Spyros Kokolakis
Spyros Kokolakis
Verified email at aegean.gr - Homepage
Cited by
Cited by
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
S Kokolakis
Computers & security 64, 122-134, 2017
The insider threat to information systems and the effectiveness of ISO17799
M Theoharidou, S Kokolakis, M Karyda, E Kiountouzis
Computers & Security 24 (6), 472-484, 2005
Information systems security policies: a contextual perspective
M Karyda, E Kiountouzis, S Kokolakis
Computers & security 24 (3), 246-260, 2005
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
A Tsohou, M Karyda, S Kokolakis
Computers & security 52, 128-141, 2015
Managing the introduction of information security awareness programmes in organisations
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
European Journal of Information Systems 24 (1), 38-58, 2015
Information systems security from a knowledge management perspective
P Belsis, S Kokolakis, E Kiountouzis
Information Management & Computer Security, 2005
Investigating information security awareness: research and practice gaps
A Tsohou, S Kokolakis, M Karyda, E Kiountouzis
Information Security Journal: A Global Perspective 17 (5-6), 207-227, 2008
Security requirements, risks and recommendations for small enterprise and home‐office environments
D Spinellis, S Kokolakis, S Gritzalis
Information Management & Computer Security, 1999
The use of business process modelling in information systems security analysis and design
SA Kokolakis, AJ Demopoulos, EA Kiountouzis
Information Management & Computer Security, 2000
Formulating information systems risk management strategies through cultural theory
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
Information Management & Computer Security, 2006
Analyzing trajectories of information security awareness
A Tsohou, M Karyda, S Kokolakis, E Kiountouzis
Information Technology & People, 2012
An ontology for secure e-government applications
M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ...
First International Conference on Availability, Reliability and Security …, 2006
A security standards' framework to facilitate best practices' awareness and conformity
SM Furnell, N Clarke, R von Solms, A Tsohou, S Kokolakis, ...
Information Management & Computer Security, 2010
Functional requirements for a secure electronic voting system
S Ikonomopoulos, C Lambrinoudakis, D Gritzalis, S Kokolakis, K Vassiliou
Security in the information society, 507-519, 2002
Privacy and fair information practices in ubiquitous environments
JH Park, S Gritzalis, CH Hsu, M Karyda, S Kokolakis
Internet Research, 2009
Process‐variance models in information security awareness research
A Tsohou, S Kokolakis, M Karyda, E Kiountouzis
Information Management & Computer Security, 2008
Electronic voting systems: Security implications of the administrative workflow
C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ...
14th International Workshop on Database and Expert Systems Applications …, 2003
Security and Dependability for Ambient Intelligence
G Spanoudakis, S Kokolakis
Springer Science & Business Media, 2009
A qualitative approach to information availability
T Tryfonas, D Gritzalis, S Kokolakis
IFIP International Information Security Conference, 37-47, 2000
Generic security policies for healthcare information systems
S Kokolakis, D Gritzalis, S Katsikas
Health informatics journal 4 (3-4), 184-195, 1998
The system can't perform the operation now. Try again later.
Articles 1–20