Search results

1 – 10 of 37
Article
Publication date: 30 January 2019

Maria Sideri, Angeliki Kitsiou, Ariadni Filippopoulou, Christos Kalloniatis and Stefanos Gritzalis

Even though social media are nowadays used in the frame of public governance to ensure citizens’ major participation, enhance e-dialogue and e-democracy consequently, this…

Abstract

Purpose

Even though social media are nowadays used in the frame of public governance to ensure citizens’ major participation, enhance e-dialogue and e-democracy consequently, this utilization has not been expanded yet in the field of education, whose key role focuses on the cultivation of active citizenship, as it is promoted through participation. The purpose of this paper is to examine leadership’s views of Greek Secondary and Tertiary Education on the potential use of social media for participatory decision-making processes in order to identify if the e-participation model could be implemented in the Greek education field as in other public domains.

Design/methodology/approach

An exploratory research was elaborated, employing a survey design of quantitative method in order to explore Greek educational organizations leadership’s perspectives toward social media usage in participatory decision-making processes.

Findings

The research reveals Greek educational leadership’s positive view on the potential effects of social media usage in participatory decision-making processes and highlights anticipated benefits as well as problems to be faced, indicating the foundation for Greek leaders to implement social media in their leadership practices and exploit their affordances as in e-governance shifts.

Practical implications

Bringing the concept of e-participation and crowd sourcing model – key features in e-governance initiatives through social media usage – in education field, Greek educational leadership is informed to consider social media utilization more methodically in the context of participatory decision-making processes, updating simultaneously existing leadership practices.

Originality/value

Up till now, social media usage in participatory decision-making processes in educational settings has hardly received attention.

Details

Internet Research, vol. 29 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 November 2005

Apostolos Malatras, George Pavlou, Petros Belsis, Stefanos Gritzalis, Christos Skourlas and Ioannis Chalaris

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artifacts. In these inherently unstable…

Abstract

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artifacts. In these inherently unstable conditions and bearing in mind the resource’s limitations that are attributed to participating devices, the deployment of Knowledge Management techniques is considered complicated due to the particular requirements. Security considerations are also very important since the distribution of knowledge information to multiple locations over a network, poses inherent problems and calls for advanced methods in order to mitigate node misbehaviour and in order to enforce authorized and authenticated access to this information. This paper addresses the issue of secure and distributed knowledge management applications in pervasive environments. We present a prototype implementation after having discussed detailed design principles as far as the communications and the application itself is regarded. Robustness and lightweight implementation are the cornerstones of the proposed solution. The approach we have undertaken makes use of overlay networks to achieve efficiency and performance optimization, exploiting ontologies. The work presented in this paper extends our initial work to tackle this problem, as this was described in (28).

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

1465

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 2006

Evangelia Kavakli, Christos Kalloniatis, Pericles Loucopoulos and Stefanos Gritzalis

To present a new methodology for incorporating privacy requirements into the system design process called PriS, and describe its applicability in the e‐VOTE system for presenting…

1218

Abstract

Purpose

To present a new methodology for incorporating privacy requirements into the system design process called PriS, and describe its applicability in the e‐VOTE system for presenting methodology's way‐of‐working.

Design/methodology/approach

PriS is a requirement engineering methodology focused on privacy issues. It provides a set of concepts for modelling privacy requirements (anonymity, pseudonymity, unlinkability and unobservability) in the organisation domain and a systematic way‐of‐working for translating these requirements into system models. The conceptual model used in PriS is based on the Enterprise Knowledge Development (EKD) framework. PriS models privacy requirements as a special type of goal.

Findings

Based on the analysis of a number of well‐known privacy‐enhancing technologies as well as of existing security requirement engineering methodologies, this paper pinpoints the gap between system design methodologies and technological solutions. To this end, PriS is suggested, with a view to providing a methodological framework for matching privacy‐related requirements with the proper implementation techniques.

