Personal information

United Kingdom

Activities

Employment (1)

University of Strathclyde: Glasgow, Glasgow, GB

2000-07-01 to present | Lecturer (Computer and Information Sciences)
Employment
Source: Self-asserted source
Sotirios Terzis

Education and qualifications (3)

University of Dublin Trinity College: Dublin, IE

1997-11-01 to 2005-06-01 | PhD (Computer Science)
Education
Source: Self-asserted source
Sotirios Terzis

University of Crete: Rethymnon, GR

1995-10-01 to 1997-10-31 | MSc (Computer Science)
Education
Source: Self-asserted source
Sotirios Terzis

University of Crete: Rethymnon, GR

1991-09-01 to 1995-09-30 | BSc(Hons) (Computer Science)
Education
Source: Self-asserted source
Sotirios Terzis

Works (46)

Information Security Management in Digitized Identity Systems

2025 | Book chapter
Contributors: Salim Awudu; Sotirios Terzis
Source: check_circle
Crossref

Getting users to click: a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing

Information and Computer Security
2024 | Journal article
EID:

2-s2.0-85183931923

Part of ISSN: 2056497X 20564961
Contributors: Ahmad, R.; Terzis, S.; Renaud, K.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Quality factors impacting e-learning within the mobile environment in Saudi Arabia universities: An interview study

International Journal of Data and Network Science
2024 | Journal article
EID:

2-s2.0-85175492468

Part of ISSN: 25618156 25618148
Contributors: Bamaga, A.; Terzis, S.; Zafar, B.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Content Analysis of Persuasion Principles in Mobile Instant Message Phishing

IFIP Advances in Information and Communication Technology
2023 | Conference paper
EID:

2-s2.0-85172704158

Part of ISBN: 9783031385292
Part of ISSN: 1868422X 18684238
Contributors: Ahmad, R.; Terzis, S.; Renaud, K.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier
grade
Preferred source (of 2)‎

Explaining Instructional Factors Affecting M-Leaming Using the Moderator of Social Media: An Extension of the IS and TAM Models

Proceedings - 2023 7th International Conference on E-Society, E-Education and E-Technology, ESET 2023
2023 | Conference paper
EID:

2-s2.0-85193015308

Part of ISBN: 9798350344608
Contributors: Bamaga, A.; Zafar, B.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2023 | Conference paper
EID:

2-s2.0-85171483888

Part of ISBN: 9783031358210
Part of ISSN: 16113349 03029743
Contributors: Ahmad, R.; Terzis, S.; Renaud, K.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier
grade
Preferred source (of 2)‎

INVESTIGATING STAFF INFORMATION SECURITY POLICY COMPLIANCE IN ELECTRONIC IDENTITY SYSTEMS –THE GHANAIAN NATIONAL IDENTITY SYSTEM

Proceedings of the International Conferences on e-Society 2023, ES 2023 and Mobile Learning 2023, ML 2023
2023 | Conference paper
EID:

2-s2.0-85181537865

Part of ISBN: 9789898704474
Contributors: Awudu, S.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Understanding LMS Use in Saudi Higher Education: A Case Study of Blackboard at King Abdulaziz University

Journal of Higher Education Theory and Practice
2023 | Journal article
EID:

2-s2.0-85182141615

Part of ISSN: 21583595
Contributors: Bamaga, A.K.; Zafer, B.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Multi-party Updatable Delegated Private Set Intersection

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2022 | Conference paper
EID:

2-s2.0-85142736121

Part of ISBN: 9783031182822
Part of ISSN: 16113349 03029743
Contributors: Abadi, A.; Dong, C.; Murdoch, S.J.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links

IFIP Advances in Information and Communication Technology
2022 | Conference paper
EID:

2-s2.0-85135084652

Part of ISBN: 9783031121715
Part of ISSN: 1868422X 18684238
Contributors: Ahmad, R.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier
grade
Preferred source (of 2)‎

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

IEEE Transactions on Dependable and Secure Computing
2019 | Journal article
EID:

2-s2.0-85063195608

Part of ISSN: 19410018 15455971
Contributors: Abadi, A.; Terzis, S.; Metere, R.; Dong, C.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

VD-PSI: Verifiable delegated private set intersection on outsourced private datasets

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Conference paper
EID:

2-s2.0-85019751292

Part of ISBN: 9783662549698
Part of ISSN: 16113349 03029743
Contributors: Abadi, A.; Terzis, S.; Dong, C.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

O-PSI: Delegated private set intersection on outsourced datasets

IFIP Advances in Information and Communication Technology
2015 | Conference paper
EID:

2-s2.0-84942602910

Part of ISBN: 9783319184661
Part of ISSN: 18684238
Contributors: Abadi, A.; Terzis, S.; Dong, C.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

A middleware for pervasive situation-awareness

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Conference paper
EID:

2-s2.0-84862750668

Part of ISBN: 9783642308222
Part of ISSN: 03029743 16113349
Contributors: Thomson, G.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Distress detection (poster abstract)

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Conference paper
EID:

2-s2.0-84867875166

Part of ISBN: 9783642333378
Part of ISSN: 03029743 16113349
Contributors: Vella, M.; Terzis, S.; Roper, M.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Message from the M-MPAC 2011 editors

Proceedings of the 3rd International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2011 - Co-located with ACM/IFIP/USENIX International Middleware Conference
2011 | Conference paper
EID:

2-s2.0-84856636407

Contributors: Terzis, S.; Veiga, L.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Novice user perception of e-services: A study in the Egyptian public sector

2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2011
2011 | Conference paper
EID:

2-s2.0-84857223677

Part of ISBN: 9781457710841
Contributors: Nosseir, A.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Towards authentication via selected extraction from electronic personal histories

Lecture Notes in Business Information Processing
2011 | Conference paper
EID:

2-s2.0-84876257522

Part of ISBN: 9783642198014
Part of ISSN: 18651348
Contributors: Nosseir, A.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

A study in authentication via electronic personal history questions

ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems
2010 | Conference paper
EID:

2-s2.0-78649840388

Part of ISBN: 9789898425089
Contributors: Nosseir, A.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Danger theory and intrusion detection: Possibilities and limitations of the analogy

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Conference paper
EID:

2-s2.0-77955885373

Part of ISSN: 03029743 16113349
Contributors: Vella, M.; Roper, M.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Message from the M-MPAC 2010 editors

Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference
2010 | Conference paper
EID:

2-s2.0-78650902774

Contributors: Terzis, S.; Veiga, L.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Message from the M-MPAC 2009 Editors

Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2009 co-located with ACM/IFIP/USENIX International Middleware Conference
2009 | Conference paper
EID:

2-s2.0-76749162815

Contributors: Veiga, L.; Donsez, D.; Riva, O.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Distributed Applications and Interoperable Systems: 8th IFIP WG 6.1 International Conference, DAIS 2008 Oslo, Norway, June 4-6, 2008 Proceedings

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Conference paper
EID:

2-s2.0-84928642226

Part of ISSN: 16113349 03029743
Contributors: Meier, R.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-45749157612

Part of ISSN: 03029743 16113349
Contributors: Meier, R.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Message from the MPAC2008 chair

Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, MPAC 2008 - Held at the ACM/IFIP/USENIX 9th International Middleware Conference, Middleware 2008
2008 | Conference paper
EID:

2-s2.0-84885741753

Contributors: Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-84928634215

Part of ISSN: 16113349 03029743
Contributors: Meier, R.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Message from the MPAC2007 chairs

Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing, MPAC 2007 held at the ACM/IFIP/USENIX 8th International Middleware Conference
2007 | Conference paper
EID:

2-s2.0-57349123509

Contributors: Terzis, S.; Neely, S.; Narasimhan, N.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Gathering experience in trust-based interactions

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | Conference paper
EID:

2-s2.0-33745889615

Part of ISSN: 16113349 03029743
Contributors: English, C.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Middleware for pervasive and ad hoc computing

Personal and Ubiquitous Computing
2006 | Journal article
EID:

2-s2.0-28644435368

Part of ISSN: 16174909
Contributors: Terzis, S.; Nixon, P.; Narasimhan, N.; Walsh, T.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Question-based authentication using context data

ACM International Conference Proceeding Series
2006 | Conference paper
EID:

2-s2.0-34547186056

Contributors: Nosseir, A.; Connor, R.; Revie, C.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Situation determination with reusable situation specifications

Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
2006 | Conference paper
EID:

2-s2.0-33750338100

Contributors: Thomson, G.; Terzis, S.; Nixon, P.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Towards self-protecting ubiquitous systems: Monitoring trust-based interactions

Personal and Ubiquitous Computing
2006 | Journal article
EID:

2-s2.0-28644440574

Part of ISSN: 16174909
Contributors: English, C.; Terzis, S.; Nixon, P.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Security, Privacy and Trust Issues in Smart Environments

Smart Environments: Technology, Protocols and Applications
2005 | Book chapter
EID:

2-s2.0-44349139060

Contributors: Nixon, P.A.; Wagealla, W.; English, C.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Trust lifecycle management in a global computing environment

Lecture Notes in Computer Science
2005 | Conference paper
EID:

2-s2.0-23944451144

Part of ISSN: 03029743
Contributors: Terzis, S.; Wagealla, W.; English, C.; Nixon, P.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Engineering trust based collaborations in a global computing environment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004 | Conference paper
EID:

2-s2.0-35048854584

Part of ISSN: 16113349 03029743
Contributors: English, C.; Terzis, S.; Wagealla, W.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Engineering trust based collaborations in a global computing environment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004 | Book
EID:

2-s2.0-85088006460

Part of ISSN: 16113349 03029743
Contributors: English, C.; Terzis, S.; Wagealla, W.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2003 | Conference paper
EID:

2-s2.0-84936976524

Part of ISSN: 16113349 03029743
Contributors: Nixon, P.; Terzis, S.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Trust dynamics for collaborative global computing

Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
2003 | Conference paper
EID:

2-s2.0-24944440142

Part of ISBN: 0769519636
Part of ISSN: 15244547
Contributors: English, C.; Terzis, S.; Wagealla, W.; Lowe, H.; Nixon, P.; McGettrick, A.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Trusting collaboration in global computing systems

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2003 | Book
EID:

2-s2.0-35248890054

Part of ISSN: 16113349 03029743
Contributors: English, C.; Wagealla, W.; Nixon, P.; Terzis, S.; Lowe, H.; McGettrick, A.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Using trust for secure collaboration in uncertain environments

IEEE Pervasive Computing
2003 | Journal article
EID:

2-s2.0-2442549069

Part of ISSN: 15361268
Contributors: Cahill, V.; Gray, E.; Seigneur, J.-M.; Jensen, C.D.; Chen, Y.; Shand, B.; Dimmock, N.; Twigg, A.; Bacon, J.; English, C. et al.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Architectural implications for context adaptive smart spaces

Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002
2002 | Conference paper
EID:

2-s2.0-84958157686

Contributors: Nixon, P.; Dobson, S.; Terzis, S.; Wang, F.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Security models for trusting network appliances

Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002
2002 | Conference paper
EID:

2-s2.0-84958155705

Contributors: English, C.; Nixon, P.; Terzis, S.; McGettrick, A.; Lowe, H.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

International Journal on Digital Libraries
2000 | Journal article
EID:

2-s2.0-84867509420

Part of ISSN: 14321300 14325012
Contributors: Kapidakis, S.; Terzis, S.; Sairamesh, J.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Component location and the role of trading in large scale distributed systems

International Workshop on Software Engineering for Parallel and Distributed Systems, Proceedings
2000 | Conference paper
EID:

2-s2.0-0033715182

Contributors: Terzis, S.; Nixon, P.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

Vanilla: An open language framework

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2000 | Conference paper
EID:

2-s2.0-77950476196

Part of ISSN: 16113349 03029743
Contributors: Dobson, S.; Nixon, P.; Wade, V.; Terzis, S.; Fuller, J.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier

A management architecture for measuring and monitoring the behavior of digital libraries

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
1998 | Conference paper
EID:

2-s2.0-84945188568

Part of ISBN: 9783540651017
Part of ISSN: 16113349 03029743
Contributors: Kapidakis, S.; Terzis, S.; Sairamesh, J.
Source: Self-asserted source
Sotirios Terzis via Scopus - Elsevier