Sean B. Maynard

Orcid: 0000-0003-2044-8163

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia


According to our database1, Sean B. Maynard authored at least 71 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics.
Eur. J. Inf. Syst., 2024

Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework.
Australas. J. Inf. Syst., 2024

2023
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities.
Comput. Secur., December, 2023

Cyber-threat intelligence for security decision-making: A review and research agenda for practice.
Comput. Secur., September, 2023

Data governance and the secondary use of data: The board influence.
Inf. Organ., June, 2023

2022
Information Security Management in High Quality IS Journals: A Review and Research Agenda.
CoRR, 2022

Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda.
CoRR, 2022

Editorial.
Comput. Secur., 2022

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Case-based learning in the management practice of information security: an innovative pedagogical instrument.
Pers. Ubiquitous Comput., 2021

Do privacy concerns determine online information disclosure? The case of internet addiction.
Inf. Comput. Secur., 2021

Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis.
Int. J. Inf. Manag., 2021

Demystifying analytical information processing capability: The case of cybersecurity incident response.
Decis. Support Syst., 2021

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training.
CoRR, 2021

Applying social marketing to evaluate current security education training and awareness programs in organisations.
Comput. Secur., 2021

How can organizations develop situation awareness for incident response: A case study of management practice.
Comput. Secur., 2021

Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals.
Proceedings of the 29th European Conference on Information Systems, 2021

Leveraging Data and Analytics for Digital Business Transformation through DataOps: An Information Processing Perspective.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
How integration of cyber security management and incident response enables organizational learning.
J. Assoc. Inf. Sci. Technol., 2020

Opportunity or Threat: Board Perspectives on the Secondary Use of Data.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

Information Security Governance: A Process Model and Pilot Case Study.
Proceedings of the 41st International Conference on Information Systems, 2020

Situation-Awareness in Incident Response: An In-depth Case Study and Process Model.
Proceedings of the 41st International Conference on Information Systems, 2020

Modernizing business analytics capability with DataOps: A decision-making agility perspective.
Proceedings of the 28th European Conference on Information Systems, 2020

Teaching Information Security Management Using an Incident of Intellectual Property Leakage.
Proceedings of the Australasian Conference on Information Systems, 2020

Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness.
Proceedings of the 27th European Conference on Information Systems, 2019

Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices.
Proceedings of the Australasian Conference on Information Systems, 2019

Dynamic Information Security Management Capability: Strategising for Organisational Performance.
Proceedings of the Australasian Conference on Information Systems, 2019

The Dark Web Phenomenon: A Review and Research Agenda.
Proceedings of the Australasian Conference on Information Systems, 2019

Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls.
Proceedings of the Australasian Conference on Information Systems, 2019

2018
Towards a Framework for Strategic Security Context in Information Security Governance.
Pac. Asia J. Assoc. Inf. Syst., 2018

Defining the Strategic Role of the Chief Information Security Officer.
Pac. Asia J. Assoc. Inf. Syst., 2018

Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach.
Proceedings of the International Conference on Information Systems, 2018

An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

2017
Organisational Information Security Strategy: Review, Discussion and Future Research.
Australas. J. Inf. Syst., 2017

Information Security Governance: A Case Study of the Strategic Context of Information Security.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

The Chief Information Security Officer and the Five Dimensions of a Strategist.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Organizational Security Learning from Incident Response.
Proceedings of the International Conference on Information Systems, 2017

Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study.
Proceedings of the International Conference on Information Systems, 2017

Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective.
Proceedings of the 25th European Conference on Information Systems, 2017

A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups.
Proceedings of the Australasian Conference on Information Systems, 2017

2016
Foundations for an Intelligence-driven Information Security Risk-management System.
J. Inf. Technol. Theory Appl., 2016

Business Intelligence and Supply Chain Agility.
CoRR, 2016

Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective.
CoRR, 2016

The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.
Comput. Law Secur. Rev., 2016

Business Analytics in Information Security Risk Management: the contingent effect on Security Performance.
Proceedings of the 24th European Conference on Information Systems, 2016

Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective.
Proceedings of the Australasian Conference on Information Systems, 2016

A Theory on Information Security.
Proceedings of the Australasian Conference on Information Systems, 2016

Mitigating BYOD Information Security Risks.
Proceedings of the Australasian Conference on Information Systems, 2016

Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
A case analysis of information systems and security incident responses.
Int. J. Inf. Manag., 2015

Information Security Culture: Towards an Instrument for Assessing Security Management Practices.
Int. J. Cyber Warf. Terror., 2015

Digital forensic readiness: Expert perspectives on a theoretical framework.
Comput. Secur., 2015

A business analytics capability framework.
Australas. J. Inf. Syst., 2015

Evaluating the Utility of Research Articles for Teaching Information Security Management.
Proceedings of the Australasian Conference on Information Systems, 2015

Information Security Strategy in Organisations: Review, Discussion and Future Research Directions.
Proceedings of the Australasian Conference on Information Systems, 2015

Information Security Policy: A Management Practice Perspective.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
Information security strategies: towards an organizational multi-strategy perspective.
J. Intell. Manuf., 2014

Towards A Systemic Framework for Digital Forensic Readiness.
J. Comput. Inf. Syst., 2014

Teaching information security management: reflections and experiences.
Inf. Manag. Comput. Secur., 2014

A situation awareness model for information security risk management.
Comput. Secur., 2014

Information Security Risk Management: An Intelligence-Driven Approach.
Australas. J. Inf. Syst., 2014

2013
Towards an Intelligence-Driven Information Security Risk Management Process for Organisations.
Proceedings of the Australasian Conference on Information Systems, 2013

2011
Towards Understanding Deterrence: Information Security Managers' Perspective.
Proceedings of the International Conference on IT Convergence and Security, 2011

2010
Ethical decision making: Improving the quality of acceptable use policies.
Comput. Secur., 2010

Embedding Information Security Culture Emerging Concerns and Challenges.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

2007
Organisational security culture: Extending the end-user perspective.
Comput. Secur., 2007

2006
Organizational Security Culture: More Than Just an End-User Phenomenon.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Security Governance: Its Impact on Security Culture.
Proceedings of the 3rd Australian Information Security Management Conference, 2005


  Loading...