Spyros Kokolakis

Orcid: 0000-0001-6255-1922

According to our database1, Spyros Kokolakis authored at least 54 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach.
Inf. Comput. Secur., 2024

Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues.
Comput. Secur., September, 2023

How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors.
Multimodal Technol. Interact., 2023

2022
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures.
Inf. Comput. Secur., 2022

Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research.
Inf. Comput. Secur., 2022

BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes.
Inf. Comput. Secur., 2022

2021
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach.
J. Cybersecur. Priv., December, 2021

Behavioral biometrics & continuous user authentication on mobile devices: A survey.
Inf. Fusion, 2021

BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
AppAware: a policy visualization model for mobile applications.
Inf. Comput. Secur., 2020

2018
AppAware: A Model for Privacy Policy Visualization for Mobile Applications.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

2017
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon.
Comput. Secur., 2017

Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data.
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017

Privacy Decision-Making in the Digital Era: A Game Theoretic Review.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Users' Attitudes on Mobile Devices: Can Users' Practices Protect their Sensitive Data?
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016

2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015

2014
Directions for Raising Privacy Awareness in SNS Platforms.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2013
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
Analyzing Trajectories of Information Security Awareness.
Inf. Technol. People, 2012

An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

2010
Analyzing Information Security Awareness through Networks of Association.
Proceedings of the Trust, 2010

Unifying ISO Security Standards Practices into a Single Security Framework.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Future Directions.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Introduction: The SERENITY vision.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Security and Dependability Solutions for Web Services and Workflows.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009

Aligning Security Awareness With Information Systems Security Management.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
Investigating Information Security Awareness: Research and Practice Gaps.
Inf. Secur. J. A Glob. Perspect., 2008

Process-variance models in information security awareness research.
Inf. Manag. Comput. Secur., 2008

2007
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007

2006
Formulating information systems risk management strategies through cultural theory.
Inf. Manag. Comput. Secur., 2006

A Framework for Exploiting Security Expertise in Application Development.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

An ontology for secure e-government applications.
Proceedings of the The First International Conference on Availability, 2006

2005
Information systems security from a knowledge management perspective.
Inf. Manag. Comput. Security, 2005

The insider threat to information systems and the effectiveness of ISO17799.
Comput. Secur., 2005

Information systems security policies: a contextual perspective.
Comput. Secur., 2005

Employing Ontologies for the Development of Security Critical Applications.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2003
Content, Context, Process Analysis of IS Security Policy Formation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

A Knowledge-Based Repository Model for Security Policies Management.
Proceedings of the Computer Network Security, 2003

Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project.
Proceedings of the Electronic Government, Second International Conference, 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Functional Requirements for a Secure Electronic Voting System.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Redefining Information Systems Security: Viable Information Systems.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Ανάπτυξη και διαχείριση ασφαλείας πληροφοριακών συστημάτων: εννοιολογικό πλαίσιο, μεθοδολογίες και εργαλεία
PhD thesis, 2000

The use of business process modelling in information systems security analysis and design.
Inf. Manag. Comput. Secur., 2000

Achieving Interoperability in a Multiple-Security- Policies Environment.
Comput. Secur., 2000

A Qualitative Approach to Information Availability.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Secur., 1999

1996
An analyst's view of IS security.
Proceedings of the Information Systems Security, 1996

Is there a Need for New Information Security Models?
Proceedings of the Communications and Multimedia Security II, 1996


  Loading...