Filter by type:

Sort by year:

Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media

Journal
K. Vgena, A. Kitsiou, C. Kalloniatis, S. Gritzalis
Future Internet, Vol. 19, No. 249, MDPI

Responsible Innovation at work: Gamification, public engagement, and Privacy by Design

Journal
D. Ruggiu, V. Blok, C. Coenen, C. Kalloniatis, A. Kitsiou, A-G Mavroeidi, S. Milani, A. Sitzia
Journal of Responsible Innovation, Taylor and Francis (Accepted)

Understanding the role of Users’ Socio-location Attributes and their Privacy Implications on Social Media

Journal
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis
Information and Computer Security, Emerald (Accepted)

Uncovering patterns of public perceptions towards biodiversity crime using con-servation culturomics

Journal
A. Troumbis, S. Iosifidis, C. Kalloniatis
Crime, Law and Social Change, 2022, Springer (Accepted)

A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems

Conferences
C. Lyvas, K. Maliatsos, A. Menegatos, T. Giannakopoulos, C. Lambrinoudakis, C. Kalloniatis and A. Kanatas
CyberICPS 2022 8th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in conjunction with 27th European Symposium on Research in Computer Security (ESORICS), Sokratis Katsikas et al. (eds), September 2022, Copenhagen, Denmark, Springer Lecture Notes in Computer Science

Object Relational Mapping vs. Event-Sourcing: Systematic review

Conferences
M. Pantelelis, C. Kalloniatis
EGOVIS 2022, 11th International Conference on Electronic Government and the Information Systems Perspective, A. Kő and E. Francesconi (eds), August 2022, Vienna, Austria, Springer Lecture Notes in Computer Science

Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things

Conferences
S. Stavrinos, K. Kotis, C. Kalloniatis
AIAI 2022, 18th Artificial Intelligence Applications and Innovations Conference, I. Maglogiannis, L. Iliadis, J. Macintyre, P. Cortez (eds), June 2022, Crete, Greece IFIP Advances in Information and Communication Technology

Revised Forensic Framework Validation and Cloud Forensic Readiness

Journal
S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos, M. Psallidas
International Journal of Electronic Governance, 2021, Inderscience Publishers

Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks

Journal
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
Future Internet, Vol. 13, No. 2:23, https://doi.org/10.3390/fi13020023

Protecting Privacy in Cultural Industries: Challenges and Perspectives

Chapter in Book
A. Kitsiou, C. Kalloniatis
Emerging Technologies and Cultural Heritage, Catapoti, D. & Bounia, A. (eds) Athens: Alexan-dreia, pp. 267-286. (in greek)

Privacy Requirements Engineering Technologies

Chapter in Book
V. Diamantopoulou, C. Kalloniatis
Information and Systems Security in Cyberspace, S. Katsikas, S. Gritzalis, C. Lambrinoudakis (Εds.), Athens, Greece, NewTech Pub., pp. 517-546, 2021 (in greek)

Security Requirements Engineering Technologies

Chapter in Book
A. Pattakou, M. Pantelelis, C. Kalloniatis
Information and Systems Security in Cyberspace, S. Katsikas, S. Gritzalis, C. Lambrinoudakis (Εds.), Athens, Greece, NewTech Pub., pp. 491-516, 2021 (in greek)

Security, Privacy and Usability

Chapter in Book
P. Zagouras, K. Vgena, A. Kitsiou, C. Kalloniatis
Information and Systems Security in Cyberspace, S. Katsikas, S. Gritzalis, C. Lambrinoudakis (Εds.), Athens, Greece, NewTech Pub., pp. 191-231, 2021 (in greek)

Gamification: a necessary element for designing privacy training programs

Chapter in Book
A-G Mavroeidi, A. Kitsiou, C. Kalloniatis
The Role of Gamification in Software Development Lifecycle, C. Kalloniatis (Ed), Rijeka, Croatia, InTechOpen, 2021 (DOI: 10.5772/intechopen.97420)

Can social gamification and privacy co-exist? Identifying the major concerns

Conferences
K. Vgena, A-G Mavroeidi, A. Kitsiou, C. Kalloniatis
PCI 2021 25th Pan-Hellenic Conference on Informatics, M. Vassilakopoulos, N. Karanikolas, G. Stamoulis, V. Verykios, C. Sgouropou-lou, (eds), pp. 178–183 November 2021, Volos, Greece, ACM Press

Disclosing Social and Location Attributes on Social Media: The Impact on Users’ Privacy

Conferences
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis
SECPRE 2021 5th International Workshop on Security and Privacy Requirements En-gineering in conjunction with 26th European Symposium on Research in Computer Se-curity (ESORICS), C. Kalloniatis, J. Mylopoulos, A. Anton and S. Gritzalis (eds), October 2021, Darmstadt: Germany, Springer LNCS Lecture Notes in Computer Science Vol.12501

Incorporating privacy by design in Body Sensor Networks for Medical Applica-tions: A Privacy and Data Protection Framework

