关注
Shaun Aghili
Shaun Aghili
Professor, Concordia University of Edmonton
在 concordia.ab.ca 的电子邮件经过验证
标题
引用次数
引用次数
年份
11th Iberian Conference on Information Systems and Technologies (CISTI)
KT Hafiz, S Aghili, P Zavarsky
692016
A Six Sigma approach to internal audits.
S Aghili
Strategic Finance 90 (8), 38-44, 2009
432009
The use of predictive analytics technology to detect credit card fraud in Canada
KT Hafiz, S Aghili, P Zavarsky
2016 11th Iberian Conference on Information Systems and Technologies (CISTI …, 2016
282016
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider
A Gbadeyan, S Butakov, S Aghili
Annals of Telecommunications 72, 347-357, 2017
192017
A vulnerability study of Mhealth chronic disease management (CDM) applications (apps)
T Mabo, B Swar, S Aghili
Trends and Advances in Information Systems and Technologies: Volume 1 6, 587-598, 2018
162018
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches
H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
162012
Organizational risk management: successful achievement of business objectives hinges on the organization's ability to manage risk effectively
S Aghili
Internal Auditor 67 (3), 21-23, 2010
122010
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment
O Akeju, S Butakov, S Aghili
International Journal of Internet of Things and Cyber-Assurance 1 (1), 22-39, 2018
102018
Fingerprint security for protecting EMV payment cards
H Vats, R Ruhl, S Aghili
2015 10th International Conference for Internet Technology and Secured …, 2015
102015
Using COBIT 5 for risk to develop cloud computing SLA evaluation templates
O Illoh, S Aghili, S Butakov
Service-Oriented Computing-ICSOC 2014 Workshops: WESOA; SeMaPS, RMSOC, KASA …, 2015
102015
Throughput metrics meet six sigma
S Aghili
Management Accounting Quarterly 12 (3), 12, 2011
92011
Sampling techniques: when used judiciously, a time-tested tool can help auditors increase the efficiency of their work
S Aghili
Internal Auditor 68 (6), 19-21, 2011
82011
A study of doxing, its security implications and mitigation strategies for organizations
RS Mathews
72014
Fraud auditing using CAATT: a manual for auditors and forensic accountants to detect organizational fraud
S Aghili
Auerbach Publications, 2019
62019
Audit plan for patch management of enterprise applications
L Odilinye, S Butakov, S Aghili
IT Convergence and Security 2017: Volume 2, 168-175, 2018
42018
Intent biometrics: an enhanced form of multimodal biometric systems
E Gilady, D Lindskog, S Aghili
2014 28th International Conference on Advanced Information Networking and …, 2014
42014
E-government system security model (egssm): A multidimensional, risk based approach to e-government
DC Edwards, P Zavarsky, R Ruhl, D Lindskog, S Aghili
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
42011
Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers
A Tamunobarafiri, S Aghili, S Butakov
International Journal of Monitoring and Surveillance Technologies Research …, 2017
22017
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit
TM Techoro, S Butakov, S Aghili, R Ruhl
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-6, 2015
22015
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process
K Syed, P Zavarsky, D Lindskog, R Ruhl, S Aghili
Trust, Privacy and Security in Digital Business: 9th International …, 2012
22012
系统目前无法执行此操作,请稍后再试。
文章 1–20