Christos Skourlas

ORCID: 0000-0003-4464-5305
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Semantic Web and Ontologies
  • Access Control and Trust
  • Online Learning and Analytics
  • Text and Document Classification Technologies
  • Context-Aware Activity Recognition Systems
  • Cryptography and Data Security
  • Advanced Text Analysis Techniques
  • Image Retrieval and Classification Techniques
  • Topic Modeling
  • Natural Language Processing Techniques
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • Service-Oriented Architecture and Web Services
  • Peer-to-Peer Network Technologies
  • Data Mining Algorithms and Applications
  • Online and Blended Learning
  • Wireless Body Area Networks
  • E-Learning and Knowledge Management
  • Web Data Mining and Analysis
  • Digital Accessibility for Disabilities
  • Biomedical Text Mining and Ontologies
  • Machine Learning and Data Classification
  • Spam and Phishing Detection
  • Advanced Database Systems and Queries
  • Information and Cyber Security

University of West Attica
2018-2024

Athens University of Economics and Business
2017

Technological Educational Institute of Athens
2007-2016

Athens Information Technology
2014

Technological Educational Institute of Eastern Macedonia and Thrace
2007

Panteion University
2000

It is widely acknowledged that employees of an organization are often a weak link in the protection its information assets. Information security has not been given enough attention literature terms human factor effect; researchers have called for more examination this area. Human factors play significant role computer security. In paper, we focus on relationship presenting weaknesses may lead to unintentional harm and discuss how awareness can be major tool overcoming these weaknesses. A...

10.1016/j.sbspro.2014.07.133 article EN Procedia - Social and Behavioral Sciences 2014-08-01

This paper explores the utilization of "pervasive" or "ubiquitous" computing devices and technologies in higher education classroom future. Firstly, a survey on characteristics applications today's ubiquitous is presented, along with questioning level their ubiquity. Such include smartphones, PDAs, Tablet PCs, iPods, as well reading appliances, Pad-type interactive whiteboards telepresence boards. Multiple network connections such cellular, Wi-Fi, Bluetooth, NFC, provide long-, medium-,...

10.1016/j.sbspro.2013.02.081 article EN Procedia - Social and Behavioral Sciences 2013-02-01

Several studies have shown that consumers perceive higher risks buying online than in conventional way. Perceived affect all purchase decisions and consumers' behavior, by deterring them to buy. These come from the lack of trust shoppers toward vendors' credibility. The main field research this paper is investigate how affecting engagement e-commerce, order conclude which security measures should be taken mitigate perceived risks. A framework for a also given identify causal relationships...

10.1016/j.sbspro.2014.07.122 article EN Procedia - Social and Behavioral Sciences 2014-08-01

Purpose – The purpose of this paper is to investigate risk reduction strategies in online shopping through the perspective buyer’s trust. Design/methodology/approach An explanatory research approach adopted identify cause-and-effect relationships between e-quality and customers’ loyalty, satisfaction This accomplished field research, which based on a structured questionnaire that utilizes E-S-QUAL tool, multiple-item general scale for measuring electronic service quality. sample consisted 92...

10.1108/jsit-01-2014-0008 article EN Journal of Systems and Information Technology 2014-08-05

Purpose – The purpose of this paper is to investigate the association lack awareness and human factors significant attacks that threat computer security in higher education. Design/methodology/approach Five nine are considered their relationship. A field research conducted on Greek employees education identify affect information security. sample consisted 103 use computers at work. Pearson correlation analysis between (9) risks performed. Findings Examining with these computers, all...

10.1108/jsit-01-2014-0007 article EN Journal of Systems and Information Technology 2014-08-05

The population of the Earth is moving towards urban areas forming smart cities (SCs). Waste management a component SCs. We consider SC which contains distribution waste bins and trucks located in sectors. Bins are enabled with Internet Things (IoT) sensors actuators. Prior approaches focus mainly on dynamic scheduling routing issues emerging from IoT-enabled management. However, less research has been done area stochastic reassignment process during four seasons year over period two years....

10.1177/0734242x18783843 article EN Waste Management & Research The Journal for a Sustainable Circular Economy 2018-07-17

Abstract This paper investigates the new trends in field of “pervasive” or “ubiquitous” computing logistics. Over past two decades, research challenges pervasive have evolved following rapid progress information and communication technology. Researchers are working to create an “Internet Things” that globally interconnects smart devices sensor networks. Technologies such as wireless communication, ubiquitous sensors, passive semi-passive RFID, essential monitor transport chain. “Pervasive...

10.1016/j.sbspro.2013.02.082 article EN Procedia - Social and Behavioral Sciences 2013-02-01

Abstract This paper proposes e-doctor; a web-based application that makes automatic diagnoses about health problems. The whole procedure is based on Support Vector Machines (SVMs), which are supervised learning models analyze data and proceed to decisions, their knowledge. System administrators define specific characteristics for each problem can be diagnosed, educate the SVM by entering sample files of statistical data. After that, medical staff enter exam information patients, e-doctor an...

10.1016/j.sbspro.2013.02.078 article EN Procedia - Social and Behavioral Sciences 2013-02-01

Purpose – Institutional repositories (IR) are usually used to archive and manage digital collections including research results, educational material, etc. Learning management systems (LMS) form a popular basis for e-learning blended learning. This paper aims study how integrate IR LMS support accessibility of disabled students with learning difficulties (dyslexic students) in higher education. Customised ontologies focusing on can be facilitate indexing, access items the repository....

10.1108/lr-08-2015-0088 article EN Library Review 2016-03-22

The proliferation of mobile devices has led to their integration into a huge number assistive environments where they perform key role. Pervasive environments, built over wireless infrastructures, introduce new possibilities in the healthcare sector realizing anytime-anywhere access medical information paradigm. Towards this direction pervasive technology can be deployed such as home monitoring for elderly or patients. In paper we describe policy based architecture that utilizes software...

