PhD in Law (University scholarship –Distinction) - University of Strathclyde Law School, 2013
LL.M in Information Technology and Telecommunications Law (Distinction) - University of Strathclyde Law School, 2007
LLB - National and Kapodistrian University of Athens Law School, 2006
Significant Professional Experience
- September 2019 - present Reader in Cybercrime and Cybersecurity, University of Portsmouth, Institute of Criminal Justice Studies
- 2014 - present Senior Lecturer in Law and Cybercrime, University of Portsmouth, Institute of Criminal Justice Studies
- 2009-2014 Tutor of Law, University of Strathclyde, School of Law
- 2013-2014 Tutor of Law, University of Edinburgh, School of Law
Professional Trainings and Qualifications
- Digital Forensics - Certified Forensic Investigation Practitioner (CFIP) accredited by the Institute of Information Security Professionals Provider: 7safe (2017)
- Law of Data security and Investigations training course provided by the Sans Institute (2018)
- “Regulating Cyberspace in the People’s Republic of China: A system of ‘symbiotic control’” to be submitted to the International Review of Law, Computers and Technology
- “Fighting Cybercrime in a grassroots way. Lessons from a Cybercrime Awareness Clinic.” (co-authored) to be submitted to the Criminology and Criminal Justice journal
- Cybercrime Awareness Clinic
- ORPHEUS: Offline and online Radicalisation Prevention Holding back Extremism and Upholding Security Role
- Cyber - Clinics
- Understanding moral injury and belief change in the experiences of police online child sex crime investigators
- “A short history of hacktivism: Its past and present and what can we learn from it” in ‘Rethinking Cybercrime: Critical Debates’, Tim Owen and Jessica Marshall (eds) Palgrave Macmillan, forthcoming 2019-20
- “Ethics in criminological research: Lessons from a research ethics committee” Ron Iphofen (ed) The Springer Handbook of Research Ethics and Scientific Integrity. Springer Nature, forthcoming 2019
- “Living with Hacktivism: From Conflict to Symbiosis” (2018) Palgrave Macmillan
- “Book Review: Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility” by Emily B. Laidlaw, (2017) Journal of Information Rights, Policy and Practice
- “Insider unauthorised use of authorised access: What are the alternatives to the Computer Misuse Act 1990?” (2016) International Journal of Law, Crime and Justice, Issue 47, pp.85-96.
- “From Morris to Nosal: The history of exceeding authorization and the need for a change” (2016) John Marshall Journal of Information Technology & Privacy Law, Vol.30, pp.227-270.
- “China and the Internet: Expanding on Lessig’s Regulation Nightmares” (2012) SCRIPTed, Vol. 9, Issue 2, pp.150-172.
- “The role of the Internet in political struggles: Lessons from Iran and Egypt” (2012) New Political Science Journal Vol.34, Issue 2, pp.151-171.
- “Hackers: A criminological perspective” (2008) (in Greek) Art of Crime, Vol.1; available at www.theartofcrime.gr