| 2008 |
| 19 | EE | Aggeliki Tsohou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps.
Information Security Journal: A Global Perspective 17(5&6): 207-227 (2008) |
| 2007 |
| 18 | EE | Aggeliki Tsohou,
Marianthi Theoharidou,
Spyros Kokolakis,
Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
TrustBus 2007: 24-33 |
| 2006 |
| 17 | EE | Maria Karyda,
Theodoros Balopoulos,
Lazaros Gymnopoulos,
Spyros Kokolakis,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stelios Dritsas:
An ontology for secure e-government applications.
ARES 2006: 1033-1037 |
| 16 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
| 2005 |
| 15 | | Theodoros Balopoulos,
Stelios Dritsas,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process.
ECIW 2005: 21-28 |
| 14 | EE | Maria Karyda,
Evangelos A. Kiountouzis,
Spyros Kokolakis:
Information systems security policies: a contextual perspective.
Computers & Security 24(3): 246-260 (2005) |
| 13 | EE | Marianthi Theoharidou,
Spyros Kokolakis,
Maria Karyda,
Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799.
Computers & Security 24(6): 472-484 (2005) |
| 2003 |
| 12 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
| 11 | EE | Euripidis Loukis,
Spyros Kokolakis:
Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project.
EGOV 2003: 181-186 |
| 10 | EE | Spyros Kokolakis,
Costas Lambrinoudakis,
Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management.
MMM-ACNS 2003: 112-121 |
| 9 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation.
SEC 2003: 145-156 |
| 2002 |
| 8 | | S. Ikonomopoulos,
Costas Lambrinoudakis,
Dimitris Gritzalis,
Spyros Kokolakis,
K. Vassiliou:
Functional Requirements for a Secure Electronic Voting System.
SEC 2002: 507-520 |
| 2001 |
| 7 | | Maria Karyda,
Spyros Kokolakis,
Evangelos A. Kiountouzis:
Redefining Information Systems Security: Viable Information Systems.
SEC 2001: 453-468 |
| 2000 |
| 6 | | Theodore Tryfonas,
Dimitris Gritzalis,
Spyros Kokolakis:
A Qualitative Approach to Information Availability.
SEC 2000: 37-48 |
| 5 | | Spyros Kokolakis,
Evangelos A. Kiountouzis:
Achieving Interoperability in a Multiple-Security- Policies Environment.
Computers & Security 19(3): 267-281 (2000) |
| 4 | EE | Spyros Kokolakis,
A. J. Demopoulos,
Evangelos A. Kiountouzis:
The use of business process modelling in information systems security analysis and design.
Inf. Manag. Comput. Security 8(3): 107-116 (2000) |
| 1999 |
| 3 | EE | Diomidis Spinellis,
Spyros Kokolakis,
Stefanos Gritzalis:
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Security 7(3): 121-128 (1999) |
| 1996 |
| 2 | | Spyros Kokolakis:
Is there a Need for New Information Security Models?
Communications and Multimedia Security 1996: 256-267 |
| 1 | | Evangelos A. Kiountouzis,
Spyros Kokolakis:
An analyst's view of IS security.
SEC 1996: 23-35 |