Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Spyrou is active.

Publication


Featured researches published by Thomas Spyrou.


international conference on human computer interaction | 2007

Evaluating usability evaluation methods: criteria, method and a case study

Panayiotis Koutsabasis; Thomas Spyrou; John Darzentas

The paper proposes an approach to comparative usability evaluation that incorporates important relevant criteria identified in previous work. It applies the proposed approach to a case study of a comparative evaluation of an academic website employing four widely-used usability evaluation methods (UEMs): heuristic evaluation, cognitive walkthroughs, think-aloud protocol and co-discovery learning.


information security | 1996

Intention modelling: approximating computer user intentions for detection and prediction of intrusions

Thomas Spyrou; John Darzentas

This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive representation of knowledge about how to perform these actions. The Intention modelling approach is based on theories of cognitive and task modelling as well as on theories of intention, rational action and plan recognition. Intention Models (IMs) have been used in the detection of malicious attacks which usually do not consist of illegal actions, but of a set of actions individually acceptable to the system which at a higher level may form non acceptable task(s). A first effort at implementing these models for a real application was for the creation of the UII system, a research prototype for the detection of anomalous behaviour of network users obtained by reasoning about the characterisation of their intentions. It was developed as an autonomous module within SECURENET, a European funded programme that aims at defending open computer systems, employing advanced techniques and methodologies.


Electronic Commerce Research | 2008

A descriptive reference framework for the personalisation of e-business applications

Panayiotis Koutsabasis; Modestos Stavrakis; Nikos Viorres; Jenny S. Darzentas; Thomas Spyrou; John Darzentas

Personalisation is widely considered as a critical element of contemporary electronic businesses. However, despite the wealth of scientific work on personalisation, the definition of the term remains blurred with as consequence a lack of clarity as to what to design or evaluate when it comes to this area of an e-business. E-business stakeholders, including designers, managers and customers, need to understand the significance of personalisation features for many reasons including: guidance for design and evaluation, user appeal and implications for e-business functionality. The paper introduces a descriptive framework for personalisation aspects of e-businesses, in business-to-consumer (B2C) situations, that is related to typical e-business functionality. The proposed framework classifies previous research and extends it to provide e-commerce stakeholders with a vocabulary for analysing e-businesses, for comparing personalisation features, and for explaining e-business commerce evaluation results. The framework is applied to the evaluation of the personalisation features of contemporary clothing e-businesses, and conclusions are drawn for the readiness of this sector to adopt personalisation requirements.


Kybernetes | 2007

Cybernetic embodiment and the role of autonomy in the design process

Argyris Arnellos; Thomas Spyrou; John Darzentas

Purpose – This paper aims to develop the role of autonomy in the emergence of the design process. It shows how the design process is facilitated by autonomy, how autonomy is enhanced through the design process and how the emergence of anticipatory and future‐oriented representational content in an autonomous cognitive system provides the functionality needed for the strengthening of both its autonomy and the design process, in which the autonomous cognitive system purposefully engages.Design/methodology/approach – Initially, the essential characteristics of the design process and of the cognitive systems participating in it will be identified. Then, an attempt to demonstrate the ability of an enhanced second‐order cybernetic framework to satisfy these characteristics will be made. Next, an analytic description of the design process under this framework is presented and the respective implications are critically discussed.Findings – The role of autonomy is crucial for the design process, as it seems that a...


hawaii international conference on system sciences | 1999

Facilitating user-system interaction: the GAIA interaction agent

Panayiotis Koutsabasis; John Darzentas; Thomas Spyrou; Jenny S. Darzentas

This paper presents the identification, design and implementation of a user interface to a brokerage system and the conceptual architecture and functional behaviour of an intelligent interaction agent that supports and enhances the interaction between the user and the system. The term interaction agent is used in order to describe a particular class of interface agents that function as intelligent personal assistants to users of a computer based system. The interaction agent provides assistance to the user in two contexts. On the user interface level it assists users to comprehend and manipulate the user interface. On the domain of application level, it provides users with information and advice according to their preferences. This work is being carried out in the context of an ACTS (AC 221) project GAIA (Generic Architecture for Information Availability).


Computer Communications | 1996

Research: Model for network behaviour under viral attack

Sokratis K. Katsikas; Thomas Spyrou; Dimitris Gritzalis; John Darzentas

Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soundness of the model is being tested via simulation experiments. Interesting results that can be practically useful to network administrators are being derived.


international conference on universal access in human computer interaction | 2009

The Usability of Web Accessibility Guidelines: An Approach for Evaluation

Maria Kapsi; Evangelos Vlachogiannis; Jenny S. Darzentas; Thomas Spyrou

This paper aims at contributing to the evaluation of web accessibility and thus promoting design for all, considering the design process as an iterative process containing evaluation as a fundamental component. More specifically, the paper: 1) rethinks Web Accessibility Evaluation notion and its abstract requirements, 2) investigates the usability of W3C Web Content Accessibility Guidelines (WCAG 1.0 and WCAG 2.0), and 3) proposes an approach for an evaluation of the usability of accessibility guidelines.


Interactive Learning Environments | 2001

Towards Integration of Learning Objects Metadata and Learner Profiles Design: Lessons Learnt from GESTALT

Michalis Konstantopoulos; Jenny S. Darzentas; Panayiotis Koutsabasis; Thomas Spyrou; John Darzentas

Within the context of learning technology environments, there is much effort on one hand, at defining metadata for educational content, and on the other, at specifying learner user profiles. However, less attention has been paid to the understanding of the relationship between these two areas of research, in terms of semantic and structural correlations. Based on an implementation of learning object metadata and learner profiles in a learning technology system undertaken in the Getting Education Systems Talking Across Leading Edge Technologies (GESTALT) project, this paper argues that the definition of a metadata schema and a User Profile should be a joint effort due to the complementary nature of these two descriptions in regard to the critical functions of the educational process.


Journal of Decision Systems | 1995

Designing a Designers' Decision Aiding System (DDAS)

John Darzentas; Jenny S. Darzentas; Thomas Spyrou

ABSTRACT An approach for designing and developing decision aiding systems is presented through the design and definition of the architecture of a system, corresponding to a real problem: that of providing aid to designers. The purpose of the decision aid is to provide assistance to computer system designers tackling interface usability problems and needing to know which modelling techniques out of an array would be more appropriate to apply. Different aspects of the design problem may call for different modelling techniques to be recruited. The design of the DDAS accommodates that reality. The architecture of DDAS is based on principles of systems thinking, in particular soft systems methodology, for eliciting and structuring knowledge relevant to a generic design space, and on fuzzy sets through test score semantics for representing and evaluating the meaning of relationships between components of the design problem and the modelling techniques. The advantage of this architecture is that it could be used...


Computer Networks | 2001

The need for academic middleware to support advanced learning services

Michalis Konstantopoulos; Thomas Spyrou; John Darzentas

Abstract The increased significance of digital and human networks in academic institutions and the development of vocational and distance-learning methods and systems and their associated delivery services have modified the organizational and information structures of academic institutions. In this new scenario, management information systems, many learning resources in printed or digital format and network-related user services compete for acceptance in a rapidly changing system. There is a growing need to provide new services in order to function in a changing international market, to prepare for the expected student mobility and the increasing diversity of educational needs. There are two main research areas that are looking at the problem, each from their own perspective: the learning technology area and the network technology area. The former is working mainly on standards and best practices for the delivery of online and distance education. Efforts include the description of learning objects with metadata, the description of learners with profiles and the generic depiction of learning technology systems in terms of information systems architecture. In the latter research area, recent deployment issues have been of increasing concern. Inevitably, research is moving towards an area where major work is already underway. This is the part of the networking community that is working on the definition and deployment of middleware services. This paper argues for the introduction of academic middleware to speed up the delivery process of the new services and reduce the complexity of the managed systems.

Collaboration


Dive into the Thomas Spyrou's collaboration.

Top Co-Authors

Avatar

John Darzentas

University of the Aegean

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nikos Viorres

University of the Aegean

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Julio Abascal

University of the Basque Country

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge