Shaun Aghili
Shaun Aghili
Professor, Concordia University of Edmonton
Verified email at
Cited by
Cited by
11th Iberian Conference on Information Systems and Technologies (CISTI)
KT Hafiz, S Aghili, P Zavarsky
A Six Sigma approach to internal audits
S Aghili
Strategic Finance 90 (8), 38-44, 2009
The use of predictive analytics technology to detect credit card fraud in Canada
KT Hafiz, S Aghili, P Zavarsky
2016 11th Iberian Conference on Information Systems and Technologies (CISTI …, 2016
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider
A Gbadeyan, S Butakov, S Aghili
Annals of Telecommunications 72, 347-357, 2017
A vulnerability study of Mhealth chronic disease management (CDM) applications (apps)
T Mabo, B Swar, S Aghili
Trends and Advances in Information Systems and Technologies: Volume 1 6, 587-598, 2018
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches
H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
Organizational risk management: successful achievement of business objectives hinges on the organization's ability to manage risk effectively
S Aghili
Internal Auditor 67 (3), 21-23, 2010
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment
O Akeju, S Butakov, S Aghili
International Journal of Internet of Things and Cyber-Assurance 1 (1), 22-39, 2018
Fingerprint security for protecting EMV payment cards
H Vats, R Ruhl, S Aghili
2015 10th International Conference for Internet Technology and Secured …, 2015
Using COBIT 5 for risk to develop cloud computing SLA evaluation templates
O Illoh, S Aghili, S Butakov
Service-Oriented Computing-ICSOC 2014 Workshops: WESOA; SeMaPS, RMSOC, KASA …, 2015
Throughput metrics meet six sigma
S Aghili
Management Accounting Quarterly 12 (3), 12, 2011
Sampling techniques: when used judiciously, a time-tested tool can help auditors increase the efficiency of their work
S Aghili
Internal Auditor 68 (6), 19-21, 2011
A study of doxing, its security implications and mitigation strategies for organizations
RS Mathews
Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud
S Aghili
CRC Press, 2019
Audit plan for patch management of enterprise applications
L Odilinye, S Butakov, S Aghili
IT Convergence and Security 2017: Volume 2, 168-175, 2018
Intent biometrics: an enhanced form of multimodal biometric systems
E Gilady, D Lindskog, S Aghili
2014 28th International Conference on Advanced Information Networking and …, 2014
E-government system security model (egssm): A multidimensional, risk based approach to e-government
DC Edwards, P Zavarsky, R Ruhl, D Lindskog, S Aghili
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit
TM Techoro, S Butakov, S Aghili, R Ruhl
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-6, 2015
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process
K Syed, P Zavarsky, D Lindskog, R Ruhl, S Aghili
Trust, Privacy and Security in Digital Business: 9th International …, 2012
The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance
S Aghili
CRC Press, 2022
The system can't perform the operation now. Try again later.
Articles 1–20