Follow
Elda Paja
Title
Cited by
Cited by
Year
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements engineering 24, 133-160, 2019
2222019
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
822016
Modelling and reasoning about security requirements in socio-technical systems
E Paja, F Dalpiaz, P Giorgini
Data & Knowledge Engineering 98, 123-143, 2015
822015
Knowledge-driven data ecosystems toward data transparency
S Geisler, ME Vidal, C Cappiello, BF Lóscio, A Gal, M Jarke, M Lenzerini, ...
ACM Journal of Data and Information Quality (JDIQ) 14 (1), 1-12, 2021
762021
Security requirements engineering: designing secure socio-technical systems
F Dalpiaz, E Paja, P Giorgini
MIT Press, 2016
632016
Managing security requirements conflicts in socio-technical systems
E Paja, F Dalpiaz, P Giorgini
Conceptual Modeling: 32th International Conference, ER 2013, Hong-Kong …, 2013
602013
Security requirements engineering via commitments
F Dalpiaz, E Paja, P Giorgini
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), 1-8, 2011
522011
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
482016
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
352016
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques
L Piras, E Paja, P Giorgini, J Mylopoulos, R Cuel, D Ponte
2017 11th International Conference on Research Challenges in Information …, 2017
312017
STS-Tool: socio-technical security requirements through social commitments
E Paja, F Dalpiaz, M Poggianella, P Roberti, P Giorgini
2012 20th IEEE International Requirements Engineering Conference (RE), 331-332, 2012
312012
Security requirements engineering for secure business processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research: BIR 2011 International Workshops …, 2012
262012
Maintaining secure business processes in light of socio-technical systems' evolution
M Salnitri, E Paja, P Giorgini
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
252016
Threat analysis in goal-oriented security requirements modelling
PH Meland, E Paja, EA Gjære, S Paul, F Dalpiaz, P Giorgini
International Journal of Secure Software Engineering (IJSSE) 5 (2), 1-19, 2014
232014
Goal models for acceptance requirements analysis and gamification design
L Piras, E Paja, P Giorgini, J Mylopoulos
Conceptual Modeling: 36th International Conference, ER 2017, Valencia, Spain …, 2017
222017
Formative user-centered evaluation of security modeling: Results from a case study
S Trösterer, E Beck, F Dalpiaz, E Paja, P Giorgini, M Tscheligi
International Journal of Secure Software Engineering (IJSSE) 3 (1), 1-19, 2012
212012
Sociotechnical trust: An architectural approach
AK Chopra, E Paja, P Giorgini
Conceptual Modeling–ER 2011: 30th International Conference, ER 2011 …, 2011
202011
STS-tool: security requirements engineering for socio-technical systems
E Paja, F Dalpiaz, P Giorgini
Engineering Secure Future Internet Services and Systems: Current Research, 65-96, 2014
192014
Trust-based specification of sociotechnical systems
E Paja, AK Chopra, P Giorgini
Data & Knowledge Engineering 87, 339-353, 2013
192013
Specifying and reasoning over socio-technical security requirements with sts-tool
E Paja, F Dalpiaz, M Poggianella, P Roberti, P Giorgini
Conceptual Modeling: 32th International Conference, ER 2013, Hong-Kong …, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20