Author of the publication

Information Systems Security Management: A Review and a Classification of the ISO Standards.

, , , and . e-Democracy, volume 26 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 220-235. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsohou, Aggeliki
add a person with the name Tsohou, Aggeliki
 

Other publications of authors with the same name

Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data., , and . MCIS, page 32. AISeL, (2017)Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries., , , , , , , , and . Int. J. Electron. Gov. Res., 8 (3): 63-77 (2012)Cyber insurance: state of the art, trends and future directions., , , and . Int. J. Inf. Sec., 22 (3): 737-748 (June 2023)Are users competent to comply with information security policies? An analysis of professional competence models., and . Inf. Technol. People, 31 (5): 1047-1068 (2018)A Data Scope Management Service to Support Privacy by Design and GDPR Compliance., , , , , , and . J. Data Intell., 2 (2): 136-165 (2021)Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform., , , , , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 204-223. Springer, (2019)Unifying ISO Security Standards Practices into a Single Security Framework., , , and . SAISMC, page 188-203. University of Plymouth, (2010)Demystifying the Influential IS legends of positivism, and . Journal of the Association for Information Systems, (2018)Governance of IT Service Procurement: Relationship vs Network based Approach., , and . PACIS, page 55. (2013)