Spyros Kokolakis
Orcid: 0000-0001-6255-1922
According to our database1,
Spyros Kokolakis
authored at least 54 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach.
Inf. Comput. Secur., 2024
Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2023
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues.
Comput. Secur., September, 2023
How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors.
Multimodal Technol. Interact., 2023
2022
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures.
Inf. Comput. Secur., 2022
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research.
Inf. Comput. Secur., 2022
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes.
Inf. Comput. Secur., 2022
2021
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach.
J. Cybersecur. Priv., December, 2021
Inf. Fusion, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Inf. Comput. Secur., 2020
2018
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
2017
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon.
Comput. Secur., 2017
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Users' Attitudes on Mobile Devices: Can Users' Practices Protect their Sensitive Data?
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016
2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015
2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
2013
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
2012
An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012
2010
Proceedings of the Trust, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Manag. Comput. Secur., 2008
2007
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007
2006
Inf. Manag. Comput. Secur., 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Inf. Manag. Comput. Security, 2005
Comput. Secur., 2005
Comput. Secur., 2005
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005
Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2003
Content, Context, Process Analysis of IS Security Policy Formation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Electronic Government, Second International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Redefining Information Systems Security: Viable Information Systems.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
2000
Ανάπτυξη και διαχείριση ασφαλείας πληροφοριακών συστημάτων: εννοιολογικό πλαίσιο, μεθοδολογίες και εργαλεία
PhD thesis, 2000
The use of business process modelling in information systems security analysis and design.
Inf. Manag. Comput. Secur., 2000
Comput. Secur., 2000
A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Secur., 1999
1996
An analyst's view of IS security.
Proceedings of the Information Systems Security, 1996
Is there a Need for New Information Security Models?
Proceedings of the Communications and Multimedia Security II, 1996