Author of the publication

Incorporating privacy requirements into the system design process: The PriS conceptual framework.

, , , and . Internet Res., 16 (2): 140-158 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Goal Modeling in Requirements Engineering: Analysis and Critique of Current Methods, and . Information Modeling Methods and Methodologies, Idea Group, (2005)Applying Soft Computing Technologies for Implementing Privacy-Aware Systems., , , and . CAiSE Workshops, volume 112 of Lecture Notes in Business Information Processing, page 31-45. Springer, (2012)Requirements Engineering for Cyber Physical Production Systems: The e-CORE approach and its application., , and . Inf. Syst., (2022)Requirements Engineering for Cyber Physical Production Systems., , and . CAiSE, volume 11483 of Lecture Notes in Computer Science, page 276-291. Springer, (2019)Intelligent Parking Management by Means of Capability Oriented Requirements Engineering., , , , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 158-172. Springer, (2019)Towards a Methodology for Evaluating Big Data Platforms., , and . SERVICES, page 380-381. IEEE, (2019)Mobile Augmented Reality edutainment applications for cultural institutions., , , and . IISA, page 1-4. IEEE, (2013)Wireless communications in Olympic Games: R&I into the frame of the updated gatekeeping model., , , and . WTS, page 1-5. IEEE, (2011)Cloud Forensics Solutions: A Review., , , and . CAiSE Workshops, volume 178 of Lecture Notes in Business Information Processing, page 299-309. Springer, (2014)Using Scenarios to Systematically Support Goal-Directed Elaboration for Information System Requirements., , and . ECBS, page 308-314. IEEE Computer Society, (1996)