Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

A data-driven, goal-oriented framework for process-focused enterprise re-engineering., , , and . Inf. Syst. E Bus. Manag., 19 (2): 683-747 (2021)A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)Modeling Design Patterns with Description Logics: A Case Study., , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)Consent verification monitoring., , , and . CoRR, (2022)Security Requirements Engineering for Secure Business Processes., , , and . BIR Workshops, volume 106 of Lecture Notes in Business Information Processing, page 77-89. Springer, (2011)Analyzing Attack Strategies Through Anti-goal Refinement., , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 75-90. Springer, (2015)"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark., , , and . CoRR, (2020)#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;: Understanding Privacy Concerns, Trust and Adoption in Mobile COVID-19 Tracing Across Four Countries., , , , and . Proc. ACM Hum. Comput. Interact., 6 (MHCI): 1-27 (2022)A Mixed-method Study on Security and Privacy Practices in Danish Companies., , , , and . CoRR, (2021)Sociotechnical Trust: An Architectural Approach., , and . ER, volume 6998 of Lecture Notes in Computer Science, page 104-117. Springer, (2011)