default search action
Elda Paja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e2]Elda Paja, Jelena Zdravkovic, Evangelia Kavakli, Janis Stirna:
The Practice of Enterprise Modeling - 17th IFIP Working Conference, PoEM 2024, Stockholm, Sweden, December 3-5, 2024, Proceedings. Lecture Notes in Business Information Processing 538, Springer 2025, ISBN 978-3-031-77907-7 [contents] - 2024
- [j11]Daniel Russo, Sebastian Baltes, Niels van Berkel, Paris Avgeriou, Fabio Calefato, Beatriz Cabrero-Daniel, Gemma Catolino, Jürgen Cito, Neil A. Ernst, Thomas Fritz, Hideaki Hata, Reid Holmes, Maliheh Izadi, Foutse Khomh, Mikkel Baun Kjærgaard, Grischa Liebel, Alberto Lluch-Lafuente, Stefano Lambiase, Walid Maalej, Gail C. Murphy, Nils Brede Moe, Gabrielle O'Brien, Elda Paja, Mauro Pezzè, John Stouby Persson, Rafael Prikladnicki, Paul Ralph, Martin P. Robillard, Thiago Rocha Silva, Klaas-Jan Stol, Margaret-Anne D. Storey, Viktoria Stray, Paolo Tell, Christoph Treude, Bogdan Vasilescu:
Generative AI in Software Engineering Must Be Human-Centered: The Copenhagen Manifesto. J. Syst. Softw. 216: 112115 (2024) - 2023
- [j10]Meira Levy, Irit Hadar, Jennifer Horkoff, Jane Huffman Hayes, Barbara Paech, Alex Dekhtyar, Gunter Mussbacher, Elda Paja, Tong Li, Seok-Won Lee, Dongfeng Fang:
Philanthropic conference-based requirements engineering in time of pandemic and beyond. Requir. Eng. 28(2): 213-227 (2023) - [j9]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent Verification Monitoring. ACM Trans. Softw. Eng. Methodol. 32(1): 2:1-2:33 (2023) - [c31]Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja:
Towards a Basic Security Framework for SMEs - Results From an Investigation of Cybersecurity Challenges in Denmark. REW 2023: 230-233 - 2022
- [j8]Sandra Geisler, Maria-Esther Vidal, Cinzia Cappiello, Bernadette Farias Lóscio, Avigdor Gal, Matthias Jarke, Maurizio Lenzerini, Paolo Missier, Boris Otto, Elda Paja, Barbara Pernici, Jakob Rehof:
Knowledge-Driven Data Ecosystems Toward Data Transparency. ACM J. Data Inf. Qual. 14(1): 3:1-3:12 (2022) - [j7]Oksana Kulyk, Lauren Britton-Steele, Elda Paja, Melanie Duckert, Louise Barkhuus:
#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;: Understanding Privacy Concerns, Trust and Adoption in Mobile COVID-19 Tracing Across Four Countries. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-27 (2022) - [i4]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent verification monitoring. CoRR abs/2206.06406 (2022) - 2021
- [j6]Thai-Minh Truong, Lam-Son Lê, Elda Paja, Paolo Giorgini:
A data-driven, goal-oriented framework for process-focused enterprise re-engineering. Inf. Syst. E Bus. Manag. 19(2): 683-747 (2021) - [e1]Fatma Basak Aydemir, Catarina Gralha, Maya Daneva, Eduard C. Groen, Andrea Herrmann, Patrick Mennig, Sallam Abualhaija, Alessio Ferrari, Jin Guo, Renata S. S. Guizzardi, Jennifer Horkoff, Anna Perini, Angelo Susi, Travis D. Breaux, Xavier Franch, Neil A. Ernst, Elda Paja, Norbert Seyff:
Joint Proceedings of REFSQ 2021 Workshops, OpenRE, Poster and Tools Track, and Doctoral Symposium co-located with the 27th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2021), Essen, Germany, April 12, 2021. CEUR Workshop Proceedings 2857, CEUR-WS.org 2021 [contents] - [i3]Asmita Dalela, Saverio Giallorenzo, Oksana Kulyk, Jacopo Mauro, Elda Paja:
A Mixed-method Study on Security and Privacy Practices in Danish Companies. CoRR abs/2104.04030 (2021) - [i2]Sandra Geisler, Maria-Esther Vidal, Cinzia Cappiello, Bernadette Farias Lóscio, Avigdor Gal, Matthias Jarke, Maurizio Lenzerini, Paolo Missier, Boris Otto, Elda Paja, Barbara Pernici, Jakob Rehof:
Knowledge-driven Data Ecosystems Towards Data Transparency. CoRR abs/2105.09312 (2021) - 2020
- [p4]Mohamad Gharib, Paolo Giorgini, Mattia Salnitri, Elda Paja, Haralambos Mouratidis, Michalis Pavlidis, José Fran. Ruiz:
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. Visual Privacy Management 2020: 22-53 - [i1]Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja:
"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark. CoRR abs/2007.05259 (2020)
2010 – 2019
- 2019
- [j5]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, Luca Piras, John Mylopoulos, Paolo Giorgini:
Goal-oriented requirements engineering: an extended systematic mapping study. Requir. Eng. 24(2): 133-160 (2019) - [c30]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent Verification Under Evolving Privacy Policies. RE 2019: 422-427 - 2018
- [c29]Marco Robol, Elda Paja, Mattia Salnitri, Paolo Giorgini:
Modeling and Reasoning About Privacy-Consent Requirements. PoEM 2018: 238-254 - [c28]Elda Paja, Mauro Poggianella, Fatma Basak Aydemir, Paolo Giorgini:
PACAS: A Gamified Platform for Participatory Change Management in ATM Systems. REFSQ Workshops 2018 - 2017
- [c27]Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos:
Goal Models for Acceptance Requirements Analysis and Gamification Design. ER 2017: 223-230 - [c26]Salimeh Dashti, Paolo Giorgini, Elda Paja:
