Giannis Paspatis | Ionian University (original) (raw)

Papers by Giannis Paspatis

Research paper thumbnail of Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement

Journal of cybersecurity and privacy, Feb 7, 2024

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement

Multiple studies have demonstrated that the conventional method of learning is suboptimal when ou... more Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective of enhancing individuals’ privacy
practices to a higher level of confidentiality. We performed an experiment on a limited number of people to validate the efficacy of our suggested transformation framework. This framework combined determining aspects of privacy behavior with experiential behavior modification methodologies such as neutral stimuli (e.g., cognitive behavioral transformation—CBTx), practical assessments and motivational interviews from other disciplines. While these methods have proven effective in fields like psychology and sociology, they have not yet been applied to the realm of Information Computer and Technology (ICT). In this study, we have effectively demonstrated the efficacy of the proposed framework through a five-phase experiment. The suggested framework has the potential to be advantageous for educational institutions, including both public and private schools as well as universities, to construct new frameworks or develop new methodologies regarding individuals’ privacy behavior transformation to a more protective one. Furthermore, our framework offers a conducive environment for further investigation into privacy behavior transformation methodologies.

Research paper thumbnail of Synchronous and Asynchronous Webcasts as an Exclusive Way of Education

Research paper thumbnail of AppAware: a policy visualization model for mobile applications

Information & Computer Security, 2020

Purpose Privacy policies emerge as the main mechanism to inform users on the way their informatio... more Purpose Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. The literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. This study aims to address this challenge this paper presents AppAware, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications. Design/methodology/approach AppAware formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppAware aims to bridge the difficulty to read privacy policies and android’s obscure permission set with a new privacy policy visualization model. Thus, we propose...

Research paper thumbnail of AppAware: A Model for Privacy Policy Visualization for Mobile Applications

Privacy policies emerge as the main mechanism to inform users on the way their information is man... more Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. Literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. In an effort to address this challenge this paper presents AppWare, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications. AppWare formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppWare aims to bridge the difficulty to read privacy policies and android's obscure permission set with a new privacy policy visualization model. To validate AppAware we conducted a survey through questionnaire aiming to evaluate AppAware in terms of installability, usability, and viability-purpose. The results demonstrate that AppAware is assessed above average by the users in all categories.

Research paper thumbnail of How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

Several studies have shown that the traditional way of learning is not optimal when we aim to imp... more Several studies have shown that the traditional way of learning is not optimal when we aim to improve ICT users’ actual privacy behavior. In this research, we present a literature review of the theories that are followed in other fields to modify human behavior. Our findings show that the cognitive theory and the health belief model present optimistic results. Further, we examine various learning methods and we conclude that experiential learning is advantageous compared to other methods. In this paper aggregate the privacy behavior determinant factors found in the literature and we use the cognitive theory to we synthesize a theoretical framework. The proposed framework can be beneficial to educational policy makers and practitioners, such as public and private schools, and universities. Also, our framework provides a fertile ground for more research on experiential privacy learning and privacy behavior enhancement.

Research paper thumbnail of How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors

How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution

Research paper thumbnail of Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data

Many university departments provide public engagement activities, often referred to as 'outreach'... more Many university departments provide public engagement activities, often referred to as 'outreach' to school students, their teachers and other members of the public. It is less common for University Departments to run activities for their employees let alone the children of these employees. This paper looks at the value put on an engagement activity both by participating students and their parents who are employees of the host university. Analysis shows that the students welcome the opportunity to experience aspects of their parents' workplace and those parents are extremely supportive of such initiatives.

