Publikationer av Ulrik Franke
Refereegranskade
Artiklar
[1]
U. Franke, "Att utveckla och implementera cybersäkerhetspolicy : Lärdomar från den finansiella sektorn," Statsvetenskaplig Tidskrift, vol. 126, no. 2, s. 251-272, 2024.
[2]
A. Andreasson et al., "Cybersecurity work at Swedish administrative authorities : taking action or waiting for approval," Cognition, Technology & Work, 2024.
[3]
U. Franke, "Rawlsian Algorithmic Fairness and a Missing Aggregation Property of the Difference Principle," Philosophy & Technology, vol. 37, no. 3, 2024.
[4]
U. Franke, "Algorithmic Fairness, Risk, and the Dominant Protective Agency," Philosophy & Technology, vol. 36, no. 4, 2023.
[5]
C. Barreto et al., "Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime," Computers & security (Print), vol. 131, s. 1-16, 2023.
[6]
U. Franke, "Algorithmic Political Bias—an Entrenchment Concern," Philosophy & Technology, vol. 35, no. 3, 2022.
[7]
J. Dexe et al., "Explaining automated decision-making: a multinational study of the GDPR right to meaningful information," Geneva papers on risk and insurance. Issues and practice, 2022.
[8]
U. Franke, "First- and Second-Level Bias in Automated Decision-making," Philosophy & Technology, vol. 35, no. 2, 2022.
[9]
U. Franke, "How Much Should You Care About Algorithmic Transparency as Manipulation?," Philosophy & Technology, vol. 35, no. 4, 2022.
[10]
S. Varga, J. Brynielsson och U. Franke, "Cyber-threat perception and risk management in the Swedish financial sector," Computers & security (Print), vol. 105, 2021.
[11]
U. Franke, "Rawls’s Original Position and Algorithmic Fairness," Philosophy & Technology, vol. 34, no. 4, s. 1803-1817, 2021.
[12]
M. Välja et al., "Automating threat modeling using an ontology framework : Validated with data from critical infrastructures," Cybersecurity, vol. 3, no. 1, 2020.
[13]
J. Dexe och U. Franke, "Nordic lights? National AI policies for doing well by doing good," Journal of Cyber Policy, vol. 5, s. 332-349, 2020.
[14]
U. Franke och A. Hoxell, "Observable Cyber Risk on Cournot Oligopoly Data Storage Markets," Risks, vol. 8, no. 4, 2020.
[15]
M. Välja et al., "A Framework for Automatic IT Architecture Modeling : Applying Truth Discovery," Complex Systems Informatics and Modeling Quarterly, no. 20, 2019.
[16]
A. Fazlollahi och U. Franke, "Measuring the impact of enterprise integration on firm performance using data envelopment analysis," International Journal of Production Economics, vol. 200, s. 119-129, 2018.
[17]
U. Franke och M. Buschle, "Experimental Evidence on Decision-Making in Availability Service Level Agreements," IEEE Transactions on Network and Service Management, vol. 13, no. 1, s. 58-70, 2016.
[18]
U. Franke, P. Johnson och J. König, "An architecture framework for enterprise IT service availability analysis," Software and Systems Modeling, vol. 13, no. 4, s. 1417-1445, 2014.
[19]
P. Johnson et al., "An architecture modeling framework for probabilistic prediction," Information Systems and E-Business Management, vol. 12, no. 4, s. 595-622, 2014.
[20]
P. Närman et al., "Enterprise Architecture Availability Analysis Using Fault Trees and Stakeholder Interviews," Enterprise Information Systems, vol. 8, no. 1, s. 1-25, 2014.
[21]
L. Gingnell et al., "Quantifying Success Factors for IT Projects-An Expert-Based Bayesian Model," Information systems management, vol. 31, no. 1, s. 21-36, 2014.
[22]
C. Sandels, U. Franke och L. Nordström, "Vehicle to grid : System reference architectures and Monte Carlo simulations," International Journal of Vehicle Autonomous Systems, vol. 11, no. 2-3, s. 205-228, 2013.
[23]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian framework," Software quality journal, vol. 20, no. 2, s. 369-394, 2012.
[24]
U. Franke, "Optimal IT service availability : Shorter outages, or fewer?," IEEE Transactions on Network and Service Management, vol. 9, no. 1, s. 22-33, 2012.
[25]
H. Holm et al., "Success Rate of Remote Code Execution Attacks : Expert Assessments and Observations," Journal of universal computer science (Online), vol. 18, no. 6, s. 732-749, 2012.
[26]
R. Lagerström et al., "A method for creating entreprise architecture metamodels : applied to systems modifiability," International Journal of Computer Science and Applications, vol. 6, no. 5, s. 89-120, 2009.
Konferensbidrag
[27]
U. Franke et al., "Requirements on and Procurement of Explainable Algorithms-A Systematic Review of the Literature," i NEW TRENDS IN DISRUPTIVE TECHNOLOGIES, TECH ETHICS, AND ARTIFICIAL INTELLIGENCE, DITTET 2024, 2024, s. 40-52.
