Author of the publication

Privacy Requirements Engineering for Trustworthy e-Government Services.

, , , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 298-307. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsohou, Aggeliki
add a person with the name Tsohou, Aggeliki
 

Other publications of authors with the same name

Cyber insurance: state of the art, trends and future directions., , , and . Int. J. Inf. Sec., 22 (3): 737-748 (June 2023)Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries., , , , , , , , and . Int. J. Electron. Gov. Res., 8 (3): 63-77 (2012)Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform., , , , , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 204-223. Springer, (2019)Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data., , and . MCIS, page 32. AISeL, (2017)Unifying ISO Security Standards Practices into a Single Security Framework., , , and . SAISMC, page 188-203. University of Plymouth, (2010)Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship., , , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 24-33. Springer, (2007)Η ενημερότητα ασφαλείας στα πλαίσια της διοίκησης ασφαλείας πληροφοριακών συστημάτων. University of the Aegean, Greece, (2010)National Archive of PhD Theses: oai:10442/25076.Effects of privacy policy visualization on users' information privacy awareness level., and . Inf. Technol. People, 33 (2): 502-534 (2020)Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 159-180. Springer, (2019)