91 results on '"Piras, L. A."'
Search Results
52. Overview of Imagecleflifelog 2019: Solve my life puzzle and lifelog moment retrieval
- Author
-
Dang-Nguyen, D. -T, Piras, L., Riegler, M., Zhou, L., Lux, M., Minh-Triet Tran, Le, T. -K, Ninh, V. -T, and Gurrin, C.
- Subjects
Image processing ,Data_MISCELLANEOUS ,Lifelog - Abstract
This paper describes ImageCLEFlifelog 2019, the third edition of the Lifelog task. In this edition, the task was composed of two subtasks (challenges): the Lifelog Moments Retrieval (LMRT) challenge that followed the same format as in the previous edition, and the Solve My Life Puzzle (Puzzle), a brand new task that focused on rearranging lifelog moments in temporal order. ImageCLEFlifelog 2019 received noticeably higher submissions than the previous editions, with ten teams participating resulting in a total number of 109 runs. publishedVersion
53. An interactive lifelog retrieval system for activities of daily living understanding
- Author
-
Liting Zhou, Piras, L., Riegler, M., Lux, M., Dang-Nguyen, D. -T, and Gurrin, C.
54. Retrieval of diverse images by pre-filtering and hierarchical clustering
- Author
-
Dang-Nguyen, D. -T, Piras, L., GIORGIO GIACINTO, Boato, G., and Natale, F. G. B.
55. Etiopathogenesis, clinical and diagnostic framework of patellar luxation,Eziopatogenesi, inquadramento clinico e diagnostico della lussazione di rotula
- Author
-
Davide Mancusi, Olimpo, M., Peirone, B., and Piras, L. A.
56. Recommendation in persuasive eHealth systems: An effective strategy to spot users' losing motivation to exercise
- Author
-
Pilloni, P., Piras, L., Ludovico Boratto, Carta, S., Fenu, G., and Mulas, F.
57. Organiser Team at ImageCLEFlifelog 2020: A Baseline Approach for Moment Retrieval and Athlete Performance Prediction using Lifelog Data
- Author
-
Le, T. -K, Ninh, V. -T, Liting Zhou, Nguyen-Ngoc, M. -H, Trinh, H. -D, Tran, N. -H, Piras, L., Riegler, M., Halvorsen, P., Lux, M., Tran, M. -T, Healy, G., Gurrin, C., and Dang-Nguyen, D. -T
58. Riparazione osteocondrale 'One Stage' con frammenti di cartilagine autologa in scaffold ibrido: studio in vitro su uomo e in vivo su modello animale (coniglio e capra)
- Author
-
Marmotti, A., Realmuto, C., Castoldi, F., Rossi, R., Bruzzone, M., Bonasia, D. E., Cottino, U., Maiello, A., Cristina Bignardi, Piras, L., Peirone, B., and Degerfeld, M. M.
- Subjects
Riparazione osteocondrale "one stage" ,Scaffold ,Orthopedics ,Nanoindentazione ,Goat animal model ,One-stage osteochondral repair ,In vitro chondrocytes cultures ,Rabbit animal model
59. Overview of imagecleflifelog 2017: Lifelog retrieval and summarization
- Author
-
Dang-Nguyen, D. -T, Piras, L., Riegler, M., Boato, G., Zhou, L., and Cathal Gurrin
60. LSC'19 chairs' welcome
- Author
-
Gurrin, C., Schoeffmann, K., Joho, H., Dang-Nguyen, D. T., Liting Zhou, Riegler, M., and Piras, L.
61. Image Hunter at ImageCLEF 2012 personal photo retrieval task
- Author
-
Roberto Tronci, Piras, L., Murgia, G., and Giacinto, G.
62. Using gamification to incentivize sustainable urban mobility.
- Author
-
Kazhamiakin, R. (Raman), Marconi, A. (Annapaola), Perillo, M. (Mirko), Pistore, M. (Marco), Valetto, G. (Giuseppe), Piras, L. (Luca), Avesani, F. (Francesco), Perri, N. (Nicola), Kazhamiakin, R. (Raman), Marconi, A. (Annapaola), Perillo, M. (Mirko), Pistore, M. (Marco), Valetto, G. (Giuseppe), Piras, L. (Luca), Avesani, F. (Francesco), and Perri, N. (Nicola)
- Abstract
Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined with initiatives aimed at increasing the awareness of citizens, and promoting their behavioural change. This paper explores the potential of gamification mechanisms to incentivize voluntary behavioural changes towards sustainable mobility solutions. We present a service-based gamification framework, developed within the STREETLIFE EU Project, which can be used to develop games on top of existing services and systems within a Smart City, and discuss the empirical findings of an experiment conducted in the city of Rovereto on the effectiveness of gamification to promote sustainable urban mobility.
63. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design.
- Author
-
Ali, Raian, Kaindl, Hermann, Maciaszek, Leszek A., Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Cox, K. (Karl), Mouratidis, H. (Haralambos), Ali, Raian, Kaindl, Hermann, Maciaszek, Leszek A., Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Cox, K. (Karl), and Mouratidis, H. (Haralambos)
- Abstract
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting or mitigating conflicts. The framework and tool we propose in this paper, called ConfIs, fills this gap by supporting engineers and organisations in these complex activities, with its systematic and interactive process. We applied ConfIs to a realistic GDPR example from the DEFeND EU Project, and evaluated its supportiveness, with positive results, by involving privacy and security requirements experts (This research is an extension of the study conducted by ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2021. ConfIs: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design [https://doi.org/10.5220/0010406100800091]).
64. ConfIs: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design.
- Author
-
Raian, Ali, Kaindl, Hermann, Maciaszek, Leszek, Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. (Mohammed), Cox, K. (Karl), Mouratidis, H. (Haralambos), Raian, Ali, Kaindl, Hermann, Maciaszek, Leszek, Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. (Mohammed), Cox, K. (Karl), and Mouratidis, H. (Haralambos)
- Abstract
Privacy and security requirements, and their potential conflicts, are increasingly having more and more importance. It is becoming a necessary part to be considered, starting from the very early stages of requirements engineering, and in the entire software engineering cycle, for the design of any software system. In the last few years, this has been even more emphasized and required by the law. A relevant example is the case of the General Data Protection Regulation (GDPR), which requires organizations, and their software engineers, to enforce and guarantee privacy-by-design to make their platforms compliant with the regulation. In this context, complex activities related to privacy and security requirements elicitation, analysis, mapping and identification of potential conflicts, and the individuation of their resolution, become crucial. In the literature, there is not available a comprehensive requirement engineering oriented tool for supporting the requirements analyst. In this paper, we propose ConfIs, a tool for supporting the analyst in performing a process covering these phases in a systematic and interactive way. We present ConfIs and its process with a realistic example from DEFeND, an EU project aiming at supporting organizations in achieving GDPR compliance. In this context, we evaluated ConfIs by involving privacy/security requirements experts, which recognized our tool and method as supportive, concerning these complex activities.
65. Goal-oriented requirements engineering: an extended systematic mapping study.
- Author
-
Horkoff, J. (Jennifer), Aydemir, F. B. (Fatma Başak), Cardoso, E. (Evellin), Li, T. (Tong), Maté, A. (Alejandro), Paja, E. (Elda), Salnitri, M. (Mattia), Piras, L. (Luca), Mylopoulos, J. (John), Giorgini, P. (Paolo), Horkoff, J. (Jennifer), Aydemir, F. B. (Fatma Başak), Cardoso, E. (Evellin), Li, T. (Tong), Maté, A. (Alejandro), Paja, E. (Elda), Salnitri, M. (Mattia), Piras, L. (Luca), Mylopoulos, J. (John), and Giorgini, P. (Paolo)
- Abstract
Over the last two decades, much attention has been paid to the area of goal-oriented requirements engineering (GORE), where goals are used as a useful conceptualization to elicit, model, and analyze requirements, capturing alternatives and conflicts. Goal modeling has been adapted and applied to many sub-topics within requirements engineering (RE) and beyond, such as agent orientation, aspect orientation, business intelligence, model-driven development, and security. Despite extensive efforts in this field, the RE community lacks a recent, general systematic literature review of the area. In this work, we present a systematic mapping study, covering the 246 top-cited GORE-related conference and journal papers, according to Scopus. Our literature map addresses several research questions: we classify the types of papers (e.g., proposals, formalizations, meta-studies), look at the presence of evaluation, the topics covered (e.g., security, agents, scenarios), frameworks used, venues, citations, author networks, and overall publication numbers. For most questions, we evaluate trends over time. Our findings show a proliferation of papers with new ideas and few citations, with a small number of authors and papers dominating citations; however, there is a slight rise in papers which build upon past work (implementations, integrations, and extensions). We see a rise in papers concerning adaptation/variability/evolution and a slight rise in case studies. Overall, interest in GORE has increased. We use our analysis results to make recommendations concerning future GORE research and make our data publicly available.
66. Applying acceptance requirements to requirements modeling tools via gamification: a case study on privacy and security.
- Author
-
Grabis, Janis, Bork, Dominik, Piras, L. (Luca), Calabrese, F. (Federico), Giorgini, P. (Paolo), Grabis, Janis, Bork, Dominik, Piras, L. (Luca), Calabrese, F. (Federico), and Giorgini, P. (Paolo)
- Abstract
Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakeholders, concerning dozens of requirements types, from functional to qualitative, including adaptation, security and privacy, ethical, acceptance and more. In such settings, requirements engineers need support concerning such increasingly complex activities, and Requirements Engineering (RE) modeling tools have been developed for this. However, such tools, although effective, are complex, time-consuming and requiring steep learning curves. The consequent lack of acceptance and abandonment in using such tools, by engineers, paves the way to the application of RE techniques in a more error-prone, low-quality way, increasing the possibility to have failures in software systems delivered. In this paper, we identify main areas of lack of acceptance, affecting RE engineers, for such tools, and propose an approach for making modeling tools more effective in engaging the engineer in performing RE in a tool-based way, receiving adequate feedback and staying motivated to use modeling tools. This is accomplished by performing acceptance requirements analysis (through the Agon Framework) and using gamification to increase the engagement of engineers during the usage of RE modeling tools. Towards this end, we performed a case study, within the VisiOn European Project, for enhancing a tool for modeling privacy and security requirements. Our case study provides preliminary evidence that our approach supports in making RE modeling tools more engaging from the engineer perspective.
