Spring til hovednavigation
Spring til søgning
Spring til hovedindhold
IT-Universitetet i København Forside
Support til ITU faculty
Dansk
English
Forside
Forskere
Forskningsenheder
Publikationer
Projekter
Presse/medier
Aktiviteter
Priser
Søg efter ekspertise, navn eller tilknytning
Elda Paja
Associate Professor
,
Computer Science
Software Engineering
Center for Information Security and Trust
https://orcid.org/0000-0002-8346-2467
Fastnet
72185090
E-mail
elpa
itu
dk
2019
2023
Publikationer pr. år
Vis
Fingeraftryk
Netværk
Publikationer
(9)
Projekter
(1)
Lignende profiler
(6)
Fingeraftryk
Dyk ned i forskningsemnerne, hvor Elda Paja er aktive. Disse emneetiketter kommer fra dennes persons arbejder. Sammen danner de et unikt fingerprint.
Sorter
Vægt
Alfabetisk
Keyphrases
Data Practices
100%
Policy Evolution
83%
Requirements Engineering
75%
Privacy Policy
66%
COVID-19
58%
Knowledge-driven
50%
Goal-oriented Requirements
50%
Privacy Practices
50%
Data Warehouse
50%
Goal-oriented Requirements Engineering
50%
Data Ecosystem
50%
Software Engineering
50%
Data Transparency
50%
Goal-oriented
50%
Security Practices
50%
Business Process
50%
Business Intelligence
50%
Security Privacy
50%
Security Measures
50%
Systematic Mapping Study
50%
Cybersecurity Risk
50%
Close Contact
50%
Privacy Concerns
50%
Formal Framework
41%
Revocation
41%
Privacy Regulation
41%
Data Management
33%
Privacy Measures
33%
Digitalization Level
33%
General Data Protection Regulation
33%
COVID-19 Pandemic
33%
Contact Tracing Apps
33%
Adoption Rate
33%
Software Development
33%
Advertising Revenue
25%
Description Logics
25%
Enterprise Transformation
25%
Enterprise Strategy
25%
Process Redesign
25%
New Business Models
25%
Targeted Advertising
25%
Personal Data Processing
25%
Business Value
25%
Engineering Process
25%
Ontology
25%
Anda
25%
Service Personalization
25%
Domestic Flights
25%
Enterprise Modeling
25%
Data Science
25%
Computer Science
Requirement Engineering
100%
General Data Protection Regulation
83%
Privacy Policies
75%
Business Intelligence
66%
Data Management
50%
Business Process
50%
Data Warehouse
50%
Interoperability
50%
Security and Privacy
50%
Software Engineering
50%
Privacy Practice
50%
Security Practice
50%
Data Governance
50%
Ethical Consideration
50%
Privacy Concern
50%
Security Framework
50%
Formal Framework
50%
Data Processing
50%
Cybersecurity
50%
Use Case
50%
Conducted Interview
50%
Systematic Mapping Study
50%
Data Type
50%
Security Protection
50%
Personal Data
50%
Digitalization
33%
Scripting Languages
25%
Privacy Act
25%
Enterprise Architecture
25%
Data Mining
25%
Process Redesign
25%
Description Logics
25%
Enterprise Model
25%
Targeted Advertising
25%
Scholarly Work
25%
Business Value
25%
Policy Violation
25%
Ontology
25%
Digital Service
25%
Data Organization
25%
User Data
25%
Authentication
25%
Business Models
25%
Software Development
23%
Security Measure
16%
Software Developer
16%
Information Dissemination
16%
Geographical Location
16%
Privacy Protection
16%
Requirements Models
16%