Mark Strembeck

Orcid: 0000-0003-1680-9296

Affiliations:
  • Vienna University of Economics and Business, Austria


According to our database1, Mark Strembeck authored at least 110 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Case Study Comparing Twitter Communities Detected by the Louvain and Leiden Algorithms During the 2022 War in Ukraine.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

2023
The Effects of Multiple Exposure to Highly Emotional Social Media Content During the Early Stages of the 2022 War in Ukraine.
SN Comput. Sci., September, 2023

Short- and long-term impact of psychological distance on human responses to a terror attack.
Online Soc. Networks Media, 2023

An Analysis of Twitter Communities Related to the 2022 War in Ukraine.
Proceedings of the 8th International Conference on Complexity, 2023

Mainstream and Alternative Narratives in the Wake of Gun Shootings.
Proceedings of the 8th International Conference on Complexity, 2023

2022
Does geographical location have an impact on data samples extracted from Twitter?
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

On the Dynamics of Narratives of Crisis during Terror Attacks.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

Dynamics of Personal Responses to Terror Attacks: A Temporal Network Analysis Perspective.
Proceedings of the 7th International Conference on Complexity, 2022

Automated Narratives: On the Influence of Bots in Narratives during the 2020 Vienna Terror Attack.
Proceedings of the 7th International Conference on Complexity, 2022

2021
Emotional message-exchanges during 18 crisis events.
Dataset, June, 2021

Toward a generalized notion of discrete time for modeling temporal networks.
Netw. Sci., 2021

"Evacuate everyone south of that line" Analyzing structural communication patterns during natural disasters.
J. Comput. Soc. Sci., 2021

Emotional Communication During Crisis Events: Mining Structural OSN Patterns.
IEEE Internet Comput., 2021

Building blocks of communication networks in times of crises: Emotion-exchange motifs.
Comput. Hum. Behav., 2021

"Stronger than Hate": On the Dissemination of Hate Speech during the 2020 Vienna Terrorist Attack.
Proceedings of the Eighth International Conference on Social Network Analysis, 2021

Structural Similarities of Emotion-exchange Networks: Evidence from 18 Crisis Events.
Proceedings of the 6th International Conference on Complexity, 2021

2020
You talkin' to me? Exploring Human/Bot Communication Patterns during Riot Events.
Inf. Process. Manag., 2020

RAMLFlask: managing artifact coupling for web APIs.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube.
Proceedings of the Influence and Behavior Analysis in Social Networks and Social Media, 2019

Something draws near, I can feel it: An analysis of human and bot emotion-exchange motifs on Twitter.
Online Soc. Networks Media, 2019

An analysis of emotion-exchange motifs in multiplex networks during emergency events.
Appl. Netw. Sci., 2019

An Analysis of Three Legal Citation Networks Derived from Austrian Supreme Court Decisions.
Proceedings of the 4th International Conference on Complexity, 2019

A Generalized Notion of Time for Modeling Temporal Networks.
Proceedings of the 4th International Conference on Complexity, 2019

2018
Politics, sentiments, and misinformation: An analysis of the Twitter discussion on the 2016 Austrian Presidential Elections.
Online Soc. Networks Media, 2018

Investigation of Emotion Exchange Motifs in Bot/Human Interactions During Riot Events.
Proceedings of the Fifth International Conference on Social Networks Analysis, 2018

On the Public Perception of Police Forces in Riot Events - The Role of Emotions in Three Major Social Networks During the 2017 G20 Riots.
Proceedings of the 3rd International Conference on Complexity, 2018

Why so Emotional? An Analysis of Emotional Bot-generated Content on Twitter.
Proceedings of the 3rd International Conference on Complexity, 2018

On Message Exchange Motifs Emerging During Human/Bot Interactions in Multilayer Networks: The Case of Two Riot Events.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Reusable and generic design decisions for developing UML-based domain-specific languages.
Inf. Softw. Technol., 2017

An Analysis of the Twitter Discussion on the 2016 Austrian Presidential Elections.
CoRR, 2017

Security-related Research in Ubiquitous Computing - Results of a Systematic Literature Review.
CoRR, 2017

Towards triaging code-smell candidates via runtime scenarios and method-call dependencies.
Proceedings of the XP2017 Scientific Workshops, Cologne, Germany, May 22 - 26, 2017, 2017

Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Extracting reusable design decisions for UML-based domain-specific languages: A multi-method study.
J. Syst. Softw., 2016

A decade of security research in ubiquitous computing: results of a systematic literature review.
Int. J. Pervasive Comput. Commun., 2016

Deriving UML-based specifications of inter-component interactions from runtime tests.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs.
Comput. J., 2015

Deriving Tailored UML Interaction Models from Scenario-Based Runtime Tests.
Proceedings of the Software Technologies - 10th International Joint Conference, 2015

An Approach for the Semi-automated Derivation of UML Interaction Models from Scenario-based Runtime Tests.
Proceedings of the ICSOFT-EA 2015, 2015

Findings from an Experiment on Flow Direction of Business Process Models.
Proceedings of the Enterprise Modelling and Information Systems Architectures, 2015

2014
Modellierungsunterstützung für die rollenbasierte Delegation in prozessgestützten Informationssystemen.
Wirtschaftsinf., 2014

Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach.
Softw. Syst. Model., 2014

Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems.
Inf. Softw. Technol., 2014

Towards a Comprehensive Complexity Assessment of RBAC Models.
EMISA Forum, 2014

Modeling Support for Role-Based Delegation in Process-Aware Information Systems.
Bus. Inf. Syst. Eng., 2014

Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents.
Proceedings of the Symposium on Applied Computing, 2014

Comparing Three Notations for Defining Scenario-based Model Tests: A Controlled Experiment.
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014

Natural-language Scenario Descriptions for Testing Core Language Models of Domain-Specific Languages.
Proceedings of the MODELSWARD 2014 - Proceedings of the 2nd International Conference on Model-Driven Engineering and Software Development, Lisbon, Portugal, 7, 2014

On the Importance of Flow Direction in Business Process Models.
Proceedings of the ICSOFT-EA 2014, 2014

Kaskadierender Widerruf von Delegationen in prozessbasierten Informationssystemen.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

DSL-based Architecting and DSL-based Architectures.
Proceedings of the ECSA 2014 Workshops & Tool Demos Track, 2014

A Review of Delegation and Break-Glass Models for Flexible Access Control Management.
Proceedings of the Business Information Systems Workshops, 2014

2013
The Influence of Notational Deficiencies on Process Model Comprehension.
J. Assoc. Inf. Syst., 2013

Security and Privacy in Business Processes: A Posteriori Analysis Techniques.
it Inf. Technol., 2013

Bridging the gap between role mining and role engineering via migration guides.
Inf. Secur. Tech. Rep., 2013

Enforcement of entailment constraints in distributed service-based business processes.
Inf. Softw. Technol., 2013

Modelling context-aware RBAC models for mobile business processes.
Int. J. Wirel. Mob. Comput., 2013

Developing a Domain-Specific Language for Scheduling in the European Energy Sector.
Proceedings of the Software Language Engineering - 6th International Conference, 2013

Generic support for RBAC break-glass policies in process-aware information systems.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Requirements-Driven Testing of Domain-Specific Core Language Models Using Scenarios.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Higher-order Rewriting of Model-to-Text Templates for Integrating Domain-specific Modeling Languages.
Proceedings of the MODELSWARD 2013 - Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development, Barcelona, Spain, 19, 2013

An Experimental Study on the Design and Modeling of Security Concepts in Business Processes.
Proceedings of the Practice of Enterprise Modeling, 2013

Supporting Customized Views for Enforcing Access Control Constraints in Real-Time Collaborative Web Applications.
Proceedings of the Web Engineering - 13th International Conference, 2013

Evaluating A Uml-Based Modeling Framework For Process-Related Security Properties: A Qualitative Multi-Method Study.
Proceedings of the 21st European Conference on Information Systems, 2013

2012
Factors of process model comprehension - Findings from a series of experiments.
Decis. Support Syst., 2012

Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments.
Proceedings of the Third FTRA International Conference on Mobile, 2012

A UML Extension for Modeling Break-Glass Policies.
Proceedings of the EMISA 2012, 2012

