Exploring the dog–human relationship by combining fMRI, eye-tracking and behavioural measures S Karl, M Boch, A Zamansky, D van der Linden, IC Wagner, CJ Völter, ... Scientific reports 10 (1), 22273, 2020 | 76 | 2020 |
Schrödinger's security: opening the box on app developers' security rationale D Van Der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ... Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 52 | 2020 |
An empirical evaluation of design decision concepts in enterprise architecture G Plataniotis, S De Kinderen, D van Der Linden, D Greefhorst, HA Proper The Practice of Enterprise Modeling: 6th IFIP WG 8.1 Working Conference …, 2013 | 46 | 2013 |
Buddy's wearable is not your buddy: Privacy implications of pet wearables D Van Der Linden, A Zamansky, I Hadar, B Craggs, A Rashid IEEE Security & Privacy 17 (3), 28-39, 2019 | 45 | 2019 |
A systematic literature review of applications of the physics of notations D Van Der Linden, I Hadar IEEE Transactions on Software Engineering 45 (8), 736-759, 2018 | 40 | 2018 |
Formalizing enterprise architecture decision models using integrity constraints M Van Zee, G Plataniotis, D Van Der Linden, D Marosin 2014 IEEE 16th Conference on Business Informatics 1, 143-150, 2014 | 39 | 2014 |
What practitioners really want: requirements for visual notations in conceptual modeling D van der Linden, I Hadar, A Zamansky Software & Systems Modeling 18, 1813-1831, 2019 | 38 | 2019 |
A Principle-based Goal-oriented Requirements Language (GRL) for Enterprise Architecture. D Marosin, S Ghanavati, D van der Linden iStar, 2014 | 37 | 2014 |
How cognitively effective is a visual notation? on the inherent difficulty of operationalizing the physics of notations D van der Linden, A Zamansky, I Hadar Enterprise, Business-Process and Information Systems Modeling: 17th …, 2016 | 36 | 2016 |
Log my dog: perceived impact of dog activity tracking A Zamansky, D Van Der Linden, I Hadar, S Bleuer-Elsner Computer 52 (9), 35-43, 2019 | 35 | 2019 |
Platform-controlled social media APIs threaten open science BI Davidson, D Wischerath, D Racek, DA Parry, E Godwin, J Hinds, ... Nature Human Behaviour 7 (12), 2054-2057, 2023 | 34* | 2023 |
The case for adaptive security interventions I Rauf, M Petre, T Tun, T Lopez, P Lunn, D Van Der Linden, J Towse, ... ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-52, 2021 | 34 | 2021 |
Computational analysis of movement patterns of dogs with ADHD-like behavior S Bleuer-Elsner, A Zamansky, A Fux, D Kaplun, S Romanov, A Sinitca, ... Animals 9 (12), 1140, 2019 | 33 | 2019 |
Cybersecurity for smart farming: socio-cultural context matters D Van Der Linden, OA Michalec, A Zamansky IEEE Technology and Society Magazine 39 (4), 28-35, 2020 | 30 | 2020 |
The impact of surface features on choice of (in) secure answers by Stackoverflow readers D Van Der Linden, E Williams, J Hallett, A Rashid IEEE Transactions on Software Engineering 48 (2), 364-376, 2020 | 27 | 2020 |
Industry Responses to the European Directive on Security of Network and Information Systems ({{{{{NIS)}}}}}: Understanding policy implementation practices across critical … OA Michalec, D Van Der Linden, S Milyaeva, A Rashid Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 301-317, 2020 | 23 | 2020 |
K9-blyzer: Towards video-based automatic analysis of canine behavior S Amir, A Zamansky, D van der Linden Proceedings of the Fourth International Conference on Animal-Computer …, 2017 | 23 | 2017 |
Pushing boundaries of RE: Requirement elicitation for non-human users A Zamansky, D Van Der Linden, S Baskin 2017 ieee 25th international requirements engineering conference (re), 406-411, 2017 | 21 | 2017 |
Interspecies information systems D van der Linden Requirements Engineering 26 (4), 535-556, 2021 | 20 | 2021 |
A framework for improving the verifiability of visual notation design grounded in the physics of notations D Van Der Linden, A Zamansky, I Hadar 2017 IEEE 25th International Requirements Engineering Conference (RE), 41-50, 2017 | 20 | 2017 |