| 2008 |
| 13 | EE | Aggeliki Tsohou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps.
Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008) |
| 2007 |
| 12 | EE | Maria Karyda,
Stefanos Gritzalis,
Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
EUC Workshops 2007: 12-21 |
| 11 | EE | Christos Fragos,
Maria Karyda,
Evangelos A. Kiountouzis:
Using the Lens of Circuits of Power in Information Systems Security Management.
TrustBus 2007: 228-236 |
| 2006 |
| 10 | EE | Maria Karyda,
Theodoros Balopoulos,
Lazaros Gymnopoulos,
Spyros Kokolakis,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stelios Dritsas:
An ontology for secure e-government applications.
ARES 2006: 1033-1037 |
| 9 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
| 8 | EE | Lilian Mitrou,
Maria Karyda:
Employees' privacy vs. employers' security: Can they be balanced?
Telematics and Informatics 23(3): 164-178 (2006) |
| 2005 |
| 7 | | Theodoros Balopoulos,
Stelios Dritsas,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process.
ECIW 2005: 21-28 |
| 6 | EE | Maria Karyda,
Evangelos A. Kiountouzis,
Spyros Kokolakis:
Information systems security policies: a contextual perspective.
Computers & Security 24(3): 246-260 (2005) |
| 5 | EE | Marianthi Theoharidou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799.
Computers & Security 24(6): 472-484 (2005) |
| 2003 |
| 4 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
| 3 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation.
SEC 2003: 145-156 |
| 2002 |
| 2 | | Dimitris Gritzalis,
Maria Karyda,
Lazaros Gymnopoulos:
Elaborating Quantitative Approaches for IT Security Evaluation.
SEC 2002: 67-78 |
| 2001 |
| 1 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Redefining Information Systems Security: Viable Information Systems.
SEC 2001: 453-468 |