Journal
C. Kalloniatis, C. Lambrinoudakis, C. Lyvas, M. Musahl, E. Makri, A. Kanatas, S. Gritzalis
Computer Science and Information Systems, Vol 18, No. 1, p.p. 323-347, https://doi.org/10.2298/CSIS200922057K

STEM Education in Europe & the PISA Test

Journal
G. Roungos, C. Kalloniatis, Y. Matsinos
Scientific Educational Journal, Volume 8, Issue 3, ISSN: 2241-4576

A Chebyshev Polynomial Feedforward Neural Network Trained by Differential Evolution and Its Application in Environmental Case Studies

Journal
I. Troumbis, G. Tsekouras, J. Tsimikas, C. Kalloniatis, D. Haralambopoulos
Environmental Modeling and Software, Vol. 126, paper 104663, https://doi.org/10.1016/j.envsoft.2020.104663, Elsevier

The Role of Gamification in Privacy Protection and User Engagement

Chapter in Book
A-G Mavroeidi, A. Kitsiou, C. Kalloniatis
chapter in: Security and Privacy from a Legal, Ethical and Technical Perspective, C. Kalloniatis and C. Tracieso-Gonzalez (Eds), Rijeka, Croatia, InTechOpen, 2020 (DOI: 10.5772/intechopen.91159)

Towards an integrated socio-technical approach for designing adaptive Privacy-Aware Services in Cloud computing

Chapter in Book
A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis
In: Cyber Influence and Congitive Threats, V. Benson, J. McAlaney, (eds), pp. 9-27, 2020, London, Academic Press, Elsevier

Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy

Chapter in Book
S. Gritzalis, M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis
In: Advances in Core Technologies in Informatics – Papers in Honor of Profes-sor Nikolaos Alexandris, G. Tsihrintzis, M. Virvou (Eds.), Vol. 14, 2020, Springer Learning and Analytics in Intelligent Systems

Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts

Conferences
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
CyberICPS 2020 6th Workshop on Security of Industrial Control Systems and Cyber-Physical Systems in conjunction with 25th European Symposium on Research in Com-puter Security (ESORICS), S. K. Katsikas, F. Cuppens, N. Cuppens, C. Lambrin-oudakis, (eds), pp. 117-132, September 2020, Guildford: UK, Springer LNCS Lecture Notes in Computer Science Vol.12501

Aligning the concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems

Conferences
V. Diamantopoulou, C. Kalloniatis, C. Lyvas, K. Maliatsos, M. Gay, A. Kana-tas, and C. Lambrinoudakis
SECPRE 2020 4th International Workshop on Security and Privacy Requirements En-gineering in conjunction with 25th European Symposium on Research in Computer Se-curity (ESORICS), C. Kalloniatis, J. Mylopoulos, A. Anton and S. Gritzalis (eds), pp. 170-184, September 2020, Guildford: UK, Springer LNCS Lecture Notes in Computer Science Vol.12501

Securing User eXperience (SUX): A Review For the End-Users’ Software Robust-ness

Conferences
P. Zagouras, C. Kalloniatis
HAISA 2020 14th International Symposium on Human Aspects of Information Secu-rity & Assurance, Furnell-Clarke (eds), July 2020, Mytilene, Lesvos Island, Greece, IFIP

Measuring users’ socio-contextual attributes for Self-Adaptive Privacy within Cloud-Computing Environments

Conferences
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
TRUSTBUS 2020 17th International Conference on Trust, Privacy and Security in Digital Business, S. K. Katsikas, S. Gritzalis, E. Weippl, (eds), September 2020, Bratislava: Slovakia, Springer LNCS Lecture Notes in Computer Science

Towards the design of an assurance framework for increasing security and privacy in connected vehicles (in press)

Journal
C. Kalloniatis, V. Diamantopoulou, K. Kotis, C. Lyvas, K. Maliatsos, M. Gay, A. Kanatas, and C. Lambrinoudakis
International Journal of Internet of Things and Cyber-Assurance

Enhancing University students’ privacy literacy through an educational interven-tion. A Greek case-study

Journal
M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis
International Journal of Electronic Governance, 2019, Inderscience Publishers

Gamification vs Privacy: Identifying and analysing the major concerns

Journal
A. G. Mavroeidi, A. Kitsiou , C. Kalloniatis, S. Gritzalis
Future Internet, Vol. 11, No. 3 (67), pp. 1-17, 2019, MDPI

Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes

Journal
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis, S. Gritzalis
Future Internet, Vol. 11, No. 3, pp. 1-20, MDPI

A Framework for Designing Cloud Forensic-enabled Services (CFeS)

Journal
S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos
Requirements Engineering, Vol. 24, 403–430. https://doi.org/10.1007/s00766-018-0289-y

The e-Governance model in Education. Citizenship cultivation, participa-tion enhancement and collective decision making in Greek educational structures using social media

Chapter in Book
M. Sideri, A. Kitsiou, A. Filippopoulou, C. Kalloniatis, S. Gritzalis
In : Innovation, Sustainability and Educational Design, V. Papavasileiou, V. Katsigianni, N. Tzamperis & M. Kaila (Εds.), Athens, Greece, Diadrasi Publ., pp. 88-107 2019

A Revised Forensic Process for Aligning the Investigation Process with the De-sign of Forensic-Enabled Cloud Services

Conferences
S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos
E-Democracy 2019 – Safeguarding Democracy and Human Rights in the Digital Age, In: Katsikas S., Zorkadis V. (eds) December 2019, Communications in Computer and Information Science, vol 1111. Springer

Do Identity and Location Data Interrelate? New Affiliations and Privacy Con-cerns in Social-Driven Sharing

Conferences
K. Vgena, A. Kitsiou, C. Kalloniatis, D. Kavroudakis
TRUSTBUS 2019 16th International Conference on Trust, Privacy and Security in Digital Bussiness, S. Gritzalis, E. Weippl, S. K. Katsikas, (eds), pp. 3-16, Septem-ber 2019, Linz: Austria, Springer LNCS Lecture Notes in Computer Science Vol.11711

The interrelation of game elements and privacy requirements for the design of a system: A metamodel

Conferences
A.G. Mavroeidi, A. Kitsiou, C. Kalloniatis
TRUSTBUS 2019 16th International Conference on Trust, Privacy and Security in Digital Bussiness, S. Gritzalis, E. Weippl, S. K. Katsikas, (eds), pp. 110-125, Sep-tember 2019, Linz: Austria, Springer LNCS Lecture Notes in Computer Science Vol.11711

Secure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development

Conferences
A. Polydoropoulou, C. Kalloniatis, D. Kavroudakis, S. Gritzalis
TRB 2019 Transportation Research Board TRB’s 98th Meeting, K. Turnbull et al., (eds), January 2019, Washington, USA, TRB

Security and Privacy under a unified framework: A review

Journal
A. Pattakou, C. Kalloniatis, S. Gritzalis
International Journal On Advances in Security, Vol. 11, No. 1-2, pp. 39-51, 2018, IARIA

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identi-fying the Major Privacy Concepts

Journal
C. Kalloniatis, D. Kavroudakis, A. Polydoropoulou, S. Gritzalis
International Journal of Applied Geospatial Research, Vol. 10, No. 1, pp. 73-91, 2019, IGI Global

E-Governance in educational settings. Leadership’s views of the Greek Second-ary and Tertiary Education on social media usage for participatory decision-making

Journal
M. Sideri, A. Filippopoulou, A. Kitsiou, C. Kalloniatis, S. Gritzalis
Internet Research, Vol. 29 No. 4, pp. 818-845

Location—Allocation Modeling for Emergency Evacuations in the Aegean Sea

Chapter in Book
D. Kavroudakis, C. Kalloniatis, P. Theodorou
chapter in: Mediterranean Cities and Island Communities, Stratigea and Ka-vroudakis (Eds), Springer, 2018

A Framework for Aligning the Design of Forensic-enabled Cloud Services with the Investigation Process

Chapter in Book
S. Simou, C. Kalloniatis, S. Gritzalis
chapter in: Management of Information Systems, (eds), 2018, Rijeka, Croatia, InTechOpen, 2018

"... having freedom of speech, does not mean that we can write whatever we want. Our freedom stops where others’ rights of begin. " An educational inter-vention for enhancing privacy awareness in digital social networks

Chapter in Book
M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
chapter in: Sustainability, Sustainable Development, Nature and Human Nature: Our World? Quo Vadis, Athens, Greece, (to be published) (in greek), 2018

Towards the Design of Usable Privacy by Design Methodologies

Conferences
A. Pattakou, A. G. Mavroeidi, V. Diamantopoulou, C. Kalloniatis, S. Gritzalis
ESPRE 2018 5th International Workshop on Evolving Security and Privacy Require-ments Engineering (in conjunction with the RE'18 26th IEEE Requirements Engineer-ing Conference), K. Beckers, S. Faily, S.-W. Lee, N. Mead, (eds), August 2018, Banff, Canada, IEEE CPS Conference Publishing Services

Enhancing Cultural Tourism Experiences in Albania through Mobile Augmented Reality Applications

Conferences
A. Dhembi, D. Kavroudakis, C. Kalloniatis
3rd ’SmartBlueCity’ Euro-Mediterranean Conference and Exhibition 2018 on “Featur-ing Territorial Intelligence of Small and Medium-sized Cities and Insular Communities in the Mediterranean Scenery – Building Bridges between Local Endeavors and Global Developments”, A. Stratigea, (ed), October 2018, Larnaca, Cyprus, Springer

Modeling Data Center Temperature Profile in Terms of a First Order Polynomial RBF Network Trained by Particle Swarm Optimization

Conferences
J. Troumbis, G. Tsekouras, C. Kalloniatis, P. Papachiou, D. Haralambopoulos
ICANN 2018 27th International Conference on Artificial Neural Networks, Věra KůrkováYannis ManolopoulosBarbara HammerLazaros IliadisIlias Maglogi-annis (eds), October 2018, Rhodes, Greece, LNCS, Volume 11140, Springer

