Your Profile
Σκάλκος Ανδρέας

Εκπαίδευση - Σπουδές

Πτυχίο Πληροφορικής Ε.Α.Π.

Μεταπτυχιακό Δίπλωμα Ειδίκευσης στη κατεύθυνση Διοίκηση Πληροφοριακών Συστημάτων (MIS) του τμήματος Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων του Πανεπιστημίου Αιγαίου.

Διδακτορικό Δίπλωμα στην περιοχή της Πληροφοριακής Ιδιωτικότητας, Τμήμα Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων, Πανεπιστήμιο Αιγαίου.

Μεταδιδακτορικός Ερευνητής στο Τμήμα Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων του Πανεπιστημίου Αιγαίου,όπου  συνεργάζεται ερευνητικά πρωτίστως  με τον Καθηγητή Σπύρο Κοκολάκη.

Πιστοποιήσεις:

  • "Εργαστήριο Ψηφιακών Συστημάτων" της Σχολής Θετικών Επιστημών του ΕΑΠ
  • "U.Lab: Transforming Business, Society, and Self", ΜΙΤx
  • SciWrite-SP Writing in the Sciences-Stanford University, School of Medicine
  • "Intoduction to Marketing",The Wharton School University of Pennsylvania
  • Developing Innovative Ideas for New Companies: The First Step in Entrepreneurship by University of Maryland
  • Step-by-step guide to reviewing, Elsevier Publishing Campus

Ερευνητικά Ενδιαφέροντα

  • Πληροφοριακή ιδιωτικότητα 
  • Συμπεριφορική ασφάλεια και ιδιωτικότητα
  • Ανωνυμία
  • means - end ανάλυση
  • Εργαλεία Ενισχυσης Ιδιωτικότητας
  • Ανθρωποκεντρική προσέγγιση  ιδιωτικότητας και ασφάλειας Π.Σ

 

Διδασκαλία

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


A. Skalkos, S. Kokolakis, Modification of User Behavior Towards the Use of Privacy-Preserving Search Engines: Insights from an Experiment on Privacy., EMCIS '24, Themistocleous, M., Bakas, N., Kokosalakis, G., Papadaki, M. , (eds), pp. 295–312, Feb, 2025, Athens, Greece, Springer, https://link.springer.com/chapter/10.100...
 

Abstract
This study examines the relationship between user behavior and exposure to information about Privacy-Preserving Search Engines (PPSEs). The research explores whether exposure to positive, neutral, or negative information about privacy practices affects user behavior toward PPSEs. Results show an increase in PPSE awareness post-exposure but no substantial change in usage. Negative news impacts trust, while positive news enhances usability perception. These findings highlight the need for multifaceted strategies to address privacy concerns and promote PPSE adoption.

Ioannis Stylios, A. Skalkos, S. Kokolakis, M. Karyda, BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System, ESORICS 2021 International Workshops. ESORICS 2021, Katsikas S. et al., pp. pp 158-170, Oct, 2021, Darmstadt, Germany, Springer, https://link.springer.com/chapter/10.100...
 

Abstract
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user’s keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).

[3]
A. Skalkos, A. Tsohou, M. Karyda, S. Kokolakis, INVESTIGATING THE VALUES THAT DRIVE THE ADOPTION OF ANONYMITY TOOLS: A LADDERING APPROACH, 11th Mediterranean Conference on Information Systems (MCIS 2017) , Sep, 2017, The 11th Mediterranean Conference on Information Systems Genoa,Italy, AIS Electronic Library (AISeL)

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.