default search action
Maria Karyda 0001
Person information
- affiliation: University of the Aegean, Greece
Other persons with the same name
- Maria Karyda 0002 (aka: Mary Karyda 0002) — Aalto University, Helsinki, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach. Inf. Comput. Secur. 32(3): 322-343 (2024) - 2023
- [c35]Ioanna Topa, Maria Karyda:
Addressing Organisational, Individual and Technological Aspects and Challenges in Information Security Management: Applying a Framework for a Case Study. HICSS 2023: 470-479 - 2022
- [j19]Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria Karyda:
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. Inf. Comput. Secur. 30(5): 687-704 (2022) - [c34]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis:
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory. ARES 2022: 81:1-81:8 - 2021
- [j18]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Forming digital identities in social networks: the role of privacy concerns and self-esteem. Inf. Comput. Secur. 29(2): 240-262 (2021) - [j17]Andreas Skalkos, Ioannis Stylios, Maria Karyda, Spyros Kokolakis:
Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach. J. Cybersecur. Priv. 1(4): 743-766 (2021) - [c33]Vasiliki Diamantopoulou, Maria Karyda:
Integrating Privacy-By-Design with Business Process Redesign. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 127-137 - [c32]Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria Karyda:
BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 158-170 - 2020
- [j16]Konstantina Vemou, Maria Karyda:
Evaluating privacy impact assessment methods: guidelines and best practice. Inf. Comput. Secur. 28(1): 35-53 (2020) - [j15]Konstantina Vemou, Maria Karyda:
Requirements for private communications over public spheres. Inf. Comput. Secur. 28(1): 68-96 (2020) - [j14]Paola Mavriki, Maria Karyda:
Automated data-driven profiling: threats for group privacy. Inf. Comput. Secur. 28(2): 183-197 (2020) - [j13]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls. Inf. Comput. Secur. 28(4): 645-662 (2020) - [c31]Paola Mavriki, Maria Karyda:
Big Data Analytics in Healthcare Applications: Privacy Implications for Individuals and Groups and Mitigation Strategies. EMCIS 2020: 526-540
2010 – 2019
- 2019
- [j12]Ioanna Topa, Maria Karyda:
From theory to practice: guidelines for enhancing information security management. Inf. Comput. Secur. 27(3): 326-342 (2019) - [c30]Paola Mavriki, Maria Karyda:
Big Data Analytics: From Threatening Privacy to Challenging Democracy. e-Democracy 2019: 3-17 - [c29]Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 159-180 - [c28]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 238-257 - [c27]Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance. TrustBus 2019: 94-109 - 2018
- [c26]Konstantina Vemou, Maria Karyda:
An Organizational Scheme for Privacy Impact Assessments. EMCIS 2018: 258-271 - [c25]Paola Mavriki, Maria Karyda:
Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society. MCIS 2018: 4 - [c24]Konstantina Vemou, Maria Karyda:
An Evaluation Framework for Privacy Impact Assessment Methods. MCIS 2018: 5 - [c23]Ioanna Topa, Maria Karyda:
Usability Characteristics of Security and Privacy Tools: The User's Perspective. SEC 2018: 231-244 - 2017
- [c22]Paola Mavriki, Maria Karyda:
Using Personalization Technologies for Political Purposes: Privacy Implications. e-Democracy 2017: 33-46 - [c21]Maria Karyda:
Fostering Information Security Culture In Organizations: A Research Agenda. MCIS 2017: 28 - 2016
- [c20]Maria Karyda, Lilian Mitrou:
Data Breach Notification: Issues and Challenges for Security Management. MCIS 2016: 60 - 2015
- [j11]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Comput. Secur. 52: 128-141 (2015) - [j10]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24(1): 38-58 (2015) - [c19]Konstantina Vemou, Maria Karyda:
Evaluating Privacy Practices in Web 2.0 Services. MCIS 2015: 7 - [c18]Ioanna Topa, Maria Karyda:
Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance. TrustBus 2015: 169-179 - 2014
- [c17]Konstantina Vemou, Maria Karyda, Spyros Kokolakis:
Directions for Raising Privacy Awareness in SNS Platforms. Panhellenic Conference on Informatics 2014: 60:1-60:6 - [c16]Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda:
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. SEC 2014: 438-445 - 2013
- [c15]Konstantina Vemou, Maria Karyda:
A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. TrustBus 2013: 74-84 - 2012
- [j9]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Trajectories of Information Security Awareness. Inf. Technol. People 25(3): 327-352 (2012) - [c14]Ramzi El-Haddadeh, Aggeliki Tsohou, Maria Karyda:
Implementation Challenges for Information Security Awareness Initiatives in E-Government. ECIS 2012: 179 - [c13]Spyros Kokolakis, Kalliopi Anastasopoulou, Maria Karyda:
An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions. Panhellenic Conference on Informatics 2012: 123-126 - 2010
- [c12]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Information Security Awareness through Networks of Association. TrustBus 2010: 227-237
2000 – 2009
- 2009
- [j8]Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park, Spyros Kokolakis:
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions. Internet Res. 19(2): 194-208 (2009) - [c11]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Aligning Security Awareness With Information Systems Security Management. MCIS 2009: 73 - 2008
- [j7]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Process-variance models in information security awareness research. Inf. Manag. Comput. Secur. 16(3): 271-287 (2008) - [j6]Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps. Inf. Secur. J. A Glob. Perspect. 17(5&6): 207-227 (2008) - 2007
- [c10]Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21 - [c9]Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis:
Using the Lens of Circuits of Power in Information Systems Security Management. TrustBus 2007: 228-236 - 2006
- [j5]Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Formulating information systems risk management strategies through cultural theory. Inf. Manag. Comput. Secur. 14(3): 198-217 (2006) - [j4]Maria Karyda, Evangelia Mitrou, Gerald Quirchmayr:
A framework for outsourcing IS/IT security services. Inf. Manag. Comput. Secur. 14(5): 402-415 (2006) - [j3]Lilian Mitrou, Maria Karyda:
Employees' privacy vs. employers' security: Can they be balanced? Telematics Informatics 23(3): 164-178 (2006) - [c8]Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas:
An ontology for secure e-government applications. ARES 2006: 1033-1037 - [c7]Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70 - 2005
- [b1]Maria Karyda:
Διοίκηση ασφάλειας πληροφοριακών συστημάτων: οργανωσιακά ζητήματα ανάπτυξης, εφαρμογής και ενσωμάτωσης πολιτικών ασφάλειας. Athens University Economics and Business, Greece, 2005 - [j2]Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis:
Information systems security policies: a contextual perspective. Comput. Secur. 24(3): 246-260 (2005) - [j1]Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799. Comput. Secur. 24(6): 472-484 (2005) - [c6]Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28 - [c5]Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Theodoros Balopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Employing Ontologies for the Development of Security Critical Applications. I3E 2005: 187-201 - 2003
- [c4]Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471 - [c3]Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156 - [p1]Costas Lambrinoudakis, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, Spyros Ikonomopoulos:
Secure Electronic Voting: the Current Landscape. Secure Electronic Voting 2003: 101-122 - 2002
- [c2]Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos:
Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78 - 2001
- [c1]Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint