Aggeliki Tsohou

Orcid: 0000-0003-2200-3651

According to our database1, Aggeliki Tsohou authored at least 57 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors.
J. Cybersecur. Priv., July, 2023

Cyber insurance: state of the art, trends and future directions.
Int. J. Inf. Sec., June, 2023

Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance.
Eur. J. Inf. Syst., March, 2023

How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors.
Multimodal Technol. Interact., 2023

2022
A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness.
Telematics Informatics, 2021

A Data Scope Management Service to Support Privacy by Design and GDPR Compliance.
J. Data Intell., 2021

Forming digital identities in social networks: the role of privacy concerns and self-esteem.
Inf. Comput. Secur., 2021

Towards an Information Privacy and Personal Data Protection Competency Model for Citizens.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

2020
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary.
J. Assoc. Inf. Syst., 2020

Effects of privacy policy visualization on users' information privacy awareness level.
Inf. Technol. People, 2020

Examining the side effects of organizational Internet monitoring on employees.
Internet Res., 2020

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

AppAware: a policy visualization model for mobile applications.
Inf. Comput. Secur., 2020

From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls.
Inf. Comput. Secur., 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.
Proceedings of the Information Systems, 2020

2019
Developing and validating a common body of knowledge for information privacy.
Inf. Comput. Secur., 2019


General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Demystifying the Influential IS Legends of Positivism.
J. Assoc. Inf. Syst., 2018

Are users competent to comply with information security policies? An analysis of professional competence models.
Inf. Technol. People, 2018

AppAware: A Model for Privacy Policy Visualization for Mobile Applications.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

2017
Embedding persuasive features into policy issues: Implications to designing public participation processes.
Gov. Inf. Q., 2017

Enabling valid informed consent for location tracking through privacy awareness of users: A process theory.
Comput. Law Secur. Rev., 2017

Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data.
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017

The Privacy Paradox in the Context of Online Health Data Disclosure by Users.
Proceedings of the Information Systems, 2017

Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015

The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
A framework for privacy-preserving access to next-generation EHRs.
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014

Expressive or Instrumental: the Dual Perspective Model of Personal Web Usage at Workplace.
Proceedings of the 22st European Conference on Information Systems, 2014

The Dual Nature of Personal Web Usage at Workplace: Impacts, Antecedents and regulating Policies.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
Governance of IT Service Procurement: Relationship vs Network based Approach.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2012
Analyzing Trajectories of Information Security Awareness.
Inf. Technol. People, 2012

Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries.
Int. J. Electron. Gov. Res., 2012

Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Implementation Challenges for Information Security Awareness Initiatives in E-Government.
Proceedings of the 20th European Conference on Information Systems, 2012

2010
Η ενημερότητα ασφαλείας στα πλαίσια της διοίκησης ασφαλείας πληροφοριακών συστημάτων
PhD thesis, 2010

A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity.
Inf. Manag. Comput. Secur., 2010

Analyzing Information Security Awareness through Networks of Association.
Proceedings of the Trust, 2010

Privacy Requirements Engineering for Trustworthy e-Government Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Engineering secure systems with ISO 26702 and 27001.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Unifying ISO Security Standards Practices into a Single Security Framework.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Aligning Security Awareness With Information Systems Security Management.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
Investigating Information Security Awareness: Research and Practice Gaps.
Inf. Secur. J. A Glob. Perspect., 2008

Process-variance models in information security awareness research.
Inf. Manag. Comput. Secur., 2008

2007
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
Proceedings of the Trust, 2007

2006
Formulating information systems risk management strategies through cultural theory.
Inf. Manag. Comput. Secur., 2006


  Loading...