Author of the publication

Problem-based requirements interaction analysis

, , , and . International Working Conference on Requirements Engineering: Foundation for Software Quality, page 200--215. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Problem-Based Consideration of Privacy-Relevant Domain Knowledge.. Privacy and Identity Management, volume 421 of IFIP Advances in Information and Communication Technology, page 150-164. Springer, (2013)Problem-based privacy analysis (ProPAn) - a computer-aided privacy requirements engineering method.. University of Duisburg-Essen, Germany, (2018)Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard., , , , , and . ENASE (Selected Papers), volume 1023 of Communications in Computer and Information Science, page 71-97. Springer, (2018)At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure., , and . PST, page 1-10. IEEE Computer Society, (2018)Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites., , and . UMAP (Adjunct Publication), page 117-125. ACM, (2019)Problem-based requirements interaction analysis, , , and . International Working Conference on Requirements Engineering: Foundation for Software Quality, page 200--215. Springer, (2014)