Roel Wieringa
#39,423
Most Influential Person Now
Dutch computer scientist
Roel Wieringa's AcademicInfluence.com Rankings
Roel Wieringacomputer-science Degrees
Computer Science
#1906
World Rank
#1980
Historical Rank
Software Engineering
#89
World Rank
#89
Historical Rank
Database
#1889
World Rank
#1981
Historical Rank
Download Badge
Computer Science
Roel Wieringa's Degrees
- PhD Computer Science University of Twente
- Masters Computer Science University of Twente
- Bachelors Computer Science University of Twente
Similar Degrees You Can Earn
Why Is Roel Wieringa Influential?
(Suggest an Edit or Addition)According to Wikipedia, Roelf Johannes Wieringa is a Dutch computer scientist who was a Professor of Information Systems at the University of Twente, specialized in the "integration of formal and informal specification and design techniques".
Roel Wieringa's Published Works
Published Works
- Requirements engineering paper classification and evaluation criteria: a proposal and a discussion (2005) (840)
- Design Science Methodology for Information Systems and Software Engineering (2014) (764)
- Deontic logic in computer science: normative system specification (1994) (316)
- Design science as nested problem solving (2009) (304)
- Enterprise architecture: Management tool and blueprint for the organisation (2006) (264)
- Requirements engineering - frameworks for understanding (1996) (255)
- A survey of structured and object-oriented software specification methods and techniques (1998) (247)
- What Is Design Science (2014) (171)
- Naming the pain in requirements engineering (2016) (165)
- Tool support for verifying UML activity diagrams (2004) (158)
- Applications of deontic logic in computer science: a concise overview (1994) (155)
- Agile requirements prioritization in large-scale outsourced system projects: An empirical study (2013) (155)
- Design methods for reactive systems - Yourdon, Statemate, and the UML (2003) (149)
- Verification support for workflow design with UML activity graphs (2002) (142)
- Technical Action Research as a Validation Method in Information Systems Design Science (2012) (135)
- Deontic logic: a concise overview (1994) (126)
- Six strategies for generalizing software engineering theories (2015) (125)
- Using Dynamic Classes and Role Classes to Model Object Migration (1995) (120)
- Specifying Dynamic and Deontic Integrity Constraints (1989) (119)
- Guest Editors' Introduction: Stakeholders in Requirements Engineering (2007) (119)
- Comparing Petri Net and Activity Diagram Variants for Workflow Modelling - A Quest for Reactive Petri Nets (2003) (110)
- Engineering Secure Software and Systems (2011) (110)
- A systematic mapping study on empirical evaluation of software requirements specifications techniques (2009) (101)
- A Formal Semantics for UML Activity Diagrams - Formalising Workflow Models (2001) (96)
- Aligning Application Architecture to the Business Context (2003) (94)
- The Role of Deontic Logic in the Specification of Information Systems (1998) (89)
- The methodological soundness of requirements engineering papers: a conceptual framework and two case studies (2006) (86)
- Roles and Dynamic Subclasses: A Modal Logic Approach (1994) (85)
- Security Implications of Virtualization: A Literature Study (2009) (85)
- Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (2006) (80)
- Naming the Pain in Requirements Engineering: Contemporary Problems, Causes, and Effects in Practice (2016) (79)
- A Real-Time Execution Semantics for UML Activity Diagrams (2001) (74)
- Project Graal: Towards Operational Architecture Alignment (2004) (69)
- Towards a Service-Oriented MDA-Based Approach to the Alignment of Business Processes with IT Systems: from the Business Model to a Web Service Composition Model (2009) (67)
- Empirical research methods for technology validation: Scaling up to practice (2014) (67)
- Do We Know Enough about Requirements Prioritization in Agile Projects: Insights from a Case Study (2010) (67)
- A Modal Approach to Intentions, Commitments and Obligations: Intention plus Commitment Yields Obligation (1996) (65)
- Algebraic Foundations for Dynamic Conceptual Models (1990) (65)
- A requirements engineering framework for cross-organizational ERP systems (2006) (63)
- An Introduction to Requirements Traceability (1995) (63)
- Requirements Level Semantics for UML Statecharts (2000) (62)
- Design science methodology: principles and practice (2010) (61)
- A conceptual model and process for client-driven agile requirements prioritization (2010) (61)
- An integrated framework for ought-to-be and ought-to-do constraints (1996) (59)
- Risk and argument: A risk-based argumentation method for practical security (2011) (58)
- Requirements Engineering-Based Conceptual Modelling (2002) (56)
- An Integrated Enterprise Architecture Framework for Business-IT Alignment (2006) (55)
- Cost estimation for cross-organizational ERP projects: research perspectives (2008) (54)
- Quality Requirements in Large-Scale Distributed Agile Projects - A Systematic Literature Review (2017) (50)
- A Formalization of Objects Using Equational Dynamic Logic (1991) (50)
- Cross-organizational ERP management: how to create a successful business case? (2009) (49)
- Value-oriented design of service coordination processes: correctness and trust (2005) (49)
- LCM 3.0: A Language for describing Conceptual Models (1993) (49)
- Requirements-Level Semantics and Model Checking of Object-Oriented Statecharts (2002) (48)
- Model-based qualitative risk assessment for availability of IT infrastructures (2011) (48)
- A Minimal Transition System Semantics for Lightweight Class and Behavior Diagrams (1998) (47)
- Relevance and Problem Choice in Design Science (2010) (47)
- Quality Requirements Challenges in the Context of Large-Scale Distributed Agile: An Empirical Study (2018) (47)
- Design Methods for Reactive Systems (2003) (46)
- Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited (1995) (46)
- An integrated conceptual model for information system security risk management supported by enterprise architecture management (2019) (46)
- The Identification of Objects and Roles - object identifiers revisited - (1991) (45)
- Towards a business-IT aligned maturity model for collaborative networked organizations (2008) (44)
- Aziomatization, Declarative Semantics and Operational Semantics of Passive and Active Updates in Logic Databases (1995) (44)
- Goal-Oriented Requirements Engineering and Enterprise Architecture: Two Case Studies and Some Lessons Learned (2012) (44)
- Agile Requirements Prioritization: What Happens in Practice and What Is Described in Literature (2011) (41)
- Requirements researchers: are we really doing research? (2005) (41)
- A Value-Oriented Approach to E-business Process Design (2003) (41)
- Free choice and contextually permitted actions (1996) (38)
- An Execution Algorithm for UML Activity Graphs (2001) (38)
- Current established risk assessment methodologies and tools (2013) (38)
- Status Quo in Requirements Engineering (2018) (37)
- Automated analysis of security requirements through risk-based argumentation (2015) (36)
- Value-Based Business-IT Alignment in Networked Constellations of Enterprises (2005) (35)
- Combining TROLL with the Object Modeling Technique (1994) (33)
- Equational Specification of Dynamic Objects (1990) (32)
- Inheritance conditions for object life cycle diagrams (1994) (31)
- Generalizing by similarity: Lessons learnt from industrial case studies (2013) (31)
- OMTROLL - Object Modeling in Troll (1993) (31)
- Object-Oriented Analysis, Structured Analysis, and Jackson System Development (1991) (30)
- Cyber-crime Science = Crime Science + Information Security (2010) (29)
- Dynamic Database Logic: the First-order Case (1992) (29)
- Value-Driven Coordination Process Design Using Physical Delivery Models (2008) (29)
- Benefits of Location-Based Access Control: A Literature Study (2010) (28)
- Requirements Engineering for Service-Oriented Computing: A Position Paper (2003) (28)
- External Insider Threat: A Real Security Challenge in Enterprise Value Webs (2010) (27)
- Thirty one problems in the semantics of UML 1.3 dynamics (1999) (27)
- Three Roles of Conceptual Models in Information System Design and Use (1989) (27)
- A Business Ecosystem Architecture Modeling Framework (2019) (26)
- Integrating Semi-Formal and Formal Software Specification Techniques (1998) (26)
- Requirements Engineering: Problem Analysis and Solution Specification (Extended Abstract) (2004) (26)
- Semantic and Pragmatic Interoperability: A Model for Understanding (2005) (26)
- Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (2010) (25)
- The Green Lab: Experimentation in Software Energy Efficiency (2015) (25)
- A Specification Language for Static, Dynamic and Deontic Integrity Constraints (1989) (25)
- Requirements Engineering Techniques for e-Services (2008) (25)
- Actors, actions, and initiative in normative system specification (1993) (25)
- Improving Requirements Engineering by Artefact Orientation (2013) (25)
- Guest Editors' Introduction: RE'03-Practical Requirements Engineering Solutions (2004) (25)
- Postmodern Software Design with NYAM: Not Yet Another Method (1997) (24)
- The Identiication of Objects and Roles -object Identiiers Revisited (1991) (23)
- Stakeholders in Requirements Engineering (2007) (21)
- Requirements engineering for cross-organizational ERP implementation undocumented assumptions and potential mismatches (2005) (21)
- The Structure of Design Theories, and an Analysis of their Use in Software Engineering Experiments (2011) (21)
- Toolkit for Conceptual Modeling (TCM): User's Guide and Reference (1997) (21)
- Lessons learned from evaluating a checklist for reporting experimental and observational research (2012) (21)
- Designing Requirements Engineering Research (2007) (20)
- A Fixed-point Characterization of a Deontic Logic of Regular Action (2001) (20)
- Ontological Distinctions between Means-End and Contribution Links in the i* Framework (2013) (19)
- A conceptual framework for ERP benefit classification: Results of a literature review (2009) (19)
- Steps towards a method for the formal modeling of dynamic objects (1991) (19)
- A method for building and evaluating formal specifications of object-oriented conceptual models of database systems (1993) (19)
- Value-based design of collaboration processes for e-commerce (2004) (18)
- Accident Analysis Methods and Models — a Systematic Literature Review (2017) (18)
- Combining Static and Dynamic Modelling Methods: A Comparison of Four Methods (1995) (18)
- The inheritance of dynamic and deontic integrity constraints or: Does the boss have more rights? (1991) (18)
- The declarative problem frame: designing systems that create and use norms (2000) (18)
- Harmfulness of Code Duplication - A Structured Review of the Evidence (2009) (18)
- Checking the alignment of value-based business models and IT functionality (2007) (18)
- Risk Assessment as an Argumentation Game (2013) (17)
- Value Framing: A Prelude to Software Problem Framing (2004) (17)
- Role-Based Access Control in Retrospect (2012) (17)
- Value-Based Requirements Engineering for Value Webs (2007) (16)
- Value-Oriented Coordination Process Modeling (2010) (16)
- Integrating Semi-formal and Formal Requirements (1997) (16)
- Persuasive technologies: a systematic literature review and application to PISA (2014) (16)
- A Coordination Complexity Model to Support Requirements Engineering for Cross-organizational ERP (2006) (16)
- Towards a unified checklist for empirical research in software engineering: first proposal (2012) (16)
- Understanding Challenging Situations in Agile Quality Requirements Engineering and Their Solution strategies: Insights from a Case Study (2018) (16)
- Case study research in information systems engineering: how to generalize, how not to generalize, and how not to generalize too much (2013) (15)
- Requirements Engineering for Enterprise Systems: What We Know and What We Don't Know? (2010) (15)
- Algebraic Specification of Object Dynamics in Knowledge Base Domains (1990) (15)
- What you ask is what you get: Understanding architecturally significant functional requirements (2015) (15)
- Surveying the factors that influence maintainability: research design (2005) (15)
- LCM and MCM: Specification of a control system using dynamic logic and process algebra (1994) (15)
- Argumentation-based security requirements elicitation: The next round (2014) (15)
- A dynamic logic for reasoning about sub-ideal states (1994) (15)
- Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group (2015) (14)
- Contextual Permission: A Solution to the Free Choice Paradox (1994) (14)
- Probing for Requirements Knowledge to Stimulate Architectural Thinking (2016) (14)
- Identifying Architecturally Significant Functional Requirements (2015) (14)
- Chapter 1 – Reactive Systems (2003) (13)
- A conceptual model specification language (CMSL Version 2) (1992) (13)
- Challenges in Service Value Network Composition (2012) (13)
- A Unified Checklist for Observational and Experimental Research in Software Engineering (Version 1) (2012) (13)
- E3value to BPMN Model Transformation (2011) (13)
- Extending CTL with Actions and Real Time (2000) (13)
- Improving the Semantic Interoperability of IoT Early Warning Systems: The Port of Valencia Use Case (2018) (13)
- How to Write and Read a Scientific Evaluation Paper (2009) (13)
- Mission 2 Solution: Requirements Engineering Education as a Central Theme in the BIT Programme (2005) (13)
- Design Science, Engineering Science and Requirements Engineering (2008) (12)
- Value-driven Service Matching (2008) (12)
- Monitoring Collaboration from a Value Perspective (2007) (12)
- e3service: A Critical Reflection and Future Research (2015) (11)
- MaDe4IC: an abstract method for managing model dependencies in inter-organizational cooperations (2010) (11)
- Goal-Oriented RE for E-Services (2004) (11)
- Using Value Models for Business Risk Analysis in e-Service Networks (2015) (11)
- Software Requirements Engineering: The Need for Systems Engineering and Literacy (2001) (11)
- Traceability and modularity in software design (1998) (11)
- Understandability of Goal-Oriented Requirements Engineering Concepts for Enterprise Architects (2014) (11)
- Actor-Oriented Specification of Deontic Integrity Constraints (1991) (11)
- Evaluating the structure of research papers: A case study (2004) (11)
- Preliminary Survey on Empirical Research Practices in Requirements Engineering (2012) (11)
- Design Methods for Software Systems: YOURDON, Statemate and Uml (2002) (11)
- Smart Logistics: An Enterprise Architecture Perspective (2017) (10)
- Modelling Mobility Aspects of Security Policies (2004) (10)
- Real-World Semantics of Conceptual Models (2008) (10)
- Designing Technical Action Research and Generalizing from Real-World Cases (2012) (10)
- Using a Foundational Ontology to Investigate the Semantics Behind the Concepts of the i* Language (2013) (10)
- Surveying the Factors that Influence Maintainability (2005) (10)
- Regular database update logics (2001) (10)
- Empirical research in business process management: introduction to the special issue (2011) (10)
- Requirements Engineering: Solutions and Trends (2005) (10)
- Operational Business-IT Alignment in Value Webs (2008) (10)
- Technical Action Research (2014) (10)
- Towards self-configuration and management of e-service provisioning in dynamic value constellations (2008) (10)
- Subsystem design guidelines for extensible general-purpose software (1998) (9)
- Exploiting a Goal-Decomposition Technique to Prioritize Non-functional Requirements (2007) (9)
- The university library document circulation system specified in LCM (1993) (9)
- Actor-Oriented System Specification with Dynamic Logic (1991) (9)
- Value-Driven Risk Analysis of Coordination Models (2016) (9)
- Rethinking De-Perimeterisation: Problem Analysis And Solutions (2009) (9)
- LCM and MCM (1995) (9)
- Towards Information Systems Design for Value Webs (2007) (9)
- ArgueSecure: Out-of-the-Box Security Risk Assessment (2016) (8)
- Second international workshop on from SofTware Requirements to Architectures (STRAW'03) (2003) (8)
- Some Finite-Graph Models for Process Algebra (1991) (8)
- Automated Identification and Prioritization of Business Risks in e-service Networks (2016) (8)
- Methodologies of requirements engineering research and practice: position statement (2003) (8)
- Trust and Business Webs (2011) (8)
- Experimental Validation of a Risk Assessment Method (2015) (8)
- Reference Architecture for Integration Platforms (2017) (8)
- RE'03: practical requirements engineering solutions : Guest editors' introduction (2004) (8)
- Proceedings 11th IEEE International Requirements Engineering Conference (2003) (8)
- Classifying Assumptions Made during Requirements Verification of Embedded Systems (2008) (8)
- Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization (2011) (8)
- A new method to assess telecom service availability risks (2011) (8)
- Requirements Engineering Research Methodology: Principles and practice (2008) (8)
- An Experimental Evaluation of a Unified Checklist for Designing and Reporting Empirical Research in Software Engineering (2012) (7)
- Formalizing the UML in a Systems Engineering Approach (1998) (7)
- Monitoring Service Compositions in MoDe4SLA - Design of Validation (2009) (7)
- Agile Quality Requirements Engineering Challenges: First Results from a Case Study (2017) (7)
- Quantitative, Value-Driven Risk Analysis of e-Services (2018) (7)
- Risk-Driven Conceptual Modeling of Outsourcing Decisions (2004) (7)
- Reusing knowledge in embedded systems modelling (2013) (7)
- Towards middle-range usable design theories for software engineering (2014) (7)
- e3service: A Critical Reflection and Future Research (2015) (7)
- An Approach for Maintaining Models of an E-commerce Collaboration (2008) (7)
- A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation (2009) (6)
- Web Services as Product Experience Augmenters and the Implications for Requirements Engineering: A Position Paper (2004) (6)
- Formal analysis of the Shlaer-Mellor method: Towards a toolkit of formal and informal requirements specification techniques (1996) (6)
- Competences of IT Architects (2009) (6)
- Realizing Traceability from the Business Model to Enterprise Architecture (2019) (6)
- A Survey of Requirements Engineering Methods for Pervasive Services (2006) (6)
- Risk and Business Goal Based Security Requirement and Countermeasure Prioritization (2011) (6)
- Information systems, correctness and reusability : selected papers from the IS-CORE Workshop, Amsterdam, 26-30 September 1994 (1995) (6)
- Measuring Computer Literacy without Questionnaires (2016) (6)
- CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (2009) (6)
- Reusable Rationale Blocks: Improving Quality and Efficiency of Design Choices (2006) (6)
- Behavior Change Support Systems for Privacy and Security (2015) (5)
- A Case Base for Requirements Engineering: Problem Categories and Solution Techniques (2000) (5)
- Architecture Alignment in a Large Government Organization: A Case Study (2004) (5)
- Validation of embedded system verification models (2011) (5)
- Investigating the usability and utility of tangible modelling of socio-technical architectures (2015) (5)
- Design and initial validation ofthe Rastermethod for telecom service availability risk assessment (2012) (5)
- Capturing Assumptions while Designing a Verification Model for Embedded Systems (2007) (5)
- A Conceptual Framework for Research in Cross-organizational ERP Cost Estimation (2005) (5)
- Research Findings on Empirical Evaluation of Requirements Specifications Approaches (2009) (5)
- A2thOS: availability analysis and optimisation in SLAs (2010) (5)
- From Business Value Model to Coordination Process Model (2009) (5)
- The impact of architectural decisions on quality attributes of enterprise information systems: a survey of the design space (2004) (4)
- Conceptual modeling in social and physical contexts (2008) (4)
- Architecture Alignment (2017) (4)
- Validating the Raster Risk Assessment Method in Practice (2015) (4)
- Non-monotonic modelling from initial requirements: a proposal and comparison with monotonic modelling methods (2008) (4)
- Two Case Studies of Subsystem Design for Extensible General-Purpose Software (1998) (4)
- Obtaining Formal Models through Non-Monotonic Refinement (2007) (4)
- Web-based Collaborative Security Requirements Elicitation (2016) (4)
- Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings (2009) (4)
- Understandability of Goal Concepts by Requirements Engineering Experts (2014) (4)
- Value-exchange Patterns in Business Models of Intermediaries that Offer Negotiation Services (2004) (4)
- Risk Identification of Tailorable Context-aware Systems: a Case Study and Lessons Learned (2012) (4)
- Rationality of Cross-System Data Duplication: A Case Study (2010) (4)
- An Investigation into Agency Requirements in E-Business Information Systems (2001) (4)
- Validating database constraints and updates using automated reasoning techniques (1995) (4)
- Validating specifications of dynamic systems using automated reasoning techniques (1995) (4)
- Developing a domain-specific cross-organizational RE method (2004) (4)
- Care-giver tailoring of IT-based healthcare services for elderly at home: A field test and its results (2013) (4)
- Proceedings of REBNITA 2005 : 1st International Workshop on Requirements Engineering for Business Need and IT Alignment (2005) (4)
- Modelling telecom fraud with e3value (2014) (4)
- Risk identication of tailorable context-aware systems: a case study and lessons learned (2012) (3)
- Exploring Governance in a Decentralized Energy Trading Eco-System (2020) (3)
- Abductive Inference Design (2014) (3)
- Report on the working conference on requirements engineering: foundation for software quality (REFSQ'09) (2009) (3)
- Towards Management of Complex Service Compositions - Position Paper (2009) (3)
- Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition (2005) (3)
- Towards Semantic Service Specification and Discovery (2004) (3)
- Requirements Engineering Since the Year One Thousand (2017) (3)
- Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language (2017) (3)
- Using the Tools in TRADE I: A Decision Support System for Traffic Light maintenance (1997) (3)
- The Yourdon Systems Method and the Toolkit for Conceptual Modeling (1996) (3)
- Using the tools in TRADE II: Specification and design of a meeting scheduler system (1997) (3)
- Towards Validating Risk Indicators Based on Measurement Theory (2010) (3)
- Learning from Accidents: A Systematic Review of Accident Analysis Methods and Models (2018) (3)
- Minimal semantics for transaction specifications in a multi-modal logic (1996) (3)
- Endurability and Profitability analysis of Collaborative Networks (2012) (3)
- Design Science and Software Engineering (2009) (3)
- Report on the Survey of Role-Based Access Control (RBAC) in Practice (2012) (3)
- How to assess telecom service availability risks for crisis organisations (2011) (3)
- Requirements engineering conferences: Wither industry tracks? (2013) (3)
- Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures (2009) (3)
- Model-driven system development: Experimental design and report of the pilot experiment (2011) (3)
- Structured Review of Code Clone Literature (2008) (3)
- Graphical Modeling of Security Arguments: Current State and Future Directions (2017) (3)
- Reducing the extensions of CTL with actions and real time (2000) (3)
- An Empirical Study to Validate the Use of Ontological Guidelines in the Creation of i* Models (2015) (2)
- Computer Literacy Systematic Literature Review Method (2017) (2)
- Research Goals and Research Questions (2014) (2)
- Understanding the Dynamics of Requirements Evolution: A Comparative Case Study of Groupware Implementation. (2004) (2)
- Introduction to the First International Workshop on Empirical Research in Business Process Management (ER-BPM 2009) (2009) (2)
- The influence of conceptual user models on the creation and interpretation of diagrams representing reactive systems (2006) (2)
- 06351 Abstracts Collection -- Methods for Modelling Software Systems (MMOSS) (2006) (2)
