Follow
Spyros Kokolakis
Spyros Kokolakis
Verified email at aegean.gr - Homepage
Title
Cited by
Cited by
Year
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
S Kokolakis
Computers & security 64, 122-134, 2017
16102017
The insider threat to information systems and the effectiveness of ISO17799
M Theoharidou, S Kokolakis, M Karyda, E Kiountouzis
Computers & Security 24 (6), 472-484, 2005
4312005
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
A Tsohou, M Karyda, S Kokolakis
Computers & security 52, 128-141, 2015
2682015
Information systems security policies: a contextual perspective
M Karyda, E Kiountouzis, S Kokolakis
Computers & security 24 (3), 246-260, 2005
2622005
Managing the introduction of information security awareness programmes in organisations
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
European Journal of Information Systems 24 (1), 38-58, 2015
1842015
Investigating information security awareness: research and practice gaps
A Tsohou, S Kokolakis, M Karyda, E Kiountouzis
Information Security Journal: A Global Perspective 17 (5-6), 207-227, 2008
1332008
Information systems security from a knowledge management perspective
P Belsis, S Kokolakis, E Kiountouzis
Information Management & Computer Security 13 (3), 189-202, 2005
1162005
Behavioral biometrics & continuous user authentication on mobile devices: A survey
I Stylios, S Kokolakis, O Thanou, S Chatzis
Information Fusion 66, 76-99, 2021
1132021
Analyzing trajectories of information security awareness
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
Information Technology & People 25 (3), 327-352, 2012
962012
Security requirements, risks and recommendations for small enterprise and home‐office environments
D Spinellis, S Kokolakis, S Gritzalis
Information Management & Computer Security 7 (3), 121-128, 1999
951999
Formulating information systems risk management strategies through cultural theory
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
Information Management & Computer Security 14 (3), 198-217, 2006
832006
The use of business process modelling in information systems security analysis and design
SA Kokolakis, AJ Demopoulos, EA Kiountouzis
Information Management & Computer Security 8 (3), 107-116, 2000
822000
An ontology for secure e-government applications
M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ...
First International Conference on Availability, Reliability and Security …, 2006
692006
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions
M Karyda, S Gritzalis, J Hyuk Park, S Kokolakis
Internet Research 19 (2), 194-208, 2009
632009
A security standards' framework to facilitate best practices' awareness and conformity
A Tsohou, S Kokolakis, C Lambrinoudakis, S Gritzalis
Information Management & Computer Security 18 (5), 350-365, 2010
622010
Functional requirements for a secure electronic voting system
S Ikonomopoulos, C Lambrinoudakis, D Gritzalis, S Kokolakis, K Vassiliou
Security in the Information Society: Visions and Perspectives, 507-519, 2002
602002
A Qualitative Approach to Information Availability: This work has been supported in part by the Greek National Secretariat for Research and Development, under Programme YPER’97
T Tryfonas, D Gritzalis, S Kokolakis
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
452000
Process‐variance models in information security awareness research
A Tsohou, S Kokolakis, M Karyda, E Kiountouzis
Information Management & Computer Security 16 (3), 271-287, 2008
442008
Security and Dependability for Ambient Intelligence
G Spanoudakis, S Kokolakis
Springer Science & Business Media, 2009
432009
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
402003
The system can't perform the operation now. Try again later.
Articles 1–20