Εκπαίδευση - Σπουδές

Ο Ιωάννης είναι Υποψήφιος Διδάκτορας και Ερευνητής, υπό την επίβλεψη του Αναπληρωτή Καθηγητή Σπύρου Κοκολάκη, στο Τμήμα Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων (ΜΠΕΣ) του Πανεπιστημίου Αιγαίου. Το Διδακτορικό του διακρίθηκε στις υποτροφίες του Ελληνικού Ιδρύματος Έρευνας και Καινοτομίας (ΕΛ.ΙΔ.Ε.Κ) μεταξύ 2.144 υποψηφίων που υπέβαλαν προτάσεις (ποσοστό αποδοχής περίπου 20%, χρηματοδότηση 23.500 €).

Είναι κάτοχος Μεταπτυχιακού Διπλώματος Ειδίκευσης στην Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων από το Πανεπιστήμιο Αιγαίου, Τμήμα ΜΠΕΣ και αναμένεται επίσης ένα Master of Education (ΜΕd) στην Διδακτική των θετικών Επιστημών και των ΤΠΕ στην Εκπαίδευση: Διεπιστημονική Προσέγγιση από το Τμήμα Προσχολικής Αγωγής και Εκπαιδευτικού Σχεδιασμού του Πανεπιστημίου Αιγαίου. Είναι κάτοχος πτυχιούχου Επικοινωνίων, Πληροφορικής και Διοίκησης από τη σχολή Οικονομίας και Διοίκησης του Ανώτατου Τεχνολογικού Ιδρύματος της Ηπείρου και κατέχει, επίσης, ένα Certificate of Engineering για την ολοκλήρωση των δύο πρώτων ετών (15 μαθήματα, 86 ECTS) του τμήματος Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών του Πανεπιστημίου Κύπρου.

Ερευνητικά Ενδιαφέροντα

Ο Ιωάννης έχει δημοσιεύσει αρκετά βιβλία και εκπαιδευτικά συγγράμματα (Εκδότες: πανεπιστήμιο Αθηνών και Αιγαίου) και αρκετά papers σε διεθνή και ευρωπαϊκά επιστημονικά συνέδρια και περιοδικά με κριτές. Εργάζεται εδώ και 11 χρόνια σε διάφορα έργα που απαιτούν γνώση σε διάφορους τομείς της επιστήμης της Πληροφορικής και κυρίως στην Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων.

▽ Αυτά περιλαμβάνουν:

o Biometrics Security
o Continuous Authentication
o Mobile Security & Privacy
o Technology Acceptance Models
o Statistical Machine Learning
o Information System Security Management
o Security Policies, Risk Analysis, Security Awareness

Διδασκαλία

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Ioannis Stylios, S. Kokolakis, P. Andriotis, Privacy decision-making in the digital era: A game theoretic review, International Conference on Human Aspects of Information Security, Privacy, and Trust, Theo Tryfonas, (ed), pp. 589-603, Jul, 2017, Vancouver, Canada, Springer, Cham, https://link.springer.com/chapter/1...
 

Abstract
Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, face decisions with regard to the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments on policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information. Motivated by the aforementioned issues and challenges, we focus on aspects of privacy decision-making in the digital era and address issues of individuals’ privacy behavior. We further discuss issues of strategic privacy decision-making for online service providers and e-government service providers.

Ioannis Stylios, S. Kokolakis, Thanou, O., Chatzis, S., User's Attitudes on Mobile Devices: Can Users' Practices Protect Their Sensitive Data?, 10th Mediterranean Conference on Information Systems (MCIS) 2016, Sep, 2016, https://www.researchgate.net/public...
 

Abstract
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or processed by handheld devices rise as well. This practice entails risks, such as violating users’ privacy, stealing users’ identities, etc. Particularly, stealing an unlocked device grants full access to sensitive data and applications. In this survey, we examine whether users adopt some basic practices to protect their sensitive personal data themselves, or is there a need to further strengthen their protection? Our statistical analysis assesses smartphone users’ security attitudes and practices among different age groups. Finally, we investigate the factors that affect the attitude of users with respect to their practices for the protection of personal data.The results of this study, show that while many smartphone users do take some security precautions, a high percentage (24%) of them still ignores security and privacy risks. In addition, 19,1 % of users do not follow any practices to protect their PINs and Passwords.\r\nKeywords: Mobile Phones, Privacy Risk, Users Attitudes, Survey.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, A Review of Continuous Authentication Using Behavioral Biometrics, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/public...
 

Abstract
Abstract —The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are considered to raise systems security and reliability, and biometric technologies have increasingly become part of security architectures. Since some of uni-biometrics' vulnerabilities have already been revealed, they have been replaced or enhanced by multi-biometrics where behavioral biometrics are gaining ground as a new way of establishing the identity of a user. We therefore present a collection of selected published sources relevant to this topic accompanied by annotation, critical analysis of contents and, in some cases apposition of the main conclusions of each work. This work can help new researchers, scientists and the industry develop new systems and technologies by providing them a ready to use literature base with theoretical and practical aspects on Continuous Authentication using behavioral biometrics. Keywords — Literature Review Mobile Phones, Privacy Risk, Behavioral Biometrics, Continuous Authentication.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, Communication Security & Cyberbullying: A Review of the Legal Issues, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/public...
 

