|
Search the dblp DataBase
Evangelos A. Kiountouzis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
Redefining Information Systems Security: Viable Information Systems. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:453-468 [Conf]
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
Content, Context, Process Analysis of IS Security Policy Formation. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:145-156 [Conf]
- Evangelos A. Kiountouzis, Spyros Kokolakis
An analyst's view of IS security. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:23-35 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Security Concerns for Contemporary Development Practices: A Case Study. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:421-436 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:347-356 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Perceptions of Security Contributing to the Implementation of Secure IS. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:313-324 [Conf]
- Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis
Information systems security policies: a contextual perspective. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:246-260 [Journal]
- Spyros Kokolakis, Evangelos A. Kiountouzis
Achieving Interoperability in a Multiple-Security- Policies Environment. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:267-281 [Journal]
- Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis
The insider threat to information systems and the effectiveness of ISO17799. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:472-484 [Journal]
- Spyros Kokolakis, A. J. Demopoulos, Evangelos A. Kiountouzis
The use of business process modelling in information systems security analysis and design. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:107-116 [Journal]
- Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou
Embedding security practices in contemporary information systems development approaches. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:4, pp:183-197 [Journal]
- Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis
Using the Lens of Circuits of Power in Information Systems Security Management. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:228-236 [Conf]
Analyzing Information Security Awareness through Networks of Association. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.007secs
|