Atif and Ruighaver, Tobias (2018) "Towards a Framework for Strategic Security Context in Information Security Governance," Pacific Asia Journal of the Association for Information Systems: Vol. 10 : Iss. 4 , Article 4. Available at: https://aisel.aisnet.org/pajais/vol10/iss4/4. 

  9. Maynard, Sean B; Onibere, Mazino; and Ahmad, Atif (2018) "Defining the Strategic Role of the Chief Information Security Officer," Pacific Asia Journal of the Association for Information Systems: Vol. 10 : Iss. 3 , Article 3. 
    Available at: https://aisel.aisnet.org/pajais/vol10/iss3/3

  10. ​Horne, Craig A; Maynard, Sean B; Ahmad, Atif (2017) "Organisational Information Security Strategy: Review, Discussion and Future Research", Australasian Journal of Information Systems v21, 17 pages.

  11. Richardson, M; Bosua, R.; Clark, K.; Webb, J.; Ahmad, A.; Maynard, S. (2017) "Towards responsive regulation of the Internet of Things: Australian Perspectives", Internet Policy Review, 6(1), 13 pages.

  12. Webb, J; Ahmad, A; Maynard, S.B.; Shanks, G. (2016) "Foundations for an Intelligence-Driven Information Security Risk Management System", Journal of Information Technology Theory and Application, 17(3), pp.25-51. 

  13. Richardson, M.; Bosua, R.; Clark, K.; Webb, J.; Ahmad, A.; Maynard, S. (2016) "Privacy and the Internet of Things", Media and Arts Law Review, 21, 336-351.

  14. Carron, X; Bosua, R; Maynard, S.B., Ahmad, A. (2016) "The Internet Of Things And Its Impact On Individual Privacy: An Australian Privacy Principle Perspective", Computer Law & Security Review, 32(1), p 4-15.

  15. Ahmad, A., Maynard, S.B., Shanks, G. (2015) "A Case Analysis of Information Systems and Security Incident Responses", International Journal of Information Management 35(6), 717-723. A*

  16. Cosic, R., Shanks, G. & Maynard,S.B. (2015) "A business analytics capability framework". Australasian Journal of Information Systems, 19, pp. S5-S19

  17. Elyas, M; Ahmad, A; Maynard, S.B., Lonie, A. (2015) “Digital Forensic Readiness: Expert Perspectives on a Theoretical Framework”.  Computers and Security. v52, July, p 70-89.

  18. Lim, Joo Soon; Maynard, S.B.; Ahmad, A; Chang, S. (2015) "Information Security Culture: Towards an Instrument for Assessing Security Management Practices", International Journal of Cyber Warfare and Terrorism. 5(2), 31-52.

  19. Webb, J; Maynard, S.B; Ahmad, A; Shanks, G (2014) "Information Security Risk Management: An Intelligence-Driven Approach". Australasian Journal of Information Systems, 18(3).

  20. Webb, J; Ahmad, A; Maynard, S.B; Shanks, G., (2014), "A Situation Awareness Model for Information Security Risk Management". Computers & Security. Volume 44, July 2014, p 391-404.

  21. Ahmad, A; Maynard, S.B. (2014) "Teaching Information Security Management: Reflections and Experiences", Information Management & Computer Security, 22(5), p 513-536.

  22. Elyas, M; Maynard, SB; Ahmad, A, Lonie, A (2014) "Towards a Systematic Framework for Digital Forensic Readiness", Journal of Computer Information Systems, 54(3), Spring, p 97-105.

  23. Ahmad,A; Maynard, SB; Park, S (2014) "Information Security Strategies: Towards an Organizational Multi-Strategy perspective", Journal of Intelligent Manufacturing, 25 (2), pp 357-370.

  24. Ruighaver, AB; Maynard, SB; Warren, M (2010) "Ethical Decision Making: Improving the Quality of Acceptable Use Policies", Computers and Security, Volume 29, Issue 7, October 2010, Pages 731-736.

  25. Ruighaver,A.B.; Maynard, S.B. and Chang, S. (2007) "Organisational security culture: Extending the end-user perspective". Computers & Security, Volume 26, Issue 1, February 2007, Pages 56-62.

  26. Maynard, S., Burstein, F. and Arnott, D. (2001) "A Multi-faceted Decision Support System Evaluation Approach" Journal of Decision Systems, 10(3-4), pages 395-428.​

Conference papers refereed​

  1. Lakshmi, Ritu; Naseer, Humza; Maynard, Sean; Ahmad, Atif (2021) Sensemaking In Cybersecurity Incident Response: The Interplay of Organizations, Technology, And Individuals. European Conference on Information Systems, Marrakesh, Morocco p. 1-11.

  2. Ahmad, A., Desouza, K., Maynard, S.B., Whitty, M., Kotsias, J., Baskerville, R. (2020) “Situation-Awareness in Incident Response: An In-depth Case Study and Process Model”, International Conference on Information Systems 2020, 9 pages, A*

  3. Wong, CK, Maynard, S.B., Ahmad, A., Naseer, H. (2020) "Information Security Governance: A Process Model and Pilot Case Study”, International Conference on Information Systems 2020, 9 pages, A*

  4. Ahmad, A., Maynard, S. B., Motahhir, S., & Alshaikh, M. (2020). Teaching Information Security Management Using an Incident of Intellectual Property Leakage. Australasian Conference on Information Systems, Wellington NZ, 11 pages.

  5. Ahmad, A., Maynard, S. B., & Motahhir, S. (2021). Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries. Australasian Conference on Information Systems, Wellington NZ, 12 pages.

  6. Alshaikh, M., Maynard, S.B., Ahmad, A. (2020) "Security Education, Training, and Awareness: Incorporating a Social Marketing Approach for Behaviour Change", Communications in Computer and Information Science: ISSA 2020, 19th International Information Security South Africa Conference, 15 pages 

  7. Black, S., Davern, M.J., Maynard, S.B., Naseer, H. (2020). Opportunity or Threat: Board Perspectives on the Secondary Use of Data, 24th Pacific Asia Conference on Information Systems, p. 1-8.

  8. Naseer, H., Maynard, S.B., Xu, J. (2020). Modernizing business analytics capability with DataOps: A decision-making agility perspective, European Conference on Information Systems, Marrakesh, Morocco p. 1-11.

  9. Horne, C. A., Maynard, S. B., & Ahmad, A. (2019). A Theory on Information Security: A Pilot Study. In Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy (Vol. 1) (pp. 1-23).

  10. A Gupta, SB Maynard, A Ahmad (2019). The Dark Web Phenomenon: A Review and Research Agenda. 30th Australasian Conference on Information Systems, Freemantle, Australia 9th-11th December, (pp. 1-11)

  11. H Altukruni, SB Maynard, M Alshaikh, A Ahmad (2019). Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls. 30th Australasian Conference on Information Systems, Freemantle, Australia 9th-11th December, pp 75-85

  12. AH Shah, A Ahmad, SB Maynard, H Naseer (2019). Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices. 30th Australasian Conference on Information Systems, Freemantle, Australia 9th-11th December, pp 449-455

  13. M Onibere, A Ahmad, SB Maynard (2019). Dynamic Information Security Management Capability: Strategising for Organisational Performance. 30th Australasian Conference on Information Systems, Freemantle, Australia 9th-11th December, pp 674-680

  14. Alshaikh, M., Naseer, H., Ahmad, A., & Maynard, S. (2019).Toward Sustainable Behaviour Change: An Approach for Cyber Security Education Training and Awareness. European Conference on Information Systems.  (pp. 1-14).

  15. Naseer, Humza; Ahmad, Atif; Maynard, Sean B; Shanks, Graeme (2018). Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach, International Conference On Information Systems (ICIS), San Francisco, USA, 9 pages (**Nominated for Best Research in Progress Paper**) A*

  16. Agudelo-Serna, C., Bosua, R., Ahmad, A., & Maynard, S. B. (2018). Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations, European Conference on Information Systems, 21 pages.

  17. Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S. (2018). An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. In Proceedings of the 51st Hawaii International Conference on System Sciences, 10 pages.

  18. Naseer, Humza; Shanks, Graeme; Ahmad, Atif; Maynard, Sean (2017) "Towards An Analytics-Driven Information Security Risk Management: A Contingent Resource Based Perspective", European Conference on Information Systems, pp 2645-2655.

  19. Serna, Carlos Andres Agudelo; Bosua, Rachelle; Maynard, Sean; Ahmad, Atif (2017) "Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations", Pacific Asia Conference on Information Systems, 14 pages.

  20. Tan, Terrence; Maynard, Sean; Ahmad, Atif; Ruighaver, Tobias (2017) "Information Security Governance: A Case Study of the Strategic Context of Information Security", Pacific Asia Conference on Information Systems, 14 pages.

