
Christos KalloniatisUniversity of the Aegean · Department of Cultural Technology and Communication
Christos Kalloniatis
Associate Professor
About
137
Publications
46,176
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,544
Citations
Citations since 2017
Introduction
Additional affiliations
January 2012 - present
Publications
Publications (137)
As maritime and military missions become more and more complex and multifactorial over the years, there has been a high interest in the research and development of (autonomous) unmanned underwater vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs’ collaboration in swarm formations, towards obtaining deeper insights related...
Even though both internet-of-cloud services and biometric systems (BSs) are used worldwide, popular and expanded among public and private services, their utilization has not been extended among Greek users, and in particular within Greek HEIs. This paper aims to examine the University of the Aegean (UA) students’ perceptions, especially on BS accep...
Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on users’ self-representation on SM, we examined the impact of self-determination and self-disclosure on...
Storing information in a software system is challenging, especially in the cloud computing era. Traditional, battle-tested methods, like Object Relational Mapping, seem inappropriate for all cases, but other alternatives feel too complicated to implement. Moreover, new software design methodologies, like Domain-Driven Design, provide alternative mo...
Public engagement is crucial to strengthen responsibility frameworks in highly innovative contexts, including as part of business organisations. One particular innovation that calls for public engagement is gamification. Gamification fosters changes in working practices to improve the organisation, efficiency and productivity of a business by intro...
As maritime and military missions become more and more complex over the years, there has been a high interest in the research and development of Unmanned Underwater Vehicles (UUVs). Latest efforts concern the modeling and simulation of UUVs collaboration within formations of vehicles (swarms), towards obtaining deeper insights related to critical i...
Purpose
The purpose of this paper is to establish reciprocity among socio-location attributes while underlining the additional users’ privacy implications on social media (SM).
Design/methodology/approach
Digital identity theories, social software engineering theory and the Privacy Safeguard (PriS) methodology were considered while reviewing 32 pa...
Previous literature summarizes that within social media (SM) more information about users’ identity may be disclosed in comparison to their initial intention, imposing various privacy implications. Privacy implications may arise due to the combination of social and location attributes disclosure. The revelation of a substantial amount of users’ inf...
Ο όρος «αναδυόμενες τεχνολογίες» επιχειρεί να καταδείξει ότι η ιστορία της τεχνολογίας δεν συνιστά μία εξελικτική διαδικασία. Η επινόηση ενός νέου εργαλείου, τεχνικής ή μέσου θέτει μεν ως αρχικό στόχο την ικανοποίηση δεδομένων αναγκών και την επίλυση συγκεκριμέ-νων προβλημάτων, ταυτόχρονα όμως φέρνει στη επιφάνεια νέα ερωτήματα, εγείρει νέου τύπου...
The benefits, deriving from utilizing new Information and Communication Technologies (ICTs), such as Internet of Things or cloud computing, raise at the same time several privacy risks and concerns for users. Despite the fact that users’ inability to protect their privacy has been recognized, hence users do not get involved in processes for enhanci...
Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users’ privacy more effectively within SNs, self-adaptive privacy preserving schemes have been developed, considered the importance of users’ social and technological context and sp...
Within Information and Knowledge Society the concept of Privacy has been enriched including aspects related to digital life, while the right to online Privacy gains more and more attention daily due to several cases of privacy breaches. Privacy is associated with the control, access and use or misuse of personal information by others, including gov...
Intelligent transport systems (ITSs) play a key role in people's daily activities. ITSs significantly improve mobility offering a variety of services to a vast number of users that increase on a daily basis, as more and new services are introduced. These services are based on advanced information and communication technologies (ICTs) and rely stron...
Privacy protection within Cloud Computing Environments (CCE) is extremely complex to be realized, due to multiple stakeholders’ interactions that lead to several privacy risks and leaks. Therefore, the necessity for self-adaptive privacy preserving schemes, in order to safeguard users’ privacy by considering their social and technological context w...
