<?xml version="1.0"?>
<dblpperson name="Evangelos Moustakas" pid="24/4657" n="12">
<person key="homepages/24/4657" mdate="2009-06-10">
<author pid="24/4657">Evangelos Moustakas</author>
</person>
<r><article key="journals/jamia/ChandrasekaranM26" mdate="2026-04-26">
<author pid="r/CRanganathan">Ranganathan Chandrasekaran</author>
<author orcid="0000-0002-2671-9035" pid="24/4657">Evangelos Moustakas</author>
<title>Patient attitudes toward ambient artificial intelligence scribes in clinical care: insights from a cross-sectional study.</title>
<year>2026</year>
<pages>263-272</pages>
<volume>33</volume>
<journal>J. Am. Medical Informatics Assoc.</journal>
<number>2</number>
<ee>https://doi.org/10.1093/jamia/ocaf218</ee>
<url>db/journals/jamia/jamia33.html#ChandrasekaranM26</url>
<stream>streams/journals/jamia</stream>
</article>
</r>
<r><article key="journals/jms/ChandrasekaranKSM24" mdate="2026-03-24">
<author pid="r/CRanganathan">Ranganathan Chandrasekaran</author>
<author pid="369/3854">Karthik Konaraddi</author>
<author pid="369/3329">Sakshi S. Sharma</author>
<author orcid="0000-0002-2671-9035" pid="24/4657">Evangelos Moustakas</author>
<title>Text-Mining and Video Analytics of COVID-19 Narratives Shared by Patients on YouTube.</title>
<pages>21</pages>
<year>2024</year>
<month>December</month>
<volume>48</volume>
<journal>J. Medical Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10916-024-02047-1</ee>
<url>db/journals/jms/jms48.html#ChandrasekaranKSM24</url>
</article>
</r>
<r><inproceedings key="conf/cybersecpods/MoustakasLMR20" mdate="2025-09-06">
<author orcid="0000-0002-2671-9035" pid="24/4657">Evangelos Moustakas</author>
<author orcid="0000-0003-2595-5076" pid="270/6118">Nishtha Lamba</author>
<author pid="241/0934">Dina Mahmoud</author>
<author pid="r/CRanganathan">C. Ranganathan</author>
<title>Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>Cyber Security</booktitle>
<ee>https://doi.org/10.1109/CyberSecurity49315.2020.9138861</ee>
<crossref>conf/cybersecpods/2020</crossref>
<url>db/conf/cybersecpods/cybersecpods2020.html#MoustakasLMR20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csedu/MoustakasOCR12" mdate="2012-05-29">
<author pid="24/4657">Evangelos Moustakas</author>
<author pid="65/11439">Isabel Oliveira</author>
<author pid="181/2592">Carlos Costa</author>
<author pid="83/11438">Maria Teresa Roberto</author>
<title>Towards the Development of a Mobile Learning Model for Smart Phones using Stakeholders' Analysis.</title>
<pages>477-483</pages>
<year>2012</year>
<booktitle>CSEDU (2)</booktitle>
<crossref>conf/csedu/2012-2</crossref>
<url>db/conf/csedu/csedu2012-2.html#MoustakasOCR12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaEEE/Moustakas09" mdate="2009-11-02">
<author pid="24/4657">Evangelos Moustakas</author>
<title>Using the familiar: How m-Learning (SMS texting) can enhance the student learning experience.</title>
<pages>167-175</pages>
<year>2009</year>
<booktitle>CSREA EE</booktitle>
<crossref>conf/csreaEEE/2009</crossref>
<url>db/conf/csreaEEE/csreaEEE2009.html#Moustakas09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaEEE/SidiropoulouM09" mdate="2009-11-02">
<author pid="74/7482">Panagiota-Aikaterina Sidiropoulou</author>
<author pid="24/4657">Evangelos Moustakas</author>
<title>A Review of the Main Technical Solutions to Facilitate Effective On-Line Dispute Resolution Mechanisms.</title>
<pages>271-275</pages>
<year>2009</year>
<booktitle>CSREA EE</booktitle>
<crossref>conf/csreaEEE/2009</crossref>
<url>db/conf/csreaEEE/csreaEEE2009.html#SidiropoulouM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecis/SidiropoulouM09" mdate="2016-12-05">
<author pid="74/7482">Panagiota-Aikaterina Sidiropoulou</author>
<author pid="24/4657">Evangelos Moustakas</author>
