Skip to main content

Showing 1–20 of 20 results for author: Maynard, S

.
  1. Steps Towards Satisficing Distributed Dynamic Team Trust

    Authors: Edmund R. Hunt, Chris Baber, Mehdi Sobhani, Sanja Milivojevic, Sagir Yusuf, Mirco Musolesi, Patrick Waterson, Sally Maynard

    Abstract: Defining and measuring trust in dynamic, multiagent teams is important in a range of contexts, particularly in defense and security domains. Team members should be trusted to work towards agreed goals and in accordance with shared values. In this paper, our concern is with the definition of goals and values such that it is possible to define 'trust' in a way that is interpretable, and hence usable… ▽ More

    Submitted 4 November, 2023; v1 submitted 11 September, 2023; originally announced September 2023.

  2. arXiv:2308.10920  [pdf

    cs.CY

    Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

    Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Sean B. Maynard, Atif Ahmad

    Abstract: Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US$\$$2.8 million. Furthermore, Australian organisations spend the second most worldwide (US$\$$1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: Pages 14. arXiv admin note: text overlap with arXiv:1606.01450

    Journal ref: PACIS 2017 Proceedings. 224 http://aisel.aisnet.org/pacis2017/224

  3. arXiv:2308.10689  [pdf

    cs.CY cs.SI

    Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

    Authors: Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard

    Abstract: The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls while neglecting human factors… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 22 pages, ECIS full paper 2018

    Journal ref: Research Papers. 72 (2018) https://aisel.aisnet.org/ecis2018_rp/72

  4. Spin vectors in the Koronis family: IV. Completing the sample of its largest members after 35 years of study

    Authors: Stephen M. Slivan, Matthew Hosek Jr., Max Kurzner, Alyssa Sokol, Sarah Maynard, Anna V. Payne, Arden Radford, Alessondra Springmann, Richard P. Binzel, Francis P. Wilkin, Emily A. Mailhot, Alan H. Midkiff, April Russell, Robert D. Stephens, Vincent Gardiner, Daniel E. Reichart, Joshua Haislip, Aaron LaCluyze, Raoul Behrend, René Roy

    Abstract: An observational study of Koronis family members' spin properties was undertaken with two primary objectives: to reduce selection biases for object rotation period and lightcurve amplitude in the sample of members' known spin vectors, and to better constrain future modeling of spin properties evolution. Here we report rotation lightcurves of nineteen Koronis family members, and derived results tha… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: 49 pages, 29 figures, accepted for publication in Icarus

  5. arXiv:2208.13087  [pdf

    cs.CR

    Information Security Management in High Quality IS Journals: A Review and Research Agenda

    Authors: Sean Maynard, Atif Ahmad

    Abstract: In the digital age, the protection of information resources is critical to the viability of organizations. Information Security Management (ISM) is a protective function that preserves the confidentiality, integrity and availability of information resources in organizations operating in a complex and evolving security threat landscape. This paper analyses ISM research themes, methods, and theories… ▽ More

    Submitted 27 August, 2022; originally announced August 2022.

  6. arXiv:2208.12875  [pdf

    cs.CR cs.CY

    Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda

    Authors: Antra Arshad, Atif Ahmad, Sean Maynard

    Abstract: IT security outsourcing is the process of contracting a third-party security service provider to perform, the full or partial IT security functions of an organization. Little is known about the factors influencing organizational decisions in outsourcing such a critical function. Our review of the research and practice literature identified several managerial factors and legal factors. We found res… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

  7. arXiv:2201.09617  [pdf

    cs.CY

    Leveraging Data and Analytics for Digital Business Transformation through DataOps: An Information Processing Perspective

    Authors: Jia Xu, Humza Naseer, Sean Maynard, Justin Fillipou

    Abstract: Digital business transformation has become increasingly important for organizations. Since transforming business digitally is an ongoing process, it requires an integrated and disciplined approach. Data Operations (DataOps), emerging in practice, can provide organizations with such an approach to leverage data and analytics for digital business transformation. This paper proposes a framework that… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Australasian Conference on Information Systems, Sydney, Dec 2021

  8. arXiv:2108.04996  [pdf

    cs.CR

    Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training

    Authors: Ashley O'Neill, Atif Ahmad, Sean Maynard

    Abstract: Cybersecurity incident response teams mitigate the impact of adverse cyber-related events in organisations. Field studies of IR teams suggest that at present the process of IR is under-developed with a focus on the technological dimension with little consideration of practice capability. To address this gap, we develop a scenario-based training approach to assist organisations to overcome socio-te… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

    Comments: 11 pages

  9. arXiv:2107.02941  [pdf

    cs.CR cs.CY

    Sensemaking in Cybersecurity Incident Response: The Interplay of Organizations, Technology and Individuals

    Authors: Ritu Lakshmi, Humza Naseer, Sean Maynard, Atif Ahmad

    Abstract: Sensemaking is a critical activity in organizations. It is a process through which individuals ascribe meanings to events which forms the basis to facilitate collective action. However, the role of organizations, technology and individuals and their interaction in the process of sensemaking has not been sufficiently explored. This novel study seeks to address this gap by proposing a framework that… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

    Comments: 11 pages

  10. arXiv:2104.07144  [pdf

    cs.CR

    Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices

    Authors: Abid Hussain Shah, Atif Ahmad, Sean B. Maynard, Humza Naseer

    Abstract: In this short paper we argue that to combat APTs, organizations need a strategic level shift away from a traditional prevention centered approach to that of a response centered one. Drawing on the information warfare (IW) paradigm in military studies, and using Dynamic Capability Theory (DCT), this research examines the applicability of IW capabilities in the corporate domain. We propose a researc… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 8 pages

    Journal ref: ACIS, Perth, Australia. (pp. 449-455) 2019

  11. arXiv:2104.07141  [pdf

    cs.CR

    Dynamic Information Security Management Capability: Strategising for Organisational Performance

    Authors: Mazino Onibere, Atif Ahmad, Sean B Maynard

    Abstract: The increasing frequency, impact, consequence and sophistication of cybersecurity attacks is becoming a strategic concern for boards and executive management of organisations. Consequently, in addition to focusing on productivity and performance, organisations are prioritizing Information Security Management (ISM). However, research has revealed little or no conceptualisation of a dynamic ISM capa… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 7 pages

    Journal ref: ACIS, Perth, Australia. (pp. 674-680) 2019

  12. arXiv:2104.07140  [pdf

    cs.CR

    Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls

    Authors: Hibah Altukruni, Sean B. Maynard, Moneer Alshaikh, Atif Ahmad

    Abstract: Knowledge leakage poses a critical risk to the competitive advantage of knowledge-intensive organisations. Although knowledge leakage is a human-centric security issue, little is known about leakage resulting from individual behaviour and the protective strategies and controls that could be effective in mitigating leakage risk. Therefore, this research explores the perspectives of security practit… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages

    Journal ref: ACIS, Perth, Australia. (pp. 75-85) 2019

  13. arXiv:2104.07138  [pdf

    cs.CR

    The Dark Web Phenomenon: A Review and Research Agenda

    Authors: Abhineet Gupta, Sean B Maynard, Atif Ahmad

    Abstract: The internet can be broadly divided into three parts: surface, deep and dark. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. This review investigates how the dark web is being utilised with an emphasis on cybercrime, and how law enforcement plays the role of its adversary. The review describes these hidden spaces… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages, Paper presented at the 30th Australasian Conference on Information Systems, Perth, Australia (2019)

  14. arXiv:2103.14839  [pdf

    cs.CR

    Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries

    Authors: Atif Ahmad, Sean B. Maynard, Sameen Motahhir

    Abstract: Teaching cases based on stories about real organizations are a powerful means of storytelling. These cases closely parallel real-world situations and can deliver on pedagogical objectives as writers can use their creative license to craft a storyline that better focuses on the specific principles, concepts, and challenges they want to address in their teaching. The method instigates critical discu… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Journal ref: Australasian Conference on Information Systems, Wellington, 2020, pp. 1-12

  15. arXiv:2103.14838  [pdf

    cs.CR

    Teaching Information Security Management Using an Incident of Intellectual Property Leakage

    Authors: Atif Ahmad, Sean B. Maynard, Sameen Motahhir, Moneer Alshaikh

    Abstract: Case-based learning is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems. The real-world case is described in a legal ind… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Comments: 11 pages

    Journal ref: Australasian Conference on Information Systems, Wellington, 2020, pp. 1-11

  16. arXiv:1606.03528  [pdf

    cs.CY cs.CR

    Information Security Strategy in Organisations: Review, Discussion and Future Research Directions

    Authors: Craig A. Horne, Atif Ahmad, Sean B. Maynard

    Abstract: Dependence on information, including for some of the world's largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences continue to indicate that attacks are still escalating on organisations when conducting these information-based activities. Clearly, more researc… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/209

  17. arXiv:1606.03511  [pdf

    cs.CY

    Business Intelligence and Supply Chain Agility

    Authors: Mohammad Moniruzzaman, Sherah Kurnia, Alison Parkes, Sean B. Maynard

    Abstract: Supply Chain Agility is important for organisations to stay competitive in today's dynamic business environment. There is increasing interest in deploying Business Intelligence (BI) in the Supply Chain Management (SCM) context to improve Supply Chain (SC) Agility. However, there is limited research exploring BI contributions to SC Agility. In this research-in-progress paper we propose a model base… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: Research-in-progress ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/204

  18. arXiv:1606.01450  [pdf

    cs.CY

    Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective

    Authors: Carlos Andres Agudelo, Rachelle Bosua, Atif Ahmad, Sean B. Maynard

    Abstract: Knowledge sharing drives innovation and the opportunity to develop a sustainable competitive advantage. However, in the extant knowledge management and information security literature, leakage from sharing activities is neglected. The risk of knowledge leakage is exacerbated with the pervasive use of mobile devices and the adoption of BYOD (Bring Your Own Device). Thus, this research-in-progress p… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: Research-in-progress ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/146

  19. arXiv:1606.01448  [pdf

    cs.CY cs.CR

    Evaluating the Utility of Research Articles for Teaching Information Security Management

    Authors: Harry Zurita, Sean B. Maynard, Atif Ahmad

    Abstract: Research articles can support teaching by introducing the latest expert thinking on relevant topics and trends and describing practical real-world case studies to encourage discussion and analysis. However, from the point of view of the instructor, a common challenge is identifying the most suitable papers for classroom teaching amongst a very large pool of potential candidates that are not typica… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/143

  20. arXiv:1606.00890  [pdf

    cs.CY cs.CR

    Information Security Policy: A Management Practice Perspective

    Authors: Moneer Alshaikh, Sean B. Maynard, Atif Ahmad, Shanton Chang

    Abstract: Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security policy a… ▽ More

    Submitted 27 May, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/49