Empirical Evaluation of the VisiOn Privacy Platform

[1]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[2]  Vera Lúcia Raposo,et al.  Telemedicine: The legal framework (or the lack of it) in Europe , 2016, GMS Health Technology Assessment.

[3]  Shifali Arora,et al.  Privacy and Security in Mobile Health (mHealth) Research , 2014, Alcohol research : current reviews.

[4]  Craig Locatis,et al.  Cloud and traditional videoconferencing technology for telemedicine and distance learning. , 2015, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[5]  Paolo Giorgini,et al.  Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[6]  Haralambos Mouratidis,et al.  Modeling Trust Relationships for Developing Trustworthy Information Systems , 2014, Int. J. Inf. Syst. Model. Des..

[7]  Paolo Giorgini,et al.  Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .

[8]  Deven McGraw,et al.  For telehealth to succeed, privacy and security risks must be identified and addressed. , 2014, Health affairs.

[9]  E. Brous,et al.  Legal Considerations in Telehealth and Telemedicine , 2016, The American journal of nursing.

[10]  J. Kvedar,et al.  Privacy and Security Concerns in Telehealth. , 2014, The virtual mentor : VM.

[11]  Haralambos Mouratidis,et al.  Dealing with trust and control: A meta-model for trustworthy information systems development , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[12]  Magnus C. Ohlsson,et al.  Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.