Maria Karyda

Orcid: 0000-0001-9402-8570

Affiliations:
  • University of the Aegean, Greece


According to our database1, Maria Karyda authored at least 56 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Addressing Organisational, Individual and Technological Aspects and Challenges in Information Security Management: Applying a Framework for a Case Study.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures.
Inf. Comput. Secur., 2022

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach.
J. Cybersecur. Priv., December, 2021

Forming digital identities in social networks: the role of privacy concerns and self-esteem.
Inf. Comput. Secur., 2021

BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Integrating Privacy-By-Design with Business Process Redesign.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Requirements for private communications over public spheres.
Inf. Comput. Secur., 2020

Evaluating privacy impact assessment methods: guidelines and best practice.
Inf. Comput. Secur., 2020

Automated data-driven profiling: threats for group privacy.
Inf. Comput. Secur., 2020

From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls.
Inf. Comput. Secur., 2020

Big Data Analytics in Healthcare Applications: Privacy Implications for Individuals and Groups and Mitigation Strategies.
Proceedings of the Information Systems, 2020

2019
From theory to practice: guidelines for enhancing information security management.
Inf. Comput. Secur., 2019

General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Big Data Analytics: From Threatening Privacy to Challenging Democracy.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

2018
Usability Characteristics of Security and Privacy Tools: The User's Perspective.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

An Evaluation Framework for Privacy Impact Assessment Methods.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

An Organizational Scheme for Privacy Impact Assessments.
Proceedings of the Information Systems, 2018

2017
Fostering Information Security Culture In Organizations: A Research Agenda.
Proceedings of the 11th Mediterranean Conference on Information Systems, 2017

Using Personalization Technologies for Political Purposes: Privacy Implications.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

2016
Data Breach Notification: Issues and Challenges for Security Management.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016

2015
Managing the introduction of information security awareness programmes in organisations.
Eur. J. Inf. Syst., 2015

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Comput. Secur., 2015

Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Evaluating Privacy Practices in Web 2.0 Services.
Proceedings of the 9th Mediterranean Conference on Information Systems, 2015

2014
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Directions for Raising Privacy Awareness in SNS Platforms.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2013
A Classification of Factors Influencing Low Adoption of PETs Among SNS Users.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

2012
Analyzing Trajectories of Information Security Awareness.
Inf. Technol. People, 2012

An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Implementation Challenges for Information Security Awareness Initiatives in E-Government.
Proceedings of the 20th European Conference on Information Systems, 2012

2010
Analyzing Information Security Awareness through Networks of Association.
Proceedings of the Trust, 2010

2009
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009

Aligning Security Awareness With Information Systems Security Management.
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009

2008
Investigating Information Security Awareness: Research and Practice Gaps.
Inf. Secur. J. A Glob. Perspect., 2008

Process-variance models in information security awareness research.
Inf. Manag. Comput. Secur., 2008

2007
Using the Lens of Circuits of Power in Information Systems Security Management.
Proceedings of the Trust, 2007

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Employees' privacy vs. employers' security: Can they be balanced?
Telematics Informatics, 2006

Formulating information systems risk management strategies through cultural theory.
Inf. Manag. Comput. Secur., 2006

A framework for outsourcing IS/IT security services.
Inf. Manag. Comput. Secur., 2006

A Framework for Exploiting Security Expertise in Application Development.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

An ontology for secure e-government applications.
Proceedings of the The First International Conference on Availability, 2006

2005
Διοίκηση ασφάλειας πληροφοριακών συστημάτων: οργανωσιακά ζητήματα ανάπτυξης, εφαρμογής και ενσωμάτωσης πολιτικών ασφάλειας
PhD thesis, 2005

The insider threat to information systems and the effectiveness of ISO17799.
Comput. Secur., 2005

Information systems security policies: a contextual perspective.
Comput. Secur., 2005

Employing Ontologies for the Development of Security Critical Applications.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2003
Secure Electronic Voting: the Current Landscape.
Proceedings of the Secure Electronic Voting, 2003

Content, Context, Process Analysis of IS Security Policy Formation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Electronic Voting Systems: Security Implications of the Administrative Workflow.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Elaborating Quantitative Approaches for IT Security Evaluation.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Redefining Information Systems Security: Viable Information Systems.
Proceedings of the Trusted Information: The New Decade Challenge, 2001


  Loading...