Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Aggeliki Tsohou
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (3): 322–343.
Published: 01 December 2023
Journal Articles
Forming digital identities in social networks: the role of privacy concerns and self-esteem
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (2): 240–262.
Published: 05 April 2021
Journal Articles
From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 645–662.
Published: 08 June 2020
Journal Articles
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
Available to PurchaseAggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 531–553.
Published: 18 May 2020
Journal Articles
AppAware: a policy visualization model for mobile applications
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (1): 116–132.
Published: 23 January 2020
Journal Articles
Developing and validating a common body of knowledge for information privacy
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (5): 668–686.
Published: 28 August 2019
Journal Articles
A security standards' framework to facilitate best practices' awareness and conformity
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (5): 350–365.
Published: 23 November 2010
Journal Articles
Process‐variance models in information security awareness research
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (3): 271–287.
Published: 18 July 2008
Journal Articles
Formulating information systems risk management strategies through cultural theory
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (3): 198–217.
Published: 01 May 2006