- Managing Trust in Business Webs Using Game Theory (2012) (2)
- Single-Case Mechanism Experiments (2014) (2)
- De-perimeterisation as a cycle: tearing down and rebuilding security perimeters (2008) (2)
- CRAC: Confidentiality risk assessment and IT-infrastructure comparison (2010) (2)
- Engineering Secure Software and Systems (2016) (2)
- A Handbook Supporting Model-Driven Software Development - a Case Study (2009) (2)
- Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting (2011) (2)
- Minimal Semantics for Action Specifications in First-order Dynamic Logic (1997) (2)
- Embedding Object-Oriented Design in System Engineering (1999) (2)
- A Semantics for Persistency in Propositional Dynamic Logic (2000) (2)
- A Trust Ontology for Business Collaborations (2012) (2)
- Towards a Method for Evolutionary Implementation of Groupware (1999) (2)
- Towards a sustainable blockchain use case (2019) (2)
- Requirements analysis of the VoD application using the tools in TRADE (1996) (2)
- A Logic for the Specification of Multi-Object Systems (Short Paper) (1999) (2)
- Philosophical Foundations of Information Systems Engineering (PHISE'05) (2005) (2)
- A domain-specific cross-organizational requirements engineering method (2004) (2)
- Traceability from the Business Value Model to the Enterprise Architecture: A Case Study (2021) (2)
- Eliciting user requirements for ambient intelligent systems: a case study (2005) (2)
- Generalization and specialization of object dynamics (1989) (2)
- A Study on Tangible Participative Enterprise Modelling (2016) (2)
- Securing the Extended Enterprise: A Method for Analyzing External Insider Threat (2012) (2)
- Observational Case Studies (2014) (2)
- An integrated conceptual model for information system security risk management supported by enterprise architecture management (2018) (2)
- RE@21 spotlight: Most influential papers from the requirements engineering conference (2013) (2)
- The Design Cycle (2014) (2)
- Modelling mobility aspects of security policies (Invited paper) (2004) (2)
- How to read and write a scientific evaluation paper (2009) (2)
- Axiomatic Specification of Database Domain Statics (1987) (2)
- Assumption-based risk identification method (ARM) in dynamic service provisioning (2013) (2)
- Review of code clone articles (2008) (2)
- The Unified Modeling Language (UML) (2003) (2)
- Using Value Models to Improve the Cost/Benefit Analysis of Inter-Organizational System Implementations (2012) (2)
- Minimal Semantics for Action Specifications in PDL (1996) (1)
- A classification of RE papers:(A)re we researching or designing RE techniques? (2005) (1)
- A newly introduced Industry Voice Column (2013) (1)
- Methodologies of requirements engineering research and practice (2003) (1)
- Documenting the ICT Architecture of TSI (2001) (1)
- On Quality Issues in Networked Value Constellations (2008) (1)
- The Role of Tangibility and Iconicity in Collaborative Modelling Tasks (2017) (1)
- Using the Tools in TRADE III: A controller for a Compact Dynamic Bus Station (1999) (1)
- Towards More Individualized Interfaces: Automating the Assessment of Computer Literacy (2019) (1)
- Preferential semantics for action specification in first-order modal action logic (1998) (1)
- Governance in Peer-to-Peer Networks Is a Design Problem (short paper) (2020) (1)
- SmTIP: A Big Data Integration Platform for Synchromodal Transport (2018) (1)
- Information Technology as Coordination Infrastructure (2006) (1)
- Analysing Large-Scale Scrum Practices with Respect to Quality Requirements Challenges (2020) (1)
- The place of expert systems in a typology of information systems. (1986) (1)
- Value-driven Security Agreements in Extended Enterprises (2010) (1)
- Requirements engineering (1996) (1)
- Towards the Integration of Value and Coordination Models - Position Paper - (2007) (1)
- Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions (2005) (1)
- Applying Generic AcciMap to a DDOS Attack on a Western-European Telecom Operator (2019) (1)
- Engineering Security Agreements Against External Insider Threat (2013) (1)
- Mu-calculus-based Deontic Logic for Regular Actions. (2000) (1)
- Dynamic Homecare Service Provisioning: A Field Test and Its Results (2013) (1)
- Entity-Relationship Diagrams (2003) (1)
- E-Business and Agency: Some Research Issues (2001) (1)
- Structuring Problem Analysis for Embedded Systems Modelling (2010) (1)
- Fuzzy Spatial Relations for Document Layout Analysis (1999) (1)
- Workshop on technology transfer in software engineering (2006) (1)
- Role change in database domains (1989) (1)
- Cross-Organizational Workflows: A Classification of Design Decisions (2005) (1)
- The Banking Industry Underestimates Costs of Cloud Migrations (2020) (1)
- Object Identiiers, Keys, and Surrogates | Object Identiiers Revisited (1995) (1)
- Empirical validation research methods (2012) (1)
