Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Spyros Kokolakis
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (3): 322–343.
Published: 01 December 2023
Journal Articles
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (5): 687–704.
Published: 26 May 2022
Journal Articles
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 562–582.
Published: 15 March 2022
Journal Articles
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (2): 243–254.
Published: 07 December 2021
Journal Articles
AppAware: a policy visualization model for mobile applications
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (1): 116–132.
Published: 23 January 2020
Journal Articles
A security standards' framework to facilitate best practices' awareness and conformity
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (5): 350–365.
Published: 23 November 2010
Journal Articles
Process‐variance models in information security awareness research
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (3): 271–287.
Published: 18 July 2008
Journal Articles
Formulating information systems risk management strategies through cultural theory
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (3): 198–217.
Published: 01 May 2006
Journal Articles
Information systems security from a knowledge management perspective
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (3): 189–202.
Published: 01 July 2005
