Abstract is missing.
- Adaptive information security and privacyBashar Nuseibeh. 17 [doi]
- Research methods and examples of empirical research in information securityEdgar R. Weippl. 18 [doi]
- Conceptual modelling: How to do it right?Monique Snoeck. 19 [doi]
- A modeling framework for business process reengineering using big data analytics and a goal-orientationGrace Park, Lawrence Chung, Latifur Khan, Sooyong Park. 21-32 [doi]
- CEFOP: A method for the Continual Evolution of Organisational ProcessesOrnela Cela, Agnès Front, Dominique Rieu. 33-43 [doi]
- Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approachYosra Lassoued, Selmin Nurcan. 44-55 [doi]
- What can information systems do for regulators? A review of the state-of-practice in CanadaOkhaide Akhigbe, Daniel Amyot, John Mylopoulos, Gregory Richards. 57-65 [doi]
- A tool-supported compliance process for software systemsPriscila Engiel, Julio Cesar Sampaio do Prado Leite, John Mylopoulos. 66-76 [doi]
- A definition of Information Security Classification in cybersecurity contextGuillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens. 77-82 [doi]
- A metamodel and code generation approach for symmetric unary associationsCesar Gonzalez-Perez, Patricia Martin-Rodilla. 84-94 [doi]
- From user goals to process-based service compositions: A flexible semantic-based approachIsabelle Mirbel. 95-102 [doi]
- Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission NetworkDuncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams. 103-108 [doi]
- The dbMark: A benchmarking system for watermarking methods for relational databasesStavros Kyriakopoulos, Theodoros Tzouramanis, Yannis Manolopoulos. 110-119 [doi]
- TRAWL: Protection against rogue sites for the massesAntonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi. 120-127 [doi]
- Representing, reasoning and predicting fraud using fraud plansJohn K. C. Kingston. 128-133 [doi]
- Wikipedia-based extraction of key information from resumesMohammad Ghufran, Nacéra Bennacer, Gianluca Quercini. 135-145 [doi]
- Context-based web service discovery framework with QoS considerationsSara Samir, Amany Sarhan, Alsayed Algergawy. 146-155 [doi]
- Traffic flow measurement of a public transport system through automated Web observationAlexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart. 156-161 [doi]
- Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID ConnectNitin Naik, Paul Jenkins. 163-174 [doi]
- Privacy proof in the cloudVeerle Jessen, Hans Weigand. 175-186 [doi]
- Supporting the design of privacy-aware business processes via privacy process patternsVasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis. 187-198 [doi]
- A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modellingModhi Al Alshaikh, Gulden Uchyigit, Roger Evans. 200-210 [doi]
- Towards an ethical recommendation frameworkDimitris Paraschakis. 211-220 [doi]
- Expert suggestion for conference program committeesHong Diep Tran, Guillaume Cabanac, Gilles Hubert. 221-232 [doi]
- Formal semantics and analysis tasks for ME-MAP modelsAzzam Maraee, Arnon Sturm. 234-243 [doi]
- A participative method for knowledge elicitation in collaborative innovation projectsFatemeh Movahedian, Agnès Front, Dominique Rieu, Armelle Farastier, Christelle Grandvallet, Franck Pourroy, Guy Prudhomme. 244-254 [doi]
- Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniquesLuca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, Diego Ponte. 255-265 [doi]
- LogMap+: Relational data enrichment and linked data resources matchingSlavko Zitnik, Marko Bajec, Dejan Lavbic. 267-275 [doi]
- An ontology-based framework for enhancing personalized content and retrieval informationEssayeh Aroua, Abed Mourad. 276-285 [doi]
- Semantic task specification in business process contextHermann Kaindl, Ralph Hoch, Roman Popp. 286-291 [doi]
- Evaluation of MUSER, a holistic security requirements analysis frameworkElias Seid, Kazi Robin, Tong Li, John Mylopoulos. 293-304 [doi]
- Cultural exploration of attack vector preferences for self-identified attackersChar Sample, Jennifer Cowley, Steve Hutchinson. 305-314 [doi]
- Data fidelity: Security's soft underbellyChar Sample, Tim Watson, Steve Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple. 315-320 [doi]
- System design considerations for risk perceptionAndrew M'manga, Shamal Faily, John McAlaney, Christopher Williams. 322-327 [doi]
- Are you ready? Towards the engineering of forensic-ready systemsGeorge Grispos, Jesús Garcia-Galán, Liliana Pasquale, Bashar Nuseibeh. 328-333 [doi]
- Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritageAlaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin, Sanaz Fallahkhair. 334-339 [doi]
- Extending and validating gestUI using technical action researchOtto Parra, Sergio España, José Ignacio Panach. 341-352 [doi]
- The PDA-LPA design space for user interface adaptationSara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt. 353-364 [doi]
- Visual behaviour in searching information: A preliminary eye tracking studyMohammad Alsaffar, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan. 365-370 [doi]
- Community detection in dynamic graphs with missing edgesOualid Benyahia, Christine Largeron, Baptiste Jeudy. 372-381 [doi]
- IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case studyChiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici. 382-390 [doi]
- Integration of a multidimensional schema from different social media to analyze customers'opinionsImen Moalla, Ahlem Nabli, Mohamed Hammami. 391-400 [doi]
- Cyber security risk management for health-based critical infrastructuresMyrsini Athinaiou. 402-407 [doi]
- Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese usersMohammad Alsaffar. 408-413 [doi]
- Supporting the consistency in multi-perspective Business Process Modeling: A mapping approachAfef Awadid. 414-419 [doi]
- A DSPL approach for the development of context-adaptable user interfacesThouraya Sboui. 421-426 [doi]
- A framework managing conflicts between security and privacy requirementsDuaa Alkubaisy. 427-432 [doi]
- Supporting modelers with model qualities and patternsFabrice Boissier. 440-445 [doi]
- Security threat classification for outsourced IT projectsMoneef Almutairi, Stephen Riddle. 447-448 [doi]
- A requirements driven approach to data warehouse consolidationDeepika Prakash, Naveen Prakash. 449-450 [doi]
- GeIS based on Conceptual Models for the risk assessment of NeuroblastomaVerônica Burriel, José F. Reyes R., Ana Heredia Casanoves, Carlos Iñiguez-Jarrin, Ana León. 451-452 [doi]
- Generating data sets as inputs of reference for cyber security issues and industrial control systemsThomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste, Yvon Kermarrec, Pedro Merino Laso. 453-454 [doi]
- Multi-level clustering for extracting process-related information from email logsDiana Jlailaty, Daniela Grigori, Khalid Belhajjame. 455-456 [doi]
- Demonstrating Named Data Networking integration into DataTweet IoT ArchitectureSoumya Kanti Datta, Christian Bonnet. 457-458 [doi]
- Two-step RDF query processing for Linked DataYongju Lee, Changsu Kim. 459-460 [doi]
- Visual Privacy Management in User Centric Open EnvironmentsVasiliki Diamantopoulou, Michalis Pavlidis. 461-462 [doi]
- Software CROWD-sourcingNitin Naik. 463-464 [doi]