Elda Paja

Orcid: 0000-0002-8346-2467

According to our database1, Elda Paja authored at least 49 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Philanthropic conference-based requirements engineering in time of pandemic and beyond.
Requir. Eng., June, 2023

Consent Verification Monitoring.
ACM Trans. Softw. Eng. Methodol., January, 2023

Towards a Basic Security Framework for SMEs - Results From an Investigation of Cybersecurity Challenges in Denmark.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

2022
#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;: Understanding Privacy Concerns, Trust and Adoption in Mobile COVID-19 Tracing Across Four Countries.
Proc. ACM Hum. Comput. Interact., 2022

Knowledge-Driven Data Ecosystems Toward Data Transparency.
ACM J. Data Inf. Qual., 2022

2021
A data-driven, goal-oriented framework for process-focused enterprise re-engineering.
Inf. Syst. E Bus. Manag., 2021

Knowledge-driven Data Ecosystems Towards Data Transparency.
CoRR, 2021

A Mixed-method Study on Security and Privacy Practices in Danish Companies.
CoRR, 2021

2020
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.
Proceedings of the Visual Privacy Management, 2020

"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark.
CoRR, 2020

2019
Goal-oriented requirements engineering: an extended systematic mapping study.
Requir. Eng., 2019

Consent Verification Under Evolving Privacy Policies.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

2018
PACAS: A Gamified Platform for Participatory Change Management in ATM Systems.
Proceedings of the Joint Proceedings of REFSQ-2018 Workshops, 2018

Modeling and Reasoning About Privacy-Consent Requirements.
Proceedings of the Practice of Enterprise Modeling - 11th IFIP WG 8.1. Working Conference, PoEM 2018, Vienna, Austria, October 31, 2018

2017
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Information Security Risk Management.
Proceedings of the Practice of Enterprise Modeling, 2017

Goal Models for Acceptance Requirements Analysis and Gamification Design.
Proceedings of the Conceptual Modeling - 36th International Conference, 2017

2016
Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Goal-Oriented Requirements Engineering: A Systematic Literature Map.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Security attack analysis using attack patterns.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Can Goal Reasoning Techniques Be Used for Strategic Decision-Making?
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

2015
Modelling and reasoning about security requirements in socio-technical systems.
Data Knowl. Eng., 2015

Holistic security requirements analysis: An attacker's perspective.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

A Holistic Approach to Attack Modeling and Analysis.
Proceedings of the Eighth International i*Workshop, 2015

Analyzing Attack Strategies Through Anti-goal Refinement.
Proceedings of the Practice of Enterprise Modeling, 2015

The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report.
Proceedings of the Advances in Conceptual Modeling, 2015

STS-Tool 3.0: Maintaining Security in Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

The Importance of Teaching Goal-Oriented Analysis Techniques: an Experience Report.
Proceedings of the 1st International iStar Teaching Workshop co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
Security Requirements Engineering with STS-Tool.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Socio-technical Security Requirements Modelling Language for Secure Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

STS-Tool: Security Requirements Engineering for Socio-Technical Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

STS: a Security Requirements Engineering methodology for socio-technical Systems.
PhD thesis, 2014

Threat Analysis in Goal-Oriented Security Requirements Modelling.
Int. J. Secur. Softw. Eng., 2014

Preserving Compliance with Security Requirements in Socio-Technical Systems.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

2013
Trust-based specification of sociotechnical systems.
Data Knowl. Eng., 2013

STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

Designing Secure Socio-Technical Systems with STS-ml.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool.
Proceedings of the Conceptual Modeling - 32th International Conference, 2013

Managing Security Requirements Conflicts in Socio-Technical Systems.
Proceedings of the Conceptual Modeling - 32th International Conference, 2013

2012
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study.
Int. J. Secur. Softw. Eng., 2012

STS-tool: Socio-technical Security Requirements through social commitments.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements.
Proceedings of the Advances in Conceptual Modeling, 2012

Modelling Security Requirements in Socio-Technical Systems with STS-Tool.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
Security requirements engineering via commitments.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Security Requirements Engineering for Service-Oriented Applications.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Sociotechnical Trust: An Architectural Approach.
Proceedings of the Conceptual Modeling - ER 2011, 30th International Conference, 2011

Modeling Design Patterns with Description Logics: A Case Study.
Proceedings of the Advanced Information Systems Engineering, 2011

Security Requirements Engineering for Secure Business Processes.
Proceedings of the Workshops on Business Informatics Research, 2011


  Loading...