Intelligent Transport Systems (ITS) play a key role in our daily activities. ITS development over the last decades has been based on the rapid evolution of information technologies, which include processing capabilities, availability of hardware and communication technologies. Moreover, ITS use Information and Communication Technologies (ICT) to im...
The examination of users’ socio-contextual attributes and their impact on their privacy management is of great importance in order for self-adaptive privacy preserving schemes to be effectively designed within cloud computing environments. However, several ambitious adaptive privacy schemes, presented in previous literature, seem to fail to examine...
Millions of users all over the world nowadays spend many hours daily using social networks on a range of devices (desktop, tablet, mobile), in many languages and countries, under very different systems of governance, and in wide-ranging social, religious, cultural and political environments. But the same software (System Services, Operating Systems...
Τα τελευταία χρόνια καταγράφεται μια αυξανόμενη ενσωμάτωση των Μέσων Κοινωνικής Δικτύωσης (ΜΚΔ) σε λειτουργίες της δημόσιας σφαίρας. Η αξιοποίησή τους στον τομέα της δημόσιας διοίκησης ειδικότερα στηρίζει ένα νέο μοντέλο διακυβέρνησης που συμβάλλει στην ανάπτυξη μιας αμοιβαίας επωφελούς σχέσης μεταξύ πολιτών και διοικούντων, καθώς οι πρώτοι γίνοντα...
Η διατήρηση της ιδιωτικότητας σε ψηφιακά περιβάλλοντα είναι μέγιστης σημασίας. Η ιδιωτικότητα σχετίζεται με τον έλεγχο, την πρόσβαση, τη χρήση ή την κατάχρηση της προσωπικής πληροφορίας από άλλους. Αν και οι Ιστότοποι Κοινωνικής Δικτύωσης (ΙΚΔ) έχουν συμβάλλει στον τρόπο που οι άνθρωποι επικοινωνούν και κατασκευάζουν τα κοινωνικά τους δίκτυα αποκαλ...
Είναι γνωστό ότι οι κοινωνικοί δρώντες αποφεύγουν να συζητούν δημοσίως, στην πραγματική ζωή, προσωπικά ζητήματα, καθώς φοβούνται τον άτυπο κοινωνικό έλεγχο που θα τους ασκηθεί. Αντίθετα, στην ψηφιακή ζωή αποκαλύπτουν ενδόμυχες σκέψεις, συναισθήματα και προσωπικά θέματα, πιστεύοντας ότι η παρεχόμενη ανωνυμία (anonymity) από ιστοσελίδες κοινωνικής δι...
Ακραία κοινωνικά φαινόμενα και πληθώρα κοινωνικών μετασχηματισμών που βιώνουμε ατομικά και συλλογικά, θέτουν εμφατικά το ερώτημα «πού οδεύουμε;». Απαντώντας στην πρόκληση για τη βιωσιμότητα της κοινωνίας και την ανάπτυξή της, η αειφόρος ανάπτυξη προωθεί το όραμα και επισημαίνει την ευθύνη για κοινωνική συνοχή που προϋποθέτει ομαλότητα και σταθερότη...
This paper introduces a polynomial feedforward neural network based on Chebyshev polynomials able to effectively model non-linear and highly complex environmental data. The data sets were cautiously selected from the fields of biology, ecology, climate, and environmental management, and economics as to represent a scientifically meaningful and cons...
The design and implementation of cloud services, without taking under consideration the forensic requirements and the investigation process, makes the acquisition and examination of data, complex and demanding. The evidence gathered from the cloud may not become acceptable and admissible in the court. A literature gap in supporting software enginee...
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, a...
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Inter...
Privacy and Data protection are highly complex issues within eHealth/M-Health systems. These systems should meet specific requirements deriving from the organizations and users, as well as from the variety of legal obligations deriving from GDPR that dictate protection rights of data subjects and responsibilities of data controllers. To address tha...
This systematic literature review intends to determine the extent to which contribution is available to assist organisations and interested parties to understand better or comply with the requirements of the ISO/IEC 27001 international standard, known as Information Security Management Systems (ISMS). The primary aim of this paper is to explore the...
Nowadays, location-sharing applications (LSA) within social media enable users to share their location information at different levels of precision. Users on their side are willing to disclose this kind of information in order to represent themselves in a socially acceptable online way. However, they express privacy concerns regarding potential mal...
Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementati...
Insular regions play an important role in Eastern Mediterranean, mostly attributed to their geographical, environmental, social and economic peculiarities. Greek islands in the Aegean Sea are such an example, being attractive tourism destinations with a varying permanent population both island- and season-specific. Such a seasonality of islands’ po...
Various researchers summarize that location-sharing applications are used extensively in users’ daily practice not only for getting advantage of services but also for representing themselves in the online sphere. At the same time, users’ privacy concerns are expressed in the most demanding way towards both social media applications and software des...
Due to the increased use of Information and Communication Technologies (ICTs), several methods have been developed in order to create more attractive interaction environments, so that users’ interest on using services to be maintained. Gamification consists a method, aiming to increase users’ engagement by implementing game design elements in servi...
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamification techniques are applied, user engagement in applications has increased. In these applications the...
Purpose
Even though social media are nowadays used in the frame of public governance to ensure citizens’ major participation, enhance e-dialogue and e-democracy consequently, this utilization has not been expanded yet in the field of education, whose key role focuses on the cultivation of active citizenship, as it is promoted through participation...
Intelligent Transport Systems (ITS) play a key role in our daily activities. ITS significantly improve mobility offering a variety of services to a vast amount of users that increase on a daily basis, as more and new services are introduced. These services are based on advanced Information and Communication Technologies (ICTs) and rely strongly on...
Social network sites (SNSs) have doubtlessly altered the way that social actors communicate and interact worldwide. Several researches have shown that users disclose personal information within SNSs, while expressing privacy concerns. Users’ inability to protect their privacy within SNSs, despite their recorded privacy concerns, constitutes the cor...
Social network sites (SNSs) have doubtlessly altered the way that social actors communicate and interact worldwide. Several researches have shown that users disclose personal information within SNSs, while expressing privacy concerns. Users’ inability to protect their privacy within SNSs, despite their recorded privacy concerns, constitutes the cor...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in con...
Intelligent transport systems (ITSs) play a key role in people's daily activities. ITSs significantly improve mobility offering a variety of services to a vast number of users that increase on a daily basis, as more and new services are introduced. These services are based on advanced information and communication technologies (ICTs) and rely stron...
IT applications could offer a wide range of advantages in the tourist sector. The use of mobile applications in the tourist sector offers comparative advantages in terms of sites accessibility and geographical awareness of users. In this article, we discuss about the process of designing and implementing an Android application using open-source lib...
In this paper a polynomial radial basis function neural network is trained to model and predict the temperature profile-energy proxy of a highly complex data center located at the University of the Aegean, Greece. A number of input variables are identified that directly quantify the rack’s air temperature. The corresponding data set is generated th...
Security assurance is defined as the degree of confidence that the security requirements of an IT system are satisfied. In view of the emerging paradigm of connected vehicles i.e., dynamic Cyber-Physical systems of highly-equipped infrastructure-connected vehicles, specifying the involved assurance becomes highly-critical yet challenging; vehicles...
Spatial Networks such as road networks form a critical infrastructure in contemporary cities mainly because they are associated with most transportation means and travel options of our day-to-day activities. In the context of recent “smart cities revolution”, advanced IT solutions can help towards the promotion of Locations of Cultural Interest (LC...
Over the last decades, the spread of affordable computers facilitated the development of innovative IT solutions in almost all fields of our life. The interconnection of devices embedded in everyday objects, enabled the development of new services and products offering new capabilities in data capturing and data transmission. The appearance of Inte...
