Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon S Kokolakis Computers & security 64, 122-134, 2017 | 1423 | 2017 |
The insider threat to information systems and the effectiveness of ISO17799 M Theoharidou, S Kokolakis, M Karyda, E Kiountouzis Computers & Security 24 (6), 472-484, 2005 | 417 | 2005 |
Information systems security policies: a contextual perspective M Karyda, E Kiountouzis, S Kokolakis Computers & security 24 (3), 246-260, 2005 | 254 | 2005 |
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs A Tsohou, M Karyda, S Kokolakis Computers & security 52, 128-141, 2015 | 244 | 2015 |
Managing the introduction of information security awareness programmes in organisations A Tsohou, M Karyda, S Kokolakis, E Kiountouzis European Journal of Information Systems 24 (1), 38-58, 2015 | 166 | 2015 |
Investigating information security awareness: research and practice gaps A Tsohou, S Kokolakis, M Karyda, E Kiountouzis Information Security Journal: A Global Perspective 17 (5-6), 207-227, 2008 | 131 | 2008 |
Information systems security from a knowledge management perspective P Belsis, S Kokolakis, E Kiountouzis Information Management & Computer Security 13 (3), 189-202, 2005 | 114 | 2005 |
Security requirements, risks and recommendations for small enterprise and home‐office environments D Spinellis, S Kokolakis, S Gritzalis Information Management & Computer Security 7 (3), 121-128, 1999 | 94 | 1999 |
Analyzing trajectories of information security awareness A Tsohou, M Karyda, S Kokolakis, E Kiountouzis Information Technology & People 25 (3), 327-352, 2012 | 93 | 2012 |
Behavioral biometrics & continuous user authentication on mobile devices: A survey I Stylios, S Kokolakis, O Thanou, S Chatzis Information Fusion 66, 76-99, 2021 | 88 | 2021 |
Formulating information systems risk management strategies through cultural theory A Tsohou, M Karyda, S Kokolakis, E Kiountouzis Information Management & Computer Security 14 (3), 198-217, 2006 | 85 | 2006 |
The use of business process modelling in information systems security analysis and design SA Kokolakis, AJ Demopoulos, EA Kiountouzis Information Management & Computer Security 8 (3), 107-116, 2000 | 82 | 2000 |
An ontology for secure e-government applications M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ... First International Conference on Availability, Reliability and Security …, 2006 | 69 | 2006 |
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions M Karyda, S Gritzalis, JH Park, S Kokolakis Internet Research 19 (2), 194-208, 2009 | 61 | 2009 |
Functional requirements for a secure electronic voting system S Ikonomopoulos, C Lambrinoudakis, D Gritzalis, S Kokolakis, K Vassiliou Security in the Information Society: Visions and Perspectives, 507-519, 2002 | 59 | 2002 |
A security standards' framework to facilitate best practices' awareness and conformity A Tsohou, S Kokolakis, C Lambrinoudakis, S Gritzalis Information Management & Computer Security 18 (5), 350-365, 2010 | 58 | 2010 |
A Qualitative Approach to Information Availability: This work has been supported in part by the Greek National Secretariat for Research and Development, under Programme YPER’97 T Tryfonas, D Gritzalis, S Kokolakis Information Security for Global Information Infrastructures: IFIP TC11 …, 2000 | 45 | 2000 |
Process‐variance models in information security awareness research A Tsohou, S Kokolakis, M Karyda, E Kiountouzis Information Management & Computer Security 16 (3), 271-287, 2008 | 44 | 2008 |
Security and Dependability for Ambient Intelligence G Spanoudakis, S Kokolakis Springer Science & Business Media, 2009 | 42 | 2009 |
Electronic voting systems: Security implications of the administrative workflow C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ... 14th International Workshop on Database and Expert Systems Applications …, 2003 | 40 | 2003 |