A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness

Conferences
S. Simou, J. Troumbis, C. Kalloniatis, D. Kavroudakis, S. Gritzalis
TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security, G. Pernul, S. Furnell, (eds), pp. 150-164, September 2018, Regensburg, Germany, Springer LNCS Lecture Notes in Computer Science, Springer

The use of Internet οf Things in cultural sites: A critical overview (abstract)

Conferences
D. Kavroudakis, S. Stavridis, M. Batsaris, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

Smart Spatial Network Paths: The case of cultural routes (abstract)

Conferences
A. Agourogiannis, D. Kavroudakis, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

The role of Social Software Engineering in the design of Privacy-Aware Infor-mation System

Conferences
A. Vgena, A. Kitsiou, D. Kavroudakis, C. Kalloniatis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

The role of Gamification in Cultural Informatics

Conferences
A.G. MAvroeidi, A. Kitsiou, C. Kalloniatis, S. Gritzalis
CICMS 2018 1st International Conference on Cultural Informatics & Communication-Media Studies, May 2018, Kusadasi, Turkey

Towards a Security Assurance Framework for Connected Vehicles

Conferences
P. Pantazopoulos, S. Haddad, C. Lambrinoudakis, C. Kalloniatis, K. Maliatsos, A. Kanatas, A. Varádi, M. Gay, A. Amditis
The 5th IEEE WoWMoM Workshop on Smart Vehicles: Connectivity Technologies and ITS Applications, At Chania, Greece

Efficiency and effectiveness approaches in spatial data collection of vrisa after lesvos earthquake

Conferences
D. Kavroudakis, N. Soulakellis, K. Topouzelis, S. Chatzistamatis, C. Vasilakos, A. Papakostantinou, G. Tataris, C. Kalloniatis, O. Rousou, M. Batsaris, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.

Synergistic exploitation of geoinformation methods for post-earthquake 3d mapping of vrisa traditional settlement, Lesvos island, Greece

Conferences
N. Soulakellis, S. Chatzistamatis, C. Vasilakos, G. Tataris, A. Papakonstan-tinou, D. Kavroudakis, K. Topouzelis, O. Roussou, C. Kalloniatis, E. Papado-poulou, K. Chaidas, and P. Kalaitzis
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLII-3/W4, 491-498, https://doi.org/10.5194/isprs-archives-XLII-3-W4-491-2018, 2018

Interpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization

Journal
G. Tsekouras, Tsimikas I., C. Kalloniatis, S. Gritzalis
IEEE Transactions on Fuzzy Systems, 2017, IEEE

A Risk Management Approach for a Sustainable Cloud Migration

Journal
A.A.L.A. Rahman, S. Islam, C. Kalloniatis, S. Gritzalis
Journal of Risk and Financial Management, Vol. 10, No. 20, doi:10.3390/jrfm10040020

Designing Secure and Privacy Aware Information Systems

Journal
C. Kalloniatis, A. Pattakou, E. Kavakli, S. Gritzalis
International Journal of Secure Software Engineering, Vol. 8, No. 2, pp. 1-25, doi: 10.4018/IJSSE.2017040101, IGI Global

A Conceptual Model to Support Security Analysis in the Internet of Things

Journal
O. Mavropoulos, H. Mouratidis, A. Fish, E. Panaousis and C. Kalloniatis
Computer Science and Information Systems Journal, Vol. 14, No. 2, pp. 557-578, doi: 10.2298/CSIS160110016M, ComSIS

Incorporating Privacy in the Design of Cloud-Based Systems: A Conceptual Metamodel

Journal
C. Kalloniatis
Information and Computer Security Journal, Vol. 25, No. 5, pp. 614-633, doi: https://doi.org/10.1108/ICS-06-2016-0044, Emerald

Sharing secrets, revealing thoughts and feelings: perceptions about disclosure practices and anonymity in a FB university students’ community

Journal
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
International Journal of Electronic Governance, Vol. 9, No. 3/4, pp. 361-384, doi: http://dx.doi.org/10.1504/IJEG.2017.10006251, International Journal of Electronic Governance, Inderscience Publishers

Addressing Privacy in Traditional and Cloud-based Systems

Chapter in Book
C. Kalloniatis, E. Kavakli, S. Gritzalis
chapter in: Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, Mehdi Khosrow-Pour, (ed), pp. 1900-1930, 2017, Her-shey, USA, IGI Global, 2017

Privacy Protection in Digital Social Networks. Necessary condition for maintain-ing social cohesion in the Information Society?

