Author of the publication

Information Security Risk Management: An Intelligence-Driven Approach.

, , , and . Australas. J. Inf. Syst., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Chief Information Security Officer and the Five Dimensions of a Strategist., , and . PACIS, page 77. (2017)Defining the Strategic Role of the Chief Information Security Officer., , and . Pac. Asia J. Assoc. Inf. Syst., 10 (3): 3 (2018)Foundations for an Intelligence-driven Information Security Risk-management System., , , and . J. Inf. Technol. Theory Appl., 17 (3): 3 (2016)Leveraging Data and Analytics for Digital Business Transformation through DataOps: An Information Processing Perspective., , , and . CoRR, (2022)Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics., , , and . Eur. J. Inf. Syst., 33 (2): 200-220 (2024)The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective., , , and . Comput. Law Secur. Rev., 32 (1): 4-15 (2016)Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities., , , , and . Comput. Secur., (December 2023)Information Security Policy: A Management Practice Perspective., , , and . ACIS, page 12. (2015)Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training., , , and . ACIS, page 35. (2022)Information Security Governance: A Process Model and Pilot Case Study., , , and . ICIS, Association for Information Systems, (2020)