This study presents a conceptual framework that combines perceived ease of use, perceived usefulness, innovativeness and trust in order to examine their influence on the mobile services adoption intention in the Greek environment. A... more
This study presents a conceptual framework that combines perceived ease of use, perceived usefulness, innovativeness and trust in order to examine their influence on the mobile services adoption intention in the Greek environment. A survey is conducted and the methodologies applied include factor analysis and stepwise regression analysis. The findings show that all the variables have a statistically significant effect on peoples adoption intention with the exception of trust. The implication of this work to both researchers and practitioners is discussed.
COVID-19 pandemic crisis has brought extraordinary changes to almost all human activities. This unfamiliar situation has affected, among others, the working conditions, under which employees should keep doing their job while protecting... more
COVID-19 pandemic crisis has brought extraordinary changes to almost all human activities. This unfamiliar situation has affected, among others, the working conditions, under which employees should keep doing their job while protecting themselves and preventing the coronavirus from spreading. As a result, working from home has been considered as a topic of high interest, and a number of empirical studies have been conducted aiming at investigating its impact on contemporary companies, organizations and their employees. The focus of this research is on the employee profile and type of organization, as well as on other factors and conditions that influence the adoption of teleworking policies. Therefore, the scope of the systematic review paper is to analyze and present the factors affecting COVID-19 induced teleworking, the perceived benefits and obstacles of this situation to employees and their firms, as well as the determinants that impact pandemic induced teleworking adjustment a...
The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of... more
The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of models introduces components and mechanisms that seem to be able to partially match the specific requirements imposed by UbiCom environments. In this paper, an evaluation of current access control models based on a brief study of UbiCom access control requirements is presented. Then, a new access control approach that extends UCON towards a differentiated utilization of attribute mutability for easiness of administration, better performance and lower operational cost in UbiCom environments is proposed.
The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the... more
The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the usage decision process. In this paper, a detailed classication of the aforementioned criteria along with a representative usage scenario for each category is presented, unveiling a number of UCON's limitations. In turn, a Use-based Usage CONtrol (UseCON) model is proposed that provides, for the creation of a usage decision, enhanced handling of information regarding context and previ- ous or current usages exercised in the system. The enhanced capabilities of the proposed approach are demonstrated and discussed with the use of detailed application examples.
Usage CONtrol (UCON) is a next generation access control model enhanced with capabilities presented in trust and digital rights management. However, modern computing environments are usually introducing complex usage scenarios. Such a... more
Usage CONtrol (UCON) is a next generation access control model enhanced with capabilities presented in trust and digital rights management. However, modern computing environments are usually introducing complex usage scenarios. Such a complexity results in involving a large number of entities and in utilizing multi party contextual information during the decision making process of a particular usage. Moreover, usage control is demanded to support novel access modes on single or composite resources, while taking into account new socio-technical abstractions and relations. In this paper, a number of challenging issues faced when UCON is applied in modern computing environments are highlighted through the utilization of representative usage scenarios. The results of this study are revealing various limitations in contextual information handling, lack to support complicated usage modes of subjects on objects, and weaknesses in utilizing information concerning previous or current usages of system resources.