Abstract
Abstract — The research of legal issues concerning the cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in legislation concerning cyberbullying? b) Does the penal legislator consider security in cyberspace as a legal asset? c) How is cyberbullying treated in the legal system? By taking into account the existing legal and social dimensions of the issue, and triggered by those three research questions, we conclude that the creation of a global framework of internet behavior rules, internet legislation and communication security policies is absolutely necessary. Keywords — Cyberbullying, Legislation, Communication Security.

Ioannis Stylios, Chatzis, S., Thanou, O., S. Kokolakis, Mobile Phones & Behavioral Modalities: Surveying users’ practices, TELFOR 2015 International IEEE Conference, Nov, 2015, IEEE, https://www.researchgate.net/public...
 

Abstract
Abstract — Mobile phones are one of the most popular means of access to the internet. Users, via the telephone, connect to different services such as: Google, social networks, work accounts, banks accounts, etc. Those services, are many times, left open in their device. This enables risks, such as, loss or/and the violation of their personal data. In addition, in case of device theft after login, full access to sensitive data and applications may be fully granted. The purpose of this research is to analyze the most salient patterns characterizing user practices regarding certain behavioral modalities including: the way of using the various applications, power consumption, touch gestures and guest users’ habits. To this end, we used an original questionnaire, created for the needs of the specific survey, to examine whether we can find some trends among the users. This can give us a qualitative information, for the different behaviors / “characters” of users, in order to be used in further research regarding User’s Continuous Authentication. Keywords — Mobile Phones, Behavioral Modalities, Continuous Authentication, Survey.

G. Tzelepis, T. Skentos, Ioannis Stylios, Study and environmental surveying on the Fire of Parnitha with Geographic Information Systems (GIS) for similar natural risk management in the future, 8th Hellenic Conference HellasGIs, Dec, 2014, HellasGIs, https://www.researchgate.net/public...
 

Abstract
Οι δασικές πυρκαγιές αποτελούν έναν από τους σημαντικότερους κινδύνους του φυσικού και ανθρωπογενούς περιβάλλοντος που καλείται να αντιμετωπίσει η Ελλάδα κατά τους θερινούς μήνες. Τα τελευταία χρόνια γίνεται μία προσπάθεια για διεπιστημονική προσέγγιση των φυσικών κινδύνων που αντλεί τεχνικές και εργαλεία από μία μεγάλη γκάμα επιστημών (γεωλογία, δασολογία, γεωγραφία, επιστήμες μηχανικού, πληροφορική κ.α.). Σκοπός του άρθρου είναι η παρουσίαση της μελέτης και της εκτίμησης των περιβαλλοντικών επιπτώσεων από την πυρκαγιά και η εξαγωγή ποσοτικών και ποιοτικών δεδομένων για τις χρήσεις γης με χρήση σύγχρονων τεχνικών τηλεπισκόπησης και η περιβαλλοντική αποτύπωση της πυρκαγιάς με Σύστηματα Γεωγραφικών Πληροφοριών (ΣΓΠ), γνωστά ευρέως και ως G.I.S. Geographic Information Systems. Η παρούσα μελέτη αναδεικνύει τον κομβικό ρόλο των ΣΓΠ και των τεχνικών Τηλεπισκόπισης σε θέματα πρόληψης και διαχείρισης φυσικών καταστροφών.

Ioannis Stylios, V. Vlachos, Iosif Androulidakis, Performance Comparison of Machine Learning Algorithms for Diagnosis of Cardiotocograms with Class Inequality, TELFOR 2014 International IEEE Conference, Nov, 2014, IEEE, https://www.researchgate.net/public...
 

Abstract
Abstract — The objective of the present paper is to demonstrate the potential of Computational Intelligence in applications pertaining to the automatic identification – categorisation of Cardiotocograms using Machine Learning Algorithms and Artificial Neural Networks whose purpose is to distinguish between healthy or pathological cases leading to mortality during birth or fetal cerebral palsy. Interest is also placed on the performance of the Machine learning algorithms and the comparison of the classifiers’ results.

Iosif Androulidakis, V. Christou, N. Bardis, Ioannis Stylios, Surveying user’s practices regarding mobile phone’s security features, 3rd WSEAS International Conference, Jun, 2009, https://www.researchgate.net/public...
 

Abstract
Abstract: Despite the fact that mobile phone’s security measures have been increased during the last years, users don’t take the necessary measures to avoid a possible unauthorized access and/or sensitive data retrieval from their mobile phone. In order to investigate this issue, in this paper, we present the results of a survey conducted in the University of Ioannina, Greece according to which 282 participants were asked about quite many key factors concerning their mobile phone security. The results are very interesting and can be considered as a potential guide by various mobile operators for their future technological investments and their customer’s briefing about mobile’s phone security.

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.