Lilian Mitrou

Lilian Mitrou
University of the Aegean · Department of Information and Communication Systems Engineering

Professor

About

63
Publications
40,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
836
Citations
Education
March 1989 - February 1993
Goethe University Frankfurt
Field of study
  • Law - Data Protection- Information Law

Publications

Publications (63)
Chapter
This book addresses the interplay between the proportionality principle and EU digital law. Does EU digital law provide a fair balance of rights and interests? How does proportionality limit legislation in the digital economy? How can it be used to balance competing rights and interests? Diving into the dialectics of law and technology, the book an...
Article
Full-text available
Using remote sensing technologies to ensure environmental protection responds to the need of protection of a right and a public good and interest. However, the increasing introduction of these technologies has raised new challenges, such as their interference with the rights of privacy and personal data, which are also protected fundamental rights....
Conference Paper
Full-text available
Application of Remote Sensing Technologies in environmental monitoring: legal framework, limitations and potential in the European Union
Article
Full-text available
Distributed medical, financial, or social databases are analyzed daily for the discovery of patterns and useful information. Privacy concerns have emerged as some database segments contain sensitive data. Data mining techniques are used to parse, process, and manage enormous amounts of data while ensuring the preservation of private information. Cr...
Chapter
Our analysis of community policing focuses on the impact of the new Data Protection Package that will enter into force in May 2018. We identify and discuss the implications of both the General Data Protection Regulation (2016/ 679/ EU-GDPR) and the Police and Criminal Justice Authorities Directive (2016/680/ EU -PCJA Directive), as due to the hybri...
Chapter
In 2016, the General Data Protection Regulation has opened a new chapter for the protection of informational privacy in Europe. More than a simple revision of the Data Protection Directive (1995) and less than a regulatory paradigm shift, the Regulation attempts to keep path with technological and socio-economic changes while guaranteeing the perso...
Conference Paper
Full-text available
The Internet of Things (IoT), in which billions of things such as devices, applications and networks , are interconnected to each other and are capable to interact without any human intervention , is transforming the way of life. Public safety, transportation and communication, energy , healthcare, logistics, government and education are using cute...
Article
In this paper a systematic modelling methodology for evaluating the effects of cyber-attacks on States Critical Information Infrastructure (CII) is introduced. The analysis is focused on the United Nations Charter's normative scheme of the ‘use of force’, in order to define whether these attacks constitute a wrongful ‘use of force’ under the princi...
Conference Paper
Full-text available
Several high-profile personal data breaches have triggered a discussion among privacy advocates, security practitioners, corporate managers and politicians on what role regulation should play in how companies and organisations protect data. The self-regulation paradigm fails to reinforce individuals' right to information and foster proactive risk m...
Conference Paper
Full-text available
A systematic modelling methodology is presented in this paper, so as to evaluate the effects of cyberattacks on states’ Critical Information Infrastructure, in order to answer the question of whether these attacks have risen to the level of a ‘use of force’ under the principles of international law. By using the qualitative criteria for recognizing...
Article
Purpose – The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, fro...
Article
Purpose – This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the effectiveness of audio CAPTCHA systems by adapting the challenges to the user characteristics. Design/methodology/approach – A prototype has been designed, called PrivCAPTC...
Article
Full-text available
In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if...
Conference Paper
Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. In this paper, our goal is to present a horror and a success story from the digital world of Social Media, in order to: (a). present a politic...
Conference Paper
Full-text available
Following the identification on an international basis of cyberspace as a new “domain of warfare”, it has become widely (though not fully) accepted that the traditional rules of International Humanitarian Law are also applicable to Computer Network Attacks (CNAs). Despite the fact that there has been considerable progress at the European and Intern...
Article
Cloud computing (CC) is the new trend in computing and resource management. This architectural shift toward thin clients and the centralized on-demand provision of computing resources aspires to offer significant economical benefits to its users. However, the adaption of the CC model has forced many times the IT industry and the academia to revisit...
Conference Paper
Full-text available
This paper is towards deliverable ID4.3.1 "Legal Issues of Cybercrime".
Conference Paper
Addressing the insider threat is a major issue in cyber and corporate security in order to enhance trusted computing in critical infrastructures. In this paper we study the psychosocial perspective and the implications of insider threat prediction via social media, Open Source Intelligence and user generated content classification. Inductively, we...
Article
The proliferation of smartphones introduces new opportunities in digital forensics. One of the reasons is that smartphones are usually equipped with sensors (e.g. accelerometer, proximity sensor, etc.), hardware which can be used to infer the user's context. This context may be useful in a digital investigation, as it can aid in the rejection or ac...
Conference Paper
It is an undisputable fact that nowadays many different types of crime are conducted by utilizing some type of electronic device - communication. To address this new situation, modern forensics tools evolved, becoming sophisticated enough to handle almost all kinds of digital content. However, surprisingly enough, collecting and validating the auth...
Conference Paper
Full-text available
Social media have widened society’s opportunities for communication, while they offer ways to perform employees’ screening and profiling. Our goal in this paper is to develop an insider threat prediction method by (e)valuating a users’ personality trait of narcissism, which is deemed to be closely connected to the manifestation of malevolent inside...
Conference Paper
Cloud Computing (CC) is a promising next-generation computing paradigm providing network and computing resources on demand via the web. The cloud market is still in its infancy and all major issues, ranging from interoperability and standardization, to legislation and SLA contracts are still wide open. However, the main obstacle for a more catholic...
Conference Paper
Full-text available
Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies...
Conference Paper
Full-text available
Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection chann...
Conference Paper
Full-text available
The effectiveness of CAPTCHA challenges largely depends on being simultaneously easier to solve for humans and harder to solve for bots. In this work we argue that it is possible to enhance the effectiveness of audio CAPTCHA challenges by adapting the challenge to the users’ characteristics. We propose a method for achieving this adaptation while p...
Article
Full-text available
Technological and social phenomena like cloud computing, behavioural advertising, online social networks as well as globalisation (of data flows) have profoundly transformed the way in which personal data are processed and used. This paper discusses the efficiency of the legislation in force and the impact of PETs and the concept of privacy by desi...
Conference Paper
The evolution of new technologies and the spread of the Internet have led to the exchange and elaboration of massive amounts of data. Simultaneously, intelligent systems that parse and analyze patterns within data are gaining popularity. Many of these data contain sensitive information, a fact that leads to serious concerns on how such data should...
Conference Paper
Full-text available
This paper addresses the issue of workplace monitoring and its implications for employees' privacy. We focus on privacy issues with regard to new trends and surveillance techniques: proxy servers, keyloggers and packet sniffers. The aim is multifold: we discuss privacy concerns and implications as a result of implementing surveillance technologies,...
Article
Full-text available
Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. The increasing importance of search engines for the location of the desired information on the Inte...
Article
Full-text available
Purpose – The purpose of this paper is to examine how the introduction of new communication channels facilitates interactive information sharing and collaboration between various actors over social networking services and how social networking fits in the existing European legal framework on data protection. The paper also aims to discuss some spec...
Chapter
This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and phy...
Conference Paper
Full-text available
Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. The increasing importance of search engines for the location of the desired information on the Inte...
Article
Full-text available
It is widely accepted that electronic Government environments have caused a complete transformation of the way individuals, businesses and governmental agencies interact with central government. However, the acceptance and success of e-Government services largely depend on the level of trust and confidence developed by the users to the provided ser...
Chapter
Full-text available
This chapter addresses the issue of electronic workplace monitoring and its implications for employees' privacy. Organisations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organisational life, including communications, desktop and phy...
Conference Paper
Full-text available
This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from a technical and legal perspective and provides general directions on how these issues can be tackled. The paper also discusses the implications of data mining...
Chapter
The internationally increased attention on organized crime, cyber-crime, as well as terrorism-reinforced by the terrorist attacks, especially in New York, Madrid, and London-have created a fertile ground for governments and international organizations to speed up the adoption of legislation that will strengthen the investigation and prosecution pow...
Article
Full-text available
This paper addresses the controversy between employees’ right to privacy and employers’ need to safeguard organizational resources by employing monitoring tools. It shows how organizations can formulate use policies, by applying basic principles for fair and lawful monitoring. A list of key points is presented, which organizations should take into...
Article
Full-text available
Purpose – The objective of this paper is to investigate the legal and technical reasons why a declaration of will, denoted by a digital signature, can be cancelled and how this cancellation can be technically achieved. Design/methodology/approach – Proposes a technical framework for establishing a signature revocation mechanism based on special da...
Conference Paper
The digitalisation of networks thus offering of new services may entail inherent risks to privacy of the user, as well as possible inhibitions on his/her freedom of communication. This paper addresses issues of privacy and fair processing of personal data in electronic communications. It focuses on the analysis of the Directive 2002/58/EC “on priva...
Chapter
Full-text available
This paper provides a systematic overview of the major constitutional and legalaspects of e-voting, together with their technical implications. All democracy-oriented legal and constitutional requirements of an Internet-based voting system are identified. Such a voting system has to comply with these, in order to encourage and promote the participa...
Conference Paper
Full-text available
This paper addresses the democracy-oriented legal and constitutional requirements that an electronic voting system has to comply with. Its scope covers every election or decision-making process, which takes place through voting. Due mainly to the digital divide and to current technological limitation, electronic voting cannot be proposed as a unive...
Article
This paper provides a systematic overview of the major constitutional and legal aspects of e-voting, together with their technical implications. All democracy- oriented legal and constitutional requirements of an Internet-based voting system are identified. Such a voting system has to comply with these, in order to encourage and promote the partici...

Network

Cited By