Search results

1 – 8 of 8
To view the access options for this content please click here
Book part
Publication date: 15 November 2018

Aristidis Bitzenis and Vasileios Vlachos

A report of the International Labour Organization on undeclared work in Greece refers to failures of formal institutions which contribute to the asymmetry between state…

Abstract

A report of the International Labour Organization on undeclared work in Greece refers to failures of formal institutions which contribute to the asymmetry between state and civic morality. The particular asymmetry is explored through the context of tax morale, which is one of the major determinants of the shadow economy. Although several papers have been published on the Greek shadow economy, tax morale in Greece has not been adequately explored. This research aims to investigate the effect of the economic downturn on the factors determining the level of tax morale through primary data from a European Union-funded research project on the Greek shadow economy. The findings provide policy orientations toward transferring activities from the shadow to the official economy, a goal which is part of Europe 2020 strategy.

Details

Advances in Taxation
Type: Book
ISBN: 978-1-78756-416-9

Keywords

To view the access options for this content please click here
Article
Publication date: 21 August 2007

Vasileios Vlachos and Diomidis Spinellis

To present a new technique that contains the spread of rapid malcode, which is based on peer‐to‐peer (P2P) communication and the principles of computer hygiene.

Abstract

Purpose

To present a new technique that contains the spread of rapid malcode, which is based on peer‐to‐peer (P2P) communication and the principles of computer hygiene.

Design/methodology/approach

Two proof‐of‐concept prototypes demonstrate the feasibility of the introduced technique. The effectiveness of the proposed model is supported by experimental findings through simulation tests. Additional software tools have been developed to ensure the correctness of the simulation.

Findings

Provides supportive information regarding the efficiency of computer hygiene practices. Moreover, theoretical and empirical results show that P2P networks could play an important role in the containment of worm epidemics.

Research limitations/implications

A stable system deployed in large‐scale is yet to be implement in order to produce decisive results regarding the benefits of the proposed algorithm.

Practical implications

This paper argues that P2P networks can have significant impact on the containment of the rapid malcode.

Originality/value

This paper is an extended and revised version of the “PROMISing steps towards computer hygiene” paper which appeared in the INC2006 conference.

Details

Information Management & Computer Security, vol. 15 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 7 June 2011

Vasileios Vlachos, Marilena Minou, Vasillis Assimakopouos and Androniki Toska

Cybercrime is a serious threat for most modern societies as it hinders the necessary adoption of information and communication technologies (ICT). This paper seeks to…

Abstract

Purpose

Cybercrime is a serious threat for most modern societies as it hinders the necessary adoption of information and communication technologies (ICT). This paper seeks to analyze a large number of real cases related to the cybercrime in Greece.

Design/methodology/approach

All cases were voluntarily submitted from Greek users, who asked for assistance to a special task force, composed of public sector employees and servants. By analyzing more than 1,000 similar cases, the paper derives a taxonomy of security‐related incidents that the Greek users encountered during the past years. Greece only recently embraced broadband technologies and, therefore, this paper is able to observe the corresponding increase of cybercriminal activities.

Findings

An analysis of the reports received by the task force indicate a clear shift in the type of reported content. A large number of recent reports from Greek users concern financial fraud schemes and phenomena of cyberbullying and cyber‐extortions, activities related primarily to the newly emerged social networking sites.

Originality/value

The paper offers insights into cybercrime in Greece via real case studies.

Details

Information Management & Computer Security, vol. 19 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 7 October 2013

Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou and Anastasios Stasinopoulos

Teaching information systems security features some peculiarities, compared to other scientific fields, as the trainees have to design and protect systems against both…

Abstract

Purpose

Teaching information systems security features some peculiarities, compared to other scientific fields, as the trainees have to design and protect systems against both known and unknown attacks. Moreover, the so far established stereotypes present the potential intruders as being ingenious and able to penetrate almost every system. The paper aims to discuss these issues.

Design/methodology/approach

Within the scope of two different modules in higher education institutes, the students' involvement into practical pre-designed scenarios was attempted, in order for them to understand the way intruders think, the methodologies they follow and the liabilities one may face for the flawed security of network applications and/or the supporting infrastructure. For this reason, an educational software tool was developed (named “Hackademic Challenges”), which comprised a variety of realistic scenarios, where the student had to locate and exploit various vulnerabilities, in order to successfully complete the challenge. Evaluation of the developed tool was attempted through an online, anonymous questionnaire.

Findings

The results show that the students embraced this approach and have benefited significantly from going through these exercises.

Originality/value

The contribution consists of findings that may be useful to other instructors teaching similar subjects.

Details

Information Management & Computer Security, vol. 21 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Book part
Publication date: 15 November 2018

Abstract

Details

Advances in Taxation
Type: Book
ISBN: 978-1-78756-416-9

Content available
Article
Publication date: 21 November 2008

Abstract

Details

Information Management & Computer Security, vol. 16 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Book part
Publication date: 29 January 2021

Abstract

Details

Modeling Economic Growth in Contemporary Hong Kong
Type: Book
ISBN: 978-1-83909-937-3

Content available
Book part
Publication date: 12 February 2021

Abstract

Details

Modeling Economic Growth in Contemporary Malaysia
Type: Book
ISBN: 978-1-80043-806-4

1 – 8 of 8