Author of the publication

Specification of Personal Data Protection Requirements - Analysis of Legal Requirements from the GDPR Regulation.

, , and . ICEIS (2), page 398-405. SciTePress, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Quality Measurement of BPMN Process Models., , and . ICCSA (5), volume 10964 of Lecture Notes in Computer Science, page 424-437. Springer, (2018)A Socio-Technical approach to address the Information security: Using the 27001 Manager Artefact., , and . CoRR, (2015)A Framework to Assess Information Security Quality of Service Based on a Communicative Action Way of Thinking., , , and . WorldCIST (1), volume 444 of Advances in Intelligent Systems and Computing, page 379-388. Springer, (2016)Data Protection Risk Modeling into Business Process Analysis., , and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 667-676. Springer, (2017)Using Activity Theory's Contradictions in the Context of DEMO Organization Control Model., , and . CBI (1), page 167-174. IEEE Computer Society, (2014)Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control - A Case Study on Remote Assistance Service., , and . ICEIS (3), page 303-310. SciTePress, (2014)Integrating the Scrum Framework and Lean Six Sigma., , and . ICCSA (5), volume 11623 of Lecture Notes in Computer Science, page 136-149. Springer, (2019)User Experience: A Case Study for Amphibious Operations., and . ICCSA (7), page 65-70. IEEE, (2019)A Problog Model for Analyzing Gene Regulatory Networks., , , and . ILP (Late Breaking Papers), volume 975 of CEUR Workshop Proceedings, page 38-43. CEUR-WS.org, (2012)Discovering Differentially Expressed Genes in Yeast Stress Data., , , and . CBMS, page 537-538. IEEE Computer Society, (2014)