Aggeliki Tsohou
University of the Aegean
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Aggeliki Tsohou.
Information Security Journal: A Global Perspective | 2008
Aggeliki Tsohou; Spyros Kokolakis; Maria Karyda; Evangelos A. Kiountouzis
ABSTRACT The aim of this survey is largely exploratory, namely, to discover patterns and trends in the way that practitioners and academics alike tackle the security awareness issue and to have a better understanding of the reasons why security awareness practice remains an unsolved problem. Open coding analysis was performed on numerous publications (articles, surveys, standards, reports and books). A classification scheme of six categories of concern has emerged from the content analysis (e.g., terminology ambiguity), and the chosen publications were classified based on it. The paper identifies ambiguous aspects of current security awareness approaches and the proposed classification provides a guide to identify the range of options available to researchers and practitioners when they design their research and practice on information security awareness.
Information Management & Computer Security | 2008
Aggeliki Tsohou; Spyros Kokolakis; Maria Karyda; Evangelos A. Kiountouzis
Purpose – The purpose of this paper is to study the way information systems (IS) security researchers approach information security awareness and examine whether these approaches are consistent with the organization theory and IS approaches for the study of organizational processes.Design/methodology/approach – Open coding analysis was performed on selected publications (articles, surveys, standards, and reports). The chosen publications were classified and the classification results are presented, based on a proposed typology.Findings – The proposed typology allows us to identify different types of research models followed by security researchers and practitioners, and to infer a set of practical implications, for the benefit of those interested in empirically studying information security awareness.Research limitations/implications – The paper represents a pilot survey, performed in a selected number of publications.Practical implications – The paper helps researchers and practitioners to distinguish th...
Information Technology & People | 2012
Aggeliki Tsohou; Maria Karyda; Spyros Kokolakis; Evangelos A. Kiountouzis
Purpose – Recent global security surveys indicate that security training and awareness programs are not working as well as they could be and that investments made by organizations are inadequate. The purpose of the paper is to increase understanding of this phenomenon and illuminate the problems that organizations face when trying to establish an information security awareness program.Design/methodology/approach – Following an interpretive approach the authors apply a case study method and employ actor network theory (ANT) and the due process for analyzing findings.Findings – The paper contributes to both understanding and managing security awareness programs in organizations, by providing a framework that enables the analysis of awareness activities and interactions with the various organizational processes and events.Practical implications – The application of ANT still remains a challenge for researchers since no practical method or guide exists. In this paper the application of ANT through the due pro...
Information Management & Computer Security | 2010
Aggeliki Tsohou; Spyros Kokolakis; Costas Lambrinoudakis; Stefanos Gritzalis
Purpose – Recent information security surveys indicate that both the acceptance of international standards and the relative certifications increase continuously. However, it is noted that still the majority of organizations does not know the dominant security standards or does not fully implement them. The aim of this paper is to facilitate the awareness of information security practitioners regarding globally known and accepted security standards, and thus, contribute to their adoption.Design/methodology/approach – The paper adopts a conceptual approach and results in a classification framework for categorizing available information security standards. The classification framework is built in four layers of abstraction, where the initial layer is founded in ISO/IEC 27001:2005 information security management system.Findings – The paper presents a framework for conceptualizing, categorizing and interconnecting available information security standards dynamically.Research limitations/implications – The comp...
Transforming Government: People, Process and Policy | 2014
Aggeliki Tsohou; Habin Lee; Zahir Irani
Purpose – The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach – We followed a multidisciplinary perspective (social, behavioral, business and technical) and conducted a conceptual analysis for analyzing the associated challenges. We conducted focus group interviews in two countries for evaluating the performance models that resulted from the conceptual analysis. Findings – This study identifies and analyzes several challenges that may em...
trust and privacy in digital business | 2007
Aggeliki Tsohou; Marianthi Theoharidou; Spyros Kokolakis; Dimitris Gritzalis
Organizational culture influences the way a) information security is perceived, b) security countermeasures are adopted, and c) the organization reacts to the cultural changes of a new security program. In Information Security Management Outsourcing (ISMO), cultural differences may arise between the organization and the provider, for example conflict between the countermeasures applied by the provider and the companys internal policies. We propose a conceptual framework of security mechanisms in order organizations that choose ISMO to identify and manage cultural dissimilarity.
