Maritta Heisel
Orcid: 0000-0002-3275-2819Affiliations:
- University of Duisburg-Essen, Germany
According to our database1,
Maritta Heisel
authored at least 208 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on uni-due.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour.
Soc. Netw. Anal. Min., December, 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024
2023
Proceedings of the 18th International Conference on Software Technologies, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Applicable Formal Methods for Safe Industrial Products, 2023
2022
Community detection for access-control decisions: Analysing the role of homophily and information diffusion in Online Social Networks.
Online Soc. Networks Media, 2022
The Role of Trustworthiness Facets for Developing Social Media Applications: A Structured Literature Review.
Inf., 2022
Proceedings of the Trust, Privacy and Security in Digital Business, 2022
Proceedings of the Human-Centered Software Engineering, 2022
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Proceedings of the Quality of Information and Communications Technology, 2021
P2P Frames: Pattern-based Characterization of Functional Requirements for Peer-to-peer Systems.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2021
Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
2020
Correction: Díaz Ferreyra, N.E., et al. Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Information 2020, 11, 399.
Inf., 2020
Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions.
Inf., 2020
Building Trustworthiness in Computer-Mediated Introduction: A Facet-Oriented Framework.
Proceedings of the SMSociety'20: International Conference on Social Media and Society, 2020
Proceedings of the Software Technologies - 15th International Conference, 2020
Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions.
Proceedings of the 15th International Conference on Software Technologies, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020
Persuasion Meets AI: Ethical Considerations for the Design of Social Engineering Countermeasures.
Proceedings of the 12th International Joint Conference on Knowledge Discovery, 2020
PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2020
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated Introduction.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020
Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019
Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems.
Proceedings of the Software Technologies - 14th International Conference, 2019
Proceedings of the 14th International Conference on Software Technologies, 2019
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019
Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the Software Engineering for Variability Intensive Systems, 2019
2018
Future Internet, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the Social Informatics, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams.
Proceedings of the Software Technologies - 13th International Conference, 2018
Proceedings of the 13th International Conference on Software Technologies, 2018
Proceedings of the 44th Euromicro Conference on Software Engineering and Advanced Applications, 2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018
A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface.
Reliab. Eng. Syst. Saf., 2017
Inf., 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017
Aspect Frames: Describing Cross-Cutting Concerns in Aspect-Oriented Requirements Engineering.
Proceedings of the 22nd European Conference on Pattern Languages of Programs, 2017
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017
Proceedings of the Network Intelligence Meets User Centered Social Media Networks [4th European Network Intelligence Conference, 2017
Proceedings of the Machine Learning and Knowledge Extraction, 2017
Proceedings of the Automotive - Safety & Security 2017, 2017
2016
ACM SIGSOFT Softw. Eng. Notes, 2016
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016
Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model.
Proceedings of the Software Technologies, 11th International Joint Conference, 2016
The Six-Variable Model - Context Modelling Enabling Systematic Reuse of Control Software.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016
Patterns for identification of trust concerns and specification of trustworthiness requirements.
Proceedings of the 21st European Conference on Pattern Languages of Programs, 2016
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems.
Proceedings of the Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, 2015
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface.
Proceedings of the Computer Safety, Reliability, and Security, 2015
Engineering trust- and reputation-based security controls for future internet systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the Software Technologies - 10th International Joint Conference, 2015
Systematic Identification of Information Flows from Requirements to Support Privacy Impact Assessments.
Proceedings of the ICSOFT-PT 2015, 2015
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015
Towards systematic selection of architectural patterns with respect to quality requirements.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015
Towards a reliable mapping between performance and security tactics, and architectural patterns.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015
1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA): Workshop Introduction.
Proceedings of the 2015 European Conference on Software Architecture Workshops, 2015
2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2014
Proceedings of the Software Technologies - 9th International Joint Conference, 2014
Proceedings of the Software Technologies - 9th International Joint Conference, 2014
Proceedings of the ICSOFT-PT 2014, 2014
Proceedings of the ICSOFT-PT 2014, 2014
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering Method.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Proceedings of the Relating System Quality and Software Architecture, 2014
2013
Erratum to: A pattern-based method for establishing a cloud-specific information security management system.