The aim of this paper is to present the methodology followed and the results obtained by the synergistic exploitation of geo-information methods towards 3D mapping of the impact of the catastrophic earthquake of June 12th 2017 on the traditional settlement of Vrisa on the island of Lesvos, Greece. A campaign took place for collecting: a) more than...
Efficient and effective spatial data collection is crucial in cases of catastrophic events. Resources efficiency and project effectiveness are two aspects that need special attention especially when there are spatial and temporal constraints. There is limited literature regarding efficiency and effectiveness in spatial data collection approaches. T...
Efficient and effective spatial data collection is crucial in cases of catastrophic events. Resources efficiency and project effectiveness are two aspects that need special attention especially when there are spatial and temporal constraints. There is limited literature regarding efficiency and effectiveness in spatial data collection approaches. T...
Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underly...
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in con...
Social Network Sites have doubtless become part of our lives, facilitating communication and interaction between social actors. Within this frame users disclose personal information for several reasons while at the same time they express privacy concerns. “Privacy Paradox” reveals that despite privacy concerns, users, most of the times, fail to pro...
In this paper certain interpretability criteria are taken into account in order to extract a set of linear inequality constraints for enhancing the fuzzy model interpretability. Among others, the criteria of model distinguishability, completeness, compactness, and fuzzy set sharing between rules are considered. To support distinguishability, the di...
Cloud computing is not just about resource sharing, cost savings and optimisation of business performance; it also involves fundamental concerns on how businesses need to respond on the risks and challenges upon migration. Managing risks is critical for a sustainable cloud adoption. It includes several dimensions such as cost, practising the concep...
Purpose
The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason and model about privacy in cloud environments.
Design/methodology/approach
A...
Detecting malicious code with exact match on collected datasets is becoming a large-scale identification problem due to the existence of new malware variants. Being able to promptly and accurately identify new attacks enables security experts to respond effectively.
My proposal is to develop an automated framework for identification of unknown vuln...
The present study's primary objective is to try to determine whether gender, combined with the educational background of the Internet users, have an effect on the way online privacy is perceived and practiced within the cloud services and specifically in social networking, e-commerce, and online banking. An online questionnaire was distributed thro...
Cloud forensics assist investigators on solving cloud-based cyber-crimes. Alt-hough investigators use forensic methods and tools to cope with incidents, there are other aspects that put barriers to the whole investigation process. One of these aspects is the way cloud services are designed and implemented. Software engi-neers are responsible for th...
This paper proposes a conceptual model to support decision makers during security analysis of Internet of Things (IoT) systems. The world is entering an era of ubiquitous computing with IoT being the main driver. Taking into account the scale of IoT, the number of security issues that are arising are unprecedented. Both academia and industry requir...
Software is now the driving force behind our daily lives. At work, everyone is affected to a greater or lesser extent by software, which exerts a significant influence in every activity of our daily lives. It is clear that software and the way it interacts with humans has a significant impact on the life and future of everyone who uses it. There is...
Advances in Information and Communication Technology (ICT) have had significant impact on every-day life and have allowed us to share, store and manipulate information easily and at any time. On the other hand, such situation also raises important privacy concerns. To deal with such concerns, the literature has identified the need to introduce a Pr...
Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underly...
The problem being investigated in this paper concerns the generation of an optimal ensemble (i.e. subset) of classifiers (picked up from set of classifiers applied on a specific classification task) that maximizes the classification performance of the voting ensemble method. The design of an algorithmic framework to meet the above goal would benefi...
Cloud computing provides a wide range of services to organisations in a flexible and cost efficient manner. Nevertheless , inherent cloud security issues make organisations hesitant towards the migration of their services to cloud. In parallel, the cloud service-oriented nature requires a specific and more demanding description of the business func...
The emergence of social media and their wide usage have brought changes in almost all fields of public sphere. Nowadays governmental organizations, agencies and politicians use social media in order to ensure major civil participation, enhance e-dialogue and e-democracy consequently, emphasizing thus in participatory processes through which opinion...