Asset identification in information security risk assessment: A business practice approach. Ahmad A, Smith W. P Shedden, A Ahmad, W Smith… - … of the Association for …, 2016 - aisel.aisnet.org GSID: t6oNHMvngMAJ
Towards a knowledge perspective in information security risk assessments–an illustrative case study. Ahmad A, Scheepers R, Smith W. P Shedden, W Smith, R Scheepers, A Ahmad - 2009 - aisel.aisnet.org GSID: htONw10cOGQJ
Information security risk assessment: towards a business practice perspective. Ahmad A, Smith W. P Shedden, W Smith, A Ahmad - 2010 - ro.ecu.edu.au GSID: 8HsWorEx-NEJ
Developing cybersecurity culture to influence employee behavior: A practice perspective. Alshaikh M. M Alshaikh - Computers & Security, 2020 - Elsevier GSID: bUrJXRJViy4J
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. Ahmad A, Boorman J, Desouza KC, Webb J. A Ahmad, J Webb, KC Desouza, J Boorman - Computers & Security, 2019 - Elsevier GSID: ceHDAgeUhJ0J
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …. Lowry PB, Shin B. B Shin, PB Lowry - Computers & Security, 2020 - Elsevier GSID: i3sLc3MCuXEJ