• Home
  • publications
  • Academic Accomplishment
  • Projects
  • Computer Skills
  • Honors and Awards
  • Home
  • publications
  • Academic Accomplishment
  • Projects
  • Computer Skills
  • Honors and Awards

Contact

For research collaboration, academic engagement, or professional opportunities in cyber security, privacy, governance, risk, compliance, analytics, and responsible AI, please get in touch.

parisa.shojaei85@gmail.com

G Google Scholar


2026 © Parisa. All rights reserved.

Parisa Shojaei

Parisa Shojaei

I am a PhD researcher at the University of Wollongong and a cyber security, privacy, risk, and analytics professional with a background spanning research, software engineering, governance, and data-driven problem solving.

My work sits at the intersection of privacy governance, cyber security risk, compliance, third-party assurance, cloud security, responsible AI, and advanced analytics, with a strong focus on turning complex technical, regulatory, and operational requirements into practical, structured, and defensible outcomes.

My PhD research focuses on developing effective privacy-enhancing guidelines for designing mHealth applications, with broader interests in privacy-by-design, user privacy behaviour, digital health, responsible AI, and data protection in high-sensitivity environments. Alongside my academic work, I bring practical experience in cyber security GRC, risk and compliance, vendor due diligence, evidence-based assurance, remediation tracking, structured reporting, and analytics-driven decision support.

I also have strong technical capability across Python, SQL, AWS-based workflows, software development, machine learning, and data analysis. My broader background includes research, lecturing, interdisciplinary collaboration, and applied work across cyber security, privacy, health informatics, optimisation, intelligent systems, and AI evaluation. I am passionate about designing governance, controls, and analytical approaches that help organisations make better decisions, strengthen trust, and improve real-world outcomes.

I am always open to research collaboration, academic engagement, and professional opportunities in cyber security, privacy, governance, risk, compliance, analytics, and responsible AI.


  • Health Informatics

  • Privacy In mHealth Application

  • Machine Learning

  • Optimized Algorithms

  • Data Science

Published Papers

[1]

Shojaei, P., Zamani, N., Moieni, R. (2025). Anonymity in the Age of AI. Open Journal of Social Sciences, 13(8), 48-72.

[2]

Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2025). Enhancing privacy in mHealth applications: A user centric model identifying key factors influencing privacy related behaviours. International Journal of Medical Informatics, 199, 105907.

[3]

Shojaei, P., and Moieni, R. (2025). Empirical analysis of data privacy concerns in DEI. Open Journal of Social Sciences, 13(6), 83-110.

[4]

Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2024). Security and privacy of technologies in health information systems: A systematic literature review. Computers, 13(2), 41.

[5]

Shojaei, P. (Under review). Audit-ready responsible AI security: An ISD method specification linking lifecycle decisions to evidence traceability. Information Processing & Management.

[6]

Parisasadat Shojaei, and Lotfi, S. (2016). Fuzzy Imperialist Competitive Algorithm approach to network intrusion detection. Acta Polytechnica Hungarica.

[7]

Shojaei, P. S., and Lotfi, S. (2015). Intelligent intrusion detection using fuzzy Imperialist Competitive Algorithm. International Journal of Biology, Pharmacy and Applied Sciences (IJBPAS).

[8]

Shojaei, P. (2025). AI-Driven DevSecOps: Automating security for smarter, safer software. Speaker at DevOpsDays Conference, Wollongong.

[9]

Shojaei, P., and Shen, J. (2025). Integrating generative AI into cybersecurity curricula: An ethics-aware framework for industry-ready graduates. Early Career Researcher Conference, University of Wollongong.

[10]

Shojaei, P., Chow, Y.-W., and Vlahu-Gjorgievska, E. (2025). User privacy concerns and preferences in mHealth applications: Balancing privacy and usability. Studies in Health Technology and Informatics, 329, 229-233.

[11]

Shojaei, P. (2025). Designing gender-inclusive privacy frameworks for digital platforms in Australia: Bridging ethics, policy, and practice. WREN Symposium 2025, p. 31.

[12]

Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2025). Privacy challenges in mHealth applications. WREN Symposium 2025, p. 15.

[13]

Shojaei, P. S. (2018). An approach to optimized Imperialist Competitive Algorithm for task scheduling in cloud computing. 5th International Conference on Electrical Engineering and Computer Science.

[14]

Shojaei, P. S., and Naji, H. R. (2016). A hybrid particle swarm optimization for task scheduling in cloud computing. 3rd International Congress on Electrical Engineering, Computer Sciences and Information Technology.

[15]

Shojaei, P. S. (2016). An approach to optimized genetic algorithm for task scheduling in cloud computing. International Conference on Computer Engineering and Information Technology.

[16]

Shojaei, P. S. (2016). A hybrid algorithm for task scheduling based on ant colony optimization and local neighborhood search. International Conference on Engineering and Applied Sciences.

[17]

Shojaei, P. S. (2016). Threshold acceptance approach for task scheduling in cloud computing. International Conference on Engineering and Applied Sciences.

[18]

Saghari, F., Sadegzadeh, M., and Shojaei, P. S. (2014). Provide a new method of fuzzy clustering to assess students in a learning environment. 1st National Conference on Computer Engineering and Information Technology.

[19]

Shojaei, P. S. (2014). Improving fuzzy rules of intrusion detection with Imperialist Competitive Algorithm. 12th Iranian Conference on Intelligent Systems.

[20]

Shojaei, P. S., Lotfi, S., and Mohammadkhanli, L. (2013). Extraction of fuzzy rules in intrusion detection system with Imperialist Competitive Algorithm. 11th Iranian Conference on Intelligent Systems.

[21]

Shojaei, P. S., and Lotfi, S. (2012). Review the different methods of intrusion detection in computer networks. 9th Regional Conference of Computer and Intelligent Systems.

[22]

Shojaei, P. S., Pourabasi, E., and Mohammadkhanli, L. (2015). A hybrid algorithm for task scheduling based on binary particle swarm optimization and local neighborhood search. 7th Conference on Information and Knowledge Technology.

[23]

Shojaei, P. S., and Peidaei, M. (2014). Improving fuzzy rules of intrusion detection with Imperialist Competitive Algorithm. 12th Iranian Conference on Intelligent Systems.

[24]

Shojaei, P. S., and Lotfi, S. (2013). Review the different methods of intrusion detection in computer networks using fuzzy methods. 1st National Conference on Application of Intelligent Systems.

[25]

Polouk, P., and Shojaei, P. S. (2012). Find matching patterns, discrete and symmetrical to compress information. Lahijan National Conference on Software Engineering.

Academic Accomplishments

Online Courses

  • Deep Learning with TensorFlow, 2021
  • Machine Learning, UTAustinX, 2020
  • Data Mining: Theories and Algorithms for Tackling Big Data, TsinghuaX, 2020
  • Python for Data Science, UCSanDiegoX, 2020

Certificates

  • Deep Learning with TensorFlow
  • Using Python for Research, HarvardX
  • Summer School, AI and Emerging Technologies
  • CIW Advanced HTML5 and CSS3 Specialist
  • CIW Site Development Associate
  • CIW JavaScript Specialist
  • Australian Universal Academy, MIPV
  • Diploma Supplement Label, European Certificate Group
  • General Pedagogy and Teaching Principles Certificate
  • International Training Accreditation Awarded, Paper Writing Workshop
  • Certificate of Participation, Paper Writing Workshop

Projects

Privacy Governance for mHealth

PhD research focused on developing practical and user-centred privacy-enhancing guidelines for mHealth applications, with emphasis on privacy-by-design, governance, and user behaviour.


Operational Analytics and Risk Reporting

Built repeatable pipelines that transformed heterogeneous operational and risk signals into structured datasets and executive-ready dashboards. Created validation and reconciliation checks to improve reporting reliability under tight timelines and changing requirements.


Cost and Productivity Analytics Platform

Delivered an analytics system replacing spreadsheets with structured capture, variance reporting, and KPI-style dashboards. Turned operational data into actionable insights for managers and business users.


Privacy and Safety Evaluation for AI Outputs

Designed evaluation workflows for sensitive-data risk, including leakage detection and policy checks, using measurable metrics, test sets, and repeatable runs. Produced decision-ready reporting on trends, failure modes, and examples to support safer AI adoption and iteration.


Responsible AI and Internal LLM Evaluation

Contributed to Responsible AI projects including a privacy-focused Digital ID stack and a long-context safety and privacy evaluator for internal LLM deployments. Worked with evaluation concepts including measurable metrics, privacy-aware AI workflows, explainability, and integration-oriented reporting. First-author research on audit-ready Responsible AI security, focusing on lifecycle decision-making, explainability, and evidence traceability, currently under review at Information Processing & Management.


Handwritten Digit Recognition

Built a handwritten digit recognition project using the MNIST dataset with Keras, BatchNormalization, and Dropout.


Evolutionary Algorithms for the Chance-Constrained Knapsack Problem

Worked on Python-based optimisation research focused on algorithm design, evaluation, and performance improvement.


Hybrid Metaheuristic Algorithms for Task Scheduling in Cloud Computing

Conducted research and implementation on optimisation approaches for resource allocation and task scheduling in cloud environments.


Machine Learning Algorithms

Ongoing work exploring machine learning methods and their practical applications across security, data, and intelligent systems.

Computer Skills

  • [Security] Cyber Security GRC
  • [Security] Privacy and Data Protection
  • [Security] Risk Assessment
  • [Security] Compliance
  • [Security] Third-Party Risk
  • [Security] Vendor Due Diligence
  • [Security] Control Design
  • [Security] Evidence-Based Assurance
  • [Security] Audit Readiness
  • [Security] ISO 27001
  • [Security] NIST CSF
  • [Security] Cloud Security Governance
  • [Security] Responsible AI Security
  • [Security] AI Governance
  • [Analytics] Python
  • [Analytics] SQL
  • [Analytics] Data Analysis
  • [Analytics] Data Science
  • [Analytics] Machine Learning
  • [Analytics] Reporting and Dashboarding
  • [Analytics] Structured Validation
  • [Analytics] Data-Driven Decision Support
  • [Analytics] Quantitative and Qualitative Evaluation
  • [Analytics] KPI and Variance Reporting
  • [Dev] Python

Honors and Awards

  • Selected as one of only 10 female Australian PhD candidates nationally, recognising research excellence, leadership potential, and commitment to advancing innovative interdisciplinary impact.

  • Best Lecturer of the Department of Computer Science at Payame Noor University

  • Faculty Member of the Engineering Department in the International Society of Communication and Development Between Universities

  • Member of the Executive Committee in a Computer Science Conference

  • Best Graduate Student Award and highest GPA during two semesters

  • Rank 1 in the Nationwide University Entrance Exam among 1000 participants in Islamic Azad University

  • Rank 1 in the General Pedagogy and Teaching Principles course in Tabriz Institute of Technology