Aggeliki Tsohou
Orcid: 0000-0003-2200-3651
According to our database1,
Aggeliki Tsohou
authored at least 64 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
5
4
3
6
1
2
2
2
2
1
2
1
1
1
2
1
2
6
1
4
1
3
1
2
4
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Validation and extension of two domain-specific information privacy competency models.
Int. J. Inf. Sec., June, 2024
Int. J. Inf. Sec., June, 2024
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement.
J. Cybersecur. Priv., March, 2024
The Impacts of Internet Monitoring on Employees' Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment.
Inf. Syst. Res., 2024
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach.
Inf. Comput. Secur., 2024
Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission Decisions.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
2023
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors.
J. Cybersecur. Priv., July, 2023
Int. J. Inf. Sec., June, 2023
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance.
Eur. J. Inf. Syst., March, 2023
How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors.
Multimodal Technol. Interact., 2023
Towards an Information Privacy Competency Model for the Usage of Mobile Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
2022
A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness.
Telematics Informatics, 2021
J. Data Intell., 2021
Forming digital identities in social networks: the role of privacy concerns and self-esteem.
Inf. Comput. Secur., 2021
Towards an Information Privacy and Personal Data Protection Competency Model for Citizens.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
2020
J. Assoc. Inf. Syst., 2020
Effects of privacy policy visualization on users' information privacy awareness level.
Inf. Technol. People, 2020
Internet Res., 2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020
2019
Inf. Comput. Secur., 2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation.
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Are users competent to comply with information security policies? An analysis of professional competence models.
Inf. Technol. People, 2018
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
2017
Embedding persuasive features into policy issues: Implications to designing public participation processes.
Gov. Inf. Q., 2017
Enabling valid informed consent for location tracking through privacy awareness of users: A process theory.
Comput. Law Secur. Rev., 2017
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017
Proceedings of the Information Systems, 2017
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015
The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace.
Proceedings of the 23rd European Conference on Information Systems, 2015
2014
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014
Expressive or Instrumental: the Dual Perspective Model of Personal Web Usage at Workplace.
Proceedings of the 22st European Conference on Information Systems, 2014
The Dual Nature of Personal Web Usage at Workplace: Impacts, Antecedents and regulating Policies.
Proceedings of the 22st European Conference on Information Systems, 2014
2013
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013
2012
Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries.
Int. J. Electron. Gov. Res., 2012
Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Implementation Challenges for Information Security Awareness Initiatives in E-Government.
Proceedings of the 20th European Conference on Information Systems, 2012
2010
PhD thesis, 2010
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity.
Inf. Manag. Comput. Secur., 2010
Proceedings of the Trust, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2009
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Manag. Comput. Secur., 2008
2007
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007
2006
Inf. Manag. Comput. Secur., 2006