- Requirements Engineering: Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings (2010) (1)
- Introduction to the workshop on technology transfer in software engineering (2006) (1)
- Risk Driven Requirements Specification (RiDeRS) of IT-based Homecare Systems (2013) (1)
- 19th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013). Proceedings of the REFSQ 2013 Workshops CreaRE, IWSPM, and RePriCo, the REFSQ 2013 Empirical Track (Empirical Live Experiment and Empirical Research Fair), the REFSQ 2013 Doctoral Symposi (2013) (1)
- Mechanistic modelling of cancer: some reflections from software engineering and philosophy of science (2012) (1)
- A Modal Temporal Dynamic Logic: Doing the Deadline (1997) (1)
- The Role of Deontic Logic in the Specification of Information Languages (1996) (1)
- Towards Management of Complex Service Compositions (2009) (1)
- Design science research in information systems and software systems engineering (2016) (1)
- Modeling control aspects of embedded systems (2005) (1)
- Structured Review of the Evidence for Effects of Code Duplication on Software Quality (2009) (1)
- RE 05: Engineering Successful Products (2006) (1)
- Ontologies and diagrams for software and systems engineering (2000) (1)
- 06351 Summary -- Methods for Modelling Software Systems (MMOSS) (2006) (1)
- Transforming e3value models into ArchiMate diagrams (2020) (1)
- Two Case Studies of Subsystem Design for General-Purpose CSCW Software Architectures (2000) (0)
- Business-IT Alignment in Value Webs (2008) (0)
- The Role of Goals in Design Reasoning (2013) (0)
- Quantitative Alignment of Enterprise Architectures with the Business Model (2021) (0)
- Not Yet Another Method (NYAM) (2003) (0)
- Mechanistic modelling of cancer: some reflections from software engineering and philosophy of science (2012) (0)
- Data Flow Diagrams (2003) (0)
- Engineering Secure Software and Systems (2012) (0)
- Accident Analysis Methods and Models - a Systematic Review (2018) (0)
- Is It Feasable to Construct a Semantics for All of UML? What Are the Outstanding Issues? (1999) (0)
- Statistical Difference-Making Experiments (2014) (0)
- Domain-Oriented architecture design for production control software (1998) (0)
- Stakeholder and Goal Analysis (2014) (0)
- Behavior Modeling and Design Guidelines (2003) (0)
- Methods for Modelling Software Systems (MMOSS), 27.08. - 01.09.2006 (2007) (0)
- Engineering Secure Software and Systems (2009) (0)
- Coordination process correctness and trust assumptions (2005) (0)
- Chapter 16 – Communication Diagrams (2003) (0)
- Chapter 2 - The Environment (2003) (0)
- Proceedings of the 21st International Conference on Advanced Information Systems Engineering (2009) (0)
- An Approach That Stimulates Architectural Thinking during Requirements Elicitation: An Empirical Evaluation (2020) (0)
- Proceedings of the 2006 international workshop on Software technology transfer in software engineering (2006) (0)
- Proceedings of CAiSE 2016 Doctoral Consortium co-located with 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016), Ljubljana, Slovenia, June 13-17, 2016 (2016) (0)
- Techniques for Reactive System Design: The Tools in TRADE (2001) (0)
- Chapter 19 EMBEDDING OBJECT-ORIENTED DESIGN IN SYSTEM ENGINEERING (2007) (0)
- Integration of formal and informal techniques for requirements engineering (1995) (0)
- A Road Map of Research Methods (2014) (0)
- Chapter 17 – Communication Semantics (2003) (0)
- Implementation Evaluation and Problem Investigation (2014) (0)
- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems (2022) (0)
- Descriptive Inference Design (2014) (0)
- CRAC : Confidentiality Risk Assessment and IT-Architecture Comparison (2010) (0)
- Method Description : ” Agile Requirements Prioritization : What Happens in Practice and What Is Described in Literature ” Garm Lucassen , 3484572 , Group 3 By : (2013) (0)
- Advanced Object-Oriented Requirements Specification Methods (1997) (0)
- A Minimalistic Decision Tree for Blockchain Business Cases in Healthcare (2020) (0)
- Requirements Engineering Conferences: Wither Industry Tracks? Unabridged Version With a Track History of the RE Conferences (2013) (0)
- Chapter 7 – Service Description (2003) (0)
- Minimal Semantics for Action Specifications in a Multi-modal Logic (1996) (0)
- How to Eat a Cake Without Having It: An Evaluation of the IFIP Working Group 8.1 Report on Information Systems Methodologies (1989) (0)
- Practical Requirements Engineering Solutions Guest Editors' Introduction (0)
- IPID, Integrated Policy-based Intrusion Detection (2005) (0)
- Stimulus-Response Behavior (2003) (0)
- 1 st International Workshop on Empirical Research in Process-Oriented Information Systems ER-POIS 2010 (2010) (0)
- Jackson System Development, Entity-relationship Analysis and Data Flow Models: a comparative study (1994) (0)
