The insider threat to information systems and the effectiveness of ISO17799 M Theoharidou, S Kokolakis, M Karyda, E Kiountouzis Computers & Security 24 (6), 472-484, 2005 | 418 | 2005 |
Information systems security policies: a contextual perspective M Karyda, E Kiountouzis, S Kokolakis Computers & security 24 (3), 246-260, 2005 | 254 | 2005 |
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs A Tsohou, M Karyda, S Kokolakis Computers & security 52, 128-141, 2015 | 250 | 2015 |
Managing the introduction of information security awareness programmes in organisations A Tsohou, M Karyda, S Kokolakis, E Kiountouzis European Journal of Information Systems 24 (1), 38-58, 2015 | 175 | 2015 |
Investigating information security awareness: research and practice gaps A Tsohou, S Kokolakis, M Karyda, E Kiountouzis Information Security Journal: A Global Perspective 17 (5-6), 207-227, 2008 | 131 | 2008 |
Analyzing trajectories of information security awareness A Tsohou, M Karyda, S Kokolakis, E Kiountouzis Information Technology & People 25 (3), 327-352, 2012 | 94 | 2012 |
Formulating information systems risk management strategies through cultural theory A Tsohou, M Karyda, S Kokolakis, E Kiountouzis Information Management & Computer Security 14 (3), 198-217, 2006 | 83 | 2006 |
Employees’ privacy vs. employers’ security: Can they be balanced? L Mitrou, M Karyda Telematics and Informatics 23 (3), 164-178, 2006 | 73 | 2006 |
An ontology for secure e-government applications M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ... First International Conference on Availability, Reliability and Security …, 2006 | 69 | 2006 |
Internet forensics: Legal and technical issues M Karyda, L Mitrou Second international workshop on digital forensics and incident analysis …, 2007 | 64 | 2007 |
A framework for outsourcing IS/IT security services M Karyda, E Mitrou, G Quirchmayr Information Management & Computer Security 14 (5), 403-416, 2006 | 64 | 2006 |
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions M Karyda, S Gritzalis, J Hyuk Park, S Kokolakis Internet Research 19 (2), 194-208, 2009 | 62 | 2009 |
Secure electronic voting: The current landscape C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos Secure electronic voting, 101-122, 2003 | 59 | 2003 |
Process‐variance models in information security awareness research A Tsohou, S Kokolakis, M Karyda, E Kiountouzis Information Management & Computer Security 16 (3), 271-287, 2008 | 43 | 2008 |
Identifying factors that influence employees’ security behavior for enhancing ISP compliance I Topa, M Karyda Trust, Privacy and Security in Digital Business: 12th International …, 2015 | 41 | 2015 |
EU's data protection reform and the right to be forgotten: A legal response to a technological challenge? L Mitrou, M Karyda 5th International Conference of Information Law and Ethics, 29-30, 2012 | 41 | 2012 |
Electronic voting systems: Security implications of the administrative workflow C Lambrinoudakis, S Kokolakis, M Karyda, V Tsoumas, D Gritzalis, ... 14th International Workshop on Database and Expert Systems Applications …, 2003 | 40 | 2003 |
From theory to practice: guidelines for enhancing information security management I Topa, M Karyda Information & Computer Security 27 (3), 326-342, 2019 | 39 | 2019 |
A knowledge-based approach to security requirements for e-health applications S Dritsas, L Gymnopoulos, M Karyda, T Balopoulos, S Kokolakis, ... Electronic Journal for E-Commerce Tools and Applications, 1-24, 2006 | 39 | 2006 |
Data breach notification: issues and challenges for security management M Karyda, L Mitrou | 37 | 2016 |