Author of the publication

Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary.

, and . J. Assoc. Inf. Syst., 21 (6): 1 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsohou, Aggeliki
add a person with the name Tsohou, Aggeliki
 

Other publications of authors with the same name

Cyber insurance: state of the art, trends and future directions., , , and . Int. J. Inf. Sec., 22 (3): 737-748 (June 2023)Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries., , , , , , , , and . Int. J. Electron. Gov. Res., 8 (3): 63-77 (2012)Are users competent to comply with information security policies? An analysis of professional competence models., and . Inf. Technol. People, 31 (5): 1047-1068 (2018)A Data Scope Management Service to Support Privacy by Design and GDPR Compliance., , , , , , and . J. Data Intell., 2 (2): 136-165 (2021)Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data., , and . MCIS, page 32. AISeL, (2017)Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform., , , , , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 204-223. Springer, (2019)Unifying ISO Security Standards Practices into a Single Security Framework., , , and . SAISMC, page 188-203. University of Plymouth, (2010)Demystifying the Influential IS legends of positivism, and . Journal of the Association for Information Systems, (2018)Analyzing Information Security Awareness through Networks of Association., , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 227-237. Springer, (2010)