<title>E-disputes at the crossroads: A stakeholder analysis of on-line dispute resolution mechanisms (ODR).</title>
<pages>2983-2994</pages>
<year>2009</year>
<booktitle>ECIS</booktitle>
<crossref>conf/ecis/2009</crossref>
<url>db/conf/ecis/ecis2009.html#SidiropoulouM09</url>
</inproceedings>
</r>
<r><phdthesis key="phd/ethos/Moustakas07" mdate="2022-04-05">
<author pid="24/4657">Evangelos Moustakas</author>
<title>Unsolicited commercial e-mail (spam) : integrated policy and practice.</title>
<year>2007</year>
<school>Middlesex University, London, UK</school>
<ee>http://eprints.mdx.ac.uk/13599/</ee>
<ee>https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.568390</ee>
<note type="source">British Library, EThOS</note>
</phdthesis>
</r>
<r><article key="journals/intr/MoustakasRD06" mdate="2024-10-06">
<author orcid="0000-0002-2671-9035" pid="24/4657">Evangelos Moustakas</author>
<author pid="r/CRanganathan">C. Ranganathan</author>
<author pid="62/6521">Penny Duquenoy</author>
<title>E-mail marketing at the crossroads: A stakeholder analysis of unsolicited commercial e-mail (spam).</title>
<pages>38-52</pages>
<year>2006</year>
<volume>16</volume>
<journal>Internet Res.</journal>
<number>1</number>
<ee>https://doi.org/10.1108/10662240610642532</ee>
<url>db/journals/intr/intr16.html#MoustakasRD06</url>
</article>
</r>
<r><inproceedings key="conf/ceas/MoustakasRD05" mdate="2019-07-01">
<author pid="24/4657">Evangelos Moustakas</author>
<author pid="r/CRanganathan">C. Ranganathan</author>
<author pid="62/6521">Penny Duquenoy</author>
<title>Combating Spam through Legislation: A Comparative Analysis of US and European Approaches.</title>
<year>2005</year>
<crossref>conf/ceas/2005</crossref>
<booktitle>CEAS</booktitle>
<ee type="archive">http://www.ceas.cc/papers-2005/146.pdf</ee>
<url>db/conf/ceas/ceas2005.html#MoustakasRD05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecis/MoustakasRD05" mdate="2016-12-05">
<author pid="24/4657">Evangelos Moustakas</author>
<author pid="r/CRanganathan">C. Ranganathan</author>
<author pid="62/6521">Penny Duquenoy</author>
<title>Unsolicited Commercial Email (Spam): An Exploratory Understanding Using Stakeholder Analysis.</title>
<year>2005</year>
<crossref>conf/ecis/2005</crossref>
<booktitle>ECIS</booktitle>
<ee>http://aisel.aisnet.org/ecis2005/8</ee>
<url>db/conf/ecis/ecis2005.html#MoustakasRD05</url>
<pages>274-285</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/eciw/MoustakasDR05" mdate="2005-09-16">
<author pid="24/4657">Evangelos Moustakas</author>
<author pid="62/6521">Penny Duquenoy</author>
<author pid="r/CRanganathan">C. Ranganathan</author>
<title>Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet.</title>
<pages>239-248</pages>
<year>2005</year>
<crossref>conf/eciw/2005</crossref>
<booktitle>ECIW</booktitle>
<url>db/conf/eciw/eciw2005.html#MoustakasDR05</url>
</inproceedings>
</r>
<coauthors n="10" nc="2">
<co c="1"><na f="c/Costa:Carlos" pid="181/2592">Carlos Costa</na></co>
<co c="0"><na f="d/Duquenoy:Penny" pid="62/6521">Penny Duquenoy</na></co>
<co c="0"><na f="k/Konaraddi:Karthik" pid="369/3854">Karthik Konaraddi</na></co>
<co c="0"><na f="l/Lamba:Nishtha" pid="270/6118">Nishtha Lamba</na></co>
<co c="0"><na f="m/Mahmoud:Dina" pid="241/0934">Dina Mahmoud</na></co>
<co c="1"><na f="o/Oliveira:Isabel" pid="65/11439">Isabel Oliveira</na></co>
<co c="0" n="2"><na f="r/Ranganathan:C=" pid="r/CRanganathan">C. Ranganathan</na><na>Ranganathan Chandrasekaran</na></co>
<co c="1"><na f="r/Roberto:Maria_Teresa" pid="83/11438">Maria Teresa Roberto</na></co>
<co c="0"><na f="s/Sharma:Sakshi_S=" pid="369/3329">Sakshi S. Sharma</na></co>
<co c="-1"><na f="s/Sidiropoulou:Panagiota=Aikaterina" pid="74/7482">Panagiota-Aikaterina Sidiropoulou</na></co>
</coauthors>
</dblpperson>