Research paper thumbnail of Mobile application privacy risks: Viber users' de- anonymization using public data

Mobile application developers define the terms of use for the applications they develop, which us... more Mobile application developers define the terms of use for the applications they develop, which users may accept or declined during installation. Application developers on the one hand seek to gain access to as many user information as possible, while users on the other hand seem to lack awareness and comprehension of privacy policies. This allows application developers to store an enormous number of personal data, sometimes even irrelevant to the application's function. It's also common that users choose not to alter the default settings, even when such an option is provided. In combination, the above conditions jeopardize users' rights to privacy. In this research, we examined the Viber application to demonstrate how effortless it is to discover the identity of unknown Viber users. We chose a pseudorandom sample of 2000 cellular telephone numbers and examined if we could reveal their personal information. We designed an empirical study that compares the reported behavior with the actual behavior of Viber's users. The results of this study show that users' anonymity and privacy is easily deprived and information is exposed to a knowledgeable seeker. We provide guidelines addressed to both mobile application users and developers to increase privacy awareness and prevent privacy violations.

Research paper thumbnail of Art as a mean to propaganda in 17th and 18th century Catholic Rome

The end of the 16th and the dawning of the 17th century found the tottery Europe having to face p... more The end of the 16th and the dawning of the 17th century found the tottery Europe having to face poverty, epidemic outbursts, lethal diseases, population’s increased mortality and numerous revolutions. Religious and political wars and social unrest gave a blood like color to the motley Europe’s chessboard and while political leaders sought ways for the new political status to obtain some balance. While the early forms of European nations were struggling to establish their independence, the Holy Roman Empire was finding it impossible to establish a new subsistence and the French Monarchy was reaching its apex, the new catastrophic element of the irreversible religious schism between the Catholic and the Protestant Church appeared, leading to a whole diverse prospect of Europe’s religious identity. Luther’s Reformation undeniable challenge towards the Catholic Church, the almost immediate response of the papal power through the Council of Trent (1545 - 1563) with the movement of the Counter-Reformation and the devastating consequences of the Thirty Years War (1618-1648) completed the picture strife-torn Europe. Within such ambiguous and divided environment Baroque art was born.
Despite all the difficulties, the adamant Catholic Church, following the Council of Trent’s commands and with the succor of Ignatius Loyola’s Jesuits, redefined its relationship with art and its commitment to the fight against Protestantism. Art became sacred and expressed in a high tone the catholic doctrine aiming at spreading the ecclesiastical morale over the world. The papal hierarchy was the key patron to Baroque Art which glorified God and the power of the Catholic Church by appealing to the human senses as a means of spiritual awakening and enlightenment to convince the faithful Catholics for the prestige and grandeur of Catholicism.
This project aims to indicate, through an intensive research of the 17th and 18th century artistic movements, the great impact of Baroque’s art on the religious propaganda of the Catholic Church and the Counter Reformation movement and to also examine its extensions to politics. Throughout this project and by perusing certain case studies of artistic creations, such as the Bernini’s marble statue of Santa Teresa, currently located in the church of Santa Maria Della Vittoria in Italy, we will present the significance and the power of Art to accompany, empower and enhance the religious effort of the Sacra Congregatio de Propaganda Fide organization to lead the “prodigal” crowd into awareness and back within the true Catholic faith. Arcangelo Correlli’s music piece Christmas Concerto Grosso in Sol minor Op. 6, No 8, will establish the attempt of the Catholic Cleric leadership to create strong connections of preference and friendship to the European Royal Courts.

Research paper thumbnail of Syncronous and Asyncronous Webcast as an exclusive way of education

In today's rapidly developing era, a significant number of the academic education methods and mat... more In today's rapidly developing era, a significant number of the academic education methods and material are being adopted as an integral part of the educational and learning process.It appears that the evolution and progress of such material, which have led to highly sophisticated and effective educational tools, have slowly managed to alter and replace the very essence of the existing traditional teaching methods. It would only be expected that certain academic subjects and subject fields will, in the near future, differentiate the traditional -in class- lectures by choosing a live streaming or asynchronously broadcasted videoed ones. The output of the educational material in question offers great advantages to both academic institutions and academic students when it comes to financial issues and geographical restrictions. The Hellenic Open University (HOU) has already managed to create educational material by using the asynchronous webcasting methods. In fact, and although the developing process and progress of these teaching tools are still in full swing, some academic subjects at the HOU are hence benefiting by the live streaming educational tools mentioned above.This research will confirm and present the substantial advantages that can be offered to the academic community through the use of such innovating material and infrastructure.

