Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Spyros Kokolakis
2010 – today
- 2013
[c20]Anastasopoulou Kalliopi, Theo Tryfonas, Spyros Kokolakis: Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps. HCI (27) 2013: 209-216- 2012
[j11]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Analyzing Trajectories of Information Security Awareness. IT & People 25(3): 327-352 (2012)
[c19]Spyros Kokolakis, Anastasopoulou Kalliopi, Maria Karyda: An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions. Panhellenic Conference on Informatics 2012: 123-126- 2010
[c18]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis: Unifying ISO Security Standards Practices into a Single Security Framework. SAISMC 2010: 188-203
[c17]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Analyzing Information Security Awareness through Networks of Association. TrustBus 2010: 227-237
2000 – 2009
- 2009
[j10]Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park, Spyros Kokolakis: Privacy and fair information practices in ubiquitous environments: Research challenges and future directions. Internet Research 19(2): 194-208 (2009)
[c16]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis: Information Systems Security Management: A Review and a Classification of the ISO Standards. e-Democracy 2009: 220-235
[c15]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Aligning Security Awareness With Information Systems Security Management. MCIS 2009: 73
[p3]Antonio Maña, George Spanoudakis, Spyros Kokolakis: Introduction: The SERENITY vision. Security and Dependability for Ambient Intelligence 2009: 1-18
[p2]Spyros Kokolakis, Panagiotis Rizomiliotis, Azzedine Benameur, Smriti Kumar Sinha: Security and Dependability Solutions for Web Services and Workflows. Security and Dependability for Ambient Intelligence 2009: 97-106
[p1]Antonio Maña, George Spanoudakis, Spyros Kokolakis: Future Directions. Security and Dependability for Ambient Intelligence 2009: 379-383
[e1]Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis (Eds.): Security and Dependability for Ambient Intelligence. Advances in Information Security 45, Springer 2009, ISBN 978-0-387-88774-6- 2008
[j9]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: Process-variance models in information security awareness research. Inf. Manag. Comput. Security 16(3): 271-287 (2008)
[j8]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: Investigating Information Security Awareness: Research and Practice Gaps. Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008)- 2007
[c14]Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis: Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33- 2006
[j7]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Formulating information systems risk management strategies through cultural theory. Inf. Manag. Comput. Security 14(3): 198-217 (2006)
[c13]Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037
[c12]Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70- 2005
[j6]Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis: Information systems security policies: a contextual perspective. Computers & Security 24(3): 246-260 (2005)
[j5]Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 24(6): 472-484 (2005)
[j4]Petros Belsis, Spyros Kokolakis, Evangelos A. Kiountouzis: Information systems security from a knowledge management perspective. Inf. Manag. Comput. Security 13(3): 189-202 (2005)
[c11]Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis: Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28
[c10]Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Theodoros Balopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis: Employing Ontologies for the Development of Security Critical Applications. I3E 2005: 187-201- 2003
[c9]Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
[c8]Euripidis Loukis, Spyros Kokolakis: Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project. EGOV 2003: 181-186
[c7]Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121
[c6]Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156- 2002
[c5]Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520- 2001
[c4]Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468- 2000
[j3]Spyros Kokolakis, Evangelos A. Kiountouzis: Achieving Interoperability in a Multiple-Security- Policies Environment. Computers & Security 19(3): 267-281 (2000)
[j2]Spyros Kokolakis, A. J. Demopoulos, Evangelos A. Kiountouzis: The use of business process modelling in information systems security analysis and design. Inf. Manag. Comput. Security 8(3): 107-116 (2000)
[c3]Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis: A Qualitative Approach to Information Availability. SEC 2000: 37-48
1990 – 1999
- 1999
[j1]Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis: Security requirements, risks and recommendations for small enterprise and home-office environments. Inf. Manag. Comput. Security 7(3): 121-128 (1999)- 1996
[c2]Spyros Kokolakis: Is there a Need for New Information Security Models? Communications and Multimedia Security 1996: 256-267
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:13 CEST by the dblp team



