Zobrazeno 1 - 10
of 101
pro vyhledávání: '"Wieringa, R.J."'
Autor:
Kegel, R.H.P., van Sinderen, M., Wieringa, R.J., Iyengar, Sriram, Tikka, Piiastiina, van Gemert-Pijnen, Lisette, Oinas-Kukkonen, Harri
Publikováno v:
Behavior Change Support Systems, BCSS 2019: Proceedings of the Seventh International Workshop on Behavior Change Support Systems
Behavior Change Support Systems, BCSS 2019
Behavior Change Support Systems, BCSS 2019
Computer Literacy is an important predictor for how proficient a person is in its interaction with computers, which can determine whether a person is motivated and able to use specific software. Measuring Computer Literacy or its constituent elements
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::a8846d569268b2c0fc8200452e88c77a
https://research.utwente.nl/en/publications/6b61454b-6823-4470-9db0-a11d49981716
https://research.utwente.nl/en/publications/6b61454b-6823-4470-9db0-a11d49981716
Publikováno v:
21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015, 1-16
STARTPAGE=1;ENDPAGE=16;TITLE=21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015
Requirements Engineering: Foundation for Software Quality ISBN: 9783319161006
REFSQ
Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings), 1-16
STARTPAGE=1;ENDPAGE=16;TITLE=Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings)
STARTPAGE=1;ENDPAGE=16;TITLE=21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015
Requirements Engineering: Foundation for Software Quality ISBN: 9783319161006
REFSQ
Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings), 1-16
STARTPAGE=1;ENDPAGE=16;TITLE=Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings)
[Context and motivation] It is desirable that requirement engineering methods are reliable, that is, that methods can be repeated with the same results. Risk assessments methods, however, often have low reliability when they identify risk mitigations
Autor:
Ionita, Dan, Gordijn, J., Yesuf, Ahmed S., Wieringa, R.J., Horkoff, Jennifer, Jeusfeld, Manfred A., Persson, Anne
Publikováno v:
to appear in Proc. 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8-10 November, 2016, Skövde, Sweden, 267
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::a7d2d60ddabf82ec0c13cb3deb848278
https://research.vu.nl/en/publications/8caeaf95-c9ab-4135-8ec6-da48ffeaf5ed
https://research.vu.nl/en/publications/8caeaf95-c9ab-4135-8ec6-da48ffeaf5ed
Publikováno v:
Advances in Safety, Reliability and Risk Management, 2653-2661
STARTPAGE=2653;ENDPAGE=2661;TITLE=Advances in Safety, Reliability and Risk Management
Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011), 2653-2661
STARTPAGE=2653;ENDPAGE=2661;TITLE=Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011)
STARTPAGE=2653;ENDPAGE=2661;TITLE=Advances in Safety, Reliability and Risk Management
Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011), 2653-2661
STARTPAGE=2653;ENDPAGE=2661;TITLE=Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011)
Crisis organisations, such as fire services, disaster relief and emergency medical care, nowa- days depend on telecommunications services in an unprecedented manner. Unavailability of these services during a crisis may cost lives. In order not to be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0fd75d96791d021e119f8f8d9493c80a
https://research.utwente.nl/en/publications/how-to-assess-telecom-service-availability-risks-for-crisis-organisations(0f44be98-ff07-448e-a372-a83ac6bea6c6).html
https://research.utwente.nl/en/publications/how-to-assess-telecom-service-availability-risks-for-crisis-organisations(0f44be98-ff07-448e-a372-a83ac6bea6c6).html
Publikováno v:
Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011
Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011), 1-5
STARTPAGE=1;ENDPAGE=5;TITLE=Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011)
Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011), 1-5
STARTPAGE=1;ENDPAGE=5;TITLE=Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011)
Protection of society against natural and man-made disasters is high on the societal and political agenda. Effective crisis management is more important than ever. Nowadays, crisis organisations depend crucially on reliable telecom services, and unex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3452a02f9177891535afda4e6479aad4
https://research.utwente.nl/en/publications/418a323e-c091-4fdb-b426-9cfd26be97b1
https://research.utwente.nl/en/publications/418a323e-c091-4fdb-b426-9cfd26be97b1
Publikováno v:
Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011), 155-162
STARTPAGE=155;ENDPAGE=162;TITLE=Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011)
STARTPAGE=155;ENDPAGE=162;TITLE=Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011)
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment pla
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3012b29d0cda55221709cac309c5ef4d
https://research.tue.nl/nl/publications/2b80ce58-7b2d-4c51-92dc-71e2bbf58b5c
https://research.tue.nl/nl/publications/2b80ce58-7b2d-4c51-92dc-71e2bbf58b5c
Publikováno v:
Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010), 322-325
STARTPAGE=322;ENDPAGE=325;TITLE=Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010)
STARTPAGE=322;ENDPAGE=325;TITLE=Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010)
The leakage of confidential information (e.g. industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confiden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f37ff90320a6adae47e173488939cbd9
https://research.tue.nl/nl/publications/68cdd03b-102d-48f6-90ce-4e57c2112f05
https://research.tue.nl/nl/publications/68cdd03b-102d-48f6-90ce-4e57c2112f05
An IT risk assessment must deliver the best possible quality of results in a time-effective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements. In this paper we p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::9429aaaca2d6a210748f7e42613c5c5a
https://research.tue.nl/nl/publications/d0794d1f-1635-4b15-ae6f-f664a2cb1990
https://research.tue.nl/nl/publications/d0794d1f-1635-4b15-ae6f-f664a2cb1990
Publikováno v:
TAPSOFT '91 ISBN: 9783540539810
TAPSOFT, Vol.2
TAPSOFT '91: Proceedings of the International Joint Conference on Theory and Practice of Software Development Brighton, UK, April 8–12, 1991, 337-357
STARTPAGE=337;ENDPAGE=357;TITLE=TAPSOFT '91
TAPSOFT, Vol.2
TAPSOFT '91: Proceedings of the International Joint Conference on Theory and Practice of Software Development Brighton, UK, April 8–12, 1991, 337-357
STARTPAGE=337;ENDPAGE=357;TITLE=TAPSOFT '91
In this paper, we extend dynamic logic with the concept of an actor in order to be able to specify who takes the initiative of an action, who makes a choice, or who controls a synchronization of actions. We give two examples of application of this id