Dr Sean Maynard

  • Room: Level: 10 Room: 10.21
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Business Analytics (competitive advantage)
  • Information Security (security policy evaluation quality culture governance decision making)

Personal webpage

http://people.eng.unimelb.edu.au/seanbm/

Biography

Dr Sean Maynard is an academic in the Department of Computing Information Systems at the University of Melbourne. Starting his academic career in Information Systems focusing on the use of computing technology to aid senior management (EIS) and the evaluation of decision support systems, his research over the past decade has been in the area of information systems security, in particular focusing on the evaluation of security policy quality and on the investigation of security culture within organisations.  Dr Maynard has taught many aspects of Information Systems including: Programming, Database Systems, Data Warehousing and Business Analytics, Security, Analysis and Design, and Information Systems.

Recent publications

  1. Horne CA, Maynard S, Ahmad A. Organisational Information Security Strategy: Review, Discussion and Future Research. Australasian Journal of Information Systems. University of Canberra, School of Information Sciences and Engineering. 2017, Vol. 21.
  2. Horne C, Ahmad A, Maynard S. A Theory on Information Security. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  3. Naseer H, Maynard S, Ahmad A. Business analytics in information security risk management: The contingent effect on security performance. 24th European Conference on Information Systems, ECIS 2016. 2016.
  4. Naseer H, Shanks G, Ahmad A, Maynard S. Enhancing Information Security Risk Management with Security Analytics: A Dynamic Capabilities Perspective. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  5. Webb J, Ahmad A, Maynard S, Shanks G. Foundations for an Intelligence-driven Information Security Risk-management System. Journal of Information Technology Theory and Application. JITTA. 2016, Vol. 17, Issue 3.
  6. Arregui DA, Maynard S, Ahmad A. Mitigating BYOD Information Secuirty Risks. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  7. Agudelo CA, Bosua R, Ahmad A, Maynard S. Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: A Contextual Approach. 27th Australasian Conference on Information Systems (ACIS). University of Wollongong. 2016.
  8. Richardson M, Bosua R, Clark K, Webb J, Ahmad A, Maynard S. Privacy and the Internet of Things. Media and Arts Law Review. LexisNexis Butterworths. 2016, Vol. 21.
  9. Caron X, Bosua R, Maynard S, Ahmad A. The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. COMPUTER LAW & SECURITY REVIEW. Elsevier Advanced Technology. 2016, Vol. 32, Issue 1.
  10. Cosic R, Shanks G, Maynard S. A business analytics capability framework. Australasian Journal of Information Systems. University of Canberra, School of Information Sciences and Engineering. 2015, Vol. 19.
  11. Ahmad A, Maynard S, Shanks G. A case analysis of information systems and security incident responses. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT. Pergamon. 2015, Vol. 35, Issue 6.
  12. Moniruzzaman M, Kurnia S, Parkes A, Maynard S. Business Intelligence and Supply Chain Agility. 26th Australasian Conference on Information Systems (ACIS). University of South Australia. 2015.
  13. Elyas M, Ahmad A, Maynard S, Lonie A. Digital forensic readiness: Expert perspectives on a theoretical framework. COMPUTERS & SECURITY. Elsevier Advanced Technology. 2015, Vol. 52.
  14. Zurita H, Maynard S, Ahmad A. Evaluating the Utility of Research Articles for Teaching Information Security Management. 26th Australasian Conference on Information Systems (ACIS). University of South Australia. 2015.
  15. Maynard S, Lim JS, Ahmad A, Chang S. Information Security Culture: Towards an Instrument for Assessing Security Management Practices. International Journal of Cyber Warfare and Terrorism. IGI Global. 2015, Vol. 5, Issue 2.

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile