Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Liljana Stojanovic
Jhonathan Pinzon
Liangliang Shang
Tiziano Bellini
Giovanni Venturelli
Chen Ma
Thidapat Chantem
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
AGGELIKI TSOHOU
Author Info
Open Visualization
Name
Affiliation
Papers
AGGELIKI TSOHOU
University of the Aegean, Dept. of Information and Communication Systems Engineering, Samos, Greece
37
Collaborators
Citations
PageRank
50
89
14.70
Referers
Referees
References
181
511
357
Search Limit
100
511
Publications (37 rows)
Collaborators (50 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Forming digital identities in social networks: the role of privacy concerns and self-esteem
0
0.34
2021
Privacy, Security, Legal And Technology Acceptance Elicited And Consolidated Requirements For A Gdpr Compliance Platform
0
0.34
2020
Appaware: A Policy Visualization Model For Mobile Applications
0
0.34
2020
From Iso/Iec27001:2013 And Iso/Iec27002:2013 To Gdpr Compliance Controls
0
0.34
2020
Demystifying The Influential Is Legends Of Positivism: Response To Lee'S Commentary
0
0.34
2020
Examining The Side Effects Of Organizational Internet Monitoring On Employees
0
0.34
2020
Game-Based Information Security/Privacy Education and Awareness - Theory and Practice.
0
0.34
2020
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation.
0
0.34
2019
Shaping Digital Identities in Social Networks - Data Elements and the Role of Privacy Concerns.
0
0.34
2019
General Data Protection Regulation and ISO/IEC 27001 - 2013 - Synergies of Activities Towards Organisations' Compliance.
0
0.34
2019
From ISO/IEC 27002 - 2013 Information Security Controls to Personal Data Protection Controls - Guidelines for GDPR Compliance.
0
0.34
2019
Developing And Validating A Common Body Of Knowledge For Information Privacy
0
0.34
2019
Demystifying the Influential IS Legends of Positivism
0
0.34
2018
Are Users Competent To Comply With Information Security Policies? An Analysis Of Professional Competence Models
0
0.34
2018
Does The Development Of Information Systems Resources Lead To The Development Of Information Security Resources? An Empirical Investigation
0
0.34
2017
Enabling valid informed consent for location tracking through privacy awareness of users: A process theory
0
0.34
2017
Embedding persuasive features into policy issues: Implications to designing public participation processes.
0
0.34
2017
The Same Antecedents Do Not Fit All Activities: An Activity-specific Model of Personal Internet Use in Workplace
0
0.34
2015
Managing the introduction of information security awareness programmes in organisations.
15
0.56
2015
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
1
0.35
2015
Expressive or Instrumental: the Dual Perspective Model of Personal Web Usage at Workplace.
0
0.34
2014
The Dual Nature of Personal Web Usage at Workplace: Impacts, Antecedents and regulating Policies.
0
0.34
2014
Governance of IT Service Procurement: Relationship vs Network based Approach.
0
0.34
2013
Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries
4
0.50
2012
Analyzing Trajectories Of Information Security Awareness
12
0.54
2012
Implementation Challenges for Information Security Awareness Initiatives in E-Government.
0
0.34
2012
Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations.
0
0.34
2012
Privacy requirements engineering for trustworthy e-government services
2
0.38
2010
Analyzing information security awareness through networks of association
4
0.60
2010
Engineering secure systems with ISO 26702 and 27001
2
0.38
2010
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity
5
0.44
2010
Aligning Security Awareness With Information Systems Security Management.
3
0.40
2009
Information Systems Security Management: A Review and a Classification of the ISO Standards.
0
0.34
2009
Investigating Information Security Awareness: Research and Practice Gaps
13
0.63
2008
Process-variance models in information security awareness research
6
0.53
2008
Addressing cultural dissimilarity in the information security management outsourcing relationship
5
0.44
2007
Formulating information systems risk management strategies through cultural theory
17
0.84
2006
1