67. DEFeND architecture: a privacy by design platform for GDPR compliance.
- Author
-
Gritzalis, Stefanos, Weippl, Edgar R., Katsikas, Sokratis K., Anderst-Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Praitano, A. (Andrea), Tsohou, A. (Aggeliki), Mouratidis, H. (Haralambos), Gallego-Nicasio Crespo, B. (Beatriz), Bernard, J. B. (Jean Baptiste), Fiorani, M. (Marco), Magkos, E. (Emmanouil), Sanz, A. C. (Andrès Castillo), Pavlidis, M. (Michalis), D’Addario, R. (Roberto), Zorzino, G. G. (Giuseppe Giovanni), Gritzalis, Stefanos, Weippl, Edgar R., Katsikas, Sokratis K., Anderst-Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Praitano, A. (Andrea), Tsohou, A. (Aggeliki), Mouratidis, H. (Haralambos), Gallego-Nicasio Crespo, B. (Beatriz), Bernard, J. B. (Jean Baptiste), Fiorani, M. (Marco), Magkos, E. (Emmanouil), Sanz, A. C. (Andrès Castillo), Pavlidis, M. (Michalis), D’Addario, R. (Roberto), and Zorzino, G. G. (Giuseppe Giovanni)
- Abstract
The advent of the European General Data Protection Regulation (GDPR) imposes organizations to cope with radical changes concerning user data protection paradigms. GDPR, by promoting a Privacy by Design approach, obliges organizations to drastically change their methods regarding user data acquisition, management, processing, as well as data breaches monitoring, notification and preparation of prevention plans. This enforces data subjects (e.g., citizens, customers) rights by enabling them to have more information regarding usage of their data, and to take decisions (e.g., revoking usage permissions). Moreover, organizations are required to trace precisely their activities on user data, enabling authorities to monitor and sanction more easily. Indeed, since GDPR has been introduced, authorities have heavily sanctioned companies found as not GDPR compliant. GDPR is difficult to apply also for its length, complexity, covering many aspects, and not providing details concerning technical and organizational security measures to apply. This calls for tools and methods able to support organizations in achieving GDPR compliance. From the industry and the literature, there are many tools and prototypes fulfilling specific/isolated GDPR aspects, however there is not a comprehensive platform able to support organizations in being compliant regarding all GDPR requirements. In this paper, we propose the design of an architecture for such a platform, able to reuse and integrate peculiarities of those heterogeneous tools, and to support organizations in achieving GDPR compliance. We describe the architecture, designed within the DEFeND EU project, and discuss challenges and preliminary benefits in applying it to the healthcare and energy domains.
68. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques.
- Author
-
Assar, Saïd, Pastor, Oscar, Mouratidis, Haralambos, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Cuel, R. (Roberta), Ponte, D. (Diego), Assar, Saïd, Pastor, Oscar, Mouratidis, Haralambos, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Cuel, R. (Roberta), and Ponte, D. (Diego)
- Abstract
Gamificationis a powerful paradigm and a set of best practices used to motivate people carrying out a variety of ICT–mediated tasks. Designing gamification solutions and applying them to a given ICT system is a complex and expensive process (in time, competences and money) as software engineers have to cope with heterogeneous stakeholder requirements on one hand, and Acceptance Requirements on the other, that together ensure effective user participation and a high level of system utilization. As such, gamification solutions require significant analysis and design as well as suitable supporting tools and techniques. In this work, we compare concepts, tools and techniques for gamification design drawn from Software Engineering and Human and Organizational Behaviors. We conduct a comparison by applying both techniques to the specific Meeting Scheduling exemplar used extensively in the Requirements Engineering literature.
69. Goal models for acceptance requirements analysis and gamification design.
- Author
-
Mayr, Heinrich C., Guizzardi, Giancarlo, Ma, Hui, Pastor, Oscar, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Mayr, Heinrich C., Guizzardi, Giancarlo, Ma, Hui, Pastor, Oscar, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), and Mylopoulos, J. (John)
- Abstract
The success of software systems highly depends on user engagement. Thus, to deliver engaging systems, software has to be designed carefully taking into account Acceptance Requirements, such as '70% of users will use the system', and the psychological factors that could influence users to use the system. Analysis can then consider mechanisms that affect these factors, such as Gamification (making a game out of system use), advertising, incentives and more. We propose a Systematic Acceptance Requirements Analysis Framework based on Gamification for supporting the requirements engineer in analyzing and designing engaging software systems. Our framework, named Agon, encompasses both a methodology and a meta-model capturing acceptance and gamification knowledge. In this paper, we describe the Agon Meta-Model and provide examples from the gamification of a decision-making platform in the context of a European Project.
70. Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform.
- Author
-
Katsikas, Sokratis, Cuppens, Frédéric, Cuppens, Nora, Lambrinoudakis, Costas, Kalloniatis, Christos, Mylopoulos, John, Antón, Annie, Gritzalis, Stefanos, Pallas, Frank, Pohle, Jörg, Sasse, Angela, Meng, Weizhi, Furnell, Steven, Garcia-Alfaro, Joaquin, Tsohou, A. (Aggeliki), Magkos, M. (Manos), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), Gallego-Nicasio Crespo, B. (Beatriz), Katsikas, Sokratis, Cuppens, Frédéric, Cuppens, Nora, Lambrinoudakis, Costas, Kalloniatis, Christos, Mylopoulos, John, Antón, Annie, Gritzalis, Stefanos, Pallas, Frank, Pohle, Jörg, Sasse, Angela, Meng, Weizhi, Furnell, Steven, Garcia-Alfaro, Joaquin, Tsohou, A. (Aggeliki), Magkos, M. (Manos), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), and Gallego-Nicasio Crespo, B. (Beatriz)
- Abstract
GDPR entered into force in May 2018 for enhancing user data protection. Even though GDPR leads towards a radical change with many advantages for the data subjects it turned out to be a significant challenge. Organizations need to make long and complex changes for the personal data processing activities to become GDPR compliant. Citizens as data subjects are empowered with new rights, which however they need to become aware of and understand. Finally, the role of data protection authorities changes as well as their expectations from organizations. GDPR compliance being a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of the Data govErnance For supportiNg gDpr (DEFeND) EU Project is to deliver such a platform. To succeed, the platform needs to satisfy legal and privacy requirements, be effective in supporting organizations in GDPR compliance, and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, we describe the process, within the DEFeND EU Project, for eliciting and analyzing requirements for such a complex platform, by involving stakeholders from the banking, energy, health and public administration sectors, and using advanced frameworks for privacy requirements and acceptance requirements. The paper also contributes by providing elicited privacy and acceptance requirements concerning a holistic platform for supporting GDPR compliance.
71. DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance.
- Author
-
Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Pavlidis, M. (Michalis), Mouratidis, H. (Haralambos), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Praitano, A. (Andrea), Iodice, A. (Annarita), Crespo, B. G. (Beatriz Gallego-Nicasio), Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Pavlidis, M. (Michalis), Mouratidis, H. (Haralambos), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Praitano, A. (Andrea), Iodice, A. (Annarita), and Crespo, B. G. (Beatriz Gallego-Nicasio)
- Abstract
The introduction of the European General Data Protection Regulation (GDPR) has brought significant benefits to citizens, but it has also created challenges for organisations, which are facing with difficulties interpreting it and properly applying it. An important challenge is compliance with the Privacy by Design and by default (PbD) principles, which require that data protection is integrated into processing activities and business practices from the design stage. Recently, the European Data Protection Board (EDPB) released an official document with PbD guidelines, and there are various efforts to provide approaches to support these. However, organizations are still facing difficulties in identifying a flow for executing, in a coherent, linear and effective way, these activities, and a complete toolkit for supporting this. In this paper, we: (i) identify the most important PbD activities and strategies, (ii) design a coherent, linear and effective flow for them, and (iii) describe our comprehensive supporting toolkit, as part of the DEFeND EU Project platform. Specifically, within DEFeND, we identified candidate tools, fulfilling specific GDPR aspects, and integrated them in a comprehensive toolkit: the DEFeND Data Scope Management service (DSM). The aim of DSM is to support organizations for continuous GDPR compliance through Model-Based Privacy by Design analysis. Here, we present important PbD activities and strategies individuated, then describe DSM, its design, flow, and a preliminary case study and evaluation performed with pilots from the healthcare, banking, public administration and energy sectors.
72. Design thinking and acceptance requirements for designing gamified software.
- Author
-
Piras, L. (Luca), Dellagiacoma, D. (Daniele), Perini, A. (Anna), Susi, A. (Angelo), Giorgini, P. (Paolo), Mylopoulos, J. (John), Piras, L. (Luca), Dellagiacoma, D. (Daniele), Perini, A. (Anna), Susi, A. (Angelo), Giorgini, P. (Paolo), and Mylopoulos, J. (John)
- Abstract
Gamification is increasingly applied to engage people in performing tool-supported collaborative tasks. From previous experiences we learned that available gamification guidelines are not sufficient, and more importantly that motivational and acceptance aspects need to be considered when designing gamified software applications. To understand them, stakeholders need to be involved in the design process. This paper aims to (i) identify key requirements for designing gamified solutions, and (ii) understand if existing methods (partially fitting those requirements) can be selected and combined to provide a comprehensive gamification design method. We discuss a set of key requirements for a suitable gamification design method. We illustrate how to select and combine existing methods to define a design approach that fits those requirements using Design Thinking and the Agon framework. Furthermore, we present a first empirical evaluation of the integrated design method, with participants including both requirements analysts and end-users of the gamified software. Our evaluation offers initial ideas towards a more general, systematic approach for gamification design.
73. Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
- Author
-
Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), Gallego-Nicasio Crespo, B. (Beatriz), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), and Gallego-Nicasio Crespo, B. (Beatriz)
- Abstract
Purpose– General data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform. Design/methodology/approach– The platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors. Findings– The findings provide the process for the DEFeND platform requirements’elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements. Practical implications– The proposed software engineering methodology and data collection tools(i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry. Social implications– It is reported repeatedly that data controllers face difficulties in complying with theGDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR,thus, offering
74. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design.
- Author
-
Ali, Raian, Kaindl, Hermann, Maciaszek, Leszek A., Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Cox, K. (Karl), Mouratidis, H. (Haralambos), Ali, Raian, Kaindl, Hermann, Maciaszek, Leszek A., Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Cox, K. (Karl), and Mouratidis, H. (Haralambos)
- Abstract
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting or mitigating conflicts. The framework and tool we propose in this paper, called ConfIs, fills this gap by supporting engineers and organisations in these complex activities, with its systematic and interactive process. We applied ConfIs to a realistic GDPR example from the DEFeND EU Project, and evaluated its supportiveness, with positive results, by involving privacy and security requirements experts (This research is an extension of the study conducted by ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2021. ConfIs: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design [https://doi.org/10.5220/0010406100800091]).
75. Applying acceptance requirements to requirements modeling tools via gamification: a case study on privacy and security.
- Author
-
Grabis, Janis, Bork, Dominik, Piras, L. (Luca), Calabrese, F. (Federico), Giorgini, P. (Paolo), Grabis, Janis, Bork, Dominik, Piras, L. (Luca), Calabrese, F. (Federico), and Giorgini, P. (Paolo)
- Abstract
Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakeholders, concerning dozens of requirements types, from functional to qualitative, including adaptation, security and privacy, ethical, acceptance and more. In such settings, requirements engineers need support concerning such increasingly complex activities, and Requirements Engineering (RE) modeling tools have been developed for this. However, such tools, although effective, are complex, time-consuming and requiring steep learning curves. The consequent lack of acceptance and abandonment in using such tools, by engineers, paves the way to the application of RE techniques in a more error-prone, low-quality way, increasing the possibility to have failures in software systems delivered. In this paper, we identify main areas of lack of acceptance, affecting RE engineers, for such tools, and propose an approach for making modeling tools more effective in engaging the engineer in performing RE in a tool-based way, receiving adequate feedback and staying motivated to use modeling tools. This is accomplished by performing acceptance requirements analysis (through the Agon Framework) and using gamification to increase the engagement of engineers during the usage of RE modeling tools. Towards this end, we performed a case study, within the VisiOn European Project, for enhancing a tool for modeling privacy and security requirements. Our case study provides preliminary evidence that our approach supports in making RE modeling tools more engaging from the engineer perspective.
76. Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform.
- Author
-
Katsikas, Sokratis, Cuppens, Nora, Lambrinoudakis, Costas, Kalloniatis, Christos, Mylopoulos, John, Gritzalis, Stefanos, Pallas, Frank, Sasse, Angela, Meng, Weizhi, Furnell, Steven, Garcia-Alfaro, Joaquin, Tsohou, A. (Aggeliki), Magkos, M. (Manos), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), Gallego-Nicasio Crespo, B. (Beatriz), Katsikas, Sokratis, Cuppens, Nora, Lambrinoudakis, Costas, Kalloniatis, Christos, Mylopoulos, John, Gritzalis, Stefanos, Pallas, Frank, Sasse, Angela, Meng, Weizhi, Furnell, Steven, Garcia-Alfaro, Joaquin, Tsohou, A. (Aggeliki), Magkos, M. (Manos), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), and Gallego-Nicasio Crespo, B. (Beatriz)
- Abstract
GDPR entered into force in May 2018 for enhancing user data protection. Even though GDPR leads towards a radical change with many advantages for the data subjects it turned out to be a significant challenge. Organizations need to make long and complex changes for the personal data processing activities to become GDPR compliant. Citizens as data subjects are empowered with new rights, which however they need to become aware of and understand. Finally, the role of data protection authorities changes as well as their expectations from organizations. GDPR compliance being a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of the Data govErnance For supportiNg gDpr (DEFeND) EU Project is to deliver such a platform. To succeed, the platform needs to satisfy legal and privacy requirements, be effective in supporting organizations in GDPR compliance, and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, we describe the process, within the DEFeND EU Project, for eliciting and analyzing requirements for such a complex platform, by involving stakeholders from the banking, energy, health and public administration sectors, and using advanced frameworks for privacy requirements and acceptance requirements. The paper also contributes by providing elicited privacy and acceptance requirements concerning a holistic platform for supporting GDPR compliance.
77. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques.
- Author
-
Pastor, Oscar, Mouratidis, Haralambos, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Cuel, R. (Roberta), Ponte, D. (Diego), Pastor, Oscar, Mouratidis, Haralambos, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Cuel, R. (Roberta), and Ponte, D. (Diego)
- Abstract
Gamificationis a powerful paradigm and a set of best practices used to motivate people carrying out a variety of ICT–mediated tasks. Designing gamification solutions and applying them to a given ICT system is a complex and expensive process (in time, competences and money) as software engineers have to cope with heterogeneous stakeholder requirements on one hand, and Acceptance Requirements on the other, that together ensure effective user participation and a high level of system utilization. As such, gamification solutions require significant analysis and design as well as suitable supporting tools and techniques. In this work, we compare concepts, tools and techniques for gamification design drawn from Software Engineering and Human and Organizational Behaviors. We conduct a comparison by applying both techniques to the specific Meeting Scheduling exemplar used extensively in the Requirements Engineering literature.
78. DEFeND architecture: a privacy by design platform for GDPR compliance.
- Author
-
Gritzalis, Stefanos, Weippl, Edgar R., Katsikas, Sokratis K., Anderst-Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Praitano, A. (Andrea), Tsohou, A. (Aggeliki), Mouratidis, H. (Haralambos), Gallego-Nicasio Crespo, B. (Beatriz), Bernard, J. B. (Jean Baptiste), Fiorani, M. (Marco), Magkos, E. (Emmanouil), Pavlidis, M. (Michalis), Zorzino, G. G. (Giuseppe Giovanni), Gritzalis, Stefanos, Weippl, Edgar R., Katsikas, Sokratis K., Anderst-Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Praitano, A. (Andrea), Tsohou, A. (Aggeliki), Mouratidis, H. (Haralambos), Gallego-Nicasio Crespo, B. (Beatriz), Bernard, J. B. (Jean Baptiste), Fiorani, M. (Marco), Magkos, E. (Emmanouil), Pavlidis, M. (Michalis), and Zorzino, G. G. (Giuseppe Giovanni)
- Abstract
The advent of the European General Data Protection Regulation (GDPR) imposes organizations to cope with radical changes concerning user data protection paradigms. GDPR, by promoting a Privacy by Design approach, obliges organizations to drastically change their methods regarding user data acquisition, management, processing, as well as data breaches monitoring, notification and preparation of prevention plans. This enforces data subjects (e.g., citizens, customers) rights by enabling them to have more information regarding usage of their data, and to take decisions (e.g., revoking usage permissions). Moreover, organizations are required to trace precisely their activities on user data, enabling authorities to monitor and sanction more easily. Indeed, since GDPR has been introduced, authorities have heavily sanctioned companies found as not GDPR compliant. GDPR is difficult to apply also for its length, complexity, covering many aspects, and not providing details concerning technical and organizational security measures to apply. This calls for tools and methods able to support organizations in achieving GDPR compliance. From the industry and the literature, there are many tools and prototypes fulfilling specific/isolated GDPR aspects, however there is not a comprehensive platform able to support organizations in being compliant regarding all GDPR requirements. In this paper, we propose the design of an architecture for such a platform, able to reuse and integrate peculiarities of those heterogeneous tools, and to support organizations in achieving GDPR compliance. We describe the architecture, designed within the DEFeND EU project, and discuss challenges and preliminary benefits in applying it to the healthcare and energy domains.
79. Using gamification to incentivize sustainable urban mobility.
- Author
-
Kazhamiakin, R. (Raman), Marconi, A. (Annapaola), Perillo, M. (Mirko), Pistore, M. (Marco), Valetto, G. (Giuseppe), Piras, L. (Luca), Avesani, F. (Francesco), Perri, N. (Nicola), Kazhamiakin, R. (Raman), Marconi, A. (Annapaola), Perillo, M. (Mirko), Pistore, M. (Marco), Valetto, G. (Giuseppe), Piras, L. (Luca), Avesani, F. (Francesco), and Perri, N. (Nicola)
- Abstract
Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined with initiatives aimed at increasing the awareness of citizens, and promoting their behavioural change. This paper explores the potential of gamification mechanisms to incentivize voluntary behavioural changes towards sustainable mobility solutions. We present a service-based gamification framework, developed within the STREETLIFE EU Project, which can be used to develop games on top of existing services and systems within a Smart City, and discuss the empirical findings of an experiment conducted in the city of Rovereto on the effectiveness of gamification to promote sustainable urban mobility.
80. Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
- Author
-
Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), Gallego-Nicasio Crespo, B. (Beatriz), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Mouratidis, H. (Haralambos), Chrysoloras, G. (George), Piras, L. (Luca), Pavlidis, M. (Michalis), Debussche, J. (Julien), Rotoloni, M. (Marco), and Gallego-Nicasio Crespo, B. (Beatriz)
- Abstract
Purpose– General data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform. Design/methodology/approach– The platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors. Findings– The findings provide the process for the DEFeND platform requirements’elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements. Practical implications– The proposed software engineering methodology and data collection tools(i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry. Social implications– It is reported repeatedly that data controllers face difficulties in complying with theGDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR,thus, offering
81. DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance.
- Author
-
Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Pavlidis, M. (Michalis), Mouratidis, H. (Haralambos), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Praitano, A. (Andrea), Iodice, A. (Annarita), Crespo, B. G. (Beatriz Gallego-Nicasio), Gritzalis, Stefanos, Weippl, Edgar R., Kotsis, Gabriele, Tjoa, A. Min, Khalil, Ismail, Piras, L. (Luca), Al-Obeidallah, M. G. (Mohammed Ghazi), Pavlidis, M. (Michalis), Mouratidis, H. (Haralambos), Tsohou, A. (Aggeliki), Magkos, E. (Emmanouil), Praitano, A. (Andrea), Iodice, A. (Annarita), and Crespo, B. G. (Beatriz Gallego-Nicasio)
- Abstract
The introduction of the European General Data Protection Regulation (GDPR) has brought significant benefits to citizens, but it has also created challenges for organisations, which are facing with difficulties interpreting it and properly applying it. An important challenge is compliance with the Privacy by Design and by default (PbD) principles, which require that data protection is integrated into processing activities and business practices from the design stage. Recently, the European Data Protection Board (EDPB) released an official document with PbD guidelines, and there are various efforts to provide approaches to support these. However, organizations are still facing difficulties in identifying a flow for executing, in a coherent, linear and effective way, these activities, and a complete toolkit for supporting this. In this paper, we: (i) identify the most important PbD activities and strategies, (ii) design a coherent, linear and effective flow for them, and (iii) describe our comprehensive supporting toolkit, as part of the DEFeND EU Project platform. Specifically, within DEFeND, we identified candidate tools, fulfilling specific GDPR aspects, and integrated them in a comprehensive toolkit: the DEFeND Data Scope Management service (DSM). The aim of DSM is to support organizations for continuous GDPR compliance through Model-Based Privacy by Design analysis. Here, we present important PbD activities and strategies individuated, then describe DSM, its design, flow, and a preliminary case study and evaluation performed with pilots from the healthcare, banking, public administration and energy sectors.
82. Design thinking and acceptance requirements for designing gamified software.
- Author
-
Piras, L. (Luca), Dellagiacoma, D. (Daniele), Perini, A. (Anna), Susi, A. (Angelo), Giorgini, P. (Paolo), Mylopoulos, J. (John), Piras, L. (Luca), Dellagiacoma, D. (Daniele), Perini, A. (Anna), Susi, A. (Angelo), Giorgini, P. (Paolo), and Mylopoulos, J. (John)
- Abstract
Gamification is increasingly applied to engage people in performing tool-supported collaborative tasks. From previous experiences we learned that available gamification guidelines are not sufficient, and more importantly that motivational and acceptance aspects need to be considered when designing gamified software applications. To understand them, stakeholders need to be involved in the design process. This paper aims to (i) identify key requirements for designing gamified solutions, and (ii) understand if existing methods (partially fitting those requirements) can be selected and combined to provide a comprehensive gamification design method. We discuss a set of key requirements for a suitable gamification design method. We illustrate how to select and combine existing methods to define a design approach that fits those requirements using Design Thinking and the Agon framework. Furthermore, we present a first empirical evaluation of the integrated design method, with participants including both requirements analysts and end-users of the gamified software. Our evaluation offers initial ideas towards a more general, systematic approach for gamification design.