Chapter in Book
M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis
Chapter in: Social and Cultural Sustainability, Rhodes, Greece, V. Papavasiliou, P. Fokiali, E. Nikolaou, D. Mantzanos, M. Kaila (Ed.), in greeek

The role of Gender Privacy in the use of Cloud Computing Services

Conferences
P. Michalopoulou, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

Machine Learning and Images For Malware Detection and Classification

Conferences
K. Kosmidis, C. Kalloniatis
PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press

I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB

Conferences
M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis
e-Democracy 2017 7th International Conference on e-Democracy, S. Katsikas, V. Zorkadis, (eds), pp. 79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science, Vol.792

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts

Conferences
C. Kalloniatis, D. Kavroudakis, A. Polydoropoulou, S. Gritzalis
2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, C. Nikolaides, (ed), September 2017, Heraklion, Greece, Springer 

Modelling Cloud Forensic-Enabled Services

Conferences
S. Simou, C. Kalloniatis, S. Gritzalis
Proceedings of the TRUSTBUS 2017 14th International Conference on Trust Privacy and Security in Digital Business, S. Fischer-Huebner, C. Lambrinoudakis, (eds), August 2017, Lyon, France, Springer LNCS Lecture Notes in Computer Science

Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns

Conferences
V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, S. Gritzalis
Proceedings of the IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science, May 2017, Brighton, UK, IEEE Press

Supporting Privacy by Design using Privacy Process Patterns

Conferences
V. Diamantopoulou, C. Kalloniatis, S. Gritzalis, H. Mouratidis
Proceedings of the IFIP SEC 2017 32nd IFIP International Information Security Conference, S. De Capitani di Vimercati, F. Martinelli, (eds), pp. 491-505, May 2017, Rome, Italy, Springer LNCS

Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
CLOUD COMPUTING 2017 8th International Conference on Cloud Computing, GRIDs, and Virtualization, P. Dini, (ed), February 2017, Athens, Greece, IARIA

Managing User Experience: Usability and Security in a new era of Software Supremacy

Conferences
P. Zagouras, C. Kalloniatis, S. Gritzalis
Proceedings of Human Aspects of Information Security, Privacy and Trust, HAS 2017, T. Tryfonas (ed), in the context of the 19th International Conference on Human-Computer Interaction (HCI 2017), July 2017, Vancouver, Canada, Springer LNCS Lecture Notes in Computer Science

A Survey on Cloud Forensics Challenges and Solutions

Journal
S. Simou, C. Kalloniatis, S. Gritzalis, H. Mouratidis
Security and Communication Networks, Vol. 9, No. 18, pp. 6285-6314, doi: 10.1002/sec.1688, Wiley

Increasing Internet Users Trust in the Cloud Computing Era: The Role of Privacy

Journal
C. Kalloniatis
Journal of Mass Communication and Journalism, Vol. 6, No. 3, doi:10.4172/2165-7912.1000306, OMICS

A methodology to carry out voting classification tasks using a particle swarm optimization-based neuro-fuzzy competitive learning network

Journal
A. Tamvakis, G. Tsekouras, A. Rigos, C. Kalloniatis, C-N Anagnostopoulos, G. Anastassopoulos
Evolving Systems, Vol. 8, No. 1, pp. 49-69, Springer

Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners

Journal
S. Islam, S. Fenz, E. Weippl, C. Kalloniatis
International Journal of Secure Software Engineering, Vol. 7, No. 3, pp. 44-73, IGI Global

Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitude in Secondary and Tertiary Education

Conferences
M. Sideri, A. Filippopoulou, G. Rouvalis, C. Kalloniatis, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 2875-2884, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

Conferences
N. Argyropoulos, S. Shei, C. Kalloniatis, C. Mouratidis, A. Delaney, A. Fish, S. Gritzalis
HICSS-50 2017 Hawaii International Conference on System Sciences, pp. 4827-4836, T. Bui, R. Sprague, (eds), January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services

Migrating eGovernment Services in the Cloud: A Capability Modelling Approach

Conferences
E. Gongolidis, E. Kavakli, P. Loucopoulos, C. Kalloniatis
PCI 2016 20th Pan-Hellenic Conference on Informatics, V. Verykios et al., (eds), November 2016, Patras, Greece, ACM Press

Privacy and Facebook Universities Students’ Communities for Confessions and Secrets: The Greek Case

Conferences
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
eDemocracy 2016 6th Inetrantional Confrence on e-Democracy- Citizen Rights in the World of the New Computing Paradigms, in S. Katsikas & A. Sideridis, (eds), Spring-er International Publishing, pp. 77-94.

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective

Conferences
S. Shei, C. Kalloniatis, H. Mouratidis, A. Delaney
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Towards a Model-Based Framework for Forensic- Enabled Cloud Information Systems

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
TrustBus 2016 13th International Conference on Trust Privacy and Security in Digital Business, S. Furnell, S. Katsikas, C. Lambrinoudakis (eds), September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science.

