dblp.uni-trier.dewww.uni-trier.de

Maria Karyda

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEAggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: Investigating Information Security Awareness: Research and Practice Gaps. Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008)
2007
12EEMaria Karyda, Stefanos Gritzalis, Jong Hyuk Park: A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21
11EEChristos Fragos, Maria Karyda, Evangelos A. Kiountouzis: Using the Lens of Circuits of Power in Information Systems Security Management. TrustBus 2007: 228-236
2006
10EEMaria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037
9EETheodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70
8EELilian Mitrou, Maria Karyda: Employees' privacy vs. employers' security: Can they be balanced? Telematics and Informatics 23(3): 164-178 (2006)
2005
7 Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis: Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28
6EEMaria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis: Information systems security policies: a contextual perspective. Computers & Security 24(3): 246-260 (2005)
5EEMarianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 24(6): 472-484 (2005)
2003
4EECostas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
3 Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156
2002
2 Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos: Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
2001
1 Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468

Coauthor Index

1Theodoros Balopoulos [7] [9] [10]
2Stelios Dritsas [7] [10]
3Christos Fragos [11]
4Dimitris Gritzalis [2] [4]
5Stefanos Gritzalis [7] [9] [10] [12]
6Lazaros Gymnopoulos [2] [7] [9] [10]
7Sokratis K. Katsikas [4] [9]
8Evangelos A. Kiountouzis [1] [3] [5] [6] [11] [13]
9Spyros Kokolakis [1] [3] [4] [5] [6] [7] [9] [10] [13]
10Costas Lambrinoudakis [4] [10]
11Lilian Mitrou [8]
12Jong Hyuk Park [12]
13Marianthi Theoharidou [5]
14Aggeliki Tsohou [13]
15Vassilis Tsoumas [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)