electronic government | 2012
Vishanth Weerakkody; Habin Lee; Andrea Ko; Tunc D. Medeni; Ramzi El-Haddadeh; Aggeliki Tsohou; Karim Al-Yafi; Zahir Irani; Luis Miguel Campos
Workflow technology has been proven as an enabler for numerous benefits for private and public organizations. Including: cost reduction, efficiency savings in terms of time and cost, increased capability, faster processing, reductions in errors, and work iterations, service quality and customer satisfaction. Public sector has endorsed these benefits by adopting workflow management systems to support administrative processes, such as human resources management or claims processing. This technology is yet to be utilized to support the formulation of policy making processes to facilitate the participation of citizens in the policy making processes and increase their awareness on political issues. This paper Investigates the feasibility of adopting workflow tools for the support of decision making processes that lead to development of public policies, despite the variant institutional settings. To do so, public policy making processes from four countries were examined and analyzed. The results are explored further in the article.
trust and trustworthy computing | 2010
Nikos Vrakas; Christos Kalloniatis; Aggeliki Tsohou; Costas Lambrinoudakis
Several research studies have applied information systems acceptance theories in order to examine issues related to the acceptance of e-services by users. Their application in the e-government systems has revealed that trust is a prerequisite for their usage. Moreover, it has been proved that privacy concerns are a main antecedent of trust in e-government systems intention of use. Therefore, information systems that are not privacy aware are not trusted and thus not accepted by users. Currently there are many different attacks that can be realized by malicious users for compromising the confidentiality of private data and thus putting at stake the trustworthiness of the systems. The conventional way for preventing such attacks is mainly the employment of Privacy Enhancing Technologies (PETs). However, PETs are employed as ad hoc technical solutions that are independent from the organizational context in which the system will operate. We argue that we need privacy requirements engineering methods for capturing the context dependent privacy requirements and for selecting the appropriate technical, organizational and procedural countermeasures which will help building privacy aware systems that can offer electronic services which users can trust.
trust and privacy in digital business | 2010
Aggeliki Tsohou; Maria Karyda; Spyros Kokolakis; Evangelos A. Kiountouzis
Information security awareness is a continuous effort to raise attention to information security and its importance, in order to stimulate securityoriented behaviors. Despite the increasing interest of researchers on the topic and the continuous notifications of global security surveys for its significance, awareness remains a critical issue of information security. Related approaches propose techniques and methods for promoting security without theoretical grounding and separately from the overall information security management framework. The aim of this paper is to suggest a theoretical and methodological framework which facilitates the analysis and understanding of the issues that are intertwined with awareness activities, in order to support the organizations security management.
Information Technology & People | 2018
Aggeliki Tsohou; Philipp Holtkamp
Information security policies (ISPs) are used by organizations to communicate rules on the use of information systems (IS). Research studies show that compliance with the ISPs is not a straightforward issue and that several factors influence individual behavior toward ISP compliance, such as security awareness or individual perception of security threats. The purpose of this paper is to investigate the competencies associated with users’ ISP compliance behavior.,In order to reveal the competencies that are associated with the users’ ISP compliance behavior, the authors systematically analyze the ISP compliance literature and the authors develop an ISP compliance competency model. The authors then target to explore if IS users are equipped with these competencies; to do so, the authors analyze professional competence models from various industry sectors and compare the competencies that they include with the developed ISP compliance competencies.,The authors identify the competencies associated with ISP compliance and the authors provide evidence on the lack of attention in information security responsibilities demonstrated in professional competence frameworks.,ISP compliance research has focused on identifying the antecedents of ISP compliance behavior. The authors offer an ISP compliance competency model and guide researchers in investigating the issue further by focusing on the professional competencies that are necessary for IS users.,The findings offer new contributions to practitioners by highlighting the lack of attention on the information security responsibilities demonstrated in professional competence frameworks. The paper also provides implications for the design of information security awareness programs and information security management systems in organizations.,To the best of the authors’ knowledge, the paper is the first study that addresses ISP compliance behavior from a professional competence perspective.