Match!
Stefanos Gritzalis
University of the Aegean
316Publications
29H-index
3,144Citations
Publications 316
Newest
#1Stavros Simou (University of the Aegean)H-Index: 3
#2Christos Kalloniatis (University of the Aegean)H-Index: 12
Last.Vasilios Katos (BU: Bournemouth University)H-Index: 10
view all 4 authors...
Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that ...
#1Maria Sideri (University of the Aegean)H-Index: 1
#2Angeliki Kitsiou (University of the Aegean)H-Index: 1
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 29
view all 5 authors...
Purpose Even though social media are nowadays used in the frame of public governance to ensure citizens’ major participation, enhance e-dialogue and e-democracy consequently, this utilization has not been expanded yet in the field of education, whose key role focuses on the cultivation of active citizenship, as it is promoted through participation. The purpose of this paper is to examine leadership’s views of Greek Secondary and Tertiary Education on the potential use of social media for partici...
#1Filippos Giannakas (University of the Aegean)H-Index: 2
#2Andreas Papasalouros (University of the Aegean)H-Index: 9
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 29
view all 4 authors...
ABSTRACTFor elementary students, security and privacy education is anticipated to be more joyful when the knowledge is delivered in the form of a digital game-based learning activity. This paper de...
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamification techniques are applied, user engagement in applications has increased. In these applications the protection of users’ privacy is an important aspect to consider, due to the applications obtaining a record of the personal information of their user...
#2Stefanos GritzalisH-Index: 29
Last.Angeliki KitsiouH-Index: 1
view all 4 authors...
The prevalence of Information and Communication Technologies (ICTs) has intensified information and communication broadcast, both in digital and real life, while it raises several risks and concerns. In this respect, several types of research have shown that users’ awareness increase is of major importance, focusing on the crucial role of educational and compelling interaction environments. Towards this, respective literature highlights the role of gamification- the use of game design elements i...
#1Stavros Simou (University of the Aegean)H-Index: 3
#2Ioannis Troumpis (University of the Aegean)
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 29
view all 5 authors...
Cloud forensic investigation involves a number of different people and requires a lot of effort to resolve an incident. In order for an organization to have better chances to succeed in the investigation, it needs to be well-prepared. Hence, the organization needs to develop cloud forensic readiness. This paper introduces a decision-making approach to calculate the forensic readiness and the compliance level of an organization, and in parallel to classify the unimplemented tasks in a cloud servi...
12345678910