  21. Onibere, Mazino; Ahmad, Atif; Maynard, Sean (2017) "The Chief Information Security Officer and the Five Dimensions of a Strategist", Pacific Asia Conference on Information Systems,13 Pages .

  22. Webb, Jeb; Ahmad, Atif; Maynard, Sean; Baskerville, Richard; Shanks, Graeme (2017) "Organizational Security Learning from Incident Response", International Conference On Information Systems (ICIS), 11 pages. A*

  23. Agudelo-Serna, Carlos Andres; Bosua, Rachelle; Ahmad, Atif; Maynard, Sean B (2017) "Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study", International Conference on Information Systems (ICIS), Seoul, South Korea, 19 pages. A*

  24. Pitruzzello, Sam; Ahmad, Atif; Maynard, Sean B (2017) "A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups", Australasian Conference on Information Systems, Hobart, Tasmania, 10 pages.

  25. Arregui, DA; Maynard, S.B.; Ahmad, A. (2016) "Mitigating BYOD Information Security Risks". 27th Australasian Conference on Information Systems, Wollongong, Australia 5th-7th December, 11 pages.

  26. Naseer, H; Shanks, G.; Ahmad, A.; Maynard, S.B. (2016) "Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective". 27th Australasian Conference on Information Systems, Wollongong, Australia 5th-7th December, 12 pages. 

  27. Horne, C.A.; Ahmad, A.; Maynard, S.B. (2016) "A Theory on Information Security". 27th Australasian Conference on Information Systems, Wollongong, Australia 5th-7th December, 12 pages.

  28. Agudelo, C.A.; Bosua, R.; Ahmad, A.; Maynard, S.B. (2016) "Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach". 27th Australasian Conference on Information Systems, Wollongong, Australia 5th-7th December, 12 pages.

  29. Naseer, H; Maynard, S.; Ahmad, A. (2016) "Business Analytics in Information Security Risk Management: The Contingent Effect on Security Performance". 24th European Conference on Information Systems, Istanbul, Turkey, 12-15th June

  30. Zurita, H; Maynard, S.B.; Ahmad, A.(2015) "Evaluating the Utility of Research Articles for Teaching Information Security Management".  The 26th Australasian Conference on Information Systems, Adelaide, Australia. 

  31. Horne, C.A.; Ahmad, A.; Maynard, S.B. (2015) "Information Security Strategy in Organisations: Review, Discussion and Future Research Directions". The 26th Australasian Conference on Information Systems, Adelaide, Australia

  32. Agudelo, C.A.; Bosua, R; Ahmad, A; Maynard, S.B. (2015) "Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective". The 26th Australasian Conference on Information Systems, Adelaide, Australia

  33. Alshaikh, M.; Maynard, S,B.; Ahmad, A. (2015) "Information Security Policy: A Management Practice Perspective". The 26th Australasian Conference on Information Systems, Adelaide, Australia.

  34. Moniruzzaman, M.; Kurnia, S.; Parkes, A.; Maynard, S.B. (2015) "Business Intelligence and Supply Chain Agility". The 26th Australasian Conference on Information Systems, Adelaide, Australia.

  35. Alshaikh, M; Ahmad, A; Maynard, S; Chang, S (2014) Towards a Taxonomy of Information Security Management Practices in Organisations, 25th Australasian Conference on Information Systems, 8th -10th Dec 2014, Auckland, New Zealand, pp 1-11. 

  36. Webb, J; Maynard, S.B; Ahmad, A; Shanks, G (2013) "Towards an Intelligence-Driven Information Security Risk Management Process for Organisations". ACIS 2013, Proceedings of the 24th Australasian Conference on Information Systems 2013, Australasian Conference on Information Systems (24rd : 4-6 Dec, 2013 : Melbourne, Victoria), pp 1-11  ***Best Information Security Management Paper Award***

  37. Chen, H., Maynard S.B. & Ahmad A. (2013). A Comparison of Information Security Curricula in China and the USA. 11th Australian Information Security Management Conference. Churchlands, Australia: Edith Cowan University, 2-4 Dec, 2013, p 21-34. ***Best Paper Award***

  38. Ng, Z.X., Ahmad, A. & Maynard S.B. (2013). Information Security Management: Factors that Influence Security Investments in SME's. 11th Australian Information Security Management Conference. Churchlands, Australia: Edith Cowan University, 2-4 Dec, 2013, p 60-74.

  39. Cosic, R; Shanks, G; Maynard, S (2012) "Towards a business analytics capability maturity model". ACIS 2012 : Location, location, location : Proceedings of the 23rd Australasian Conference on Information Systems 2012, Australasian Conference on Information Systems (23rd : 2012 : Geelong, Victoria), pp 1-11. 

  40. Park, S; Ruighaver, A.B.; Maynard, S.B. and Ahmad, A. (2012), "Towards Understanding Deterrence: Information Security Managers' Perspective". Proceedings of the International Conference on IT Convergence and Security 2011, Suwon, Korea, p 21-37. ***Best Paper Award***

  41. Maynard, S.B.; Ruighaver, A.B. and Ahmad, A. (2011), "Stakeholders in Security Policy Development". Proceedings of the 9th Information Security Management Conference, Perth, Australia: Edith Cowan University, p 182-188. 

  42. Lim, Joo Soon; Ahmad, Atif; Chang, Shanton; and Maynard, Sean (2010), "Embedding Information Security Culture Emerging Concerns and Challenges". PACIS 2010 Proceedings. Paper 43, pages 463-474.

  43. Lim JS, Chang S, Maynard S & Ahmad A. (2009). Exploring the Relationship between Organizational Culture and Information Security Culture. 7th Australian Information Security Management Conference. 88-97. Churchlands, Australia: Edith Cowan University.

  44. Maynard, S.B. and Ruighaver, A.B. (2007) "Security Policy Quality: A Multiple Constituency Perspective". In Assuring Business processes, Proc. of the 6th Annual Security Conference, Ed. G. Dhillon. Washington DC: Global Publishing, USA. 11-12 April 2007, pp 1-14. 

  45. Ruighaver, A.B. and Maynard, S. (2006) "Organizational Security Culture: More Than Just an End-User Phenomenon". Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006), May 22 2006, Karlstad, Sweden, pages 425-430. 

  46. Maynard S. and Ruighaver, A.B. (2006) "What Makes a Good Information Security Policy: A Preliminary Framework for Evaluating Security Policy Quality". 5th Annual Security Conference, Las Vegas, Nevada USA, 19-20 April 2006.

  47. Koh, K., Ruighaver, A.B., Maynard, S., Ahmad, A. (2005) "Security Governance: Its Impact on Security Culture", Proceedings of the 3rd Australian Information Security Management Conference, Perth, Sep 30, 2005, p 47-57. 

  48. Lonie, A; Maynard, S; Ruighaver, T and Wei, D (2005) "A Case Study of Organisational Response to Electronic and Non-electronic Financial Crimes". ACIS 2005 Proceedings, Sydney Nov 30-Dec 5, pp 1-11. 

  49. Maynard, S., and Ruighaver, A.B. (2002) "Evaluating IS Security Policy Development". Third Australian Information Warfare and Security Conference, Perth, Australia, 28-29 November 2002, pp 1-9.

  50. Chia, P. Maynard, S., and Ruighaver, A.B. (2002) "Understanding Organisational Security Culture". Sixth Pacific Asia Conference on Information Systems, Tokyo, Japan, pages 731-740, 2-3 September 2002. 

  51. Chia, P., Maynard, S., and Ruighaver, A.B. (2002) "Exploring Organizational Security Culture: developing a comprehensive research model". IS ONE World Conference, Las Vegas, Nevada USA, 4-5 April 2002, pp 1-13.

  52. Maynard, S., Ruighaver, A.B. and Sandow-Quirk, M. (2002) "Redefining the IS Security Policy". IS ONE World Conference, Las Vegas, Nevada USA, 4-5 April 2002, pp 1-12.

  53. Maynard, S and Ruighaver, A (1999) "An Analysis of IS Security Policy Evaluation" Proceedings of the Tenth Australasian Conference on Information Systems, Wellington, New Zealand, 1-3 December 1999 Pages 577-585

  54. Maynard, S., Arnott, D. and Burstein, F. (1999) "A method For Multiple Criteria Evaluation Of DSS In a multiple-constituency environment" International Society for Decision Support Systems (ISDSS), 5th International Conference, July 1999, Melbourne, Australia, 11 pages

  55. Maynard S., Burstein, F. & Arnott, D.R. (1995) 'DSS Evaluation Criteria: A Multiple Constituency Approach', Proceedings of the 6th Australasian Conference on Information Systems, p699-713.

  56. Maynard S. & Arnott D.R. (1994) 'A Multiple Constituency Approach to Decision Support Systems Evaluation', Proceedings of the Fifth Australasian Conference on Information Systems, pp 1-12. 

