11th Iberian Conference on Information Systems and Technologies (CISTI) KT Hafiz, S Aghili, P Zavarsky | 69 | 2016 |
A Six Sigma approach to internal audits. S Aghili Strategic Finance 90 (8), 38-44, 2009 | 43 | 2009 |
The use of predictive analytics technology to detect credit card fraud in Canada KT Hafiz, S Aghili, P Zavarsky 2016 11th Iberian Conference on Information Systems and Technologies (CISTI …, 2016 | 28 | 2016 |
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider A Gbadeyan, S Butakov, S Aghili Annals of Telecommunications 72, 347-357, 2017 | 19 | 2017 |
A vulnerability study of Mhealth chronic disease management (CDM) applications (apps) T Mabo, B Swar, S Aghili Trends and Advances in Information Systems and Technologies: Volume 1 6, 587-598, 2018 | 16 | 2018 |
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 16 | 2012 |
Organizational risk management: successful achievement of business objectives hinges on the organization's ability to manage risk effectively S Aghili Internal Auditor 67 (3), 21-23, 2010 | 12 | 2010 |
Main factors and good practices for managing BYOD and IoT risks in a K-12 environment O Akeju, S Butakov, S Aghili International Journal of Internet of Things and Cyber-Assurance 1 (1), 22-39, 2018 | 10 | 2018 |
Fingerprint security for protecting EMV payment cards H Vats, R Ruhl, S Aghili 2015 10th International Conference for Internet Technology and Secured …, 2015 | 10 | 2015 |
Using COBIT 5 for risk to develop cloud computing SLA evaluation templates O Illoh, S Aghili, S Butakov Service-Oriented Computing-ICSOC 2014 Workshops: WESOA; SeMaPS, RMSOC, KASA …, 2015 | 10 | 2015 |
Throughput metrics meet six sigma S Aghili Management Accounting Quarterly 12 (3), 12, 2011 | 9 | 2011 |
Sampling techniques: when used judiciously, a time-tested tool can help auditors increase the efficiency of their work S Aghili Internal Auditor 68 (6), 19-21, 2011 | 8 | 2011 |
A study of doxing, its security implications and mitigation strategies for organizations RS Mathews | 7 | 2014 |
Fraud auditing using CAATT: a manual for auditors and forensic accountants to detect organizational fraud S Aghili Auerbach Publications, 2019 | 6 | 2019 |
Audit plan for patch management of enterprise applications L Odilinye, S Butakov, S Aghili IT Convergence and Security 2017: Volume 2, 168-175, 2018 | 4 | 2018 |
Intent biometrics: an enhanced form of multimodal biometric systems E Gilady, D Lindskog, S Aghili 2014 28th International Conference on Advanced Information Networking and …, 2014 | 4 | 2014 |
E-government system security model (egssm): A multidimensional, risk based approach to e-government DC Edwards, P Zavarsky, R Ruhl, D Lindskog, S Aghili 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 4 | 2011 |
Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers A Tamunobarafiri, S Aghili, S Butakov International Journal of Monitoring and Surveillance Technologies Research …, 2017 | 2 | 2017 |
Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit TM Techoro, S Butakov, S Aghili, R Ruhl 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-6, 2015 | 2 | 2015 |
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process K Syed, P Zavarsky, D Lindskog, R Ruhl, S Aghili Trust, Privacy and Security in Digital Business: 9th International …, 2012 | 2 | 2012 |