


Остановите войну!
for scientists:
Elda Paja
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Sandra Geisler
, Maria-Esther Vidal, Cinzia Cappiello
, Bernadette Farias Lóscio, Avigdor Gal, Matthias Jarke, Maurizio Lenzerini, Paolo Missier, Boris Otto
, Elda Paja, Barbara Pernici
, Jakob Rehof:
Knowledge-Driven Data Ecosystems Toward Data Transparency. ACM J. Data Inf. Qual. 14(1): 3:1-3:12 (2022) - [i4]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent verification monitoring. CoRR abs/2206.06406 (2022) - 2021
- [j6]Thai-Minh Truong, Lam-Son Lê
, Elda Paja, Paolo Giorgini
:
A data-driven, goal-oriented framework for process-focused enterprise re-engineering. Inf. Syst. E Bus. Manag. 19(2): 683-747 (2021) - [e1]Fatma Basak Aydemir, Catarina Gralha, Maya Daneva, Eduard C. Groen, Andrea Herrmann, Patrick Mennig, Sallam Abualhaija, Alessio Ferrari, Jin Guo, Renata S. S. Guizzardi, Jennifer Horkoff, Anna Perini, Angelo Susi, Travis Breaux, Xavier Franch, Neil A. Ernst, Elda Paja, Norbert Seyff:
Joint Proceedings of REFSQ 2021 Workshops, OpenRE, Poster and Tools Track, and Doctoral Symposium co-located with the 27th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2021), Essen, Germany, April 12, 2021. CEUR Workshop Proceedings 2857, CEUR-WS.org 2021 [contents] - [i3]Asmita Dalela, Saverio Giallorenzo, Oksana Kulyk, Jacopo Mauro, Elda Paja:
A Mixed-method Study on Security and Privacy Practices in Danish Companies. CoRR abs/2104.04030 (2021) - [i2]Sandra Geisler, Maria-Esther Vidal, Cinzia Cappiello, Bernadette Farias Lóscio, Avigdor Gal, Matthias Jarke, Maurizio Lenzerini, Paolo Missier, Boris Otto, Elda Paja, Barbara Pernici, Jakob Rehof:
Knowledge-driven Data Ecosystems Towards Data Transparency. CoRR abs/2105.09312 (2021) - 2020
- [p4]Mohamad Gharib
, Paolo Giorgini
, Mattia Salnitri, Elda Paja, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz:
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. Visual Privacy Management 2020: 22-53 - [i1]Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja:
"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark. CoRR abs/2007.05259 (2020)
2010 – 2019
- 2019
- [j5]Jennifer Horkoff
, Fatma Basak Aydemir
, Evellin Cardoso, Tong Li, Alejandro Maté
, Elda Paja
, Mattia Salnitri, Luca Piras
, John Mylopoulos, Paolo Giorgini
:
Goal-oriented requirements engineering: an extended systematic mapping study. Requir. Eng. 24(2): 133-160 (2019) - [c30]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini
:
Consent Verification Under Evolving Privacy Policies. RE 2019: 422-427 - 2018
- [c29]Marco Robol, Elda Paja, Mattia Salnitri, Paolo Giorgini
:
Modeling and Reasoning About Privacy-Consent Requirements. PoEM 2018: 238-254 - [c28]Elda Paja, Mauro Poggianella, Fatma Basak Aydemir, Paolo Giorgini:
PACAS: A Gamified Platform for Participatory Change Management in ATM Systems. REFSQ Workshops 2018 - 2017
- [c27]Luca Piras
, Elda Paja
, Paolo Giorgini
, John Mylopoulos:
Goal Models for Acceptance Requirements Analysis and Gamification Design. ER 2017: 223-230 - [c26]Salimeh Dashti, Paolo Giorgini
, Elda Paja
:
Information Security Risk Management. PoEM 2017: 18-33 - [c25]Luca Piras
, Elda Paja
, Paolo Giorgini
, John Mylopoulos, Roberta Cuel
, Diego Ponte:
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. RCIS 2017: 255-265 - 2016
- [c24]Elda Paja
, Alejandro Maté
, Carson C. Woo, John Mylopoulos:
Can Goal Reasoning Techniques Be Used for Strategic Decision-Making? ER 2016: 530-543 - [c23]Tong Li, Elda Paja
, John Mylopoulos, Jennifer Horkoff
, Kristian Beckers:
Security attack analysis using attack patterns. RCIS 2016: 1-13 - [c22]Jennifer Horkoff
, Fatma Basak Aydemir
, Evellin Cardoso, Tong Li, Alejandro Maté
, Elda Paja
, Mattia Salnitri, John Mylopoulos, Paolo Giorgini
:
Goal-Oriented Requirements Engineering: A Systematic Literature Map. RE 2016: 106-115 - [c21]Mattia Salnitri, Elda Paja, Paolo Giorgini:
Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution. RE Workshops 2016: 155-164 - [c20]Mohamad Gharib
, Mattia Salnitri, Elda Paja
, Paolo Giorgini
, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz, Sandra Fernandez, Andrea Della Siria:
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform. RE 2016: 256-265 - 2015
- [j4]Elda Paja
, Fabiano Dalpiaz, Paolo Giorgini
:
Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98: 123-143 (2015) - [c19]Elda Paja, Jennifer Horkoff, John Mylopoulos:
The Importance of Teaching Goal-Oriented Analysis Techniques: an Experience Report. iStarT@CAiSE 2015: 37-42 - [c18]Mattia Salnitri, Elda Paja, Mauro Poggianella, Paolo Giorgini:
STS-Tool 3.0: Maintaining Security in Socio-Technical Systems. CAiSE Forum 2015: 205-212 - [c17]Elda Paja
, Jennifer Horkoff
, John Mylopoulos:
The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report. ER Workshops 2015: 347-357 - [c16]Tong Li, Jennifer Horkoff
, Elda Paja
, Kristian Beckers, John Mylopoulos:
Analyzing Attack Strategies Through Anti-goal Refinement. PoEM 2015: 75-90 - [c15]Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, John Mylopoulos:
A Holistic Approach to Attack Modeling and Analysis. iStar 2015: 49-54 - [c14]Tong Li, Elda Paja
, John Mylopoulos, Jennifer Horkoff
, Kristian Beckers:
Holistic security requirements analysis: An attacker's perspective. RE 2015: 282-283 - 2014
- [j3]Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini:
Threat Analysis in Goal-Oriented Security Requirements Modelling. Int. J. Secur. Softw. Eng. 5(2): 1-19 (2014) - [c13]Mattia Salnitri, Elda Paja
, Paolo Giorgini
:
Preserving Compliance with Security Requirements in Socio-Technical Systems. CSP Forum 2014: 49-61 - [p3]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini
:
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. Secure and Trustworthy Service Composition 2014: 63-78 - [p2]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini
:
STS-Tool: Security Requirements Engineering for Socio-Technical Systems. Engineering Secure Future Internet Services and Systems 2014: 65-96 - [p1]Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini
:
Security Requirements Engineering with STS-Tool. Secure and Trustworthy Service Composition 2014: 95-109 - 2013
- [j2]Elda Paja
, Amit K. Chopra, Paolo Giorgini
:
Trust-based specification of sociotechnical systems. Data Knowl. Eng. 87: 339-353 (2013) - [c12]Elda Paja
, Fabiano Dalpiaz, Paolo Giorgini
:
Managing Security Requirements Conflicts in Socio-Technical Systems. ER 2013: 270-283 - [c11]Elda Paja
, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini
:
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool. ER 2013: 504-507 - [c10]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Designing Secure Socio-Technical Systems with STS-ml. iStar 2013: 79-84 - [c9]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements. iStar 2013: 131-133 - 2012
- [j1]Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi:
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study. Int. J. Secur. Softw. Eng. 3(1): 1-19 (2012) - [c8]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
Modelling Security Requirements in Socio-Technical Systems with STS-Tool. CAiSE Forum 2012: 155-162 - [c7]Elda Paja
, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini
:
STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements. ER Workshops 2012: 396-399 - [c6]Elda Paja
, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini
:
STS-tool: Socio-technical Security Requirements through social commitments. RE 2012: 331-332 - 2011
- [c5]Elda Paja, Paolo Giorgini
, Stéphane Paul, Per Håkon Meland:
Security Requirements Engineering for Secure Business Processes. BIR Workshops 2011: 77-89 - [c4]Yudistira Asnar, Elda Paja
, John Mylopoulos:
Modeling Design Patterns with Description Logics: A Case Study. CAiSE 2011: 169-183 - [c3]Amit K. Chopra, Elda Paja
, Paolo Giorgini
:
Sociotechnical Trust: An Architectural Approach. ER 2011: 104-117 - [c2]Fabiano Dalpiaz, Elda Paja, Paolo Giorgini:
Security Requirements Engineering for Service-Oriented Applications. iStar 2011: 102-107 - [c1]Fabiano Dalpiaz, Elda Paja
, Paolo Giorgini
:
Security requirements engineering via commitments. STAST 2011: 1-8
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-22 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint