Sean B. Maynard’s research while affiliated with University of Melbourne and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (29)


Cyber Situational Awareness in Security Operation Centres
  • Conference Paper
  • Full-text available

July 2024

·

202 Reads

·

·

·

[...]

·

Atif Ahmad

Effective response to cyber-attack requires situational awareness (SA) of the incident environment. This paper conducts a systematic literature review (SLR) of cyber security SA and how individuals' performance can be improved in critical environments facing hybrid warfare threats. We examine how SA enhances Security Operations Centres (SOCs) to manage incidents and how it is understood based on the role of SOCs during attacks. We investigate three aspects of SA: Theoretical foundations; levels of situation; and measurement methods. The paper identifies that most literature is based on Endsley's three-level model of SA, which has been adapted to the cybersecurity domain as "Cyber Situation Awareness". However, some studies, especially those focusing on developing tools to enhance SA, lack a clear theoretical basis or use alternative models. We identified a balance between individual, group, and concepts of SA.

Download

Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework

January 2024

·

15 Reads

·

4 Citations

Australasian Journal of Information Systems

Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integrated and disciplined approach to leveraging analytics and promoting collaboration. An emerging business analytics practice, Data Operations (DataOps), provides a disciplined approach for organisations to collaborate using analytical information for digital business transformation. We propose a conceptual framework by reviewing the literature on business analytics, DataOps and organisational information processing theory (OIPT). This conceptual framework explains how organisations can employ DataOps as an integrated and disciplined approach for developing the analytical information processing capability and facilitating boundary-spanning activities required for digital business transformation. This research (a) extends current knowledge on digital transformation by linking it with business analytics from the perspective of OIPT and boundary-spanning activities, and (b) presents DataOps as a novel approach for using analytical information for digital business transformation.




Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics

September 2023

·

142 Reads

·

22 Citations


table 6 .
Information Security Managers participants Information
Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations

August 2023

·

38 Reads

Information and knowledge leakage has become a significant security risk to Australian organizations. Each security incident in Australian business cost an average US\2.8million.Furthermore,Australianorganisationsspendthesecondmostworldwide(US2.8 million. Furthermore, Australian organisations spend the second most worldwide (US\1.2 million each on average) on investigating and assessing information breaches. The leakage of sensitive organizational information occurs through different avenues, such as social media, cloud computing and mobile devices. In this study, we (1) analyze the knowledge leakage risk (KLR) caused by the use of mobile devices in knowledge-intensive Australian organizations, (2) present a conceptual research model to explain the determinants that influence KLR through the use of mobile devices grounded in the literature, (3) conduct interviews with security and knowledge managers to understand what strategies they use to mitigate KLR caused by the use of mobile devices and (4) use content analysis and the conceptual model to frame the preliminary findings from the interviews. Keywords: Knowledge leakage, mobile devices, mobile contexts, knowledge leakage risk


Figure 1. Research Conceptual Model. Adapted from Bradley & Dunlop (2005), Chen & Nath (2008) and Melville et al. (2004)
Figure 2. Strategies used by knowledge intensive organizations
Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations

August 2023

·

59 Reads

The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. Often employees whether deliberately or inadvertently are the cause of knowledge leakage in organizations and the use of mobile devices further exacerbates it. This problem is the result of overly focusing on technical controls while neglecting human factors. Knowledge leakage is a multidimensional problem, and in this paper, we highlight the different dimensions that constitute it. In this study, our contributions are threefold. First, we study knowledge leakage risk (KLR) within the context of mobile devices in knowledge-intensive organizations in Australia. Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature. And third, we apply the framework to the findings from interviews with security and knowledge managers. Keywords: Knowledge Leakage, Knowledge Risk, Knowledge intensive, Mobile device.


Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice

June 2023

·

93 Reads

·

41 Citations

Computers & Security

The increasing militarization of the cyber-threat environment has driven considerable interest in understanding the role of cyber-threat intelligence (CTI) in supporting the enterprise. Despite CTI’s value proposition to organizations, the rate of industry adoption has been low and localized within IT Operations. Our review of the research and practice literature on CTI shows that the discourse is heavily dominated by the technology perspective, leaving significant gaps in the knowledge of CTI. We begin with a background study that reinforces the traditional origins of CTI as a process derived from the Intelligence Cycle that is referenced and practiced in military intelligence studies. We describe the Intelligence Cycle and its phases and reinforce the characteristics and attributes of intelligence, asserting the critical importance of synthesizing information into intelligence. We subsequently develop a research agenda for practice researchers addressing the critical research question: “How can cyber-threat intelligence be operationalized in organizations?” We begin by exploring research questions to develop the theoretical foundations of CTI. Towards this objective, we present a useful template for process theory that generates practice outcomes. We then discuss methods suited to practice research in CTI before moving on to inquiries concerning the role and purpose of CTI in practice. We delve into questions on the broad aspects of practice at both the macro-level, focusing on the examination of CTI programs in organizations with different strategic risks, and the micro-level, exploring the distinctions between practice, praxis, and practitioners. Additionally, we explore questions on the role of artifacts, objects, and information systems that support CTI practice, including spaces and the role of practitioners and non-practitioners. After exploring various practice-related topics, we examine potential research opportunities pertaining to the prevailing narratives surrounding technology and information sharing, as identified in our literature review.



Comparison of previous information security reviews
Five-Stage Grounded Theory Literature Review Method (Wolfswinkel et al. 2011)
Research Methods (descriptions can be found in Zhang and Li (2005)
shows a breakdown of methods published in 5-year intervals from 1988. As pointed out earlier, the most striking observation is the steep increase in the number of surveys
maps the three categories according to theme (note more than one theme exists
Information Security Management in High Quality IS Journals: A Review and Research Agenda

August 2022

·

630 Reads

In the digital age, the protection of information resources is critical to the viability of organizations. Information Security Management (ISM) is a protective function that preserves the confidentiality, integrity and availability of information resources in organizations operating in a complex and evolving security threat landscape. This paper analyses ISM research themes, methods, and theories in high quality IS journals over a period of 30 years (up to the end of 2017). Although our review found that less than 1 percent of papers to be in the area of ISM, there has been a dramatic increase in the number of ISM publications as well as new emerging themes in the past decade. Further, past trends towards subjective-argumentative papers have reversed in favour of empirically validated research. Our analysis of research methods and approaches found ISM studies to be dominated by one-time surveys rather than case studies and action research. The findings suggest that although ISM research has improved its empirical backing over the years, it remains relatively disengaged from organisational practice.


Citations (14)


... In the realm of digital strategy implementation tools, significant attention is directed towards the amalgamation of traditional and digital business models and the alignment of digital business models with marketing objectives [3]. Moreover, the adoption of e-commerce technologies is highlighted for its capacity to enhance value and foster consumer engagement [4], alongside the pivotal role played by digital platforms, artificial intelligence, blockchain [8], virtual and augmented reality [9], and data analytics [10]. ...

Reference:

DECODING DIGITAL BUSINESS STRATEGIES: INSIGHTS FROM FIVE YEARS OF RESEARCHРОЗКРИТТЯ ЗМІСТУ ЦИФРОВИХ БІЗНЕС-СТРАТЕГІЙ: АНАЛІЗ ДОСЛІДЖЕНЬ ЗА ОСТАННІ П’ЯТЬ РОКІВ
Using Analytical Information for Digital Business Transformation through DataOps: A Review and Conceptual Framework

Australasian Journal of Information Systems

... As cyber security threats continue to grow, governments and industry bodies have introduced various regulations and standards to ensure organizations maintain adequate levels of cybersecurity (Naseer et al., 2023). Organizations must navigate this complex regulatory landscape and comply with relevant requirements, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA). ...

Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities
  • Citing Article
  • October 2023

Computers & Security

... The budget and cost considerations related to cyberattacks suggest a rational decision-making process for the adversary's role [39]. A dedicated and skilled team is required to successfully carry out cyber fraud or offensive operations [40]. This team requires a deep understanding of their target, selection of the tools, and effective execution of their approach to exploit the stolen data. ...

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
  • Citing Article
  • September 2023

... A. Real-time analytics and threat analysis Regarding the threats that arise in connection with the identified close-link deepfake phishing types, participants of CTI do essential work (Ainslie et al., 2023). As a result of the design described above, risk identification and reporting happen simultaneously so that counterbalancing information from multiple sources is provided in real-time or, to an equivalent extent, as part of the CTI system. ...

Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice
  • Citing Article
  • June 2023

Computers & Security

... Organizational approaches to consumer health data governance research could produce in-depth case studies to surface strategies and practices for, as well as barriers to, regulatory compliant governance of these data to address privacy and innovation goals in specific circumstances (Anderson, Baskerville, and Kaul, 2023). Cross sectional surveys or cases could assess how aware firm leaders are of data governance issues and whether governance concerns influence strategic data (re)use plans (Black et al., 2023). Scholars studying data ecosystems could explore and propose new approaches to bridge the discursive and methodological gaps between IS and legal / regulatory research (Burmeister et al., 2022) so as to inform mobile health design and organizational practices. ...

Data governance and the secondary use of data: The board influence
  • Citing Article
  • February 2023

Information and Organization

... It is critical to weave security awareness into the fabric of organizational processes and behaviors. This fosters effective management of organizational risk in the face of emerging threats and contributes to a robust security culture that can adapt and respond to evolving challenges [41,42,6,43] The following sections explore the nuances of organizational culture, information security culture, and their interrelationships. They also highlight the critical role of security knowledge, awareness, behavior, and culture in shaping a resilient security environment within organizations. ...

Embedding information security management in organisations: improving participation and engagement through intra-organisational Liaison

Security Journal

... O'Neil, Ahmad, and Maynard created a scenario-based approach for training CSIRT teams to overcome technical barriers to incident response [5]. The paper identified the socio-technical issues facing organizations' incident response procedures and classified them according to information technology systems' people, processes, and technology framework. ...

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training

... It is also critical to educate users about security implications to improve external and internal threat management within the energy sector organizations [89,90]. There have been some studies showing that employees have limited information security readiness [91], so cybersecurity training [92,93] can better prepare them to cope with the cybersecurity challenges and optimally respond to threat situations. Such a rich research agenda can help the energy sector organizations to secure their digital transformation drive by adopting effective controls and risk management methodologies [94][95][96][97]. ...

Case-based learning in the management practice of information security: an innovative pedagogical instrument

Personal and Ubiquitous Computing

... Flow experience simplify users' comprehensive process of information flow in a digital environment (Thompson et al., 2020;Zhang et al., 2014). As Csikszentmihalyi (2013) explains, flow experience is a mental state where individuals become fully immersed in an activity and lose awareness of their surroundings. ...

Do privacy concerns determine online information disclosure? The case of internet addiction
  • Citing Article
  • April 2021

Information and Computer Security

... Our third hypothesis addresses the enabling dimension of the DCCI framework, which focuses on supporting and standardizing cybersecurity activities. Effective integration of threat intelligence and standardization of cybersecurity measures can significantly enhance firms' awareness and resilience (Naseer et al., 2021a(Naseer et al., , 2021bNeri et al., 2024). By emphasizing supportive cybersecurity activities, firms can improve their CI development. ...

Real-time analytics, incident response process agility and enterprise cybersecurity performance: A contingent resource-based analysis
  • Citing Article
  • August 2021

International Journal of Information Management