default search action
Dirk van der Linden
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i3]Nareed Farhat, Teddy Lazebnik, Joke Monteny, Christel Palmyre Henri Moons, Eline Wydooghe, Dirk van der Linden, Anna Zamansky:
Digitally-Enhanced Dog Behavioral Testing: Getting Help from the Machine. CoRR abs/2308.06269 (2023) - 2022
- [j17]Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk van der Linden, John N. Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh:
The Case for Adaptive Security Interventions. ACM Trans. Softw. Eng. Methodol. 31(1): 9:1-9:52 (2022) - [j16]Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. IEEE Trans. Software Eng. 48(2): 364-376 (2022) - [c54]Dirk van der Linden:
Animal-centered design needs dignity: a critical essay on ACI's core concept. ACI 2022: 2:1-2:7 - [c53]Yael Hazan, Orit Hirsch-Matsioulas, Dirk van der Linden, Anna Zamansky:
How Can Technology Support Dog Shelters in Behavioral Assessment: an Exploratory Study. ACI 2022: 8:1-8:4 - [c52]Jasmine Forester-Owen, Dirk van der Linden:
Noisy technology, unhappy dogs: where technology might support caregiving in the home. ACI 2022: 10:1-10:6 - [c51]Alexandra Morgan, Dirk van der Linden:
Blind dogs need guides too: towards technological support for blind dog caregiving. ACI 2022: 22:1-22:7 - [c50]Irum Rauf, Tamara Lopez, Helen Sharp, Marian Petre, Thein Tun, Mark Levine, John N. Towse, Dirk van der Linden, Awais Rashid, Bashar Nuseibeh:
Influences of developers' perspectives on their engagement with security in code. CHASE@ICSE 2022: 86-95 - [i2]Dirk van der Linden, Brittany I. Davidson, Orit Hirsch-Matsioulas, Anna Zamansky:
On the role of technology in human-dog relationships: a future filled with dreams or nightmares? CoRR abs/2202.02030 (2022) - 2021
- [j15]Dirk van der Linden:
Interspecies information systems. Requir. Eng. 26(4): 535-556 (2021) - [c49]James McParlan, Dirk van der Linden:
Privacy labels should go to the dogs. ACI 2021: 3:1-3:10 - [c48]Daphna Golan-Shemesh, Tsippy Lotan, Yana Zadorozhnaya, Anna Zamansky, Tamar Brilant, Kira Ablamunits, Dirk van der Linden:
Exploring Digitalization of Animal-Assisted Reading. ACI 2021: 4:1-4:8 - [c47]Shahar Gofer, Vanessa Gris, Ariel Oren, Liran Sagi, Dirk van der Linden:
Chameleo: walk like a chameleon detection with AI. ACI 2021: 11:1-11:5 - [c46]Dirk van der Linden, Hava Dayan, Anna Zamansky, Irit Hadar:
Murder, She Modeled: Modeling to Support Crimino-Forensic Processes. BPMDS/EMMSAD@CAiSE 2021: 318-331 - 2020
- [j14]Dirk van der Linden, Matthew Edwards, Irit Hadar, Anna Zamansky:
Pets without PETs: on pet owners' under-estimation of privacy concerns in pet wearables. Proc. Priv. Enhancing Technol. 2020(1): 143-164 (2020) - [j13]Dirk van der Linden, Ola Aleksandra Michalec, Anna Zamansky:
Cybersecurity for Smart Farming: Socio-Cultural Context Matters. IEEE Technol. Soc. Mag. 39(4): 28-35 (2020) - [c45]Tom Menaker, Anna Zamansky, Dirk van der Linden, Dmitry I. Kaplun, Aleksandr Sinitica, Sabrina Karl, Ludwig Huber:
Towards a Methodology for Data-Driven Automatic Analysis of Animal Behavioral Patterns. ACI 2020: 12:1-12:6 - [c44]Irum Rauf, Dirk van der Linden, Mark Levine, John N. Towse, Bashar Nuseibeh, Awais Rashid:
