default search action
Aggeliki Tsohou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro:
Mastering data privacy: leveraging K-anonymity for robust health data sharing. Int. J. Inf. Sec. 23(3): 2189-2201 (2024) - [j30]Aikaterini Soumelidou, Aggeliki Tsohou:
Validation and extension of two domain-specific information privacy competency models. Int. J. Inf. Sec. 23(3): 2437-2455 (2024) - [j29]Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach. Inf. Comput. Secur. 32(3): 322-343 (2024) - [j28]Hemin Jiang, Mikko T. Siponen, Zhenhui (Jack) Jiang, Aggeliki Tsohou:
The Impacts of Internet Monitoring on Employees' Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment. Inf. Syst. Res. 35(3): 1175-1194 (2024) - [j27]Ioannis Paspatis, Aggeliki Tsohou:
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. J. Cybersecur. Priv. 4(1): 76-104 (2024) - [c32]Rena Lavranou, Aggeliki Tsohou:
Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission Decisions. AIAI (2) 2024: 347-360 - [e2]Iris Reinhartz-Berger, Chiara Di Francescomarino, Aggeliki Tsohou:
Proceedings of the Doctoral Consortium Papers Presented at the 36th International Conference on Advanced Information Systems Engineering (CAiSE 2024), Limassol, Cyprus, June 3-7, 2024. CEUR Workshop Proceedings 3767, CEUR-WS.org 2024 [contents] - 2023
- [j26]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance. Eur. J. Inf. Syst. 32(2): 331-345 (2023) - [j25]Aggeliki Tsohou, Vasiliki Diamantopoulou, Stefanos Gritzalis, Costas Lambrinoudakis:
Cyber insurance: state of the art, trends and future directions. Int. J. Inf. Sec. 22(3): 737-748 (2023) - [j24]Ioannis Paspatis, Aggeliki Tsohou:
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. J. Cybersecur. Priv. 3(3): 396-415 (2023) - [j23]Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:
How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors. Multimodal Technol. Interact. 7(8): 76 (2023) - [c31]Aikaterini Soumelidou, Aggeliki Tsohou:
Towards an Information Privacy Competency Model for the Usage of Mobile Applications. SEC 2023: 222-235 - [e1]Selmin Nurcan, Andreas L. Opdahl, Haralambos Mouratidis, Aggeliki Tsohou:
Research Challenges in Information Science: Information Science and the Connected World - 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings. Lecture Notes in Business Information Processing 476, Springer 2023, ISBN 978-3-031-33079-7 [contents] - 2022
- [c30]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis:
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory. ARES 2022: 81:1-81:8 - [c29]Thanos Papaioannou, Aggeliki Tsohou, Georgios Bounias, Stylianos Karagiannis:
A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games. TrustBus 2022: 33-49 - 2021
- [j22]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Forming digital identities in social networks: the role of privacy concerns and self-esteem. Inf. Comput. Secur. 29(2): 240-262 (2021) - [j21]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano:
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. J. Data Intell. 2(2): 136-165 (2021) - [j20]Aikaterini Soumelidou, Aggeliki Tsohou:
Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Informatics 61: 101592 (2021) - [c28]Aggeliki Tsohou:
Towards an Information Privacy and Personal Data Protection Competency Model for Citizens. TrustBus 2021: 112-125 - 2020
- [j19]Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:
AppAware: a policy visualization model for mobile applications. Inf. Comput. Secur. 28(1): 116-132 (2020) - [j18]Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28(4): 531-553 (2020) - [j17]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls. Inf. Comput. Secur. 28(4): 645-662 (2020) - [j16]Hemin Jiang, Aggeliki Tsohou, Mikko T. Siponen, Ying Li:
Examining the side effects of organizational Internet monitoring on employees. Internet Res. 30(6): 1613-1630 (2020) - [j15]Aikaterini Soumelidou, Aggeliki Tsohou:
Effects of privacy policy visualization on users' information privacy awareness level. Inf. Technol. People 33(2): 502-534 (2020) - [j14]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary. J. Assoc. Inf. Syst. 21(6): 1 (2020) - [c27]Stylianos Karagiannis, Thanos Papaioannou, Emmanouil Magkos, Aggeliki Tsohou:
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice. EMCIS 2020: 509-525 - [c26]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano, Annarita Iodice, Beatriz Gallego-Nicasio Crespo:
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. TrustBus 2020: 186-201
2010 – 2019
- 2019
- [j13]Rena Lavranou, Aggeliki Tsohou:
Developing and validating a common body of knowledge for information privacy. Inf. Comput. Secur. 27(5) (2019) - [c25]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation. ECIS 2019 - [c24]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 159-180 - [c23]Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 204-223 - [c22]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 238-257 - [c21]Luca Piras, Mohammed Ghazi Al-Obeidallah, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, Giuseppe Giovanni Zorzino:
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance. TrustBus 2019: 78-93 - [c20]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance. TrustBus 2019: 94-109 - 2018
- [j12]Aggeliki Tsohou, Philipp Holtkamp:
Are users competent to comply with information security policies? An analysis of professional competence models. Inf. Technol. People 31(5): 1047-1068 (2018) - [j11]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism. J. Assoc. Inf. Syst. 19(7): 5 (2018) - [c19]Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:
AppAware: A Model for Privacy Policy Visualization for Mobile Applications. MCIS 2018: 3 - 2017
- [j10]Aggeliki Tsohou, Eleni Kosta:
Enabling valid informed consent for location tracking through privacy awareness of users: A process theory. Comput. Law Secur. Rev. 33(4): 434-457 (2017) - [j9]Habin Lee, Aggeliki Tsohou, Youngseok Choi:
Embedding persuasive features into policy issues: Implications to designing public participation processes. Gov. Inf. Q. 34(4): 591-600 (2017) - [c18]Vasiliki Diamantopoulou, Aggeliki Tsohou, Euripidis N. Loukis, Stefanos Gritzalis:
Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation. AMCIS 2017 - [c17]Aristomenis Gritzalis, Aggeliki Tsohou, Costas Lambrinoudakis:
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy. e-Democracy 2017: 47-63 - [c16]Chrysanthi Kosyfaki, Nelina P. Angelova, Aggeliki Tsohou, Emmanouil Magkos:
The Privacy Paradox in the Context of Online Health Data Disclosure by Users. EMCIS 2017: 421-428 - [c15]Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:
Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data. MCIS 2017: 32 - 2015
- [j8]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Comput. Secur. 52: 128-141 (2015) - [j7]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24(1): 38-58 (2015) - [c14]Hemin Jiang, Aggeliki Tsohou:
The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace. ECIS 2015 - 2014
- [c13]Hemin Jiang, Aggeliki Tsohou:
The Dual Nature of Personal Web Usage at Workplace: Impacts, Antecedents and regulating Policies. ECIS 2014 - [c12]Hemin Jiang, Aggeliki Tsohou:
Expressive or Instrumental: the Dual Perspective Model of Personal Web Usage at Workplace. ECIS 2014 - [c11]Vassiliki Koufi, Flora Malamateniou, Aggeliki Tsohou, George Vassilacopoulos:
A framework for privacy-preserving access to next-generation EHRs. MIE 2014: 740-744 - 2013
- [c10]Jaeyoun Oh, Habin Lee, Aggeliki Tsohou:
Governance of IT Service Procurement: Relationship vs Network based Approach. PACIS 2013: 55 - 2012
- [j6]Aggeliki Tsohou, Habin Lee, Karim Al-Yafi, Vishanth Weerakkody, Ramzi El-Haddadeh, Zahir Irani, Andrea Ko, Tunç D. Medeni, Luís Miguel Campos:
Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries. Int. J. Electron. Gov. Res. 8(3): 63-77 (2012) - [j5]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Trajectories of Information Security Awareness. Inf. Technol. People 25(3): 327-352 (2012) - [c9]Ramzi El-Haddadeh, Aggeliki Tsohou, Maria Karyda:
Implementation Challenges for Information Security Awareness Initiatives in E-Government. ECIS 2012: 179 - [c8]Aggeliki Tsohou, Habin Lee, Yacine Rebahi, Mateusz Khalil, Simon Hohberg:
Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations. TrustBus 2012: 236-237 - 2010
- [b1]Aggeliki Tsohou:
Η ενημερότητα ασφαλείας στα πλαίσια της διοίκησης ασφαλείας πληροφοριακών συστημάτων. University of the Aegean, Greece, 2010 - [j4]Aggeliki Tsohou:
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity. Inf. Manag. Comput. Secur. 18(5): 350-365 (2010) - [c7]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Unifying ISO Security Standards Practices into a Single Security Framework. SAISMC 2010: 188-203 - [c6]Rhys Evans, Aggeliki Tsohou, Theo Tryfonas, Thea Morgan:
Engineering secure systems with ISO 26702 and 27001. SoSE 2010: 1-6 - [c5]Nikos Vrakas, Christos Kalloniatis, Aggeliki Tsohou, Costas Lambrinoudakis:
Privacy Requirements Engineering for Trustworthy e-Government Services. TRUST 2010: 298-307 - [c4]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Information Security Awareness through Networks of Association. TrustBus 2010: 227-237
2000 – 2009
- 2009
- [c3]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Information Systems Security Management: A Review and a Classification of the ISO Standards. e-Democracy 2009: 220-235 - [c2]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Aligning Security Awareness With Information Systems Security Management. MCIS 2009: 73 - 2008
- [j3]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Process-variance models in information security awareness research. Inf. Manag. Comput. Secur. 16(3): 271-287 (2008) - [j2]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps. Inf. Secur. J. A Glob. Perspect. 17(5&6): 207-227 (2008) - 2007
- [c1]Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33 - 2006
- [j1]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Formulating information systems risk management strategies through cultural theory. Inf. Manag. Comput. Secur. 14(3): 198-217 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint