Follow
Shaun Aghili
Shaun Aghili
Professor, Concordia University of Edmonton
Verified email at concordia.ab.ca
Title
Cited by
Cited by
Year
11th Iberian Conference on Information Systems and Technologies (CISTI)
KT Hafiz, S Aghili, P Zavarsky
662016
A six sigma approach to internal audits
S Aghili
Strategic Finance 90 (8), 38-44, 2009
402009
The use of predictive analytics technology to detect credit card fraud in Canada
KT Hafiz, S Aghili, P Zavarsky
2016 11th Iberian Conference on Information Systems and Technologies (CISTI …, 2016
232016
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider
A Gbadeyan, S Butakov, S Aghili
Annals of Telecommunications 72 (5), 347-357, 2017
152017
A vulnerability study of Mhealth chronic disease management (CDM) applications (apps)
T Mabo, B Swar, S Aghili
World Conference on Information Systems and Technologies, 587-598, 2018
142018
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches
H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
132012
Organizational risk management: successful achievement of business objectives hinges on the organization's ability to manage risk effectively
S Aghili
Internal Auditor 67 (3), 21-23, 2010
122010
Using COBIT 5 for risk to develop cloud computing SLA evaluation templates
O Illoh, S Aghili, S Butakov
Service-Oriented Computing-ICSOC 2014 Workshops, 236-249, 2015
102015
Throughput metrics meet six sigma
S Aghili
Management Accounting Quarterly 12 (3), 12, 2011
92011
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment
O Akeju, S Butakov, S Aghili
International Journal of Internet of Things and Cyber-Assurance 1 (1), 22-39, 2018
82018
Fingerprint security for protecting EMV payment cards
H Vats, R Ruhl, S Aghili
2015 10th International Conference for Internet Technology and Secured …, 2015
82015
Sampling techniques: when used judiciously, a time-tested tool can help auditors increase the efficiency of their work
S Aghili
Internal Auditor 68 (6), 19-21, 2011
82011
A study of doxing, its security implications and mitigation strategies for organizations
RS Mathews
52014
E-government system security model (egssm): A multidimensional, risk based approach to e-government
DC Edwards, P Zavarsky, R Ruhl, D Lindskog, S Aghili
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
42011
Intent biometrics: an enhanced form of multimodal biometric systems
E Gilady, D Lindskog, S Aghili
2014 28th International Conference on Advanced Information Networking and …, 2014
32014
Audit Plan for Patch Management of Enterprise Applications
L Odilinye, S Butakov, S Aghili
IT Convergence and Security 2017, 168-175, 2018
22018
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit
TM Techoro, S Butakov, S Aghili, R Ruhl
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-6, 2015
22015
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process
K Syed, P Zavarsky, D Lindskog, R Ruhl, S Aghili
International Conference on Trust, Privacy and Security in Digital Business …, 2012
22012
Security Perspective in Comparative Study of Platform-Based and Platform-Less BYOD Systems
NR Aenugu, S Butakov, P Zavarsky, S Aghili
IT Convergence and Security 2017, 137-145, 2018
12018
Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers
A Tamunobarafiri, S Aghili, S Butakov
International Journal of Monitoring and Surveillance Technologies Research …, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20