83. Goal models for acceptance requirements analysis and gamification design.
- Author
-
Mayr, Heinrich C., Guizzardi, Giancarlo, Ma, Hui, Pastor, Oscar, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), Mylopoulos, J. (John), Mayr, Heinrich C., Guizzardi, Giancarlo, Ma, Hui, Pastor, Oscar, Piras, L. (Luca), Paja, E. (Elda), Giorgini, P. (Paolo), and Mylopoulos, J. (John)
- Abstract
The success of software systems highly depends on user engagement. Thus, to deliver engaging systems, software has to be designed carefully taking into account Acceptance Requirements, such as '70% of users will use the system', and the psychological factors that could influence users to use the system. Analysis can then consider mechanisms that affect these factors, such as Gamification (making a game out of system use), advertising, incentives and more. We propose a Systematic Acceptance Requirements Analysis Framework based on Gamification for supporting the requirements engineer in analyzing and designing engaging software systems. Our framework, named Agon, encompasses both a methodology and a meta-model capturing acceptance and gamification knowledge. In this paper, we describe the Agon Meta-Model and provide examples from the gamification of a decision-making platform in the context of a European Project.
84. ConfIs: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design.
- Author
-
Raian, Ali, Kaindl, Hermann, Maciaszek, Leszek, Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. (Mohammed), Cox, K. (Karl), Mouratidis, H. (Haralambos), Raian, Ali, Kaindl, Hermann, Maciaszek, Leszek, Alkubaisy, D. (Duaa), Piras, L. (Luca), Al-Obeidallah, M. (Mohammed), Cox, K. (Karl), and Mouratidis, H. (Haralambos)
- Abstract
Privacy and security requirements, and their potential conflicts, are increasingly having more and more importance. It is becoming a necessary part to be considered, starting from the very early stages of requirements engineering, and in the entire software engineering cycle, for the design of any software system. In the last few years, this has been even more emphasized and required by the law. A relevant example is the case of the General Data Protection Regulation (GDPR), which requires organizations, and their software engineers, to enforce and guarantee privacy-by-design to make their platforms compliant with the regulation. In this context, complex activities related to privacy and security requirements elicitation, analysis, mapping and identification of potential conflicts, and the individuation of their resolution, become crucial. In the literature, there is not available a comprehensive requirement engineering oriented tool for supporting the requirements analyst. In this paper, we propose ConfIs, a tool for supporting the analyst in performing a process covering these phases in a systematic and interactive way. We present ConfIs and its process with a realistic example from DEFeND, an EU project aiming at supporting organizations in achieving GDPR compliance. In this context, we evaluated ConfIs by involving privacy/security requirements experts, which recognized our tool and method as supportive, concerning these complex activities.
85. Goal-oriented requirements engineering: an extended systematic mapping study.
- Author
-
Horkoff, J. (Jennifer), Aydemir, F. B. (Fatma Ba?ak), Cardoso, E. (Evellin), Li, T. (Tong), Paja, E. (Elda), Salnitri, M. (Mattia), Piras, L. (Luca), Mylopoulos, J. (John), Giorgini, P. (Paolo), Horkoff, J. (Jennifer), Aydemir, F. B. (Fatma Ba?ak), Cardoso, E. (Evellin), Li, T. (Tong), Paja, E. (Elda), Salnitri, M. (Mattia), Piras, L. (Luca), Mylopoulos, J. (John), and Giorgini, P. (Paolo)
- Abstract
Over the last two decades, much attention has been paid to the area of goal-oriented requirements engineering (GORE), where goals are used as a useful conceptualization to elicit, model, and analyze requirements, capturing alternatives and conflicts. Goal modeling has been adapted and applied to many sub-topics within requirements engineering (RE) and beyond, such as agent orientation, aspect orientation, business intelligence, model-driven development, and security. Despite extensive efforts in this field, the RE community lacks a recent, general systematic literature review of the area. In this work, we present a systematic mapping study, covering the 246 top-cited GORE-related conference and journal papers, according to Scopus. Our literature map addresses several research questions: we classify the types of papers (e.g., proposals, formalizations, meta-studies), look at the presence of evaluation, the topics covered (e.g., security, agents, scenarios), frameworks used, venues, citations, author networks, and overall publication numbers. For most questions, we evaluate trends over time. Our findings show a proliferation of papers with new ideas and few citations, with a small number of authors and papers dominating citations; however, there is a slight rise in papers which build upon past work (implementations, integrations, and extensions). We see a rise in papers concerning adaptation/variability/evolution and a slight rise in case studies. Overall, interest in GORE has increased. We use our analysis results to make recommendations concerning future GORE research and make our data publicly available.
86. Characterization and enzymatic application of a redox potential biosensor based on a silicon transducer
- Author
-
Adami, M., Martini, M., and Piras, L.
- Published
- 1995
- Full Text
- View/download PDF
87. Monitoring of enzymatic activity and quantitative measurements of substrates by means of a newly designed silicon-based potentiometric sensor
- Author
-
Adami, M., Piras, L., Lanzi, M., and Fanigliulo, A.
- Published
- 1994
- Full Text
- View/download PDF
88. 3.30 - Characterization and Enzymatic Application of a Redox Potential Biosensor Based on a Silicon Transducer
- Author
-
Adami, M., Martini, M., and Piras, L.
- Published
- 1994
- Full Text
- View/download PDF
89. The Need for Transparency, Responsibility and Accountability: The Case of Facebook IPO
- Author
-
Enrico Maria Cervellati, Adriano Di Sandro, Luca Piras, Cervellati E. M., Di Sandro A., and Piras L.
- Subjects
financial supervision ,CONFLICTS OF INTERESTS ,Settore SECS-P/09 - Finanza Aziendale ,business.industry ,DISTORTED VALUATIONS ,Accountability ,Accounting ,business ,General Business, Management and Accounting ,Transparency (behavior) ,Initial public offering ,analysts’ recommendation - Abstract
This paper aims to describe and critically analyse the Facebook Initial Public Offering (IPO), initially focusing on the pre-IPO assessments made by underwriters, and then comparing them with the market evidence. The initial weak performance disappointed all those investors believing in a fast stock increase, causing in turn the rise of bad expectations about the company’s projects. As a matter of fact, the stock trend did not reflect the enthusiasm that the financial community showed during the IPO’s marketing activity or during the road show. The stock demand was far superior than the supply during all the pre-IPO activities, and even after the upward revisions of the price range. Thus, the assessment of the valuation methods used to set the offer price plays a key role to explain the reasons of the stock performance. We analyse analysts’ reports to investigate the reasons of their distorted valuations. The case of the Facebook IPO stresses the importance of supervision to ensure transparent financial statements and protect investors. Lack of transparency, wrong corporate culture and conflicts of interest may provoke stock crashes and damage investors and the financial system overall. Ensuring integrity of financial reporting and monitoring systems is thus essential to ensure responsibility, as well as accountability.
- Published
- 2013
90. Post-operative analgesia following TPLO surgery: A comparison between cimicoxib and tramadol.
- Author
-
Piras LA, Mancusi D, Olimpo M, Gastaldi L, Rosso V, Panero E, Staffieri F, and Peirone B
- Subjects
- Analgesia veterinary, Animals, Anterior Cruciate Ligament surgery, Anterior Cruciate Ligament Injuries veterinary, Dog Diseases surgery, Dogs, Double-Blind Method, Female, Male, Osteotomy adverse effects, Pain Measurement veterinary, Pain, Postoperative drug therapy, Prospective Studies, Stifle surgery, Tibia surgery, Analgesics therapeutic use, Dog Diseases drug therapy, Imidazoles therapeutic use, Osteotomy veterinary, Pain, Postoperative veterinary, Sulfonamides therapeutic use, Tramadol therapeutic use
- Abstract
Objective: To compare the analgesic effects of oral administration of cimicoxib and tramadol over a 30 day period following Tibial Plateau Leveling Osteotomy and partial menisectomy in dogs., Design: Randomized, double blinded, prospective clinical trial., Animals: 42 adult client-owned dogs with unilateral cranial cruciate ligament disease and partial meniscal tears., Methods: Dogs were allocated into 2 treatment groups (cimicoxib or tramadol). Weight bearing while standing, thigh circumference, flexion and extension range of motions, wound classification, adverse effects, Visual Analogue Scale (VAS), Glasgow Composite Measure Pain Scale (CMPS-SF) and Helsinki Chronic Pain Index (HCPI) questionnaire and limb function by means of pressure platform gait analysis were recorded before surgery and at several time points after surgery for 30 days. Outcome measures were compared at each time point among groups., Results: A significant improvement in two objective measures of gait of the cimicoxib group: the vertical impulse on day 1 and day 20 and the peak vertical force on day 20 were significantly improved when compared to the tramadol group. However, no difference was seen for the VI or PVF of dogs on the other days compared. In addiction there was no difference in the weight bearing while standing, thigh circumference, wound classification, adverse effects, VAS, CMPS-SF and HCPI. We did not observe a difference in the number of adverse effects measured in this study with the exception of hock edaema., Conclusions and Clinical Relevance: A significant difference was not found in long-term postoperative analgesia provided by cimicoxib or tramadol in dogs undergoing TPLO when subjective parameters (with the exception of knee joint range of motion) were evaluated, but use of the force plate analysis revealed a significant difference between groups at T20 for both PVF and VI. The use of cimicoxib improved the limb function and ROM and reduced the occurrence of hock edema, in the first 20 days after surgery, without any additional side effects, compared to tramadol. Thus, the use of cimicoxib should be preferred to tramadol alone in clinical cases similar to the ones included in this study., (Copyright © 2021 Elsevier Ltd. All rights reserved.)
- Published
- 2021
- Full Text
- View/download PDF
91. Effects of antebrachial torsion on the measurement of angulation in the frontal plane: a cadaveric radiographic analysis.
- Author
-
Piras LA, Peirone B, and Fox D
- Subjects
- Animals, Biomechanical Phenomena, Cadaver, Materials Testing, Bone Plates veterinary, Dogs, Forelimb anatomy & histology
- Abstract
Objectives: To quantify the effect of ante- brachial torsion on the miscalculation of radial valgus measured radiographically and to assess a radiographic positioning method used to mitigate torsion-associated artifactual miscalculation of concurrent frontal plane angulation., Methods: A canine cadaveric forelimb was used to model different combinations of valgus and external torsion. Valgus was induced in the limb in increments of five degrees, radiographic images were taken at each increment, and the observed radiographic valgus was measured. Various angles of torsion were then induced and the process was repeated for a range of torsional angles at 15° increments. For the second objective, the study was repeated with the forelimb rotationally re-positioned to mirror the degree of the induced torsion of the deformity at each valgus and torsion iteration., Results: Both zero degrees and 15° torsional iterations possessed mean artifactual valgus (AV) values between zero and five degrees for every valgus increment. With torsion of 30° and higher, mean AV values varied widely and did not fall within the zero to five degree accepted range. Rotationally re-positioning the limb in an attempt to alleviate the AV discrepancies resulted in the 30° torsional group having acceptable AV values for valgus values between zero and 20°., Clinical Significance: Increasing ante- brachial torsion interferes with accurate radiographic measurement of frontal plane deformities. Radiographically repositioning the limb allows the accurate calculation of more valgus and torsion combinations, but still results in miscalculations of more complex deformities.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.