Dirk van der Linden
Cited by
Cited by
Exploring the dog–human relationship by combining fMRI, eye-tracking and behavioural measures
S Karl, M Boch, A Zamansky, D van der Linden, IC Wagner, CJ Völter, ...
Scientific reports 10 (1), 22273, 2020
An empirical evaluation of design decision concepts in enterprise architecture
G Plataniotis, S De Kinderen, D van Der Linden, D Greefhorst, HA Proper
The Practice of Enterprise Modeling: 6th IFIP WG 8.1 Working Conference …, 2013
Buddy's wearable is not your buddy: Privacy implications of pet wearables
D Van Der Linden, A Zamansky, I Hadar, B Craggs, A Rashid
IEEE Security & Privacy 17 (3), 28-39, 2019
Schrödinger's security: opening the box on app developers' security rationale
D Van Der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Formalizing enterprise architecture decision models using integrity constraints
M Van Zee, G Plataniotis, D Van Der Linden, D Marosin
2014 IEEE 16th Conference on Business Informatics 1, 143-150, 2014
A systematic literature review of applications of the physics of notations
D Van Der Linden, I Hadar
IEEE Transactions on Software Engineering 45 (8), 736-759, 2018
A Principle-based Goal-oriented Requirements Language (GRL) for Enterprise Architecture.
D Marosin, S Ghanavati, D van der Linden
iStar, 2014
Log my dog: perceived impact of dog activity tracking
A Zamansky, D Van Der Linden, I Hadar, S Bleuer-Elsner
Computer 52 (9), 35-43, 2019
How cognitively effective is a visual notation? on the inherent difficulty of operationalizing the physics of notations
D van der Linden, A Zamansky, I Hadar
Enterprise, Business-Process and Information Systems Modeling: 17th …, 2016
What practitioners really want: requirements for visual notations in conceptual modeling
D van der Linden, I Hadar, A Zamansky
Software & Systems Modeling 18, 1813-1831, 2019
The case for adaptive security interventions
I Rauf, M Petre, T Tun, T Lopez, P Lunn, D Van Der Linden, J Towse, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-52, 2021
Computational analysis of movement patterns of dogs with ADHD-like behavior
S Bleuer-Elsner, A Zamansky, A Fux, D Kaplun, S Romanov, A Sinitca, ...
Animals 9 (12), 1140, 2019
Cybersecurity for smart farming: socio-cultural context matters
D Van Der Linden, OA Michalec, A Zamansky
IEEE Technology and Society Magazine 39 (4), 28-35, 2020
The impact of surface features on choice of (in) secure answers by Stackoverflow readers
D Van Der Linden, E Williams, J Hallett, A Rashid
IEEE Transactions on Software Engineering 48 (2), 364-376, 2020
K9-Blyzer: Towards video-based automatic analysis of canine behavior
S Amir, A Zamansky, D van der Linden
Proceedings of the Fourth International Conference on Animal-Computer …, 2017
Industry Responses to the European Directive on Security of Network and Information Systems ({{{{{NIS)}}}}}: Understanding policy implementation practices across critical …
OA Michalec, D Van Der Linden, S Milyaeva, A Rashid
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 301-317, 2020
A framework for improving the verifiability of visual notation design grounded in the physics of notations
D Van Der Linden, A Zamansky, I Hadar
2017 IEEE 25th International Requirements Engineering Conference (RE), 41-50, 2017
Pushing boundaries of RE: Requirement elicitation for non-human users
A Zamansky, D Van Der Linden, S Baskin
2017 ieee 25th international requirements engineering conference (re), 406-411, 2017
Interspecies information systems
D van der Linden
Requirements Engineering 26 (4), 535-556, 2021
Activity trackers for raising guide dogs: Challenges and opportunities
A Zamansky, D Van Der Linden
IEEE Technology and Society Magazine 37 (4), 62-69, 2018
The system can't perform the operation now. Try again later.
Articles 1–20