Research paper thumbnail of Art as a mean to propaganda in 17th

Research paper thumbnail of Developing distance learning university programs: Advantages, structre and methodology

According to this research, there are great advantages to be acknowledged in the full use of lear... more According to this research, there are great advantages to be acknowledged in the full use of learning courses offered by Universities which are using the teaching method of Distance Learning in Higher Education. Such Institutes may provide Bachelor and Master's Degrees equivalent to the ones provided by traditional Institutes proclaiming the actual benefits to be offered to the Academic Society globally, the financial prosperity for both the Institutes themselves and the country in which they exist in and also the assistance offered to society in solving serious issues within the working market, such as reducing the unemployment rates, increase of the academic research, environmental benefits and many more by offering an alternative way in approaching higher education nowadays. A complete system of education -e -learning will be analyzed in this project, stating all the advantages accruing for the Institute and therefore the Institute's educators and the students involved. Important structural proposals will be presented in order to ensure that it is comprehended by the spectators the breadth possibilities of this systems' use should an Institute chooses to include it in its Study Programmes. Throughout this research, it will become quite clear that the Institute's academic and financial prospects and its positioning amongst global University rankings could be altered in a beneficial way by adopting the proposals analyzed in this proposal since existing and pre-owned technology may be used with minimum cost. In order to corroborate this paper's suggestions, a, complete use of the system, example throughout a student's academic life will be presented.

Research paper thumbnail of TelePass

Νο Ονοματεπώνυμο Α.Μ. 1 ΠΑΠΑΣΤΕΦΑΝΗΣ ΕΠΑΜΕΙΝΩΝΔΑΣ 64210 2 ΠΑΠΑΚΩΝΣΤΑΝΤΙΝΟΥ ΔΗΜΗΤΡΗΣ 64198 3 ΠΑΠΑΘ... more Νο Ονοματεπώνυμο Α.Μ. 1 ΠΑΠΑΣΤΕΦΑΝΗΣ ΕΠΑΜΕΙΝΩΝΔΑΣ 64210 2 ΠΑΠΑΚΩΝΣΤΑΝΤΙΝΟΥ ΔΗΜΗΤΡΗΣ 64198 3 ΠΑΠΑΘΑΝΑΣΙΟΥ ΧΑΡΙΚΛΕΙΑ 64196 4 ΠΑΣΠΑΤΗΣ ΙΩΑΝΝΗΣ 64230 ΣΧΟΛΙΑ ΠΡΟΣ ΤΟΝ ΚΑΘΗΓΗΤΗ Υπεύθυνη Δήλωση Φοιτητή: Βεβαιώνω ότι είμαι συγγραφέας αυτής της εργασίας και ότι κάθε βοήθεια την οποία είχα για την προετοιμασία αυτής της εργασίας, είναι πλήρως αναγνωρισμένη και αναφέρεται, είτε στο σημείο «Σχόλια προς καθηγητή», είτε μέσα στην εργασία. Επίσης, έχω αναφέρει τις όποιες πηγές από τις οποίες έκανα χρήση δεδομένων, ιδεών ή λέξεων, είτε αυτές αναφέρονται ακριβώς, είτε παραφρασμένες. Επίσης, βεβαιώνω ότι αυτή η εργασία προετοιμάστηκε από εμένα προσωπικά ειδικά για τη συγκεκριμένη Θεματική Ενότητα. Συμφωνώ και αποδέχομαι την ανωτέρω δήλωση Δε συμφωνώ και δεν αποδέχομαι την ανωτέρω δήλωση (στην περίπτωση αυτή, ο Κ-Σ έχει δικαίωμα να μην αξιολογήσει την εργασία του φοιτητή) Ημερομηνία ανακοίνωσης εργασίας: 1/2/2013 Ημερομηνία παράδοσης εργασίας: 24/2/2013 Καταληκτική ημερομηνία παραλαβής: 26/2/2013 Καταληκτική ημερομηνία παραλαβής σε περίπτωση καθυστερημένης παράδοσης: 3/3/2013