Security but not for security's sake: The impact of social considerations on app developers' choices. ICSE (Workshops) 2020: 141-144 - [c43]Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. ICSE 2020: 149-160 - [c42]Dirk van der Linden, Jolita Ralyté, Kurt Sandkuhl, Jelena Zdravkovic:
Panel Discussion: Enterprise Modeling in the Digital Age. PoEM (Forum) 2020: 64-69 - [c41]Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, Awais Rashid:
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures. SOUPS @ USENIX Security Symposium 2020: 301-317 - [i1]Dirk van der Linden:
Interspecies information systems. CoRR abs/2004.12168 (2020)
2010 – 2019
- 2019
- [j12]Anna Zamansky, Dirk van der Linden, Irit Hadar, Stephane Bleuer-Elsner:
Log My Dog: Perceived Impact of Dog Activity Tracking. Computer 52(9): 35-43 (2019) - [j11]Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs, Awais Rashid:
Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables. IEEE Secur. Priv. 17(3): 28-39 (2019) - [j10]Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs:
Developing for non-human users: Reflecting on practical implications in the ubiquitous computing era. J. Ind. Inf. Integr. 14: 50-58 (2019) - [j9]Dirk van der Linden, Irit Hadar, Anna Zamansky:
What practitioners really want: requirements for visual notations in conceptual modeling. Softw. Syst. Model. 18(3): 1813-1831 (2019) - [j8]Dirk van der Linden, Irit Hadar:
A Systematic Literature Review of Applications of the Physics of Notations. IEEE Trans. Software Eng. 45(8): 736-759 (2019) - [c40]Dirk van der Linden, Emma J. Williams, Irit Hadar, Anna Zamansky:
Some might freak out: What if your dog's activity tracker were to have a data breach? ACI 2019: 4:1-4:12 - [c39]Dirk van der Linden, Brittany I. Davidson, Anna Zamansky:
The not so secret life of pets: pet owners' privacy concerns for pet location data. ACI 2019: 5:1-5:6 - [c38]Kopo M. Ramokapane, Dirk van der Linden, Anna Zamansky:
Does my dog really need a gadget?: What can we learn from pet owners' amotivations for using pet wearables? ACI 2019: 6:1-6:6 - [c37]Dmitrij Kaplun, Aleksandr Sinitca, Anna Zamansky, Stephane Bleuer-Elsner, Michael Plazner, Asaf Fux, Dirk van der Linden:
Animal Health Informatics: Towards a Generic Framework for Automatic Behavior Analysis Position Paper. HEALTHINF 2019: 436-441 - [c36]Dirk van der Linden, Irit Hadar, Matthew Edwards, Awais Rashid:
Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes. STAST 2019: 47-65 - 2018
- [j7]Dirk van der Linden, Awais Rashid:
The Effect of Software Warranties on Cybersecurity. ACM SIGSOFT Softw. Eng. Notes 43(4): 31-35 (2018) - [j6]Dirk van der Linden, Awais Rashid:
The Effect of Software Warranties on Cybersecurity. ACM SIGSOFT Softw. Eng. Notes 43(4): 53 (2018) - [j5]Anna Zamansky, Dirk van der Linden:
Activity Trackers for Raising Guide Dogs: Challenges and Opportunities. IEEE Technol. Soc. Mag. 37(4): 62-69 (2018) - [c35]Atif Saeed, Peter Garraghan, Barnaby Craggs, Dirk van der Linden, Awais Rashid, Syed Asad Hussain:
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation. IEEE CLOUD 2018: 606-613 - [c34]Dirk van der Linden, Awais Rashid, Emma J. Williams, Bogdan Warinschi:
Safe cryptography for all: towards visual metaphor driven cryptography building blocks. SEAD@ICSE 2018: 41-44 - [e1]Klaus Schmid, Paola Spoletini, Eya Ben Charrada, Yoram Chisik, Fabiano Dalpiaz, Alessio Ferrari, Peter Forbrig, Xavier Franch, Marite Kirikova, Nazim H. Madhavji, Cristina Palomares, Jolita Ralyté, Mehrdad Sabetzadeh, Pete Sawyer, Dirk van der Linden, Anna Zamansky:
Joint Proceedings of REFSQ-2018 Workshops, Doctoral Symposium, Live Studies Track, and Poster Track co-located with the 23rd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2018), Utrecht, The Netherlands, March 19, 2018. CEUR Workshop Proceedings 2075, CEUR-WS.org 2018 [contents] - 2017
- [j4]Dirk van der Linden, Gert De Sitter, Tim Verbelen, Christof Devriendt, Jan Helsen:
Towards an evolvable data management system for wind turbines. Comput. Stand. Interfaces 51: 87-94 (2017) - [c33]Anna Zamansky, Dirk van der Linden, Sofya Baskin:
Teaching Animal-Computer Interaction: an Experience Report. ACI 2017: 4:1-4:7 - [c32]Shir Amir, Anna Zamansky, Dirk van der Linden:
K9-Blyzer: Towards Video-Based Automatic Analysis of Canine Behavior. ACI 2017: 9:1-9:5 - [c31]Dirk van der Linden:
Using Visual Notations with Modeling Experts or Novices: What do the Experts Think? CAiSE Workshops 2017: 53-58 - [c30]Dirk van der Linden, Irit Hadar, Anna Zamansky:
On the Requirement from Practice for Meaningful Variability in Visual Notation. BPMDS/EMMSAD@CAiSE 2017: 189-203 - [c29]Anna Zamansky, Dirk van der Linden, Sofya Baskin, Vitaliya Kononova:
Is My Dog "Playing" Tablet Games?: Exploring Human Perceptions of Dog-Tablet Interactions. CHI PLAY 2017: 477-484 - [c28]Dirk van der Linden, Anna Zamansky, Irit Hadar:
A Framework for Improving the Verifiability of Visual Notation Design Grounded in the Physics of Notations. RE 2017: 41-50 - [c27]Anna Zamansky, Dirk van der Linden, Sofya Baskin:
Pushing Boundaries of RE: Requirement Elicitation for Non-human Users. RE 2017: 406-411 - [c26]Dirk van der Linden, Anna Zamansky:
Agile with Animals: Towards a Development Method. RE Workshops 2017: 423-426 - 2016
- [c25]Dirk van der Linden, Irit Hadar:
User Involvement in Applications of the PoN. CAiSE Workshops 2016: 109-115 - [c24]Dirk van der Linden, Anna Zamansky, Irit Hadar:
How Cognitively Effective is a Visual Notation? On the Inherent Difficulty of Operationalizing the Physics of Notations. BMMDS/EMMSAD 2016: 448-462 - [c23]Dirk van der Linden, Irit Hadar:
Evaluating the Evaluators - An Analysis of Cognitive Effectiveness Improvement Efforts for Visual Notations. ENASE 2016: 222-227 - [c22]Jens Gulden, Dirk van der Linden, Banu Aysolmaz:
A Research Agenda on Visualizations in Information Systems Engineering. ENASE 2016: 234-240 - [c21]Dirk van der Linden, Irit Hadar, Anna Zamansky:
Towards a Marketplace of Visual Elements for Notation Design. RE 2016: 353-358 - 2015
- [c20]Dirk van der Linden:
An Argument for More User-Centric Analysis of Modeling Languages' Visual Notation Quality. CAiSE Workshops 2015: 114-120 - [c19]Dirk van der Linden, Marc van Zee:
Insights from a Study on Decision Making in Enterprise Architecture. PoEM (Short Papers) 2015: 21-30 - [c18]Dirk van der Linden, Irit Hadar:
Cognitive effectiveness of conceptual modeling languages: Examining professional modelers. EmpiRE 2015: 9-12 - 2014
- [j3]Dirk van der Linden, Peter De Bruyn, Wolfgang Kastner, Herwig Mannaert:
Deriving guidelines for cross-vendor reuse of IEC 61131-3 modules based on Normalized Systems theorems. Comput. Stand. Interfaces 36(3): 598-603 (2014) - [j2]Dirk van der Linden, Stijn Hoppenbrouwers, Henderik Alex Proper:
On the Identification of Modeler Communities. Int. J. Inf. Syst. Model. Des. 5(2): 22-40 (2014) - [c17]Dirk van der Linden, Henderik Alex Proper, Stijn Hoppenbrouwers:
Conceptual Understanding of Conceptual Modeling Concepts: A Longitudinal Study among Students Learning to Model. CAiSE Workshops 2014: 213-218 - [c16]Dirk van der Linden, Henderik Alex Proper:
Category Structure of Language Types Common to Conceptual Modeling Languages. BMMDS/EMMSAD 2014: 317-331 - [c15]Diana Marosin, Sepideh Ghanavati, Dirk van der Linden:
A Principle-based Goal-oriented Requirements Language (GRL) for Enterprise Architecture. iStar 2014 - [c14]Dirk van der Linden, Henderik Alex Proper:
On the accommodation of conceptual distinctions in conceptual modeling languages. Modellierung 2014: 17-32 - [c13]Diana Marosin, Dirk van der Linden, Sergio Sousa:
A collaborative risk management framework for enterprise architecture. RCIS 2014: 1-6 - [c12]Marc van Zee, Georgios Plataniotis, Dirk van der Linden, Diana Marosin:
Formalizing Enterprise Architecture Decision Models Using Integrity Constraints. CBI (1) 2014: 143-150 - [c11]Dirk van der Linden, Marc van Zee:
On the Semantic Feature Structure of Modeling Concepts: An Empirical Study. CBI (2) 2014: 158-165 - 2013
- [c10]Dirk van der Linden, Henderik Alex Proper:
On the cognitive understanding of types in modeling languages. EMISA 2013: 149-162 - [c9]Georg Neugschwandtner, Maarten Reekmans, Dirk van der Linden:
An open automation architecture for flexible manufacturing. ETFA 2013: 1-5 - [c8]Georgios Plataniotis, Sybren de Kinderen, Dirk van der Linden, Danny Greefhorst, Henderik Alex Proper:
An Empirical Evaluation of Design Decision Concepts in Enterprise Architecture. PoEM 2013: 24-38 - [c7]Dirk van der Linden, Henderik Alex Proper:
Do Conceptual Modeling Languages Accommodate Enough Explicit Conceptual Distinctions? PoEM (Short Papers) 2013: 126-135 - [c6]Dirk van der Linden:
Categorization of Modeling Language Concepts: Graded or Discrete? OTM Workshops 2013: 743-746 - 2012
- [j1]Dirk van der Linden, Stijn Hoppenbrouwers, Alina Lartseva, Wolfgang A. Molnar:
Beyond terminologies: Using psychometrics to validate shared ontologies. Appl. Ontology 7(4): 471-487 (2012) - [c5]Dirk van der Linden, Wolfgang Kastner, Herwig Mannaert:
An ISA88 Phase in IEC 61131-3 code based on the concepts of a Normalized flow element. ETFA 2012: 1-8 - [c4]Dirk van der Linden, Stijn Hoppenbrouwers:
Challenges of Identifying Communities with Shared Semantics in Enterprise Modeling. PoEM 2012: 160-171 - [c3]Dirk van der Linden, Khaled Gaaloul, Wolfgang A. Molnar:
Initial Results from a Study on Personal Semantics of Conceptual Modeling Languages. NLDB 2012: 360-365 - [p1]S. J. B. A. Hoppenbrouwers, Wim van Stokkum, Maria-Eugenia Iacob, Ilona Wilmont, D. J. T. van der Linden, Chintan Amrit, Maarten Joosen:
Stakeholder Communication. Agile Service Development 2012: 141-176 - 2011
- [c2]D. J. T. van der Linden, Stijn Hoppenbrouwers, Alina Lartseva, Henderik Alex Proper:
Towards an Investigation of the Conceptual Landscape of Enterprise Architecture. BMMDS/EMMSAD 2011: 526-535 - [c1]Dirk van der Linden, Herwig Mannaert, Wolfgang Kastner, Vincent Vanderputten, Herbert Peremans, Jan Verelst:
An OPC UA interface for an evolvable ISA88 control module. ETFA 2011: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint