Model-Driven Information Security Risk Assessment of Socio-Technical Systems

Dan Ionita

    Research output: ThesisPhD Thesis - Research UT, graduation UT

    992 Downloads (Pure)

    Search results

    • 2017

      Towards security requirements: Iconicity as a feature of an informal modeling language

      Vasenev, A., Ionita, D., Zoppi, T., Ceccarelli, A. & Wieringa, R. J., 2017, CEUR Workshop Proceedings. RWTH Aachen: CEUR, Vol. 1796. p. 1-15 15 p. (CEUR Workshop Proceedings; vol. 1796).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      File
      2 Citations (Scopus)
      44 Downloads (Pure)
    • 2016

      ArgueSecure: Out-of-the-box Risk Assessment

      Ionita, D., Kegel, R., Baltuta, A. & Wieringa, R., Sept 2016, Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, NJ: IEEE, p. 74-79 6 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      11 Downloads (Pure)
    • A study on tangible participative enterprise modelling

      Ionita, D., Kaidalova, J., Vasenev, A. & Wieringa, R., 17 Nov 2016, Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings. Link, S. & Trujillo, J. C. (eds.). Cham: Springer, p. 139-148 10 p. (Lecture Notes in Computer Science; vol. 9975).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      Open Access
      File
      1 Citation (Scopus)
      213 Downloads (Pure)
    • Automated Identification and Prioritization of Business Risks in e-service Networks

      Ionita, D., Wieringa, R. J. & Gordijn, J., 19 May 2016, Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016. Borangiu, T., Dragoicea, M. & Novoa, H. (eds.). London: Springer, p. 547-560 14 p. (Lecture Notes in Business Information Processing; vol. 247).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      File
      6 Citations (Scopus)
      240 Downloads (Pure)
    • Value-Driven Risk Analysis of Coordination Models

      Ionita, D., Gordijn, J., Yesuf, A. S. & Wieringa, R. J., 10 Nov 2016, The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings. London: Springer, p. 102-116 15 p. (Lecture Notes in Business Information Processing; vol. 267).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      6 Citations (Scopus)
      4 Downloads (Pure)
    • 2015

      Investigating the usability and utility of tangible modelling of socio-technical architectures

      Ionita, D., Wieringa, R. J., Bullee, J.-W. & Vasenev, A., 29 May 2015, Enschede: Centre for Telematics and Information Technology (CTIT). 29 p. (CTIT Technical Report Series; no. TR-CTIT-15-03)

      Research output: Book/ReportReportProfessional

      Open Access
      File
      103 Downloads (Pure)
    • Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group

      Ionita, D., Wieringa, R. J., Bullee, J.-W. & Vasenev, A., 22 Oct 2015, 34th International Conference on Conceptual Modeling, ER 2015. Johannesson, P., Li Lee, M., Liddle, S. W., Opdahl, A. L. & López, Ó. P. (eds.). Berlin: Springer, p. 558-565 8 p. (Lecture Notes in Computer Science; vol. 9381).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      12 Citations (Scopus)
      5 Downloads (Pure)
    • Using Value Models for Business Risk Analysis in e-Service Networks

      Ionita, D., Wieringa, R. J., Wolos, L., Gordijn, J. & Pieters, W., 12 Nov 2015, 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015. Ralyté, J., España, S. & Pastor, O. (eds.). Berlin: Springer, p. 239-253 15 p. (Lecture Notes in Business Information Processing; vol. 235).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      6 Citations (Scopus)
      3 Downloads (Pure)
    • 2014

      Argumentation-Based Security Requirements Elicitation: The Next Round

      Ionita, D., Bullee, J.-W. & Wieringa, R. J., 25 Aug 2014, Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, New Jersey: IEEE, p. 7-12 7 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      11 Citations (Scopus)
      12 Downloads (Pure)
    • Context-sensitive Information security Risk identification and evaluation techniques

      Ionita, D., 25 Aug 2014, 22nd IEEE International Requirements Engineering Conference (RE14). Piscataway, New Jersey: IEEE, p. 485-488 4 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      4 Downloads (Pure)
    • Modelling telecom fraud with e3value

      Ionita, D., Koenen, S. & Wieringa, R. J., 31 Oct 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 28 p. (CTIT Technical Report Series; no. TR-CTIT-14-11)

      Research output: Book/ReportReportProfessional

      Open Access
      File
      297 Downloads (Pure)