Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences with goal-oriented modeling of organizational change., and . IEEE Trans. Syst. Man Cybern. Syst., 36 (2): 221-235 (2006)Goal Modelling in Requirements Engineering: Analysis and Critique of Current Methods, and . (2005)PriS Methodology: Incorporating Privacy Requirements into the System Design Process, , and . 5th IEEE International Symposium on Signal Processing and Information Technology, page 18--21. (2005)Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering., , and . MCIS, page 71. Athens University of Economics and Business / AISeL, (2009)Capability Oriented Enterprise Knowledge Modeling: The CODEK Approach., and . Domain-Specific Conceptual Modeling, Springer, (2016)Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 66-71. Springer, (2004)Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process., , and . ARES, page 1009-1017. IEEE Computer Society, (2007)Towards a technology acceptance methodology for Industry 4.0., , and . CENTERIS/ProjMAN/HCist, page 832-839. Elsevier, (2022)WiP: An Architecture for Disruption Management in Smart Manufacturing., , , , and . SMARTCOMP, page 279-281. IEEE Computer Society, (2018)Applying Soft Computing Technologies for Implementing Privacy-Aware Systems., , , and . CAiSE Workshops, volume 112 of Lecture Notes in Business Information Processing, page 31-45. Springer, (2012)