[28]
T. Besker, U. Franke och J. Axelsson, "Navigating the Cyber-Security Risks and Economics of System-of-Systems," i 2023 18th Annual System of Systems Engineering Conference, SoSe 2023, 2023.
[29]
A. Andreasson et al., "A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic," i Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021, s. 1-8.
[30]
U. Franke, J. Turell och I. Johansson, "The Cost of Incidents in Essential Services—Data from Swedish NIS Reporting," i Lecture Notes in Computer Science, 2021, s. 116-129.
[31]
A. Andreasson et al., "A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic," i 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2020.
[32]
U. Franke och J. Wernberg, "A survey of cyber security in the Swedish manufacturing industry," i 2020 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2020.
[33]
J. Dexe, J. Ledendal och U. Franke, "An Empirical Investigation of the Right to Explanation Under GDPR in Insurance," i Lecture Notes in Computer Science, 2020, s. 125-139.
[34]
J. Dexe et al., "Towards increased transparency with value sensitive design," i Lecture Notes in Computer Science book series (LNCS, volume 12217), 2020, s. 3-15.
[35]
M. Välja et al., "Bridging the gap between business and technology in strategic decision-making for cyber security management," i Proceedings of 2016 Portland International Conference on Management of Engineering and Technology, 2016, s. 32-42.
[36]
J. Brynielsson et al., "Using Cyber Defense Exercises to Obtain Additional Data for Attacker Profiling," i Proceedings of the 14th IEEE International Conference on Intelligence and Security Informatics (ISI 2016), 2016, s. 37-42.
[37]
F. Ulrik, M. Buschle och M. Österlind, "An experiment in SLA decision-making," i Economics of Grids, Clouds, Systems, and Services - 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013, 2013, s. 256-267.
[38]
P. Johnson et al., "P2AMF : Predictive, probabilistic architecture modeling framework," i Proceedings Enterprise Interoperability - 5th International IFIP Working Conference, IWEI 2013, 2013, s. 104-117.
[39]
A. Fazlollahi, U. Franke och J. Ullberg, "Benefits of enterprise integration : Review, classification, and suggestions for future research," i Enterprise Interoperability : 4th International IFIP Working Conference, IWEI 2012, Harbin, China, September 6-7, 2012. Proceedings, 2012, s. 34-45.
[40]
M. Buschle et al., "A Tool for Enterprise Architecture Analysis Using the PRM Formalism," i INFORMATION SYSTEMS EVOLUTION, 2011, s. 108-121.
[41]
J. König et al., "An extended framework for reliability analysis of ICT for power systems," i 2011 IEEE PES Trondheim PowerTech : The Power of Technology for a Sustainable Society, POWERTECH 2011, 2011, s. 6019343.
[42]
J. Saat et al., "Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions," i Proceedings of the Hawaii International Conference on System Sciences (HICSS-44), 2011, s. 1-9.
[43]
H. Holm et al., "Expert assessment on the probability of successful remote code execution attacks," i Proceedings of 8th International Workshop on Security in Information Systems - WOSIS 2011, 2011, s. 49-58.
[44]
L. M. Von Würtemberg et al., "IT project success factors : An experience report," i Portland International Center for Management of Engineering and Technology : Technology Management in the Energy-Smart World, 2011.
[45]
C. Sandels, U. Franke och L. Nordström, "Vehicle to grid communication : Monte carlo simulations based on automated meter reading reliability," i 17th Power Systems Computation Conference, 2011.
[46]
J. Ullberg et al., "A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL," i Enterprise interoperability iv : making the internet of the future for the future of enterprise, 2010, s. 81-90.
[47]
M. Buschle et al., "A tool for enterprise architecture analysis using the PRM formalism," i CEUR Workshop Proceedings, 2010.
[48]
M. Jensen et al., "Availability of a SCADA/OMS/DMS system - A case study," i IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe, 2010.
[49]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian model," i Proc. Fourth International Workshop on Software Quality and Maintainability, 2010.
[50]
J. Saat et al., "Enterprise Architecture Meta Models for IT/Business Alignment Situations," i 14th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2010, 2010, s. 14-23.
[51]
U. Franke et al., "Factors Affecting Successful Project Management of Technology-Intense Projects," i PICMET '10 - Portland International Center for Management of Engineering and Technology, Proceedings - Technology Management for Global Economic Growth, 2010, s. 1538-1543.
[52]
U. Franke et al., "IT consolidation - An optimization approach," i 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2010, s. 21-26.
[53]
J. König, U. Franke och L. Nordström, "Probabilistic Availability Analysis of Control and Automation Systems for Active Distribution Networks," i 2010 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION : SMAR SOLUTIONS FOR A CHANGING WORLD, 2010.
[54]
U. Franke et al., "Trends in Enterprise Architecture Practice : A Survey," i Lecture Notes in Business Information Processing, 2010, s. 16-29.