- Analyzing SAFe Practices with Respect to Quality Requirements: Findings from a Qualitative Study (2021) (0)
- A Business Ecosystem Architecture Modeling Framework Confidential draft version (2019) (0)
- Value-Oriented Coordination Process Model Engineering (2011) (0)
- Integrated Specification of Values, Objects and Processes for Object-Oriented Models (Extended Abstract) (1990) (0)
- Chapter 10 – The Dictionary (2003) (0)
- Joint Proceedings of REFSQ-2014 Workshops, Doctoral Symposium, Empirical Track, and Posters, co-located with the 20th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2014), Essen, Germany, April 7-10, 2014 (2014) (0)
- Introduction to the RE’03 Special Issue (2004) (0)
- Do the Scaled Agile Practices from S@S Help with Quality Requirements Challenges and If So, How Do They Do It? (2021) (0)
- Chapter 21 – Statemate (2003) (0)
- Proper Competences of IT Architects (2009) (0)
- The Empirical Cycle (2014) (0)
- Engineering Successful Products. Conference (2006) (0)
- A Comparison of the Notations Used in the Shlaer/Mellor Method and in TCM (1995) (0)
- Systematic Literature Review Method (2017) (0)
- ERD Modeling Guidelines (2003) (0)
- Introduction to the Workshop on Software Technology Transfer in Software Engineering (2006) (0)
- State Transition Diagrams (2003) (0)
- Transaction decomposition in Object-Oriented Models (1994) (0)
- Identification and quantification of benefits is more challenging and complex for ERP II than (2009) (0)
- Requirements Engineering: Foundation for Software Quality : Proceedings of the 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010 (2010) (0)
- Table of Contents (2008) (0)
- Chapter 13 – Behavioral Semantics (2003) (0)
- Availability Incidents in the Telecommunication Domain: A Literature Review (2020) (0)
- Experiment: Understandability of Goal Modeling with ARMOR (2014) (0)
- Proceedings of the Second international conference on Engineering Secure Software and Systems (2010) (0)
- Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente (2009) (0)
- Enhancing a Requirements Specification Method with a Vocabulary Acquisition Tool (2005) (0)
- Proposal for a Sentinels project VRIEND: Value-Based Security Risk Mitigation in Enterprise Networks that are Decentralized (2006) (0)
- Function Refinement Tree (2003) (0)
- Machine Intelligence and Explication (1987) (0)
- Exploring the Challenges of Modelling Landscapes (2014) (0)
- Matching Business Processes in ebXML (2003) (0)
- Analogic Inference Design (2014) (0)
- focus Stakeholders in Requirements (2007) (0)
- A Framework for Aligning Requirementsand Ar chitectures RoelJ (2001) (0)
- Third international workshop on empirical research in business process management (ER-BPM 2012) (2013) (0)
- Chapter 4 – Software Specifications (2003) (0)
- Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011 (2011) (0)
- Problem with UML concurrency semantics (1999) (0)
- Software Specification Methods (2003) (0)
- The mutual exclusion problem in reasoning about action and change (2002) (0)
- Statistical Inference Design (2014) (0)
- Actor-oriented Specification of Deontic Integrity (0)
- Dynamic Specification of Temporal Semantics of Conceptual Models (1991) (0)
- Requirements-Level Decomposition Guidelines (2003) (0)
- Proposal for a Sentinels project IPID: Integrated Policy-based Intrusion Detection (2004) (0)
- Chapter 5 – Mission Statement (2003) (0)
- An integrated system for ought-to-be and ought-to-do constraints (extended abstract) (1993) (0)
- Model-driven requirements engineering for pervasive, context-aware well-being applications (2011) (0)
- The Structure of Goal Models in Requirements Engineering (2014) (0)
- State Transition Lists and Tables (2003) (0)
- Roel Wieringa Machine Intelligence and Explication (2012) (0)
- Postmodern Structured Analysis (PSA) (2003) (0)
- Empirical Research in Process-oriented Information Systems (2010) (0)
- Chapter 18 – Context Modeling Guidelines (2003) (0)
- Second international workshop on from SofTware requirements to architectures (STRAW'03) (2003) (0)
- Key success domains for business-IT alignment in cross-governmental partnerships (2012) (0)
- 2 Running Case Study : The Amsterdam Times (2007) (0)
- An Analysis of Method Bridging in Euromethod Version 0 (1995) (0)
- Process generalization in conceptual models (1989) (0)
- Tool Support for Value Modeling and Risk Analysis of e-Services (2018) (0)
- Quality-Driven Requirements Engineering and Architectural Design (QuadREAD) (2006) (0)
- Discussion Issues for a Working Group on Update Semantics of Logic Databases (1991) (0)
- A Modelling Method for Embedded Systems (2005) (0)
- Explaining Embedded Software Modelling Decisions (2012) (0)
This paper list is powered by the following services:
Other Resources About Roel Wieringa
What Schools Are Affiliated With Roel Wieringa?
Roel Wieringa is affiliated with the following schools: