Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Personal Details
Short CV
Research Interests
Teaching Activities
UnderGraduate Students Supervision Activities
MSc Students Supervision Activities
Editing & Conference Organization Activities

Faculty Members
Gritzalis Stefanos
Kambourakis Georgios
Karyda Maria
Kokolakis Spyros
Konstantinou Elisavet
Mitrou Lilian

Categories
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Name: Kokolakis Spyros
Office: B12 / Lymperis Building
Phone: +30 22730 82233
E-mail: [javascript protected email address]
WebPage: http://www.icsd.aegean.gr/sak
Publications
Citations (as measured by Google Scholar)

Publications
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.

JournalsConferencesBooksChapters in BooksConferences Proceedings Editor


Journals

1S. Kokolakis, Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon, Computers & Security, 2015, Elsevier, (to appear)
, indexed in SCI-E, IF = 1.035
2A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Managing the Introduction of Information Security Awareness Programs in Organisations, European Journal of Information Systems, Vol. 24, No. 1, pp. 38-58, 2015, Palgrave ,
https://www.researchgate.net/publication/257227930_Managing_the_introduction_of_....
, indexed in SCI-E, IF = 2.213
3A. Tsohou, M. Karyda, S. Kokolakis, Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs, Computers & Security, Vol. 52, pp. 128–141, 2015, Elsevier,
https://www.researchgate.net/publication/275898027_Analyzing_the_role_of_Cogniti....
, indexed in SCI-E, IF = 1.17
4 K. Anastasopoulou, S. Kokolakis, Exploring Citizens’ Intention to Use e-Government Services: The Role of Cultural Bias, International Journal of Electronic Governance, Vol. 6, No. 1, pp. 3-19, 2013, Inderscience,
http://www.inderscience.com/info/inarticle.php?artid=53378

5A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Analyzing Trajectories of Information Security Awareness, Information Technology & People, Vol. 25, No. 3, 2012, Emerald,
http://www.emeraldinsight.com/journals.htm?articleid=17047485&show=abstract
, indexed in SCI-E, IF = 0.767
6A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Aligning Security Awareness with Information Systems Security Management, Journal of Information Systems Security, Vol. 6, No. 1, pp. 36-64, 2010,
http://www.jissec.org/Contents/V6/N1/V6N1-Tsohou.html

7A. Tsohou, C. Lambrinoudakis, S. Kokolakis, S. Gritzalis, The Importance of Context-Dependent Privacy Requirements and Perceptions to the Design of Privacy-Aware Systems, UPGRADE, Vol. 11, No. 1, pp. 32-37, 2010, CEPIS,
http://www.cepis.org/files/cepisupgrade/issue-1-2010-tsohouetc.pdf

8A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, A Security Standards’ Framework to facilitate Best Practices’ Awareness and Conformity, Information Management & Computer Security, Vol. 18, No. 5, pp. 350-365, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=18&issue=5&arti....

9M. Karyda, S. Gritzalis, J. H. Park, S. Kokolakis, Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research, Vol. 19, No. 2, pp. 194-208, 2009, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=19&issue=2&arti....
, indexed in SCI-E, IF = 0.844
10A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol. 17, No. 5&6, pp. 207–227, 2008, Taylor & Francis,
http://www.tandfonline.com/doi/pdf/10.1080/19393550802492487

11A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol. 16, No. 3, pp. 271 – 287, 2008, Emerald ,
http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract

12S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, S. K. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, 2006,
http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf

13A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&arti....

14M. Karyda, E. Kiountouzis, S. Kokolakis, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol. 24, No. 3, pp. 246-260, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404804002378
, indexed in SCI-E, IF = 1.430 (5-year)
15M. Theoharidou, S. Kokolakis, M. Karyda, E. Kiountouzis, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol. 24, No. 6, pp. 472-484, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404805000684
, indexed in SCI-E, IF = 1.430 (5-year)
16P. Belsis, E. Kiountouzis, S. Kokolakis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol. 13, No. 3, pp. 189-202, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&arti....

17S. Kokolakis, C. Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol. 6, No. 4, 2005, CEPIS ,
http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078

18E. Loukis, S. Kokolakis, An architecture for a flexible public sector collaborative environment, eJETA, Vol. 1, No. 3, 2004

19S. Kokolakis, A. Demopoulos, E. Kiountouzis, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol. 8, No. 3, pp. 107-116, 2000, MCB,
www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=86....

20S. Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol. 19, No. 3, pp. 267-281, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800886150
, indexed in SCI-E, IF = 1.158
21D. Spinellis, S. Kokolakis, S. Gritzalis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol. 7, No. 3, pp. 121-128, 1999, MCB University Press ,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

22S. Kokolakis, D. Gritzalis, S. K. Katsikas, Generic security policies for healthcare information systems, Health Informatics Journal, Vol. 4, No. 3, pp. 184-195, 1998, SAGE ,
http://jhi.sagepub.com/content/4/3-4/184.full.pdf+html



University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2018