Author of the publication

DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance.

, , , , , , , , , , , , and . TrustBus, volume 11711 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsohou, Aggeliki
add a person with the name Tsohou, Aggeliki
 

Other publications of authors with the same name

Cyber insurance: state of the art, trends and future directions., , , and . Int. J. Inf. Sec., 22 (3): 737-748 (June 2023)Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries., , , , , , , , and . Int. J. Electron. Gov. Res., 8 (3): 63-77 (2012)Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data., , and . MCIS, page 32. AISeL, (2017)Engineering secure systems with ISO 26702 and 27001., , , and . SoSE, page 1-6. IEEE, (2010)Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform., , , , , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 204-223. Springer, (2019)Unifying ISO Security Standards Practices into a Single Security Framework., , , and . SAISMC, page 188-203. University of Plymouth, (2010)Effects of privacy policy visualization on users' information privacy awareness level., and . Inf. Technol. People, 33 (2): 502-534 (2020)Η ενημερότητα ασφαλείας στα πλαίσια της διοίκησης ασφαλείας πληροφοριακών συστημάτων. University of the Aegean, Greece, (2010)National Archive of PhD Theses: oai:10442/25076.Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns., , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 159-180. Springer, (2019)Game-Based Information Security/Privacy Education and Awareness: Theory and Practice., , , and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 509-525. Springer, (2020)