dblp.uni-trier.dewww.uni-trier.de

Evangelos A. Kiountouzis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEAggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: Investigating Information Security Awareness: Research and Practice Gaps. Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008)
2007
12EEChristos Fragos, Maria Karyda, Evangelos A. Kiountouzis: Using the Lens of Circuits of Power in Information Systems Security Management. TrustBus 2007: 228-236
2005
11EEMaria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis: Information systems security policies: a contextual perspective. Computers & Security 24(3): 246-260 (2005)
10EEMarianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis: The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 24(6): 472-484 (2005)
2003
9 Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156
8 Theodore Tryfonas, Evangelos A. Kiountouzis: Perceptions of Security Contributing to the Implementation of Secure IS. SEC 2003: 313-324
2002
7 Theodore Tryfonas, Evangelos A. Kiountouzis: Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. SEC 2002: 347-356
2001
6 Theodore Tryfonas, Evangelos A. Kiountouzis: Security Concerns for Contemporary Development Practices: A Case Study. SEC 2001: 421-436
5 Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis: Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468
4EETheodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou: Embedding security practices in contemporary information systems development approaches. Inf. Manag. Comput. Security 9(4): 183-197 (2001)
2000
3 Spyros Kokolakis, Evangelos A. Kiountouzis: Achieving Interoperability in a Multiple-Security- Policies Environment. Computers & Security 19(3): 267-281 (2000)
2EESpyros Kokolakis, A. J. Demopoulos, Evangelos A. Kiountouzis: The use of business process modelling in information systems security analysis and design. Inf. Manag. Comput. Security 8(3): 107-116 (2000)
1996
1 Evangelos A. Kiountouzis, Spyros Kokolakis: An analyst's view of IS security. SEC 1996: 23-35

Coauthor Index

1A. J. Demopoulos [2]
2Christos Fragos [12]
3Maria Karyda [5] [9] [10] [11] [12] [13]
4Spyros Kokolakis [1] [2] [3] [5] [9] [10] [11] [13]
5Angeliki Poulymenakou [4]
6Marianthi Theoharidou [10]
7Theodore Tryfonas [4] [6] [7] [8]
8Aggeliki Tsohou [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)