Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference59 articles.
1. Abdul Molok, Nurul Nuha, Atif Ahmad, and Shanton Chang. 2018. A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management 43: 351–356. https://doi.org/10.1016/j.ijinfomgt.2018.08.013.
2. Agudelo-Serna, Carlos Andres, Rachelle Bosua, Atif Ahmad, and Sean B. Maynard. 2015. Understanding knowledge leakage & BYOD ( Bring your own device): A Mobile Worker Perspective. The 26th Australasian Conference on Information Systems.
3. Ahmad, Atif, Kevin C. Desouza, Sean B. Maynard, Humza Naseer, and Richard L. Baskerville. 2019. How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology:1–14.
4. Alshaikh, Moneer, Atif Ahmad, Sean B. Maynard, and Shanton Chang. 2014. Towards a taxonomy of information security management practices in organisations. 25th Australasian Conference on Information Systems, Auckland, New Zealand, 8–10 December.
5. Alshaikh, M., S. B. Maynard, A. Ahmad, and S. Chang. 2018. An Exploratory study of current information security training and awareness practices in organizations. Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献