default search action
11th RCIS 2017: Brighton, UK
- Saïd Assar, Oscar Pastor, Haralambos Mouratidis:
11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017. IEEE 2017, ISBN 978-1-5090-5476-3
Keynotes
- Bashar Nuseibeh:
Adaptive information security and privacy. 17 - Edgar R. Weippl:
Research methods and examples of empirical research in information security. 18 - Monique Snoeck:
Conceptual modelling: How to do it right? 19
Session 1: Business Process Management
- Grace Park, Lawrence Chung, Latifur Khan, Sooyong Park:
A modeling framework for business process reengineering using big data analytics and a goal-orientation. 21-32 - Ornela Cela, Agnès Front, Dominique Rieu:
CEFOP: A method for the Continual Evolution of Organisational Processes. 33-43 - Yosra Lassoued, Selmin Nurcan:
Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach. 44-55
Session 2: Compliance and Regulation
- Okhaide Akhigbe, Daniel Amyot, John Mylopoulos, Gregory Richards:
What can information systems do for regulators? A review of the state-of-practice in Canada. 57-65 - Priscila Engiel, Julio César Sampaio do Prado Leite, John Mylopoulos:
A tool-supported compliance process for software systems. 66-76 - Guillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens:
A definition of Information Security Classification in cybersecurity context. 77-82
Session 3: Conceptual Modelling
- Cesar Gonzalez-Perez, Patricia Martín-Rodilla:
A metamodel and code generation approach for symmetric unary associations. 84-94 - Isabelle Mirbel:
From user goals to process-based service compositions: A flexible semantic-based approach. 95-102 - Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. 103-108
Session 4: Fraud Detection and Management
- Stavros Kyriakopoulos, Theodoros Tzouramanis, Yannis Manolopoulos:
The dbMark: A benchmarking system for watermarking methods for relational databases. 110-119 - Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi:
TRAWL: Protection against rogue sites for the masses. 120-127 - John K. C. Kingston:
Representing, reasoning and predicting fraud using fraud plans. 128-133
Session 5: Knowledge Discovery and Data
- Mohammad Ghufran, Nacéra Bennacer, Gianluca Quercini:
Wikipedia-based extraction of key information from resumes. 135-145 - Sara Samir, Amany M. Sarhan, Alsayed Algergawy:
Context-based web service discovery framework with QoS considerations. 146-155 - Alexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart:
Traffic flow measurement of a public transport system through automated Web observation. 156-161
Session 6: Privacy
- Nitin Naik, Paul Jenkins:
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. 163-174 - Veerle Jessen, Hans Weigand:
Privacy proof in the cloud. 175-186 - Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis:
Supporting the design of privacy-aware business processes via privacy process patterns. 187-198
Session 7: Recommendation Systems
- Modhi Al Alshaikh, Gulden Uchyigit, Roger Evans:
A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modelling. 200-210 - Dimitris Paraschakis:
Towards an ethical recommendation framework. 211-220 - Hong Diep Tran, Guillaume Cabanac, Gilles Hubert:
Expert suggestion for conference program committees. 221-232
Session 8: Requirements Engineering
- Azzam Maraee, Arnon Sturm:
Formal semantics and analysis tasks for ME-MAP models. 234-243 - Fatemeh Movahedian, Agnès Front, Dominique Rieu, Armelle Farastier, Christelle Grandvallet, Franck Pourroy, Guy Prudhomme:
A participative method for knowledge elicitation in collaborative innovation projects. 244-254 - Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, Diego Ponte:
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. 255-265
Session 9: Semantics and Ontology
- Slavko Zitnik, Marko Bajec, Dejan Lavbic:
LogMap+: Relational data enrichment and linked data resources matching. 267-275 - Essayeh Aroua, Mourad Abed:
An ontology-based framework for enhancing personalized content and retrieval information. 276-285 - Hermann Kaindl, Ralph Hoch, Roman Popp:
Semantic task specification in business process context. 286-291
Session 10: Security
- Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos:
Evaluation of MUSER, a holistic security requirements analysis framework. 293-304 - Char Sample, Jennifer Cowley, Steve E. Hutchinson:
Cultural exploration of attack vector preferences for self-identified attackers. 305-314 - Char Sample, Tim Watson, Steve E. Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple:
Data fidelity: Security's soft underbelly. 315-320
Session 11: System Design
- Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
System design considerations for risk perception. 322-327 - George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are you ready? Towards the engineering of forensic-ready systems. 328-333 - Alaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin, Sanaz Fallahkhair:
Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritage. 334-339
Session 12: Human-Computer Interaction
- Otto Parra, Sergio España, José Ignacio Panach:
Extending and validating gestUI using technical action research. 341-352 - Sara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt:
The PDA-LPA design space for user interface adaptation. 353-364 - Mohammad Salih Alsaffar, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan:
Visual behaviour in searching information: A preliminary eye tracking study. 365-370
Session 13: Social Media and Network Analysis
- Oualid Benyahia, Christine Largeron, Baptiste Jeudy:
Community detection in dynamic graphs with missing edges. 372-381 - Chiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici:
IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case study. 382-390 - Imen Moalla, Ahlem Nabli, Mohamed Hammami:
Integration of a multidimensional schema from different social media to analyze customers'opinions. 391-400
Doctoral Consortium - 1
- Myrsini Athinaiou:
Cyber security risk management for health-based critical infrastructures. 402-407 - Mohammad Alsaffar:
Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese users. 408-413 - Afef Awadid:
Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach. 414-419
Doctoral Consortium - 2
- Thouraya Sboui:
A DSPL approach for the development of context-adaptable user interfaces. 421-426 - Duaa Alkubaisy:
A framework managing conflicts between security and privacy requirements. 427-432 - Fabrice Boissier:
Supporting modelers with model qualities and patterns. 440-445
Posters and Demos Session
- Moneef Almutairi, Stephen Riddle:
Security threat classification for outsourced IT projects. 447-448 - Deepika Prakash, Naveen Prakash:
A requirements driven approach to data warehouse consolidation. 449-450 - Verónica Burriel, José Fabián Reyes Román, Ana Heredia Casanoves, Carlos Iñiguez-Jarrín, Ana León:
GeIS based on Conceptual Models for the risk assessment of Neuroblastoma. 451-452 - Thomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste, Yvon Kermarrec, Pedro Merino Laso:
Generating data sets as inputs of reference for cyber security issues and industrial control systems. 453-454 - Diana Jlailaty, Daniela Grigori, Khalid Belhajjame:
Multi-level clustering for extracting process-related information from email logs. 455-456 - Soumya Kanti Datta, Christian Bonnet:
Demonstrating Named Data Networking integration into DataTweet IoT Architecture. 457-458 - Yongju Lee, Changsu Kim:
Two-step RDF query processing for Linked Data. 459-460 - Vasiliki Diamantopoulou, Michalis Pavlidis:
Visual Privacy Management in User Centric Open Environments. 461-462 - Nitin Naik:
Software CROWD-sourcing. 463-464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.