Personal information

Greece

Activities

Employment (1)

University of the Aegean : Karlovassi, Samos, GR

2011 to present | Professor (Department of Information and Communication Systems Engineering)
Employment
Source: Self-asserted source
Maria Karyda

Works (26)

BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System

2022 | Book chapter
Contributors: Ioannis Stylios; Andreas Skalkos; Spyros Kokolakis; Maria Karyda
Source: check_circle
Crossref

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs

Computers & Security
2015-07 | Journal article
Contributors: Aggeliki Tsohou; Maria Karyda; Spyros Kokolakis
Source: check_circle
Crossref

A classification of factors influencing low adoption of PETs among SNS users

2013 | Book
DOI:

10.1007/978-3-642-40343-9_7

EID:

2-s2.0-84884469465

Contributors: Vemou, K.; Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

An analysis of privacy-related strategic choices of buyers and sellers in e-commerce transactions

2012 | Conference paper
DOI:

10.1109/PCi.2012.25

EID:

2-s2.0-84872246214

Contributors: Kokolakis, S.; Kalliopi, A.; Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Analyzing trajectories of information security awareness

2012 | Journal article
DOI:

10.1108/09593841211254358

EID:

2-s2.0-84865148910

Contributors: Tsohou, A.; Karyda, M.; Kokolakis, S.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Implementation challenges for information security awareness initiatives in e-government

2012 | Conference paper
EID:

2-s2.0-84905728059

Contributors: El-Haddadeh, R.; Tsohou, A.; Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Analyzing information security awareness through networks of association

2010 | Book
DOI:

10.1007/978-3-642-15152-1_20

EID:

2-s2.0-78049386127

Contributors: Tsohou, A.; Karyda, M.; Kokolakis, S.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions

2009 | Journal article
DOI:

10.1108/10662240910952346

EID:

2-s2.0-67649510567

Contributors: Karyda, M.; Gritzalis, S.; Park, J.H.; Kokolakis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

The socioeconomic background of electronic crime

2009 | Book
DOI:

10.4018/978-1-60566-204-6.ch001

EID:

2-s2.0-84901568014

Contributors: Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Bridging the gap between employee surveillance and privacy protection

2008 | Book
DOI:

10.4018/978-1-60566-036-3.ch016

EID:

2-s2.0-84883386362

Contributors: Mitrou, L.; Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Process-variance models in information security awareness research

2008 | Journal article
DOI:

10.1108/09685220810893216

EID:

2-s2.0-49249083704

Contributors: Tsohou, A.; Kokolakis, S.; Karyda, M.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

A critical approach to privacy research in ubiquitous environments - Issues and underlying assumptions

2007 | Book
EID:

2-s2.0-38349058416

Contributors: Karyda, M.; Gritzalis, S.; Jong, H.P.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Internet forensics: Legal and technical issues

2007 | Conference paper
DOI:

10.1109/WDFIA.2007.4299368

EID:

2-s2.0-47349102975

Contributors: Karyda, M.; Mitrou, L.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Using the lens of circuits of power in information systems security management

2007 | Book
EID:

2-s2.0-37249068025

Contributors: Fragos, C.; Karyda, M.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

A framework for exploiting security expertise in application development

2006 | Book
EID:

2-s2.0-33750087525

Contributors: Balopoulos, T.; Gymnopoulos, L.; Karyda, M.; Kokolakis, S.; Gritzalis, S.; Katsikas, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

A framework for outsourcing IS/IT security services

2006 | Journal article
DOI:

10.1108/09685220610707421

EID:

2-s2.0-33749496395

Contributors: Karyda, M.; Mitrou, E.; Quirchmayr, G.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

An ontology for secure e-government applications

2006 | Conference paper
DOI:

10.1109/ARES.2006.28

EID:

2-s2.0-33750962363

Contributors: Karyda, M.; Balopoulos, T.; Dritsas, S.; Gymnopoulos, L.; Kokolakis, S.; Lambrinoudakis, C.; Gritzalis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Developing a security patterns repository for secure applications design

2006 | Conference paper
EID:

2-s2.0-84873856063

Contributors: Gymnopoulos, L.; Karyda, M.; Balopoulos, T.; Dritsas, S.; Kokolakis, S.; Lambrinoudakis, C.; Gritzalis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Employees' privacy vs. employers' security: Can they be balanced?

2006 | Journal article
DOI:

10.1016/j.tele.2005.07.003

EID:

2-s2.0-33644990214

Contributors: Mitrou, L.; Karyda, M.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Formulating information systems risk management strategies through cultural theory

2006 | Journal article
DOI:

10.1108/09685220610670378

EID:

2-s2.0-33744805562

Contributors: Tsohou, A.; Karyda, M.; Kokolakis, S.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Employing ontologies for the development of security critical applications: The secure e-poll paradigm

2005 | Book
EID:

2-s2.0-84884399934

Contributors: Dritsas, S.; Gymnopoulos, L.; Karyda, M.; Balopoulos, T.; Kokolakis, S.; Lambrinoudakis, C.; Gritzalis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Incorporating security requirements into the software development process

2005 | Conference paper
EID:

2-s2.0-84873853484

Contributors: Balopoulos, T.; Dritsas, S.; Gymnopoulos, L.; Karyda, M.; Kokolakis, S.; Gritzalis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Information systems security policies: A contextual perspective

2005 | Journal article
DOI:

10.1016/j.cose.2004.08.011

EID:

2-s2.0-18844431067

Contributors: Karyda, M.; Kiountouzis, E.; Kokolakis, S.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

The insider threat to information systems and the effectiveness of ISO17799

2005 | Journal article
DOI:

10.1016/j.cose.2005.05.002

EID:

2-s2.0-24644470542

Contributors: Theoharidou, M.; Kokolakis, S.; Karyda, M.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Content, context, process analysis of is security policy formation

2003 | Book
DOI:

10.1007/978-0-387-35691-4

EID:

2-s2.0-84904363825

Contributors: Karyda, M.; Kokolakis, S.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier

Redefining information systems security: Viable information systems

2002 | Book
EID:

2-s2.0-84904252076

Contributors: Karyda, M.; Kokolakis, S.; Kiountouzis, E.
Source: Self-asserted source
Maria Karyda via Scopus - Elsevier