Information Security Risk Management. PoEM 2017: 18-33 - [c25]Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, Diego Ponte:
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. RCIS 2017: 255-265 - 2016
- [c24]Elda Paja, Alejandro Maté, Carson C. Woo, John Mylopoulos:
Can Goal Reasoning Techniques Be Used for Strategic Decision-Making? ER 2016: 530-543 - [c23]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Security attack analysis using attack patterns. RCIS 2016: 1-13 - [c22]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, John Mylopoulos, Paolo Giorgini:
Goal-Oriented Requirements Engineering: A Systematic Literature Map. RE 2016: 106-115 - [c21]Mattia Salnitri, Elda Paja, Paolo Giorgini:
Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution. RE Workshops 2016: 155-164 - [c20]Mohamad Gharib, Mattia Salnitri, Elda Paja, Paolo Giorgini, Haralambos Mouratidis, Michalis Pavlidis, José Fran. Ruiz, Sandra Fernandez, Andrea Della Siria:
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform. RE 2016: 256-265 - 2015
- [j4]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98: 123-143 (2015) - [c19]Elda Paja, Jennifer Horkoff, John Mylopoulos:
The Importance of Teaching Goal-Oriented Analysis Techniques: an Experience Report. iStarT@CAiSE 2015: 37-42 - [c18]Mattia Salnitri, Elda Paja, Mauro Poggianella, Paolo Giorgini:
STS-Tool 3.0: Maintaining Security in Socio-Technical Systems. CAiSE Forum 2015: 205-212 - [c17]Elda Paja, Jennifer Horkoff, John Mylopoulos:
The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report. ER Workshops 2015: 347-357 - [c16]Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, John Mylopoulos:
Analyzing Attack Strategies Through Anti-goal Refinement. PoEM 2015: 75-90 - [c15]Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, John Mylopoulos:
A Holistic Approach to Attack Modeling and Analysis. iStar 2015: 49-54 - [c14]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Holistic security requirements analysis: An attacker's perspective. RE 2015: 282-283 - 2014
- [b1]Elda Paja:
STS: a Security Requirements Engineering methodology for socio-technical Systems. University of Trento, Italy, 2014 - [j3]Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini:
Threat Analysis in Goal-Oriented Security Requirements Modelling. Int. J. Secur. Softw. Eng. 5(2): 1-19 (2014) - [c13]Mattia Salnitri, Elda Paja, Paolo Giorgini:
Preserving Compliance with Security Requirements in Socio-Technical Systems. CSP Forum 2014: 49-61 - [p3]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. Secure and Trustworthy Service Composition 2014: 63-78 - [p2]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
STS-Tool: Security Requirements Engineering for Socio-Technical Systems. Engineering Secure Future Internet Services and Systems 2014: 65-96 - [p1]Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini:
Security Requirements Engineering with STS-Tool. Secure and Trustworthy Service Composition 2014: 95-109 - 2013
- [j2]Elda Paja, Amit K. Chopra, Paolo Giorgini:
Trust-based specification of sociotechnical systems. Data Knowl. Eng. 87: 339-353 (2013) - [c12]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Managing Security Requirements Conflicts in Socio-Technical Systems. ER 2013: 270-283 - [c11]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool. ER 2013: 504-507 - [c10]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Designing Secure Socio-Technical Systems with STS-ml. iStar 2013: 79-84 - [c9]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements. iStar 2013: 131-133 - 2012
- [j1]Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi:
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study. Int. J. Secur. Softw. Eng. 3(1): 1-19 (2012) - [c8]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
Modelling Security Requirements in Socio-Technical Systems with STS-Tool. CAiSE Forum 2012: 155-162 - [c7]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements. ER Workshops 2012: 396-399 - [c6]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-tool: Socio-technical Security Requirements through social commitments. RE 2012: 331-332 - 2011
- [c5]Elda Paja, Paolo Giorgini, Stéphane Paul, Per Håkon Meland:
Security Requirements Engineering for Secure Business Processes. BIR Workshops 2011: 77-89 - [c4]Yudistira Asnar, Elda Paja, John Mylopoulos:
Modeling Design Patterns with Description Logics: A Case Study. CAiSE 2011: 169-183 - [c3]Amit K. Chopra, Elda Paja, Paolo Giorgini:
Sociotechnical Trust: An Architectural Approach. ER 2011: 104-117 - [c2]Fabiano Dalpiaz, Elda Paja, Paolo Giorgini:
Security Requirements Engineering for Service-Oriented Applications. iStar 2011: 102-107 - [c1]Fabiano Dalpiaz, Elda Paja, Paolo Giorgini:
Security requirements engineering via commitments. STAST 2011: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 20:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint