Publications by Ulrik Franke
Peer reviewed
Articles
[1]
U. Franke, "Att utveckla och implementera cybersäkerhetspolicy : Lärdomar från den finansiella sektorn," Statsvetenskaplig Tidskrift, vol. 126, no. 2, pp. 251-272, 2024.
[2]
A. Andreasson et al., "Cybersecurity work at Swedish administrative authorities : taking action or waiting for approval," Cognition, Technology & Work, 2024.
[3]
U. Franke, "Rawlsian Algorithmic Fairness and a Missing Aggregation Property of the Difference Principle," Philosophy & Technology, vol. 37, no. 3, 2024.
[4]
U. Franke, "Algorithmic Fairness, Risk, and the Dominant Protective Agency," Philosophy & Technology, vol. 36, no. 4, 2023.
[5]
C. Barreto et al., "Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime," Computers & security (Print), vol. 131, pp. 1-16, 2023.
[6]
U. Franke, "Algorithmic Political Bias—an Entrenchment Concern," Philosophy & Technology, vol. 35, no. 3, 2022.
[7]
J. Dexe et al., "Explaining automated decision-making: a multinational study of the GDPR right to meaningful information," Geneva papers on risk and insurance. Issues and practice, 2022.
[8]
U. Franke, "First- and Second-Level Bias in Automated Decision-making," Philosophy & Technology, vol. 35, no. 2, 2022.
[9]
U. Franke, "How Much Should You Care About Algorithmic Transparency as Manipulation?," Philosophy & Technology, vol. 35, no. 4, 2022.
[10]
S. Varga, J. Brynielsson and U. Franke, "Cyber-threat perception and risk management in the Swedish financial sector," Computers & security (Print), vol. 105, 2021.
[11]
U. Franke, "Rawls’s Original Position and Algorithmic Fairness," Philosophy & Technology, vol. 34, no. 4, pp. 1803-1817, 2021.
[12]
M. Välja et al., "Automating threat modeling using an ontology framework : Validated with data from critical infrastructures," Cybersecurity, vol. 3, no. 1, 2020.
[13]
J. Dexe and U. Franke, "Nordic lights? National AI policies for doing well by doing good," Journal of Cyber Policy, vol. 5, pp. 332-349, 2020.
[14]
U. Franke and A. Hoxell, "Observable Cyber Risk on Cournot Oligopoly Data Storage Markets," Risks, vol. 8, no. 4, 2020.
[15]
M. Välja et al., "A Framework for Automatic IT Architecture Modeling : Applying Truth Discovery," Complex Systems Informatics and Modeling Quarterly, no. 20, 2019.
[16]
A. Fazlollahi and U. Franke, "Measuring the impact of enterprise integration on firm performance using data envelopment analysis," International Journal of Production Economics, vol. 200, pp. 119-129, 2018.
[17]
U. Franke and M. Buschle, "Experimental Evidence on Decision-Making in Availability Service Level Agreements," IEEE Transactions on Network and Service Management, vol. 13, no. 1, pp. 58-70, 2016.
[18]
U. Franke, P. Johnson and J. König, "An architecture framework for enterprise IT service availability analysis," Software and Systems Modeling, vol. 13, no. 4, pp. 1417-1445, 2014.
[19]
P. Johnson et al., "An architecture modeling framework for probabilistic prediction," Information Systems and E-Business Management, vol. 12, no. 4, pp. 595-622, 2014.
[20]
P. Närman et al., "Enterprise Architecture Availability Analysis Using Fault Trees and Stakeholder Interviews," Enterprise Information Systems, vol. 8, no. 1, pp. 1-25, 2014.
[21]
L. Gingnell et al., "Quantifying Success Factors for IT Projects-An Expert-Based Bayesian Model," Information systems management, vol. 31, no. 1, pp. 21-36, 2014.
[22]
C. Sandels, U. Franke and L. Nordström, "Vehicle to grid : System reference architectures and Monte Carlo simulations," International Journal of Vehicle Autonomous Systems, vol. 11, no. 2-3, pp. 205-228, 2013.
[23]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian framework," Software quality journal, vol. 20, no. 2, pp. 369-394, 2012.
[24]
U. Franke, "Optimal IT service availability : Shorter outages, or fewer?," IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 22-33, 2012.
[25]
H. Holm et al., "Success Rate of Remote Code Execution Attacks : Expert Assessments and Observations," Journal of universal computer science (Online), vol. 18, no. 6, pp. 732-749, 2012.
[26]
R. Lagerström et al., "A method for creating entreprise architecture metamodels : applied to systems modifiability," International Journal of Computer Science and Applications, vol. 6, no. 5, pp. 89-120, 2009.
Conference papers
[27]
U. Franke et al., "Requirements on and Procurement of Explainable Algorithms-A Systematic Review of the Literature," in NEW TRENDS IN DISRUPTIVE TECHNOLOGIES, TECH ETHICS, AND ARTIFICIAL INTELLIGENCE, DITTET 2024, 2024, pp. 40-52.
[28]
T. Besker, U. Franke and J. Axelsson, "Navigating the Cyber-Security Risks and Economics of System-of-Systems," in 2023 18th Annual System of Systems Engineering Conference, SoSe 2023, 2023.
[29]
A. Andreasson et al., "A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic," in Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021, pp. 1-8.
[30]
U. Franke, J. Turell and I. Johansson, "The Cost of Incidents in Essential Services—Data from Swedish NIS Reporting," in Lecture Notes in Computer Science, 2021, pp. 116-129.
[31]
A. Andreasson et al., "A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic," in 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2020.
[32]
U. Franke and J. Wernberg, "A survey of cyber security in the Swedish manufacturing industry," in 2020 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2020.
[33]
J. Dexe, J. Ledendal and U. Franke, "An Empirical Investigation of the Right to Explanation Under GDPR in Insurance," in Lecture Notes in Computer Science, 2020, pp. 125-139.
[34]
J. Dexe et al., "Towards increased transparency with value sensitive design," in Lecture Notes in Computer Science book series (LNCS, volume 12217), 2020, pp. 3-15.
[35]
M. Välja et al., "Bridging the gap between business and technology in strategic decision-making for cyber security management," in Proceedings of 2016 Portland International Conference on Management of Engineering and Technology, 2016, pp. 32-42.
[36]
J. Brynielsson et al., "Using Cyber Defense Exercises to Obtain Additional Data for Attacker Profiling," in Proceedings of the 14th IEEE International Conference on Intelligence and Security Informatics (ISI 2016), 2016, pp. 37-42.
[37]
F. Ulrik, M. Buschle and M. Österlind, "An experiment in SLA decision-making," in Economics of Grids, Clouds, Systems, and Services - 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013, 2013, pp. 256-267.
[38]
P. Johnson et al., "P2AMF : Predictive, probabilistic architecture modeling framework," in Proceedings Enterprise Interoperability - 5th International IFIP Working Conference, IWEI 2013, 2013, pp. 104-117.
[39]
A. Fazlollahi, U. Franke and J. Ullberg, "Benefits of enterprise integration : Review, classification, and suggestions for future research," in Enterprise Interoperability : 4th International IFIP Working Conference, IWEI 2012, Harbin, China, September 6-7, 2012. Proceedings, 2012, pp. 34-45.
[40]
M. Buschle et al., "A Tool for Enterprise Architecture Analysis Using the PRM Formalism," in INFORMATION SYSTEMS EVOLUTION, 2011, pp. 108-121.
[41]
J. König et al., "An extended framework for reliability analysis of ICT for power systems," in 2011 IEEE PES Trondheim PowerTech : The Power of Technology for a Sustainable Society, POWERTECH 2011, 2011, p. 6019343.
[42]
J. Saat et al., "Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions," in Proceedings of the Hawaii International Conference on System Sciences (HICSS-44), 2011, pp. 1-9.
[43]
H. Holm et al., "Expert assessment on the probability of successful remote code execution attacks," in Proceedings of 8th International Workshop on Security in Information Systems - WOSIS 2011, 2011, pp. 49-58.
[44]
L. M. Von Würtemberg et al., "IT project success factors : An experience report," in Portland International Center for Management of Engineering and Technology : Technology Management in the Energy-Smart World, 2011.
[45]
C. Sandels, U. Franke and L. Nordström, "Vehicle to grid communication : Monte carlo simulations based on automated meter reading reliability," in 17th Power Systems Computation Conference, 2011.
[46]
J. Ullberg et al., "A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL," in Enterprise interoperability iv : making the internet of the future for the future of enterprise, 2010, pp. 81-90.
[47]
M. Buschle et al., "A tool for enterprise architecture analysis using the PRM formalism," in CEUR Workshop Proceedings, 2010.
[48]
M. Jensen et al., "Availability of a SCADA/OMS/DMS system - A case study," in IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe, 2010.
[49]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian model," in Proc. Fourth International Workshop on Software Quality and Maintainability, 2010.
[50]
J. Saat et al., "Enterprise Architecture Meta Models for IT/Business Alignment Situations," in 14th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2010, 2010, pp. 14-23.
[51]
U. Franke et al., "Factors Affecting Successful Project Management of Technology-Intense Projects," in PICMET '10 - Portland International Center for Management of Engineering and Technology, Proceedings - Technology Management for Global Economic Growth, 2010, pp. 1538-1543.
[52]
U. Franke et al., "IT consolidation - An optimization approach," in 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2010, pp. 21-26.
[53]
J. König, U. Franke and L. Nordström, "Probabilistic Availability Analysis of Control and Automation Systems for Active Distribution Networks," in 2010 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION : SMAR SOLUTIONS FOR A CHANGING WORLD, 2010.
[54]
U. Franke et al., "Trends in Enterprise Architecture Practice : A Survey," in Lecture Notes in Business Information Processing, 2010, pp. 16-29.