Requir. Eng., 2013
A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Requir. Eng., 2013
Dagstuhl Reports, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
A structured and model-based hazard analysis and risk assessment method for automotive systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
Proceedings of the Software Technologies - 8th International Joint Conference, 2013
Proceedings of the ICSOFT 2013, 2013
Proceedings of the 18th European Conference on Pattern Languages of Program, 2013
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
Proceedings of the Software Engineering 2012: Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012
Designing architectures from problem descriptions by interactive model transformation.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures, 2012
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012
Proceedings of the Software Service and Application Engineering, 2012
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011
Towards a Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the KMIS 2011, 2011
Proceedings of the Fundamental Approaches to Software Engineering, 2011
Proceedings of the Software Architecture - 5th European Conference, 2011
Proceedings of the 15th European Conference on Software Maintenance and Reengineering, 2011
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011
Proceedings of the Relating Software Requirements and Architectures., 2011
2010
Proceedings of the Computer Safety, 2010
Proceedings of the Formal Methods and Software Engineering, 2010
2009
Proceedings of the Software Engineering 2009, 2009
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM2009).
Proceedings of the Software Engineering 2009, 2009
Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009).
Proceedings of the Software Engineering 2009: Fachtagung des GI-Fachbereichs Softwaretechnik 02.-06.03. 2009 in Kaiserslautern, 2009
Proceedings of the Computer Safety, 2009
Proceedings of the Advances in Software Engineering Techniques, 2009
Proceedings of the Fundamental Approaches to Software Engineering, 2009
2008
Softwaretechnik-Trends, 2008
Proceedings of the Software Engineering 2008, 2008
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2008).
Proceedings of the Software Engineering 2008, 2008
Proceedings of the Software Engineering 2008. Fachtagung des GI-Fachbereichs Softwaretechnik, 2008
Proceedings of the Model Driven Engineering Languages and Systems, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Bericht über den Workshop <i>Software-Architektur und Migration</i> im Rahmen der Software-Engineering 2007, 27. März 2007 in Hamburg.
Softwaretechnik-Trends, 2007
Pattern-Based Exploration of Design Alternatives for the Evolution of Software Architectures.
Int. J. Cooperative Inf. Syst., 2007
Einführung.
Proceedings of the Software Engineering 2007, 2007
WG5: Workshop Softwarearchitektur und Migration.
Proceedings of the Software Engineering 2007, 2007
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007
Proceedings of the Software Architecture, First European Conference, 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the Reliable Software Technologies, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Methods to Create and Use Cross-Domain Analysis Patterns.
Proceedings of the EuroPLoP' 2006, 2006
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2006), August 29, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006
2005
Proceedings of the International Workshop on Formal Aspects of Component Software, 2005
Proceedings of the Computer Safety, 2005
Proceedings of the Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme I, 2005
2004
A method for guiding software evolution.
Proceedings of the IASTED International Conference on Software Engineering, 2004
2003
2002
Use of Patterns in Formal Development: Systematic Transition from Problems to Architectural Designs.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2002
Proceedings of the Computer Safety, 2002
Proceedings of the Formal Methods and Software Engineering, 2002
Proceedings of the Computer Security, 2002
2001
Specifying embedded systems with statecharts and Z: an agenda for cyclic software components.
Sci. Comput. Program., 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the Language Constructs for Describing Features, 2000
1999
Proceedings of the Computer Safety, 1999
Proceedings of the Conceptual Modeling, 1999
1998
Proceedings of the Computer Safety, 1998
Proceedings of the 9th International Workshop on Software Specification and Design, 1998
Tutorium: Entwicklung sicherheitskritischer eingebetteter Systeme: Der ESPRESS-Ansatz.
Proceedings of the Informatik '98, 1998
A Heuristic Approach to Detect Feature Interactions in Requirements.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998
Specifying Embedded Systems with Staecharts and Z: An Agenda for Cyclic Software Components.
Proceedings of the Fundamental Approaches to Software Engineering, 1998
1997
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997
Proceedings of the 16th International Conference on Computer Safety, 1997
Proceedings of the Requirements Targeting Software and Systems Engineering, 1997
1996
Proceedings of the 15th International Conference on Computer Safety, 1996
1995
Proceedings of the 14th International Conference on Computer Safety, 1995
Proceedings of the 5th European Software Engineering Conference, 1995
Proceedings of the Algebraic Methodology and Software Technology, 1995
1994
Korrekte Software: Nur eine Illusion?
Inform. Forsch. Entwickl., 1994
1993
"Frauenspezifische Informatik" und Frauenförderpläne: Wie paßt das zusammen?.
Proceedings of the Frauen in Mathematik und Informatik, 1993
1992
Sci. Comput. Program., 1992
1990
Proceedings of the 10th International Conference on Automated Deduction, 1990
1989
Proceedings of the GWAI-89, 1989
Proceedings of the Logic at Botik '89, 1989
1988
Bericht über den Workshop "Logik und Wissensrepräsentation".
Künstliche Intell., 1988
Proceedings of the 9th International Conference on Automated Deduction, 1988
1987
Proceedings of the GWAI-87, 11th German Workshop on Artificial Intelligence, Geseke, Germany, September 28, 1987
1986
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986