10.1145/1389586.1389614 article EN 2008-07-16

Finding the correct category (class) a new unclassified document belongs to is an interesting and difficult problem, with wide range of applications. Our methodology for narrative text classification based on two techniques: we calculate distance (similarity) between all pre-classified documents each class also similarity ‘average document’ class. In both cases use key phrases (text or terms) as distinctive features our eventually proposed method automatic extraction authority list that...

10.1177/0165551510368620 article EN Journal of Information Science 2010-06-28

In this paper, the special needs/requirements of disabled students and cost-benefits for applying blended learning in Personalized Educational Learning Environments (PELE) Higher Education are studied. The authors describe how can form an attractive helpful framework assisting Deaf Hard-of-Hearing (D-HH) to learn communicate. described experiment integrates face-to-face, synchronous, asynchronous e-learning, bilingual teaching (oral language Sign Language) mainstream class, parallel classes,...

10.4018/jmbl.2013040103 article EN International Journal of Mobile and Blended Learning 2013-04-01

This paper investigates the adoption and use of electronic invoices (e-invoices) in Greek organizations. The study attempts to evaluate current practices applied implementing e-invoicing. A field research has been conducted, which is based on a structured questionnaire. target sample consisted 42 enterprises. main issues investigation include existing invoice processing practices, barriers that prevent extended e-invoicing, observed benefits from e-invoicing implementation, strategic drivers...

10.1063/1.4907848 article EN AIP conference proceedings 2015-01-01

Purpose – The purpose of this paper is to understand the emotional state a human being by capturing speech utterances that are used during common conversation. Human beings except thinking creatures also sentimental and organisms. There six universal basic emotions plus neutral emotion: happiness, surprise, fear, sadness, anger, disgust neutral. Design/methodology/approach It proved that, given enough acoustic evidence, person can be classified an ensemble majority voting classifier....

10.1108/jsit-01-2014-0009 article EN Journal of Systems and Information Technology 2014-08-05

Purpose The purpose of this paper is to introduce an interactive system that relies on the educational data generated from online Universities services assess, correct and ameliorate learning process for both students faculty. Design/methodology/approach In presented research, services, provided by a Greek University, prior, during after COVID-19 outbreak, are analyzed utilized in order offered provide better quality students. Moreover, according paths, their presence participation insights...

10.1108/dta-06-2022-0252 article EN Data Technologies and Applications 2022-12-23

Probabilistic classifiers are considered to be among the most popular for machine learning community and used in many applications. Although probabilistic exhibit very good performance when individually a specific classification task, little work has been done on assessing of two or more combination same task. In this work, we classify documents using approaches: The naive Bayes classifier Maximum Entropy model. Then, combine results improve performance, merging operators, Max Harmonic Mean....

10.1016/j.sbspro.2014.07.098 article EN Procedia - Social and Behavioral Sciences 2014-08-01

The article describes the academic data, which derived from a University E-government analytic platform, supports facilitation of blended learning in Greek during and after COVID19 outbreak [1,2]. e-government services refer to set information systems that facilitate functionalities enable management underlying [3,4]. These educational, research managerial services, also called U-EGOV, follow four stages (Presence, Interaction, Transaction, Transformation) [5]. In presented approach, data...

10.1016/j.dib.2023.109357 article EN cc-by Data in Brief 2023-07-02

Recent advances in technology introduce many new capabilities for several sectors. Among else, the continuous improvement and integration of features mobile devices, allow their interoperation to a large number environments; primarily medical sector may suffice from utilization order monitor efficiently condition patients provide feedback specialists, especially cases absence stable (wired) network infrastructure. Strict security requirements emerge due sensitivity data being transmitted,...

10.1145/1579114.1579184 article EN 2009-06-09

In this paper, we discuss how wireless networks and mobile learning form an attractive helpful framework for supporting Deaf Hard of Hearing (D-HH) students in Higher Education. The proposed multi-domain includes Secure Wireless Infrastructures Personalized Educational Learning Environments (SWI_PELE). We present the collaboration such environments briefly a pilot implementation. scheme servers incorporates infrastructure, personalized, multimedia based educational course material. also...

10.1109/pci.2012.66 article EN 2012-10-01

In this paper, we examine how advanced Information Technologies (IT) can be exploited for information sharing across supply chains, enabling collaboration and interoperability. Advanced technologies, such as intelligent agents technology, data mining, big data, cloud computing (CC), Internet of Things (IoT), RFID technology Industry 4.0 are utilized to implement the throughout a chain. We discuss emerging research issues, trends challenges that arise from extended application technologies on...

10.1145/3291533.3291575 article EN 2018-11-29

Abstract The length of studies the students who “linger” in Higher Education has not been justified many countries, and Institutes try to solve problem using various methods. their Departments beyond six or seven years is seen as complex one, Greek Education. Two main alternative methods have discussed: Giving a low priority for registration laboratory classes, limiting number times attending based courses. Eventually, according new legislation must cut off access too long. This study...

10.1016/j.sbspro.2014.07.159 article EN Procedia - Social and Behavioral Sciences 2014-08-01

Purpose – The purpose of this paper is to examine personal digital libraries (PDL) as a self-archiving approach, mainly based on individuals’ activities. Literature presents wide range perceptions the term PDL. rationale using PDL and capabilities that should offer are also discussed. key questions we focus are: “What critical features PDL?” “Are there technologies enable implementation/incorporation such in low cost software product?” Design/methodology/approach We “a user centred view...

10.1108/lr-06-2014-0073 article EN Library Review 2014-08-26
Coming Soon ...