[55]
C. Sandels et al., "Vehicle to grid - Monte Carlo simulations for optimal aggregator strategies," i 2010 International Conference on Power System Technology : Technological Innovations Making Power Grid Smarter, POWERCON2010, 2010.
[56]
C. Sandels et al., "Vehicle to grid - Reference architectures for the control markets in Sweden and Germany," i IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe, 2010.
[57]
U. Franke et al., "A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis : CSMR 2009, PROCEEDINGS," i 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS, 2009, s. 241-245.
[58]
S. Aier et al., "A Survival Analysis of Application Life Spans based on Enterprise Architecture Models," i Proc. 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2009, 2009, s. 141-154.
[59]
M. Ekstedt et al., "A Tool for Enterprise Architecture Analysis of Maintainability : CSMR 2009, PROCEEDINGS," i EUR CON SFTWR MTNCE REENGR, 2009, s. 327-328.
[60]
U. Franke et al., "A formal method for cost and accuracy trade-off analysis in software assessment measures," i RCIS 2009 : PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, s. 295-302.
[61]
S. Buckl et al., "A pattern-based approach to quantitative enterprise architecture analysis," i 15th Americas Conference on Information Systems 2009, AMCIS 2009, 2009, s. 2314-2324.
[62]
U. Franke och P. Johnson, "An Enterprise Architecture Framework for Application Consolidation in the Swedish Armed Forces," i 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, s. 264-273.
[63]
P. Närman, U. Franke och L. Nordström, "Assessing the quality of service of Powel's netbas at a nordic utility," i IET Conference Publications, 2009.
[64]
P. Närman et al., "Data Collection Prioritization for System Quality Analysis," i Electronic Notes in Theoretical Computer Science, 2009, s. 29-42.
[65]
U. Franke et al., "Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees," i 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, s. 328-335.
[66]
U. Franke et al., "EAF(2) - A Framework for Categorizing Enterprise Architecture Frameworks," i SNPD 2009 : 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, s. 327-332.
[67]
U. Franke, W. Flores Rocha och P. Johnson, "Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks," i Proc. 42nd Annual Simulation Symposium, 2009, s. 209-216.
[68]
U. Franke et al., "Enterprise Architecture analysis using Fault Trees and MODAF," i Proceedings of the Forum at the CAiSE 2009 Conference, 2009, s. 61-66.
[69]
R. Lagerström et al., "Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach," i ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, s. 381-393.
[70]
U. Franke, W. R. Flores och P. Johnson, "Enterprise architecture dependency analysis using fault trees and Bayesian networks," i Spring Simulation Multiconference 2009 - Co-located with the 2009 SISO Spring Simulation Interoperability Workshop, 2009.
[71]
P. Gustafsson et al., "Modeling the IT Impact on Organizational Structure : 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE," i EDOC: 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, s. 14-23.
[72]
U. Franke et al., "Defense graphs and Enterprise Architecture for Information Assurance analysis," i Proceedings of the 26th Army Science Conference, 2008.
[73]
P. Gustafsson et al., "Identifying IT impacts on organizational structure and business value," i Proceedings of the Third International Workshop on Business/IT Alignment and Interoperability, 2008, s. 44-57.
[74]
P. Gustafsson et al., "Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams," i PRACTICE OF ENTERPRISE MODELING, 2008, s. 138-152.
Kapitel i böcker
[75]
J. Brynielsson, U. Franke och S. Varga, "Cyber Situational Awareness Testing," i Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities, Akhgar, Babak; Brewster, Ben red., Cham, Switzerland : Springer International Publishing AG, 2016, s. 209-233.
Icke refereegranskade
Artiklar
[76]
U. Franke, "En oavslutad dikt om ett oavslutat uppror," Slovo : Journal of Slavic Languages, Literatures and Cultures, vol. 63, s. 64-73, 2023.
Kapitel i böcker
[77]
U. Franke, "Livspusslet : Rilke och Nozick," i Rilke och filosoferna, Katarina O'Nils Franke red., Malmö : Ellerströms förlag, 2024, s. 79-86.
[78]
U. Franke et al., "Cyber situational awareness issues and challenges," i Cybersecurity and Cognitive Science, Ahmed A. Moustafa red., : Elsevier, 2022, s. 235-265.
Avhandlingar
[79]
U. Franke, "Analysis of enterprise IT service availability : Enterprise architecture modeling for assessment, prediction, and decision-making," Doktorsavhandling Stockholm : KTH Royal Institute of Technology, Trita-EE, 2012:032, 2012.
Rapporter
[80]
P. Närman, U. Franke och L. Nordström, "Assessing the quality of service of Powel's netbas at a nordic utility," Stockholm : KTH Royal Institute of Technology, IR-EE-ICS, 2008:026, 2008.
Övriga
[81]
M. Välja et al., "A framework for automatic IT architecture modeling : applying truth discovery," (Manuskript).
[82]
M. Välja, R. Lagerström och U. Franke, "Increasing Precision in IT Architecture Modeling using an Ontology Framework," (Manuskript).
Senaste synkning med DiVA:
2024-11-18 00:18:22