RCIS B

58 papers

YearTitle / Authors
201711th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017
Saïd Assar, Oscar Pastor, Haralambos Mouratidis
2017A DSPL approach for the development of context-adaptable user interfaces.
Thouraya Sboui
2017A definition of Information Security Classification in cybersecurity context.
Guillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens
2017A framework managing conflicts between security and privacy requirements.
Duaa Alkubaisy
2017A metamodel and code generation approach for symmetric unary associations.
Cesar Gonzalez-Perez, Patricia Martín-Rodilla
2017A modeling framework for business process reengineering using big data analytics and a goal-orientation.
Grace Park, Lawrence Chung, Latifur Khan, Sooyong Park
2017A participative method for knowledge elicitation in collaborative innovation projects.
Fatemeh Movahedian, Agnès Front, Dominique Rieu, Armelle Farastier, Christelle Grandvallet, Franck Pourroy, Guy Prudhomme
2017A requirements driven approach to data warehouse consolidation.
Deepika Prakash, Naveen Prakash
2017A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modelling.
Modhi Al Alshaikh, Gulden Uchyigit, Roger Evans
2017A tool-supported compliance process for software systems.
Priscila Engiel, Julio César Sampaio do Prado Leite, John Mylopoulos
2017Adaptive information security and privacy.
Bashar Nuseibeh
2017An ontology-based framework for enhancing personalized content and retrieval information.
Essayeh Aroua, Mourad Abed
2017Are you ready? Towards the engineering of forensic-ready systems.
George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh
2017CEFOP: A method for the Continual Evolution of Organisational Processes.
Ornela Cela, Agnès Front, Dominique Rieu
2017Community detection in dynamic graphs with missing edges.
Oualid Benyahia, Christine Largeron, Baptiste Jeudy
2017Conceptual modelling: How to do it right?
Monique Snoeck
2017Context-based web service discovery framework with QoS considerations.
Sara Samir, Amany M. Sarhan, Alsayed Algergawy
2017Cultural exploration of attack vector preferences for self-identified attackers.
Char Sample, Jennifer Cowley, Steve E. Hutchinson
2017Cyber security risk management for health-based critical infrastructures.
Myrsini Athinaiou
2017Data fidelity: Security's soft underbelly.
Char Sample, Tim Watson, Steve E. Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple
2017Demonstrating Named Data Networking integration into DataTweet IoT Architecture.
Soumya Kanti Datta, Christian Bonnet
2017Evaluation of MUSER, a holistic security requirements analysis framework.
Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos
2017Expert suggestion for conference program committees.
Hong Diep Tran, Guillaume Cabanac, Gilles Hubert
2017Extending and validating gestUI using technical action research.
Otto Parra, Sergio España, José Ignacio Panach
2017Formal semantics and analysis tasks for ME-MAP models.
Azzam Maraee, Arnon Sturm
2017From user goals to process-based service compositions: A flexible semantic-based approach.
Isabelle Mirbel
2017Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques.
Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, Diego Ponte
2017GeIS based on Conceptual Models for the risk assessment of Neuroblastoma.
Verónica Burriel, José Fabián Reyes Román, Ana Heredia Casanoves, Carlos Iñiguez-Jarrín, Ana León
2017Generating data sets as inputs of reference for cyber security issues and industrial control systems.
Thomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste, Yvon Kermarrec, Pedro Merino Laso
2017Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritage.
Alaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin, Sanaz Fallahkhair
2017IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case study.
Chiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici
2017Integration of a multidimensional schema from different social media to analyze customers'opinions.
Imen Moalla, Ahlem Nabli, Mohamed Hammami
2017LogMap+: Relational data enrichment and linked data resources matching.
Slavko Zitnik, Marko Bajec, Dejan Lavbic
2017Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach.
Yosra Lassoued, Selmin Nurcan
2017Multi-level clustering for extracting process-related information from email logs.
Diana Jlailaty, Daniela Grigori, Khalid Belhajjame
2017Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese users.
Mohammad Alsaffar
2017Privacy proof in the cloud.
Veerle Jessen, Hans Weigand
2017Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network.
Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams
2017Representing, reasoning and predicting fraud using fraud plans.
John K. C. Kingston
2017Research methods and examples of empirical research in information security.
Edgar R. Weippl
2017Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect.
Nitin Naik, Paul Jenkins
2017Security threat classification for outsourced IT projects.
Moneef Almutairi, Stephen Riddle
2017Semantic task specification in business process context.
Hermann Kaindl, Ralph Hoch, Roman Popp
2017Software CROWD-sourcing.
Nitin Naik
2017Supporting modelers with model qualities and patterns.
Fabrice Boissier
2017Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach.
Afef Awadid
2017Supporting the design of privacy-aware business processes via privacy process patterns.
Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis
2017System design considerations for risk perception.
Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams
2017TRAWL: Protection against rogue sites for the masses.
Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi
2017The PDA-LPA design space for user interface adaptation.
Sara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt
2017The dbMark: A benchmarking system for watermarking methods for relational databases.
Stavros Kyriakopoulos, Theodoros Tzouramanis, Yannis Manolopoulos
2017Towards an ethical recommendation framework.
Dimitris Paraschakis
2017Traffic flow measurement of a public transport system through automated Web observation.
Alexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart
2017Two-step RDF query processing for Linked Data.
Yongju Lee, Changsu Kim
2017Visual Privacy Management in User Centric Open Environments.
Vasiliki Diamantopoulou, Michalis Pavlidis
2017Visual behaviour in searching information: A preliminary eye tracking study.
Mohammad Salih Alsaffar, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan
2017What can information systems do for regulators? A review of the state-of-practice in Canada.
Okhaide Akhigbe, Daniel Amyot, John Mylopoulos, Gregory Richards
2017Wikipedia-based extraction of key information from resumes.
Mohammad Ghufran, Nacéra Bennacer, Gianluca Quercini