[55]
C. Sandels et al., "Vehicle to grid - Monte Carlo simulations for optimal aggregator strategies," in 2010 International Conference on Power System Technology : Technological Innovations Making Power Grid Smarter, POWERCON2010, 2010.
[56]
C. Sandels et al., "Vehicle to grid - Reference architectures for the control markets in Sweden and Germany," in IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe, 2010.
[57]
U. Franke et al., "A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis : CSMR 2009, PROCEEDINGS," in 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS, 2009, pp. 241-245.
[58]
S. Aier et al., "A Survival Analysis of Application Life Spans based on Enterprise Architecture Models," in Proc. 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2009, 2009, pp. 141-154.
[59]
M. Ekstedt et al., "A Tool for Enterprise Architecture Analysis of Maintainability : CSMR 2009, PROCEEDINGS," in EUR CON SFTWR MTNCE REENGR, 2009, pp. 327-328.
[60]
U. Franke et al., "A formal method for cost and accuracy trade-off analysis in software assessment measures," in RCIS 2009 : PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, pp. 295-302.
[61]
S. Buckl et al., "A pattern-based approach to quantitative enterprise architecture analysis," in 15th Americas Conference on Information Systems 2009, AMCIS 2009, 2009, pp. 2314-2324.
[62]
U. Franke and P. Johnson, "An Enterprise Architecture Framework for Application Consolidation in the Swedish Armed Forces," in 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, pp. 264-273.
[63]
P. Närman, U. Franke and L. Nordström, "Assessing the quality of service of Powel's netbas at a nordic utility," in IET Conference Publications, 2009.
[64]
P. Närman et al., "Data Collection Prioritization for System Quality Analysis," in Electronic Notes in Theoretical Computer Science, 2009, pp. 29-42.
[65]
U. Franke et al., "Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees," in 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, pp. 328-335.
[66]
U. Franke et al., "EAF(2) - A Framework for Categorizing Enterprise Architecture Frameworks," in SNPD 2009 : 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, pp. 327-332.
[67]
U. Franke, W. Flores Rocha and P. Johnson, "Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks," in Proc. 42nd Annual Simulation Symposium, 2009, pp. 209-216.
[68]
U. Franke et al., "Enterprise Architecture analysis using Fault Trees and MODAF," in Proceedings of the Forum at the CAiSE 2009 Conference, 2009, pp. 61-66.
[69]
R. Lagerström et al., "Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach," in ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, pp. 381-393.
[70]
U. Franke, W. R. Flores and P. Johnson, "Enterprise architecture dependency analysis using fault trees and Bayesian networks," in Spring Simulation Multiconference 2009 - Co-located with the 2009 SISO Spring Simulation Interoperability Workshop, 2009.
[71]
P. Gustafsson et al., "Modeling the IT Impact on Organizational Structure : 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE," in EDOC: 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, pp. 14-23.
[72]
U. Franke et al., "Defense graphs and Enterprise Architecture for Information Assurance analysis," in Proceedings of the 26th Army Science Conference, 2008.
[73]
P. Gustafsson et al., "Identifying IT impacts on organizational structure and business value," in Proceedings of the Third International Workshop on Business/IT Alignment and Interoperability, 2008, pp. 44-57.
[74]
P. Gustafsson et al., "Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams," in PRACTICE OF ENTERPRISE MODELING, 2008, pp. 138-152.
Chapters in books
[75]
J. Brynielsson, U. Franke and S. Varga, "Cyber Situational Awareness Testing," in Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities, Akhgar, Babak; Brewster, Ben Ed., Cham, Switzerland : Springer International Publishing AG, 2016, pp. 209-233.
Non-peer reviewed
Articles
[76]
U. Franke, "En oavslutad dikt om ett oavslutat uppror," Slovo : Journal of Slavic Languages, Literatures and Cultures, vol. 63, pp. 64-73, 2023.
Chapters in books
[77]
U. Franke, "Livspusslet : Rilke och Nozick," in Rilke och filosoferna, Katarina O'Nils Franke Ed., Malmö : Ellerströms förlag, 2024, pp. 79-86.
[78]
U. Franke et al., "Cyber situational awareness issues and challenges," in Cybersecurity and Cognitive Science, Ahmed A. Moustafa Ed., : Elsevier, 2022, pp. 235-265.
Theses
[79]
U. Franke, "Analysis of enterprise IT service availability : Enterprise architecture modeling for assessment, prediction, and decision-making," Doctoral thesis Stockholm : KTH Royal Institute of Technology, Trita-EE, 2012:032, 2012.
Reports
[80]
P. Närman, U. Franke and L. Nordström, "Assessing the quality of service of Powel's netbas at a nordic utility," Stockholm : KTH Royal Institute of Technology, IR-EE-ICS, 2008:026, 2008.
Other
[81]
M. Välja et al., "A framework for automatic IT architecture modeling : applying truth discovery," (Manuscript).
[82]
M. Välja, R. Lagerström and U. Franke, "Increasing Precision in IT Architecture Modeling using an Ontology Framework," (Manuscript).
Latest sync with DiVA:
2024-12-22 02:43:03