Εκπαίδευση - Σπουδές

Πτυχίο Πληροφορικής .Ε.Α.Π.

Μεταπτυχιακό Δίπλωμα Ειδίκευσης στη κατεύθυνση Διοίκηση Πληροφοριακών Συστημάτων (MIS) του τμήματος Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων του Πανεπιστημίου Αιγαίου.

Πιστοποιήσεις:

  • "Εργαστήριο Ψηφιακών Συστημάτων" της Σχολής Θετικών Επιστημών του ΕΑΠ
  • "U.Lab: Transforming Business, Society, and Self", ΜΙΤx
  • SciWrite-SP Writing in the Sciences-Stanford University, School of Medicine
  • "Intoduction to Marketing",The Wharton School University of Pennsylvania
  • Developing Innovative Ideas for New Companies: The First Step in Entrepreneurship by University of Maryland
  • Step-by-step guide to reviewing, Elsevier Publishing Campus

Ερευνητικά Ενδιαφέροντα

Πληροφοριακή ιδιωτικότητα, Ανωνυμία, ανθρωπινη συμπεριφορά, means - end ανάλυση, μέθοδος κλιμακοποίησης(laddering). Εργαλεία Ενισχυσης Ιδιωτικότητας, Αλληλεπίδραση Ανθρώπου - Υπολογιστή

Διδασκαλία

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


A. Skalkos, A. Tsohou, M. Karyda, S. Kokolakis, INVESTIGATING THE VALUES THAT DRIVE THE ADOPTION OF ANONYMITY TOOLS: A LADDERING APPROACH, 11th Mediterranean Conference on Information Systems (MCIS 2017) , Sep, 2017, The 11th Mediterranean Conference on Information Systems Genoa,Italy
 

Abstract
Concerns about privacy and frustration over censorship and content blocking are driving millions to use privacy enhancing products. This research-in-progress focuses on anonymity tools, as a Privacy Enhancing Technology (PET), investigating the values that drive the adoption of anonymity tools by users. We use means-end analysis, a methodology we consider to be appropriate for investigating users’ conceptions and incentives for adopting anonymity tools. We also use the laddering technique, a qualitative method based on in-depth interviews, to reveal the chains of attribute-consequence-values of anonymity tools users and to construct a Hierarchical Value Map. The aim of our research is to provide insights and enhance understanding of anonymity tools users’ behavior, which we expect to benefit both researchers and software engineers to design platforms that more closely fit users’ need.

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.