  57. O'Donnell P.A., Maynard S. & Grant K.(1991), 'Executive Impressions of a Computerised Logistics Simulation Game', Proceedings of the 8th Annual Conference of the Australian Society for Computers in Learning in Tertiary Education, Launceston, 491-500, 1991.

Research book chapters refereed​

  1. Lim, Joo Soon; Chang, Shanton; Ahmad, Atif; Maynard, Sean (2012) "Towards A Cultural Framework for Information Security Practices". In (Eds.) M. Gupta, J. Walp and R. Sharman, "Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions". IGI Global, p 296-315. 

  2. Chia, P., Maynard, S., and Ruighaver, A.B. (2003) "Understanding Organisational Security Culture" in Information Systems: The Challenges of Theory and Practice, Hunter, M. G. and Dhanda, K. K. (eds), Information Institute, Las Vegas, USA, pages 335 - 365.

  3. Maynard, S., and Ruighaver, A.B. (2003) "Development and Evaluation of Information System Security Policies" in Information Systems: The Challenges of Theory and Practice, Hunter, M. G. and Dhanda, K. K. (eds), Information Institute, Las Vegas, USA, pages 366 - 393.

Un-refereed publications​

  1. CAA Serna, R Bosua, SB Maynard, A Ahmad (2016). Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach, 4TH ANNUAL DOCTORAL COLLOQUIUM

  2. M Onibere, A Ahmad, S Maynard (2016) Information Security Strategy: Beyond Protection, Towards an Organisational Information Security Capability. 4TH ANNUAL DOCTORAL COLLOQUIUM, 65

  3. M Alshaikh, SB Maynard, A Ahmad, S Chang (2016). Information Security Management Practices in Organisations. 4TH ANNUAL DOCTORAL COLLOQUIUM, 52

  4. H Naseer, S Maynard, A Ahmad (2016). Business Analytics in Information Security Risk Management: The Contingent Effect on Security Performance, 4TH ANNUAL DOCTORAL COLLOQUIUM, 59

  5. Ahmad, A; Maynard, S.B.; Chang, S (2015) “Memo to Business: Information Security is not just IT’s Problem”.  The Conversation, 23 March 2015

  6. Elyas, Mohamed; Ahmad, Atif; Maynard, Sean; Lonie, Andrew (2014) "Forensic Readiness: Is Your Organisation Ready?" Digital Forensics Magazine, Issue 18, February. 

  7. Maynard S., Arnott, D. R. & Burstein, F. (1999) 'A Multiple Criteria, Multiple Constituency Approach for DSS Evaluation', Working Paper 2, Department of Information Systems, University of Melbourne (March).

  8. Maynard S., Burstein, F. & Arnott, D.R. (1995) 'DSS Evaluation Criteria: A Multiple Constituency Approach', Working Paper 20/95, Dept of Information Systems, Monash University, Melbourne.

  9. Maynard S.& Arnott, D.R. (1995) 'The Major Constituencies in Decision Support System Development, Use and Evaluation', Working Paper 4/95, Dept of Information Systems, Monash University, Melbourne.

  10. Maynard S. & Arnott, D.R. (1995) 'Decision Support System Evaluation Techniques: A Review', Working Paper 1/95, Dept of Information Systems, Monash University, Melbourne.

  11. Maynard S., O'Donnell P.A. & Furniss A.L. (1992), 'An Information Systems Perspective on the Information Requirements of Logistics Executives', Working Paper 10/92, Dept of Information Systems, Monash University, Melbourne.

Theses

Doctor of Philosophy

Maynard, S.B. (2010) "Strategic Information Security Policy Quality Assessment: A Multiple Constituency Perspective" PhD Thesis, The University of Melbourne. 

Supervisors: Dr. Tobias Ruighaver (The University of Melbourne, retired), Dr. Atif Ahmad (The University of Melbourne

Master of Information Systems

Maynard, S.B. (1997) "A multiple-constituency approach for the evaluation of decision support systems" M.Comp Thesis, Department of Information Systems, Monash University.

Supervisors: Prof David Arnott (Monash University, retired), AProf Frada Burstein (Monash University)


Honours

Maynard, S.B. (1991) "Issues in the Development of Executive Information Systems" B.Comp.(Hons) Thesis, Department of Information Systems, Monash University.

Supervisors: Prof David Arnott (Monash University, retired)

bottom of page