2008 |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Aggeliki Tsohou, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol = 16, pp. = 3, http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract, 271 – 287, 2008, Emerald |
| | |
2006 |
Spyros Kokolakis, Maria Karyda, Constantinos Lambrinoudakis, S. Dritsas, Lazaros Gymnopoulos, Theodoros Balopoulos, S. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf, 2006 |
| | |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Aggeliki Tsohou, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol = 14, pp. = 3, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&articleid=1556708, 198-217, 2006, Emerald |
| | |
2005 |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, M. Theoharidou, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol = 24, pp. = 6, http://www.sciencedirect.com/science/article/pii/S0167404805000684, YES, 1.43, 472-484, 2005, Elsevier |
| | |
Spyros Kokolakis, E. Kiountouzis, Maria Karyda, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol = 24, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0167404804002378, YES, 1.43, 246-260, 2005, Elsevier |
| | |
Spyros Kokolakis, E. Kiountouzis, Petros Belsis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol = 13, pp. = 3, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&articleid=1505858&show=abstract, 189-202, 2005, Emerald |
| | |
Spyros Kokolakis, Constantinos Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol = 6, pp. = 4, http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078, 2005, CEPIS |
| | |
2004 |
Spyros Kokolakis, Euripidis Loukis, An architecture for a flexible public sector collaborative environment, eJETA, Vol = 1, pp. = 3, 2004 |
| | |
2000 |
Spyros Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol = 19, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0167404800886150, YES, 1.158, 267-281, 2000, Elsevier |
| | |
Spyros Kokolakis, E. Kiountouzis, A. Demopoulos, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol = 8, pp. = 3, www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=862766, 107-116, 2000, MCB |
| | |