« Προηγούμενο123Επόμενο »

Περιοδικό

1998
Spyros Kokolakis, S. Katsikas, D. Gritzalis, Generic security policies for healthcare information systems, Health Informatics Journal, Vol = 4, pp. = 3, http://jhi.sagepub.com/content/4/3-4/184.full.pdf+html, 184-195, 1998, SAGE   
1999
Stefanos Gritzalis, Spyros Kokolakis, D. Spinellis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol = 7, pp. = 3, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/0460070302.pdf, 121-128, 1999, MCB University Press   
2000
Spyros Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol = 19, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0167404800886150, YES, 1.158, 267-281, 2000, Elsevier   
Spyros Kokolakis, E. Kiountouzis, A. Demopoulos, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol = 8, pp. = 3, www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=862766, 107-116, 2000, MCB   
2004
Spyros Kokolakis, Euripidis Loukis, An architecture for a flexible public sector collaborative environment, eJETA, Vol = 1, pp. = 3, 2004   
2005
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, M. Theoharidou, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol = 24, pp. = 6, http://www.sciencedirect.com/science/article/pii/S0167404805000684, YES, 1.43, 472-484, 2005, Elsevier   
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol = 24, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0167404804002378, YES, 1.43, 246-260, 2005, Elsevier   
Spyros Kokolakis, E. Kiountouzis, Petros Belsis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol = 13, pp. = 3, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&articleid=1505858&show=abstract, 189-202, 2005, Emerald   
Spyros Kokolakis, Constantinos Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol = 6, pp. = 4, http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078, 2005, CEPIS   
2006
Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, S. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf, 2006