Research paper thumbnail of Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement

Journal of cybersecurity and privacy, Feb 7, 2024

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement

Multiple studies have demonstrated that the conventional method of learning is suboptimal when ou... more Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective of enhancing individuals’ privacy
practices to a higher level of confidentiality. We performed an experiment on a limited number of people to validate the efficacy of our suggested transformation framework. This framework combined determining aspects of privacy behavior with experiential behavior modification methodologies such as neutral stimuli (e.g., cognitive behavioral transformation—CBTx), practical assessments and motivational interviews from other disciplines. While these methods have proven effective in fields like psychology and sociology, they have not yet been applied to the realm of Information Computer and Technology (ICT). In this study, we have effectively demonstrated the efficacy of the proposed framework through a five-phase experiment. The suggested framework has the potential to be advantageous for educational institutions, including both public and private schools as well as universities, to construct new frameworks or develop new methodologies regarding individuals’ privacy behavior transformation to a more protective one. Furthermore, our framework offers a conducive environment for further investigation into privacy behavior transformation methodologies.

Research paper thumbnail of Synchronous and Asynchronous Webcasts as an Exclusive Way of Education

Research paper thumbnail of AppAware: a policy visualization model for mobile applications

Information & Computer Security, 2020

Purpose Privacy policies emerge as the main mechanism to inform users on the way their informatio... more Purpose Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. The literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. This study aims to address this challenge this paper presents AppAware, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications. Design/methodology/approach AppAware formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppAware aims to bridge the difficulty to read privacy policies and android’s obscure permission set with a new privacy policy visualization model. Thus, we propose...

Research paper thumbnail of AppAware: A Model for Privacy Policy Visualization for Mobile Applications

Privacy policies emerge as the main mechanism to inform users on the way their information is man... more Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. Literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. In an effort to address this challenge this paper presents AppWare, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications. AppWare formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppWare aims to bridge the difficulty to read privacy policies and android's obscure permission set with a new privacy policy visualization model. To validate AppAware we conducted a survey through questionnaire aiming to evaluate AppAware in terms of installability, usability, and viability-purpose. The results demonstrate that AppAware is assessed above average by the users in all categories.

Research paper thumbnail of How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

Several studies have shown that the traditional way of learning is not optimal when we aim to imp... more Several studies have shown that the traditional way of learning is not optimal when we aim to improve ICT users’ actual privacy behavior. In this research, we present a literature review of the theories that are followed in other fields to modify human behavior. Our findings show that the cognitive theory and the health belief model present optimistic results. Further, we examine various learning methods and we conclude that experiential learning is advantageous compared to other methods. In this paper aggregate the privacy behavior determinant factors found in the literature and we use the cognitive theory to we synthesize a theoretical framework. The proposed framework can be beneficial to educational policy makers and practitioners, such as public and private schools, and universities. Also, our framework provides a fertile ground for more research on experiential privacy learning and privacy behavior enhancement.

Research paper thumbnail of How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors

How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution

Research paper thumbnail of Mobile Application Privacy Risks : Viber Users' De-Anonymization Using Public Data

Many university departments provide public engagement activities, often referred to as 'outreach'... more Many university departments provide public engagement activities, often referred to as 'outreach' to school students, their teachers and other members of the public. It is less common for University Departments to run activities for their employees let alone the children of these employees. This paper looks at the value put on an engagement activity both by participating students and their parents who are employees of the host university. Analysis shows that the students welcome the opportunity to experience aspects of their parents' workplace and those parents are extremely supportive of such initiatives.

Research paper thumbnail of Mobile application privacy risks: Viber users' de- anonymization using public data

Mobile application developers define the terms of use for the applications they develop, which us... more Mobile application developers define the terms of use for the applications they develop, which users may accept or declined during installation. Application developers on the one hand seek to gain access to as many user information as possible, while users on the other hand seem to lack awareness and comprehension of privacy policies. This allows application developers to store an enormous number of personal data, sometimes even irrelevant to the application's function. It's also common that users choose not to alter the default settings, even when such an option is provided. In combination, the above conditions jeopardize users' rights to privacy. In this research, we examined the Viber application to demonstrate how effortless it is to discover the identity of unknown Viber users. We chose a pseudorandom sample of 2000 cellular telephone numbers and examined if we could reveal their personal information. We designed an empirical study that compares the reported behavior with the actual behavior of Viber's users. The results of this study show that users' anonymity and privacy is easily deprived and information is exposed to a knowledgeable seeker. We provide guidelines addressed to both mobile application users and developers to increase privacy awareness and prevent privacy violations.

Research paper thumbnail of Art as a mean to propaganda in 17th and 18th century Catholic Rome

The end of the 16th and the dawning of the 17th century found the tottery Europe having to face p... more The end of the 16th and the dawning of the 17th century found the tottery Europe having to face poverty, epidemic outbursts, lethal diseases, population’s increased mortality and numerous revolutions. Religious and political wars and social unrest gave a blood like color to the motley Europe’s chessboard and while political leaders sought ways for the new political status to obtain some balance. While the early forms of European nations were struggling to establish their independence, the Holy Roman Empire was finding it impossible to establish a new subsistence and the French Monarchy was reaching its apex, the new catastrophic element of the irreversible religious schism between the Catholic and the Protestant Church appeared, leading to a whole diverse prospect of Europe’s religious identity. Luther’s Reformation undeniable challenge towards the Catholic Church, the almost immediate response of the papal power through the Council of Trent (1545 - 1563) with the movement of the Counter-Reformation and the devastating consequences of the Thirty Years War (1618-1648) completed the picture strife-torn Europe. Within such ambiguous and divided environment Baroque art was born.
Despite all the difficulties, the adamant Catholic Church, following the Council of Trent’s commands and with the succor of Ignatius Loyola’s Jesuits, redefined its relationship with art and its commitment to the fight against Protestantism. Art became sacred and expressed in a high tone the catholic doctrine aiming at spreading the ecclesiastical morale over the world. The papal hierarchy was the key patron to Baroque Art which glorified God and the power of the Catholic Church by appealing to the human senses as a means of spiritual awakening and enlightenment to convince the faithful Catholics for the prestige and grandeur of Catholicism.
This project aims to indicate, through an intensive research of the 17th and 18th century artistic movements, the great impact of Baroque’s art on the religious propaganda of the Catholic Church and the Counter Reformation movement and to also examine its extensions to politics. Throughout this project and by perusing certain case studies of artistic creations, such as the Bernini’s marble statue of Santa Teresa, currently located in the church of Santa Maria Della Vittoria in Italy, we will present the significance and the power of Art to accompany, empower and enhance the religious effort of the Sacra Congregatio de Propaganda Fide organization to lead the “prodigal” crowd into awareness and back within the true Catholic faith. Arcangelo Correlli’s music piece Christmas Concerto Grosso in Sol minor Op. 6, No 8, will establish the attempt of the Catholic Cleric leadership to create strong connections of preference and friendship to the European Royal Courts.

Research paper thumbnail of Syncronous and Asyncronous Webcast as an exclusive way of education

In today's rapidly developing era, a significant number of the academic education methods and mat... more In today's rapidly developing era, a significant number of the academic education methods and material are being adopted as an integral part of the educational and learning process.It appears that the evolution and progress of such material, which have led to highly sophisticated and effective educational tools, have slowly managed to alter and replace the very essence of the existing traditional teaching methods. It would only be expected that certain academic subjects and subject fields will, in the near future, differentiate the traditional -in class- lectures by choosing a live streaming or asynchronously broadcasted videoed ones. The output of the educational material in question offers great advantages to both academic institutions and academic students when it comes to financial issues and geographical restrictions. The Hellenic Open University (HOU) has already managed to create educational material by using the asynchronous webcasting methods. In fact, and although the developing process and progress of these teaching tools are still in full swing, some academic subjects at the HOU are hence benefiting by the live streaming educational tools mentioned above.This research will confirm and present the substantial advantages that can be offered to the academic community through the use of such innovating material and infrastructure.

Research paper thumbnail of Art as a mean to propaganda in 17th

Research paper thumbnail of Developing distance learning university programs: Advantages, structre and methodology

According to this research, there are great advantages to be acknowledged in the full use of lear... more According to this research, there are great advantages to be acknowledged in the full use of learning courses offered by Universities which are using the teaching method of Distance Learning in Higher Education. Such Institutes may provide Bachelor and Master's Degrees equivalent to the ones provided by traditional Institutes proclaiming the actual benefits to be offered to the Academic Society globally, the financial prosperity for both the Institutes themselves and the country in which they exist in and also the assistance offered to society in solving serious issues within the working market, such as reducing the unemployment rates, increase of the academic research, environmental benefits and many more by offering an alternative way in approaching higher education nowadays. A complete system of education -e -learning will be analyzed in this project, stating all the advantages accruing for the Institute and therefore the Institute's educators and the students involved. Important structural proposals will be presented in order to ensure that it is comprehended by the spectators the breadth possibilities of this systems' use should an Institute chooses to include it in its Study Programmes. Throughout this research, it will become quite clear that the Institute's academic and financial prospects and its positioning amongst global University rankings could be altered in a beneficial way by adopting the proposals analyzed in this proposal since existing and pre-owned technology may be used with minimum cost. In order to corroborate this paper's suggestions, a, complete use of the system, example throughout a student's academic life will be presented.

Research paper thumbnail of TelePass

Νο Ονοματεπώνυμο Α.Μ. 1 ΠΑΠΑΣΤΕΦΑΝΗΣ ΕΠΑΜΕΙΝΩΝΔΑΣ 64210 2 ΠΑΠΑΚΩΝΣΤΑΝΤΙΝΟΥ ΔΗΜΗΤΡΗΣ 64198 3 ΠΑΠΑΘ... more Νο Ονοματεπώνυμο Α.Μ. 1 ΠΑΠΑΣΤΕΦΑΝΗΣ ΕΠΑΜΕΙΝΩΝΔΑΣ 64210 2 ΠΑΠΑΚΩΝΣΤΑΝΤΙΝΟΥ ΔΗΜΗΤΡΗΣ 64198 3 ΠΑΠΑΘΑΝΑΣΙΟΥ ΧΑΡΙΚΛΕΙΑ 64196 4 ΠΑΣΠΑΤΗΣ ΙΩΑΝΝΗΣ 64230 ΣΧΟΛΙΑ ΠΡΟΣ ΤΟΝ ΚΑΘΗΓΗΤΗ Υπεύθυνη Δήλωση Φοιτητή: Βεβαιώνω ότι είμαι συγγραφέας αυτής της εργασίας και ότι κάθε βοήθεια την οποία είχα για την προετοιμασία αυτής της εργασίας, είναι πλήρως αναγνωρισμένη και αναφέρεται, είτε στο σημείο «Σχόλια προς καθηγητή», είτε μέσα στην εργασία. Επίσης, έχω αναφέρει τις όποιες πηγές από τις οποίες έκανα χρήση δεδομένων, ιδεών ή λέξεων, είτε αυτές αναφέρονται ακριβώς, είτε παραφρασμένες. Επίσης, βεβαιώνω ότι αυτή η εργασία προετοιμάστηκε από εμένα προσωπικά ειδικά για τη συγκεκριμένη Θεματική Ενότητα. Συμφωνώ και αποδέχομαι την ανωτέρω δήλωση Δε συμφωνώ και δεν αποδέχομαι την ανωτέρω δήλωση (στην περίπτωση αυτή, ο Κ-Σ έχει δικαίωμα να μην αξιολογήσει την εργασία του φοιτητή) Ημερομηνία ανακοίνωσης εργασίας: 1/2/2013 Ημερομηνία παράδοσης εργασίας: 24/2/2013 Καταληκτική ημερομηνία παραλαβής: 26/2/2013 Καταληκτική ημερομηνία παραλαβής σε περίπτωση καθυστερημένης παράδοσης: 3/3/2013