Author:
Tsohou Aggeliki,Magkos Manos,Mouratidis Haralambos,Chrysoloras George,Piras Luca,Pavlidis Michalis,Debussche Julien,Rotoloni Marco,Crespo Beatriz Gallego-Nicasio
Publisher
Springer International Publishing
Reference30 articles.
1. Blank, S.G.: Four Steps to the Epiphany: Successful Strategies for Products that Win, Palo (2007)
2. Bryman, A.: Social Research Methods, 3rd edn, p. 2008. Oxford University Press, Oxford (2008)
3. Cavoukian, A.: Privacy by Design. The 7 Foundational Principles, Implementation and Mapping of Fair Information Practices (2011).
https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf
4. Davis, A., Dieste, O., Hickey, A., Juristo, N., Moreno, A.M.: Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review. In: 14th IEEE International Requirements Engineering Conference (RE 2006), pp. 179–188. IEEE (2006)
5. Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy re-quirements. Re-quirements Eng. 16(1), 3–32 (2011)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献