Originality/value

This paper proposes a new methodology for addressing privacy requirements during the design process. It guides developers to choose the most appropriate implementation techniques for realising the identified privacy issues. PriS methodology has a high degree of applicability on Internet systems that wish to provide services that ensure users privacy, such as anonymous browsing, untraceable transactions, etc.

Details

Internet Research, vol. 16 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Content available
Article
Publication date: 1 October 2006

Sokratis K. Katsikas and Stefanos Gritzalis

280

Abstract

Details

Information Management & Computer Security, vol. 14 no. 5
Type: Research Article
ISSN: 0968-5227

Content available
Article
Publication date: 3 April 2009

Jong Hyuk Park, Stefanos Gritzalis and Ching-Hsien Hsu

457

Abstract

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 1 May 2001

Stefanos Gritzalis and Dimitris Gritzalis

Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or…

1100

Abstract

Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or products. The Web currently constitutes an enabler for electronic commerce, providing a global transaction platform that does not require physical presence. However, transferring trust from the physical world to the electronic one is a process that requires a trust infrastructure. The current infrastructure, based on trusted third parties can be enhanced. We introduce the notion of digital seals and provide a mechanism for transferring the trust placed by users in companies in the physical world, to the electronic one.

Details

Information Management & Computer Security, vol. 9 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 March 2006

Stefanos Gritzalis

317

Abstract

Details

Internet Research, vol. 16 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 1 December 2007

Evangelia Kavakli, Stefanos Gritzalis and Kalloniatis Christos

The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system…

Abstract

Purpose

The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and to demonstrate its applicability in an e‐voting case.

Design/methodology/approach

PriS provides a methodological framework for addressing privacy‐related issues during system development. It provides a set of concepts for formally expressing privacy requirements (authentication, authorisation, identification, data protection, anonymity, pseudonymity, unlinkability and unobservability) and a systematic way‐of‐working for translating these requirements into system models. The main activities of the PriS way‐of‐working are: elicit privacy‐related goals, analyse the impact of privacy goals on processes, model affected processes using privacy process patterns and identify the technique(s) that best support/implement the above‐process patterns.

Findings

Analysis of a number of well known privacy‐enhancing technologies, as well as of existing security requirement engineering methodologies, pinpoints the gap between system design methodologies and technological solutions. To this end, PriS provides an integrated approach for matching privacy‐related requirements to proper implementation techniques. Experimentation with the e‐voting case suggests that PriS has a high degree of applicability on internet systems that wish to provide services that ensure users privacy, such as anonymous browsing, untraceable transactions, etc.

Originality/value

The paper proposes a new methodology for addressing privacy requirements during the design process. Instead of prescribing a single solution, PriS guides developers to choose the most appropriate implementation techniques for realizing the identified privacy issues. In addition, due to its formal definition it facilitates control of the accuracy and precision of the results and enables the development of automated tools for assisting its application.

Details

Transforming Government: People, Process and Policy, vol. 1 no. 4
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 1 March 1999

Stefanos Gritzalis, George Aggelis and Diomidis Spinellis

The Java programming language supports the concept of downloadable executable content; a key technology in a wide range of emerging applications including collaborative systems…

411

Abstract

The Java programming language supports the concept of downloadable executable content; a key technology in a wide range of emerging applications including collaborative systems, electronic commerce, and Web information services. Java enables the execution of a program, on almost any modern computer regardless of hardware configuration and operating system. Safe‐Tcl was proposed as an executable content type of MIME and thus as the standard language for executable contents within e‐mail messages. However, the ability to download, integrate, and execute code from a remote computer, provided by both Java and Safe‐Tcl, introduces serious security risks since it enables a malicious remote program to obtain unauthorised access to the downloading system’s resources. In this paper, the two proposed security models are described in detail and the efficiency and flexibility of current implementations are evaluated in a comparative manner. Finally, upcoming extensions are discussed.

Details

Internet Research, vol. 9 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 37