Maria Karyda
Orcid: 0000-0001-9402-8570Affiliations:
- University of the Aegean, Greece
According to our database1,
Maria Karyda
authored at least 57 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach.
Inf. Comput. Secur., 2024
2023
Addressing Organisational, Individual and Technological Aspects and Challenges in Information Security Management: Applying a Framework for a Case Study.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures.
Inf. Comput. Secur., 2022
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach.
J. Cybersecur. Priv., December, 2021
Forming digital identities in social networks: the role of privacy concerns and self-esteem.
Inf. Comput. Secur., 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
Inf. Comput. Secur., 2020
Big Data Analytics in Healthcare Applications: Privacy Implications for Individuals and Groups and Mitigation Strategies.
Proceedings of the Information Systems, 2020
2019
Inf. Comput. Secur., 2019
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
Proceedings of the Information Systems, 2018
2017
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
2016
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016
2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015
Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 9th Mediterranean Conference on Information Systems, 2015
2014
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
2012
An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
Implementation Challenges for Information Security Awareness Initiatives in E-Government.
Proceedings of the 20th European Conference on Information Systems, 2012
2010
Proceedings of the Trust, 2010
2009
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Manag. Comput. Secur., 2008
2007
Proceedings of the Trust, 2007
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
Telematics Informatics, 2006
Inf. Manag. Comput. Secur., 2006
Inf. Manag. Comput. Secur., 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Διοίκηση ασφάλειας πληροφοριακών συστημάτων: οργανωσιακά ζητήματα ανάπτυξης, εφαρμογής και ενσωμάτωσης πολιτικών ασφάλειας
PhD thesis, 2005
Comput. Secur., 2005
Comput. Secur., 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2003
Proceedings of the Secure Electronic Voting, 2003
Content, Context, Process Analysis of IS Security Policy Formation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Elaborating Quantitative Approaches for IT Security Evaluation.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Redefining Information Systems Security: Viable Information Systems.
Proceedings of the Trusted Information: The New Decade Challenge, 2001