2008 |
19 | EE | Aggeliki Tsohou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps.
Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008) |
2007 |
18 | EE | Aggeliki Tsohou,
Marianthi Theoharidou,
Spyros Kokolakis,
Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
TrustBus 2007: 24-33 |
2006 |
17 | EE | Maria Karyda,
Theodoros Balopoulos,
Lazaros Gymnopoulos,
Spyros Kokolakis,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stelios Dritsas:
An ontology for secure e-government applications.
ARES 2006: 1033-1037 |
16 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
2005 |
15 | | Theodoros Balopoulos,
Stelios Dritsas,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process.
ECIW 2005: 21-28 |
14 | EE | Maria Karyda,
Evangelos A. Kiountouzis,
Spyros Kokolakis:
Information systems security policies: a contextual perspective.
Computers & Security 24(3): 246-260 (2005) |
13 | EE | Marianthi Theoharidou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799.
Computers & Security 24(6): 472-484 (2005) |
2003 |
12 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
11 | EE | Euripidis Loukis,
Spyros Kokolakis:
Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project.
EGOV 2003: 181-186 |
10 | EE | Spyros Kokolakis,
Costas Lambrinoudakis,
Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management.
MMM-ACNS 2003: 112-121 |
9 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation.
SEC 2003: 145-156 |
2002 |
8 | | S. Ikonomopoulos,
Costas Lambrinoudakis,
Dimitris Gritzalis,
Spyros Kokolakis,
K. Vassiliou:
Functional Requirements for a Secure Electronic Voting System.
SEC 2002: 507-520 |
2001 |
7 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Redefining Information Systems Security: Viable Information Systems.
SEC 2001: 453-468 |
2000 |
6 | | Theodore Tryfonas,
Dimitris Gritzalis,
Spyros Kokolakis:
A Qualitative Approach to Information Availability.
SEC 2000: 37-48 |
5 | | Spyros Kokolakis,
Evangelos A. Kiountouzis:
Achieving Interoperability in a Multiple-Security- Policies Environment.
Computers & Security 19(3): 267-281 (2000) |
4 | EE | Spyros Kokolakis,
A. J. Demopoulos,
Evangelos A. Kiountouzis:
The use of business process modelling in information systems security analysis and design.
Inf. Manag. Comput. Security 8(3): 107-116 (2000) |
1999 |
3 | EE | Diomidis Spinellis,
Spyros Kokolakis,
Stefanos Gritzalis:
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Security 7(3): 121-128 (1999) |
1996 |
2 | | Spyros Kokolakis:
Is there a Need for New Information Security Models?
Communications and Multimedia Security 1996: 256-267 |
1 | | Evangelos A. Kiountouzis,
Spyros Kokolakis:
An analyst's view of IS security.
SEC 1996: 23-35 |