Deriving Process-Related RBAC Models from Process Execution Histories.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

A UML Extension for the Model-Driven Specification of Audit Rules.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models.
Proceedings of the Business Process Management Workshops, 2012

An Approach for Consistent Delegation in Process-Aware Information Systems.
Proceedings of the Business Information Systems - 15th International Conference, 2012

An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Modeling process-related RBAC models with extended UML activity models.
Inf. Softw. Technol., 2011

Modeling Process-Related Duties with Extended UML Activity and Interaction Diagrams.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

An integrated approach for identity and access management in a SOA context.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Deriving role engineering artifacts from business processes and scenario models.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Comparing complexity of API designs: an exploratory experiment on DSL-based framework integration.
Proceedings of the Generative Programming And Component Engineering, 2011

Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

Checking Satisfiability Aspects of Binding Constraints in a Business Process Context.
Proceedings of the Business Process Management Workshops, 2011

Conformance Checking of RBAC Policies in Process-Aware Information Systems.
Proceedings of the Business Process Management Workshops, 2011

Modeling Support for Confidentiality and Integrity of Object Flows in Activity Models.
Proceedings of the Business Information Systems - 14th International Conference, 2011

2010
Scenario-Driven Role Engineering.
IEEE Secur. Priv., 2010

Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Role-Based Access Control for Information Federations in the Industrial Service Sector.
Proceedings of the 18th European Conference on Information Systems, 2010

On the Cognitive Effectiveness of Routing Symbols in Process Modeling Languages.
Proceedings of the Business Information Systems, 13th International Conference, 2010

2009
An approach for the systematic development of domain-specific languages.
Softw. Pract. Exp., 2009

Reusable Architectural Decisions for DSL Design: Foundational Decisions in DSL Projects.
Proceedings of the EuroPLoP 2009: 14th Annual European Conference on Pattern Languages of Programming, 2009

2008
Modeling Interdependent Concern Behavior Using Extended Activity Models.
J. Object Technol., 2008

Evaluate - An Innovative Service for Learning Performance Monitoring in Businesses.
Proceedings of the BIS 2008 Workshops Proceedings: Social Aspects of the Web (SAW 2008), 2008

Influence Factors of Understanding Business Process Models.
Proceedings of the Business Information Systems, 11th International Conference, 2008

Specifying Separation of Duty Constraints in BPEL4People Processes.
Proceedings of the Business Information Systems, 11th International Conference, 2008

2007
Object-based and class-based composition of transitive mixins.
Inf. Softw. Technol., 2007

VIDIHIP - A Web Service based Integration Platform for Power Plant Control Systems.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007

A User Profile Derivation Approach based on Log-File Analysis.
Proceedings of the 2007 International Conference on Information & Knowledge Engineering, 2007

User Profile Refinement Using Explicit User Interest Modeling.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

2006
Modeling Composition in Dynamic Programming Environments with Model Transformations.
Proceedings of the Software Composition - 5th International Symposium, 2006

2005
Embedding Policy Rules for Software-Based Systems in a Requirements Context.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

2004
An integrated approach to engineer and enforce context constraints in RBAC environments.
ACM Trans. Inf. Syst. Secur., 2004

An Approach to Extract RBAC Models from BPEL4WS Processes.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Scenario-based Component Testing Using Embedded Metadata.
Proceedings of the Testing of Component-Based Systems and Software Quality, 2004

A Proposal for the Evolution of the ODRL Information Model.
Proceedings of the First International Workshop on the Open Digital Rights Language (ODRL), 2004

Conflict checking of separation of duty constraints in RBAC - implementation experiences.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Extending BPEL4WS for Multiple Instantiation.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

A Motivation for Multiple Activity Instantiation in BPEL4WS Processes.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

2003
An approach to engineer and enforce context constraints in an RBAC environment.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Experiences with the enforcement of access rights extracted from ODRL-based digital contracts.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

2002
A scenario-driven role engineering process for functional RBAC roles.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

2001
Design and implementation of a flexible RBAC-service in an object-oriented scripting language.
Proceedings of the CCS 2001, 2001


  Loading...