


default search action
11th RCIS 2017: Brighton, UK
- Saïd Assar, Oscar Pastor, Haralambos Mouratidis:

11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017. IEEE 2017, ISBN 978-1-5090-5476-3
Keynotes
- Bashar Nuseibeh:

Adaptive information security and privacy. 17 - Edgar R. Weippl:

Research methods and examples of empirical research in information security. 18 - Monique Snoeck:

Conceptual modelling: How to do it right? 19
Session 1: Business Process Management
- Grace Park, Lawrence Chung, Latifur Khan

, Sooyong Park:
A modeling framework for business process reengineering using big data analytics and a goal-orientation. 21-32 - Ornela Cela, Agnès Front, Dominique Rieu:

CEFOP: A method for the Continual Evolution of Organisational Processes. 33-43 - Yosra Lassoued, Selmin Nurcan:

Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach. 44-55
Session 2: Compliance and Regulation
- Okhaide Akhigbe

, Daniel Amyot
, John Mylopoulos, Gregory Richards
:
What can information systems do for regulators? A review of the state-of-practice in Canada. 57-65 - Priscila Engiel, Julio César Sampaio do Prado Leite

, John Mylopoulos:
A tool-supported compliance process for software systems. 66-76 - Guillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens:

A definition of Information Security Classification in cybersecurity context. 77-82
Session 3: Conceptual Modelling
- Cesar Gonzalez-Perez

, Patricia Martín-Rodilla
:
A metamodel and code generation approach for symmetric unary associations. 84-94 - Isabelle Mirbel:

From user goals to process-based service compositions: A flexible semantic-based approach. 95-102 - Duncan Ki-Aries, Shamal Faily, Huseyin Dogan

, Christopher Williams:
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. 103-108
Session 4: Fraud Detection and Management
- Stavros Kyriakopoulos, Theodoros Tzouramanis, Yannis Manolopoulos:

The dbMark: A benchmarking system for watermarking methods for relational databases. 110-119 - Antonia Nisioti, Mohammad Heydari, Alexios Mylonas

, Vasilios Katos, Vahid Heydari Fami Tafreshi
:
TRAWL: Protection against rogue sites for the masses. 120-127 - John K. C. Kingston:

Representing, reasoning and predicting fraud using fraud plans. 128-133
Session 5: Knowledge Discovery and Data
- Mohammad Ghufran, Nacéra Bennacer, Gianluca Quercini:

Wikipedia-based extraction of key information from resumes. 135-145 - Sara Samir, Amany M. Sarhan

, Alsayed Algergawy:
Context-based web service discovery framework with QoS considerations. 146-155 - Alexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart:

Traffic flow measurement of a public transport system through automated Web observation. 156-161
Session 6: Privacy
- Nitin Naik, Paul Jenkins

:
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. 163-174 - Veerle Jessen, Hans Weigand

:
Privacy proof in the cloud. 175-186 - Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis

:
Supporting the design of privacy-aware business processes via privacy process patterns. 187-198
Session 7: Recommendation Systems
- Modhi Al Alshaikh, Gulden Uchyigit, Roger Evans:

A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modelling. 200-210 - Dimitris Paraschakis:

Towards an ethical recommendation framework. 211-220 - Hong Diep Tran, Guillaume Cabanac

, Gilles Hubert
:
Expert suggestion for conference program committees. 221-232
Session 8: Requirements Engineering
- Azzam Maraee, Arnon Sturm

:
Formal semantics and analysis tasks for ME-MAP models. 234-243 - Fatemeh Movahedian, Agnès Front, Dominique Rieu, Armelle Farastier, Christelle Grandvallet, Franck Pourroy, Guy Prudhomme:

A participative method for knowledge elicitation in collaborative innovation projects. 244-254 - Luca Piras

, Elda Paja
, Paolo Giorgini
, John Mylopoulos, Roberta Cuel
, Diego Ponte:
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. 255-265
Session 9: Semantics and Ontology
- Slavko Zitnik, Marko Bajec, Dejan Lavbic

:
LogMap+: Relational data enrichment and linked data resources matching. 267-275 - Essayeh Aroua, Mourad Abed

:
An ontology-based framework for enhancing personalized content and retrieval information. 276-285 - Hermann Kaindl

, Ralph Hoch, Roman Popp
:
Semantic task specification in business process context. 286-291
Session 10: Security
- Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos:

Evaluation of MUSER, a holistic security requirements analysis framework. 293-304 - Char Sample, Jennifer Cowley, Steve E. Hutchinson:

Cultural exploration of attack vector preferences for self-identified attackers. 305-314 - Char Sample, Tim Watson, Steve E. Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple:

Data fidelity: Security's soft underbelly. 315-320
Session 11: System Design
- Andrew M'manga

, Shamal Faily, John McAlaney
, Christopher Williams:
System design considerations for risk perception. 322-327 - George Grispos

, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh
:
Are you ready? Towards the engineering of forensic-ready systems. 328-333 - Alaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin

, Sanaz Fallahkhair:
Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritage. 334-339
Session 12: Human-Computer Interaction
- Otto Parra

, Sergio España
, José Ignacio Panach
:
Extending and validating gestUI using technical action research. 341-352 - Sara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt:

The PDA-LPA design space for user interface adaptation. 353-364 - Mohammad Salih Alsaffar

, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan
:
Visual behaviour in searching information: A preliminary eye tracking study. 365-370
Session 13: Social Media and Network Analysis
- Oualid Benyahia, Christine Largeron, Baptiste Jeudy:

Community detection in dynamic graphs with missing edges. 372-381 - Chiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici

:
IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case study. 382-390 - Imen Moalla, Ahlem Nabli, Mohamed Hammami

:
Integration of a multidimensional schema from different social media to analyze customers'opinions. 391-400
Doctoral Consortium - 1
- Myrsini Athinaiou:

Cyber security risk management for health-based critical infrastructures. 402-407 - Mohammad Alsaffar:

Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese users. 408-413 - Afef Awadid:

Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach. 414-419
Doctoral Consortium - 2
- Thouraya Sboui:

A DSPL approach for the development of context-adaptable user interfaces. 421-426 - Duaa Alkubaisy

:
A framework managing conflicts between security and privacy requirements. 427-432 - Fabrice Boissier

:
Supporting modelers with model qualities and patterns. 440-445
Posters and Demos Session
- Moneef Almutairi, Stephen Riddle

:
Security threat classification for outsourced IT projects. 447-448 - Deepika Prakash

, Naveen Prakash
:
A requirements driven approach to data warehouse consolidation. 449-450 - Verónica Burriel, José Fabián Reyes Román, Ana Heredia Casanoves, Carlos Iñiguez-Jarrín, Ana León:

GeIS based on Conceptual Models for the risk assessment of Neuroblastoma. 451-452 - Thomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste

, Yvon Kermarrec, Pedro Merino Laso
:
Generating data sets as inputs of reference for cyber security issues and industrial control systems. 453-454 - Diana Jlailaty, Daniela Grigori, Khalid Belhajjame:

Multi-level clustering for extracting process-related information from email logs. 455-456 - Soumya Kanti Datta, Christian Bonnet

:
Demonstrating Named Data Networking integration into DataTweet IoT Architecture. 457-458 - Yongju Lee, Changsu Kim:

Two-step RDF query processing for Linked Data. 459-460 - Vasiliki Diamantopoulou, Michalis Pavlidis

:
Visual Privacy Management in User Centric Open Environments. 461-462 - Nitin Naik:

Software CROWD-sourcing. 463-464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














