| 2017 | 11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017 Saïd Assar, Oscar Pastor, Haralambos Mouratidis |
| 2017 | A DSPL approach for the development of context-adaptable user interfaces. Thouraya Sboui |
| 2017 | A definition of Information Security Classification in cybersecurity context. Guillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens |
| 2017 | A framework managing conflicts between security and privacy requirements. Duaa Alkubaisy |
| 2017 | A metamodel and code generation approach for symmetric unary associations. Cesar Gonzalez-Perez, Patricia Martín-Rodilla |
| 2017 | A modeling framework for business process reengineering using big data analytics and a goal-orientation. Grace Park, Lawrence Chung, Latifur Khan, Sooyong Park |
| 2017 | A participative method for knowledge elicitation in collaborative innovation projects. Fatemeh Movahedian, Agnès Front, Dominique Rieu, Armelle Farastier, Christelle Grandvallet, Franck Pourroy, Guy Prudhomme |
| 2017 | A requirements driven approach to data warehouse consolidation. Deepika Prakash, Naveen Prakash |
| 2017 | A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modelling. Modhi Al Alshaikh, Gulden Uchyigit, Roger Evans |
| 2017 | A tool-supported compliance process for software systems. Priscila Engiel, Julio César Sampaio do Prado Leite, John Mylopoulos |
| 2017 | Adaptive information security and privacy. Bashar Nuseibeh |
| 2017 | An ontology-based framework for enhancing personalized content and retrieval information. Essayeh Aroua, Mourad Abed |
| 2017 | Are you ready? Towards the engineering of forensic-ready systems. George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh |
| 2017 | CEFOP: A method for the Continual Evolution of Organisational Processes. Ornela Cela, Agnès Front, Dominique Rieu |
| 2017 | Community detection in dynamic graphs with missing edges. Oualid Benyahia, Christine Largeron, Baptiste Jeudy |
| 2017 | Conceptual modelling: How to do it right? Monique Snoeck |
| 2017 | Context-based web service discovery framework with QoS considerations. Sara Samir, Amany M. Sarhan, Alsayed Algergawy |
| 2017 | Cultural exploration of attack vector preferences for self-identified attackers. Char Sample, Jennifer Cowley, Steve E. Hutchinson |
| 2017 | Cyber security risk management for health-based critical infrastructures. Myrsini Athinaiou |
| 2017 | Data fidelity: Security's soft underbelly. Char Sample, Tim Watson, Steve E. Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple |
| 2017 | Demonstrating Named Data Networking integration into DataTweet IoT Architecture. Soumya Kanti Datta, Christian Bonnet |
| 2017 | Evaluation of MUSER, a holistic security requirements analysis framework. Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos |
| 2017 | Expert suggestion for conference program committees. Hong Diep Tran, Guillaume Cabanac, Gilles Hubert |
| 2017 | Extending and validating gestUI using technical action research. Otto Parra, Sergio España, José Ignacio Panach |
| 2017 | Formal semantics and analysis tasks for ME-MAP models. Azzam Maraee, Arnon Sturm |
| 2017 | From user goals to process-based service compositions: A flexible semantic-based approach. Isabelle Mirbel |
| 2017 | Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, Diego Ponte |
| 2017 | GeIS based on Conceptual Models for the risk assessment of Neuroblastoma. Verónica Burriel, José Fabián Reyes Román, Ana Heredia Casanoves, Carlos Iñiguez-Jarrín, Ana León |
| 2017 | Generating data sets as inputs of reference for cyber security issues and industrial control systems. Thomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste, Yvon Kermarrec, Pedro Merino Laso |
| 2017 | Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritage. Alaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin, Sanaz Fallahkhair |
| 2017 | IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case study. Chiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici |
| 2017 | Integration of a multidimensional schema from different social media to analyze customers'opinions. Imen Moalla, Ahlem Nabli, Mohamed Hammami |
| 2017 | LogMap+: Relational data enrichment and linked data resources matching. Slavko Zitnik, Marko Bajec, Dejan Lavbic |
| 2017 | Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach. Yosra Lassoued, Selmin Nurcan |
| 2017 | Multi-level clustering for extracting process-related information from email logs. Diana Jlailaty, Daniela Grigori, Khalid Belhajjame |
| 2017 | Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese users. Mohammad Alsaffar |
| 2017 | Privacy proof in the cloud. Veerle Jessen, Hans Weigand |
| 2017 | Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams |
| 2017 | Representing, reasoning and predicting fraud using fraud plans. John K. C. Kingston |
| 2017 | Research methods and examples of empirical research in information security. Edgar R. Weippl |
| 2017 | Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. Nitin Naik, Paul Jenkins |
| 2017 | Security threat classification for outsourced IT projects. Moneef Almutairi, Stephen Riddle |
| 2017 | Semantic task specification in business process context. Hermann Kaindl, Ralph Hoch, Roman Popp |
| 2017 | Software CROWD-sourcing. Nitin Naik |
| 2017 | Supporting modelers with model qualities and patterns. Fabrice Boissier |
| 2017 | Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach. Afef Awadid |
| 2017 | Supporting the design of privacy-aware business processes via privacy process patterns. Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis |
| 2017 | System design considerations for risk perception. Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams |
| 2017 | TRAWL: Protection against rogue sites for the masses. Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi |
| 2017 | The PDA-LPA design space for user interface adaptation. Sara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt |
| 2017 | The dbMark: A benchmarking system for watermarking methods for relational databases. Stavros Kyriakopoulos, Theodoros Tzouramanis, Yannis Manolopoulos |
| 2017 | Towards an ethical recommendation framework. Dimitris Paraschakis |
| 2017 | Traffic flow measurement of a public transport system through automated Web observation. Alexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart |
| 2017 | Two-step RDF query processing for Linked Data. Yongju Lee, Changsu Kim |
| 2017 | Visual Privacy Management in User Centric Open Environments. Vasiliki Diamantopoulou, Michalis Pavlidis |
| 2017 | Visual behaviour in searching information: A preliminary eye tracking study. Mohammad Salih Alsaffar, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan |
| 2017 | What can information systems do for regulators? A review of the state-of-practice in Canada. Okhaide Akhigbe, Daniel Amyot, John Mylopoulos, Gregory Richards |
| 2017 | Wikipedia-based extraction of key information from resumes. Mohammad Ghufran, Nacéra Bennacer, Gianluca Quercini |