Reasoning about security and privacy in cloud computing under a unified meta-model

Conferences
A. Pattakou, C. Kalloniatis, S. Gritzalis
HAISA 2016 10th International Symposium on Human Aspects of Information Security & Assurance, Furnell-Clarke (eds), July 2016, Frankfurt, Germany

Incorporating Privacy Patterns into Semi-Automatic Business Process Derivation

Conferences
N. Argyropoulos, C. Kalloniatis, H. Mouratidis and A. Fish
RCIS 2016 10th International Conference on Research Challenges in Information Science

APPARATUS: Reasoning About Security Requirements in the Internet of Things

Conferences
O. Mavropoulos, H. Mouratidis, A. Fish, E. Panaousis and C. Kalloniatis
WISSE 2016 6th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2016, Ljubljana, Slovenia, Springer LNCS Lecture Notes in Computer Science

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments

Journal
P. Drogkaris, S. Gritzalis, C. Kalloniatis, C. Lambrinoudakis
Future Internet , Vol. 7, No. 4, pp. 500-515, MDPI

Assurance of Security and Privacy Requirements for Cloud Deployment Model

Journal
S. Islam, M. Ouedraogo, C. Kalloniatis, H. Mouratidis, S, Gritzalis
IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2015.2511719, IEEE Press

Privacy as an integral part for the implementation of cloud solutions

Journal
E. Kavakli, C. Kalloniatis, H. Mouratidis, S. Gritzalis
The Computer Journal, Vol. 58, No. 10, pp. 2213-2224, Oxford University Press

Free expression, privacy and social control enforcement in social media: The Greek Students’ online community on Facebook case

Chapter in Book
M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis
Chapter In E. Theodoropoulou, P. Fokiali, V. Papavasiliou, M. Kaila (Ed.), Environmentl Training and Sustainable Development. Concern Texts with innovative approaches, pp. 65-98, Diadrasi (Pub), Athens, 2015 (in Greek)

Designing Privacy-Aware Systems in the Cloud

Conferences
C. Kalloniatis
TrustBus 2015 12th International Conference on Trust Privacy and Security in Digital Business, S. Hubner, C. Lambrinoudakis (eds), September 2015, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science

Addressing Privacy and Trust Issues in Cultural Heritage Modelling

Conferences
M. Pavlidis, H. Mouratidis, C. Gonzales-Perez, C. Kalloniatis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

A Meta-model for assisting a Cloud Forensics Process

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science

Towards the development of a Cloud Forensics Methodology: A Conceptual Model

Conferences
S. Simou, C. Kalloniatis, H. Mouratidis, S. Gritzalis
WISSE 2015 5th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), June 2015, Stockholm, Sweden, Springer LNCS Lecture Notes in Computer Science

Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective

Conferences
E. Kavakli, F. Bantimaroudis, C. Kalloniatis, S. Gritzalis, K. Avgeri
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Building an innovative solution for wildfire prevention and management: the “aegis” platfor

Conferences
N. Athanasis, C. Kalloniatis, M. Vaitis, C. Vasilakos, K. Kalabokidis
EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS

Addressing Privacy in Traditional and Cloud-based Systems

Journal
C. Kalloniatis, E. Kavakli, S. Gritzalis
International Journal of Applied Industrial Engineering, Vol. 2, No.1, pp. 14-40, IGI Global

Privacy-Aware Cloud Deployment Scenario Selection

Conferences
R. Meis, C. Beckers, S. Faßbender , M. Heisel, C. Kalloniatis, S. Gritzalis
TRUSTBUS ‘14 11th International Conference on Trust, Privacy and Security in Digital Business, G. Pernull, S. Katsikas (Eds.), pp. 94-105, August 2014, Munich, Germany, Springer LNCS Lecture Notes in Computer Science 8647

Cloud Forensics Solutions: A Review

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
WISSE 2014 4th International Workshop on Information Systems Security Engineering, L. Iliadis, M. Papazoglou, K. Pohl (Eds.), pp. 299-309, June 2014, Thessaloniki, Greece, Springer LNBIP 178

Cloud Forensics: Identifying the Major Issues and Challenges

Conferences
S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis
CAiSE 2014 26th International Conference on Advanced Information Systems Engineering, M. Jarke, J. Mylopoulos, C. Quix (Eds), pp. 271-284, June 2014, Thessaloniki, Greece, Springer Lecture Notes in Computer Science 8484

Requirements identification for migrating egovernment applications to the cloud

Conferences
E. Gongolidis, C. Kalloniatis, E. Kavakli
ICT-EurAsia 2014 Information & Communication Technology-EurAsia Conference 2014, Ir. Linawati, Made Sudiana Mahendra, Erich Neuhold, A Min Tjoa, Ilsun You (Eds.), pp. 150-158, April 2014, Bali, Indonesia, Springer Lecture Notes in Computer Science LNCS 8407

Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts

Journal
C. Kalloniatis, H. Mouratidis, V. Manousakis, S. Islam, S. Gritzalis, E. Kavakli
Computer, Standards and Interfaces, Elsevier, Vol. 36, No. 4, pp. 759-775, Elsevier

Evaluating Cloud Deployment Scenarios Based on Security and Privacy Requirements

Journal
C. Kalloniatis, H. Mouratidis, S. Islam
Requirements Engineering, Vol 18, No. 4, pp. 299-319, Springer

A framework to support selection of cloud providers based on security and privacy requirements

Journal
H. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis
Journal of Systems and Software, Vol. 86, pp. 2276-2293, Elsevier

Trustworthy Selection of Cloud Providers based on Security and Privacy Re-quirements: Justifying Trust Assumptions

Conferences
M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis
Proceedings of the TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell, C. Lambrinoudakis, (eds), pp. 185-198, August 2013, Prague, Czech, Springer LNCS Lecture Notes in Computer Science

The role of trust for the development of cultural internet-based systems

Conferences
M. Pavlidis, E. Kavakli, F. Bantimaroudis, H. Mouratidis, C. Kalloniatis, S. Gritzalis
EMCIS 2013 European, Mediterranean, and Middle Eastern Conference on Information Systems, A. Ghoneim, M. Kamal, (Eds), October 2013, London, UK, EMCIS (Best paper Award)

Privacy in the Cloud: Bridging the Gap between Design and Implementation

Conferences
V. Manousakis, C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2013 3rd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2013 25th International Conf erence on Advanced Information Systems Engineering, X. Franch and P. Soffer (Eds.), June 2013, Valencia, Spain, Springer Lecture Notes in Business Information Processing 148

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

Conferences
C. Kalloniatis, V. Manousakis, C. Mouratidis, S. Gritzalis
Proceedings of the I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi (eds.), April 2013, Piraeus, Greece, Springer

Aligning Security and Privacy to support the development of Secure Information Systems

Journal
H. Mouratidis, C. Kalloniatis, S. Islam, M. P. Huget, S. Gritzalis
Journal of Universal Computer Science, Vol. 18, No. 12, pp. 1608-1627

Model based Process to Support Security and Privacy Requirements Engineering

Journal
S. Islam, H. Mouratidis, C. Kalloniatis, A. Hudic, L. Zechner
International Journal of Secure Software Engineering, Vol. 3, No 3, IGI Global

Applying soft computing technologies for implementing privacy-aware systems

Conferences
C. Kalloniatis, P. Belsis, E. Kavakli, S. Gritzalis
Proceedings of the WISSE 2012 2nd International Workshop on Information Systems Security Engineering, in conjunction with CAiSE 2012 24th International Conference on Advanced Information Systems Engineering, M. Bajec and J. Eder (Eds.), June 2012, Gdask, Poland, Springer Lecture Notes in Business Information Processing

The ‘‘Panopticon’’ of search engines: the response of the European data protection framework

Journal
E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli
Requirements Engineering, Vol. 16, No. 1, pp. 47-54, Springer

A Soft Computing approach for Privacy Requirements Engineering

Journal
C. Kalloniatis, P. Belsis, S. Gritzalis
Journal of Applied Soft Computing, Vol. 11, No. 7, pp. 4341-4348, Elsevier

Designing Privacy Aware Information Systems

Chapter in Book
C. Kalloniatis, E. Kavakli, S. Gritzalis
chapter in: Software Engineering for Secure Systems: Industrial and Research Perspectives, Mouratidis H. (Ed.), 212-231, 2011, Hershey, USA, IGI Global

Data Protection Issues pertaining to Social Networking under EU law

Journal
E. Kosta, C. Kalloniatis, L. Mitrou, S. Gritzalis
Transforming Government: People, Process, and Policy, Vol. 4, No. 2, pp. 193-201, Emerald

PRIS tool: A case tool for privacy-oriented Requirements Engineering

Journal
C. Kalloniatis, E. Kavakli, E.Kontellis
Journal of Information Systems Security, Vol. 6, No. 1, pp. 3-19, AIS SIGSEC

Privacy Requirements Engineering for Trustworthy e-Government Services

Conferences
N. Vrakas, C. Kalloniatis, A.Tsohou, C. Lambrinoudakis
Proceedings of the TRUST 2010 3rd International Conference on Trust and Trustworthy Computing, pp.298-307, A. Acquisti, S. W. Smith, A.-R. Sadeghi (Eds.) June 2010, Berlin, Germany, Springer Lecture Notes in Computer Science 6101

Incorporating Privacy during system design: Requirement Engineering Methods for protecting privacy during electronic communications

Chapter in Book
C. Kalloniatis, E. Kavakli
chapter in: Privacy Protection: Technical and Legal Issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 331-355, Papasotiriou Pub., Athens (in Greek)

Methods for Designing Privacy Aware Information Systems: A review

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, pp.185-194, V. Chrysikopoulos, N. Alexandris, C. Douligeris, S. Sioutas (Eds.), September 2009, Corfu, Greece, IEEE CPS Conference Publishing Services

Search engines: gateway to a new “Panopticon”?

Conferences
E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli
Proceedings of the TrustBus’09 6th International Conference on Trust, Privacy and Security in Digital Business, pp.11-21, S. Fischer-Huebner et al. (Eds.), September 2009, Linz, Austria, Springer Lecture Notes in Computer Science 5695

PriS Tool: A Case Tool for Privacy-Oriented RE

Conferences
C. Kalloniatis, E. Kavakli, E. Kontellis
Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, pp.913-925, G. Doukidis et al. (Eds.), September 2009, Athens Greece

Addressing Privacy Requirements in System Design: The PriS Method

Journal
C. Kalloniatis, E. Kavakli, S. Gritzalis
Requirements Engineering, Vol.13, No.3, pp.241-255, 2008, Springer

Protecting and Managing Digital Rights

Chapter in Book
E. Kavakli, C. Kalloniatis
chapter in: Aspects of Representation, Studies on Art and Technology, New Technologies in Contemporary Cultural Expression, Evi Sampanikou and Evangelia Kavakli (Eds.), pp. 241-249, Mytilene, Greece

Protecting Privacy in System Design: The Electronic Voting Case

Journal
E. Kavakli, S. Gritzalis, C. Kalloniatis
Transforming Government: People, Process, and Policy journal, Vol.1, No.4, pp.307-332, 2007, Emerald

Intelligent modification for the daltonization process of digitized paintings

Conferences
C.-N. Anagnostopoulos, G.E. Tsekouras, I. Anagnostopoulos, C. Kalloniatis
Proceedings of the ICVS 2007 5th International Conference of Computer Vision Systems, Applied Computer Science Group, March 2007, Bielefeld University, Germany

Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SecSE 2007 Secure Software Engineering Workshop (in conjunction with ARES 2007 The International Conference on Availability, Reliability, and Security), pp. 1009-1016, T. Skramstad et al. (Eds.), Vienna, Austria, April 2007, IEEE CPS Conference Publishing Services

Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework

Journal
E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis
Internet Research, Vol.16, No.2, pp.140-158, 2006, Emerald

Dealing with Privacy Issues during the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the ISSPIT’05 5th IEEE International Symposium on Signal Processing and Information Technology, pp.546-551, D. Serpanos et al. (Eds.), December 2005, Athens, Greece, IEEE CPS Conference Publishing Services

Addressing Privacy: Matching user Privacy Requirements with Implementation Techniques

Conferences
E. Kavakli, C. Kalloniatis, S. Gritzalis
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

A Learning Vector Quantizer Based on Fuzzy Clustering Analysis and its Use in Lossy Image Compression

Conferences
A. Samonas, C. Kalloniatis, G.E. Tsekouras
Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Math-ematics and its Applications Conference, I. Lypitakis (Ed.), September 2005, Athens, Greece, LEA Publisher

PriS Methodology: Incorporating Privacy Requirements into the System Design Process

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the SREIS 2005 Symposium on Requirements Engineering for Information Security, in conjunction with 13th IEEE International Requirements Engineering Conference, J. Mylopoulos, G. Spafford (Eds.) Paris, France, August 2005, IEEE CPS Conference Publishing Services

A Fuzzy Logic-Based Approach for Detecting Shifting Patterns in Cross-Cultural Data

Conferences
G.E. Tsekouras, D. Papageorgiou, S. Kotsiantis, C. Kalloniatis, P. Pintelas
Proceedings of the 18th International Conference on Innovations in Applied Artificial Intelligence, pp. 705-708, June 2005, Springer Lecture Notes in Computer Science, LNCS 3533

Analysis of Cross-Cultural Data using Hierarchical Fuzzy Logic Clustering

Conferences
G.E. Tsekouras, D. Papageorgiou, C. Kalloniatis
Proceedings of the IASTED International Conference on Artificial Intelligence and Ap-plications, International Association of Science and Technology for Development, Artificial Intelligence and Applications IASTED/ACTA Press, pp. 262-267, February 2005, Innsbruck, Austria

Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data

Journal
G. E. Tsekouras, D. Papageorgiou, S. Kotsiantis, C. Kalloniatis, and P. Pintelas
International Journal of Computational Intelligence

Fuzzy Modelling via Optimal Fuzzy Clustering

Journal
G. E. Tsekouras, C. Kalloniatis, T. Mavrofides
WSEAS Transactions on Systems, Vol. 3, No 5, pp. 1958-1963, 2004, WSEAS

A Fuzzy Clustering-Based Algorithm for Fuzzy Modeling

Journal
G. E. Tsekouras, C. Kalloniatis, E. Kavakli, T. Mavrofides
WSEAS Transactions on Systems, Vol. 3, No 5, pp. 1977-1982, 2004, WSEAS

Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks

Conferences
C. Kalloniatis, E. Kavakli, S. Gritzalis
Proceedings of the DEXA’04 EGOV’04 3rd International Conference on Electronic Government, R. Traunmuller (Ed.), pp.66-71, September 2004, Zaragoza, Spain, Springer Lecture Notes in Computer Science LNCS 3183

A Fuzzy Clustering Algorithm for Generating Fuzzy Rules from Numerical Data

Conferences
G.E. Tsekouras, G. Pavlogeorgatos, C. Kalloniatis
Proceedings of the ISDA IEEE International Conference on Intelligent Systems Design and Applications, August 2004, Budapest, Hungary