Author:
Gharib Mohamad,Giorgini Paolo,Salnitri Mattia,Paja Elda,Mouratidis Haralambos,Pavlidis Michalis,Ruiz Jose Fran.
Publisher
Springer International Publishing
Reference83 articles.
1. Acquisti, A., Friedman, A., Telang, R.: Is there a cost toprivacy breaches? An event study. In: 5th Workshop on the Economics of Information Security, pp. 1–20 (2006).
https://doi.org/10.1.1.73.2942
2. Agarwal, R., Tanniru, M.R.: Knowledge acquisition using structured interviewing: an empirical investigation. J. Manage. Inf. Syst. 7(1), 123–140 (1990). ISSN: 0742-1222.
https://doi.org/10.1080/07421222.1990.11517884
.
http://www.tandfonline.com/doi/full/10.1080/07421222.1990.11517884
3. Antón, A.I., Earp, J.B., Reese, A.: Analyzing website privacy requirements using a privacy goal taxonomy. In: Proceedings of the IEEE International Conference on Requirements Engineering, vol. 2002, pp. 23–31. IEEE (2002). ISBN: 0769514650.
https://doi.org/10.1109/ICRE.2002.1048502
4. Antn, A.I., Earp, J.B.: A requirements taxonomy for reducing Web site privacy vulnerabilities. Requir. Eng. 9(3), 169–185 (2004). ISSN: 0947-3602.
https://doi.org/10.1007/s00766-003-0183-z
.
http://link.springer.com/10.1007/s00766-003-0183-z
5. Aurum, A., Wohlin, C.: Requirements engineering: setting the context. In: Aurum, A., Wohlin, C. (eds.) Engineering and Managing Software Requirements, pp. 1–15. Springer, Heidelberg (2005).
https://doi.org/10.1007/3-540-28244-0_1
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献