Gerald Quirchmayr
Orcid: 0000-0003-2998-742XAffiliations:
- University of Vienna, Austria
According to our database1,
Gerald Quirchmayr
authored at least 130 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review.
IEEE Access, 2024
Learning to Rank Privacy Design Patterns: A Semantic Approach to Meeting Privacy Requirements.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2024
Integrating Contextual Integrity in Privacy Requirements Engineering: A Study Case in Personal E-Health Applications.
Proceedings of the Innovations for Community Services - 24th International Conference, 2024
2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2022
Mach. Learn. Knowl. Extr., 2022
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data.
Comput. Secur., 2022
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2022
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2022
2021
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021
Assuring long-term operational resilience in a pandemic: Lessons learned from COVID-19.
Proceedings of the IAIT 2021: The 12th International Conference on Advances in Information Technology, Bangkok, Thailand, 29 June 2021, 2021
Proceedings of the Innovations for Community Services - 21st International Conference, 2021
An Approach to Supporting Militia Collaboration in Disaster Relief Through a Digital Environment.
Proceedings of the Innovations for Community Services - 21st International Conference, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain.
J. Data Intell., 2020
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020
2019
Int. J. Comput. Intell. Appl., 2019
SemIDEA: Towards a Semantic IoT Data Analytic Framework for Facilitating Environmental Protection.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019
Toward the Ontology-Based Security Verification and Validation Model for the Vehicular Domain.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Challenges of GDPR and the NIS Directive.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Enhancing credibility of digital evidence through provenance-based incident response handling.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Security-Driven Information Flow Modelling for Component Integration in Complex Environments.
Proceedings of the 10th International Conference on Advances in Information Technology, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, 2017
A comparative study on innovative approaches for privacy-preservation in knowledge discovery.
Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09, 2017
2016
Wissensaustausch und Vertrauen unter Computer Emergency Response Teams - eine europäische Herausforderung.
Datenschutz und Datensicherheit, 2016
Towards a generic data-model for cross-media communication during disasters & crises: Proposed framework for classification of platforms and technologies.
Proceedings of the 3rd International Conference on Information and Communication Technologies for Disaster Management, 2016
Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015
An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal Rules.
Proceedings of the 38th Australasian Computer Science Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study.
Proceedings of the Information and Communication Technology, 2014
A Pilot Study on the Effects of Personality Traits on the Usage of Mobile Applications: A Case Study on Office Workers and Tertiary Students in the Bangkok Area.
Proceedings of the Recent Advances in Information and Communication Technology, 2014
Proceedings of the International Conference on Computer, 2014
2013
A Knowledge Transfer Framework for Supporting the Transition to Agile Development of Web Application in the Thai Telecommunications Industry.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Advances in Information Technology - 6th International Conference, 2013
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Proceedings of the Perspectives in Business Informatics Research, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
IEEE Trans. Serv. Comput., 2011
Int. J. Pervasive Comput. Commun., 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP.
Proceedings of the Sixth International Conference on Availability, 2011
2010
HMD Prax. Wirtsch., 2010
Natural language processing technologies for developing a language learning environment.
Proceedings of the iiWAS'2010, 2010
A Prototype for the Support of Integrated Software Process Development and Improvement.
Proceedings of the Advances in Information Technology - 4th International Conference, 2010
Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results.
Proceedings of the ARES 2010, 2010
2009
Towards Requirements for a Case Preparation Support System Based on Digital Evidence.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Requirements for a Knowledge Transfer Framework in the Field of Software Development Process Management for Executive Information Systems in the Telecommunications Industry.
Proceedings of the Advances in Information Technology - Third International Conference, 2009
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management.
Proceedings of the Database and Expert Systems Applications, 2009
Einige aktuelle Gründe für eine integrierte Betrachtung von Rechtsinformatik und Informationsrecht.
Proceedings of the Informatik in Recht und Verwaltung: Gestern - Heute, 2009
2008
Proceedings of the iiWAS'2008, 2008
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
Proceedings of the 16th European Conference on Information Systems, 2008
A platform for the development of location-based mobile applications with privacy protection.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
Proceedings of the The Third International Conference on Availability, 2008
2007
Information preloading strategies for e-government sites based on user's stated preference.
J. Enterp. Inf. Manag., 2007
Proceedings of the Trust, 2007
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
Proceedings of the Fifteenth European Conference on Information Systems, 2007
The motivation and proposition of a privacy-enhancing architecture for operational databases.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the The Second International Conference on Availability, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Inf. Manag. Comput. Secur., 2006
Proceedings of the Data Mining - Theory, Methodology, Techniques, and Applications, 2006
An Evaluation Framework for e-Government Services Based on Principles Laid Out in COBIT, the ISO 9000 Standard, and TAM.
Proceedings of the Australasian Conference on Information Systems, 2006
2004
Proceedings of the Intelligent Information Processing II, 2004
Data Mining by MOUCLAS Algorithm for Petroleum Reservoir Characterization from Well Logging Data.
Proceedings of the Artificial Intelligence Applications and Innovations, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Supporting Collaborative Communication in a Multi-layer Meta-process Model for Evolutionary Shared Workflows.
Proceedings of the Fourth International Conference on Electronic Business, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
A Formal Model for the Relationship between Culture and Trust within is Security Management.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003
Int. J. Hum. Comput. Interact., 2003
A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Supporting Knowledge Management in Context-Aware and Pervasive Environments Using Event-Based Co-ordination.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing..
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
The Role Of Culture In the Development of Global E-Commerce Systems.
Proceedings of the Information Systems: The e-Business Challenge, 2002
Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002
Coordination of Inter-organisational Healthcare Processes via Specialisation of Internet-Based Object Life Cycles.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
2001
Adaptive Context Aware Legal Work Environments - Basis for Developing Legal Live Spaces on the Web.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001
Proceedings of the Electronic Commerce and Web Technologies, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001
2000
J. Intell. Fuzzy Syst., 2000
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
The Dissemination of United Nations Crime and Justice Information: Future Developments of UNCJIN.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998
1997
Proceedings of the Eighth International Workshop on Database and Expert Systems Applications, 1997
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997
1996
Proceedings of the COMPSAC '96, 1996
1995
Comparison and Analysis of Selected CIM-Laboratory Concepts and their Importance for the Improvement of Staff Training.
Proceedings of the Information Management in Computer Integrated Manufacturing: A Comprehensive Guide to State-of-the-Art CIM Solutions, 1995
A Fuzzy Model of Managerial Decision Making Incorporating Risk and Ambiguity Aversion
Proceedings of the Database and Expert Systems Applications, 1995
1994
Proceedings of the International Conference on Information and Communications Technologies in Tourism, 1994
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Open Texture and Knowledge Representation.
Proceedings of the Terminology and Knowledge Engineering, 1993
Proceedings of the Database and Expert Systems Applications, 4th International Conference, 1993
1991
A Formal Model for the Support of Analogical Reasoning in Legal Expert Systems.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991
Making C++ Object Persistent by Using a Standard Relational Database System.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991
1989
Die Unterstützung der inkrementellen juristischen Fallösung durch wissensbasierte Systeme.
PhD thesis, 1989
Der Einsatz von Expertensystemtechniken zur Unterstützung der Arbeit mit Rechtsinformationssystemen.
Proceedings of the GI, 1989
1987
Konzeptionelle Vorschläge für eine umfassende IT-Unterstützung von Richtern und Staatsanwälten sowie Ansätze zu ihrer Realisierung auf der Grundlage vernetzbarer PCs des Industriestandards.
Proceedings of the GI, 1987
Der Einsatz der Modellierungssprache OBLOG zum Entwurf von Juristischen Expertensystemen im Wege des Prototyping am Beispiel eines Modells des Verfahrens der Eidesstattlichen Versicherung.
Proceedings of the Informationsbedarfsermittlung und -analyse für den Entwurf von Informationssystemen, 1987