1. Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45(1), 3:1–3:54 (2012)
2. Becker, J., Kugeler, M., Rosemann, M. (eds.): Process Management: A Guide for the Design of Business Processes. Springer, Heidelberg (2003)
3. Lecture Notes in Computer Science;C Cabanillas,2015
4. Lecture Notes in Computer Science;A del-Río-Ortega,2012
5. Gol Mohammadi, N., Bandyszak, T., Goldsteen, A., Kalogiros, C., Weyer, T., Moffie, M., Nasser, B.I., Surridge, M.: Combining risk-management and computational approaches for trustworthiness evaluation of socio-technical systems. In: Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering, pp. 237–244 (2015)