|
Short Biography:
Mark is the Institute Head of the Institute for Complex Networks. He is the Director of the Information Systems (Wirtschaftsinformatik) branch in WU's Bachelor's program, a faculty member of the Complexity Science Hub Vienna, and a member of the key researcher team at the Secure Business Austria research and competence center. Mark received two diploma degrees in Business Informatics (Dipl.-Wirt.Inform.) from the University of Essen (Germany), as well as a doctoral degree in Business Informatics (Dr.rer.soc.oec.) and a Habilitation degree (Venia Docendi & Venia Legendi) from the Vienna University of Economics and Business (WU Vienna) (Austria). He participated in national and international research projects and worked as a software developer in several German software companies. |
Current Research Interests:
(in no particular order)
- Complex Systems
- Applied Network Science
- Data Science
- Computational Social Science
- Security Analysis, Security Engineering, Security Management
- Model-driven Software Development
- Domain-specific Languages (DSLs)
- Access Control / Policy Decisions / Policy Enforcement
- Role Engineering / Role Modeling / RBAC Policy Engineering
- Distributed Systems
- Software Engineering (in general)
- Modeling Dynamic Systems and System Evolution
Teaching:
In English:
- Course: System Development and Operations / Information Systems Development
- Course: Distributed Systems
- Course: Complex Systems and Networks (Digital Network Analytics - Course I)
- Course: Complex Systems and Networks (Digital Network Analytics - Course II)
- Topics for Bachelor's theses or Master's theses: available on request
(for an overview of potential topic areas, see the "Research Interests" section above).
- Ph.D. thesis projects: make an appointment
In German:
- Vorlesung: Daten und Netzwerksicherheit
- Vorlesung: Formale Grundlagen der Wirtschaftsinformatik
- Seminar: Konversatorium aus Wirtschaftsinformatik
- Seminar: Forschungsmethoden der Wirtschaftsinformatik für Doktoranden
- Seminar: Informationssysteme, Risikobeurteilung und Risikoentscheidungen
- Diplom-, Master- und Bachelor-Arbeiten: Jederzeit Themen auf Anfrage
(insb. aus den Bereichen der oben aufgelisteten "Research Interests".)
- Betreuung von Dissertationen: bitte persönlichen
Termin vereinbaren
Recent and Selected Publications:
A more complete list can be found [here]
A number of publications are also listed at [DBLP], [Google Scholar], and [Semantic Scholar]
Copyright policy:The papers obtained from this Web site are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder. |
Selected Publications:
(author names on publications before June 2004 appear in alphabetical order)
- K. Sliwa, E. Kušen, M. Strembeck: A Case Study Comparing Twitter Communities Detected by the Louvain and Leiden Algorithms During the 2022 War in Ukraine, In: Proc. of the 14th Temporal Web Analytics Workshop (TempWeb), Companion Proceedings of the 33rd ACM Web Conference (WWW), Singapore, May 2024 (pdf)
- E. Kušen, M. Strembeck: The Effects of Multiple Exposure to Highly Emotional Social Media Content During the Early Stages of the 2022 War in Ukraine, In: Springer Nature Computer Science, Vol. 4, No. 5, September 2023 (doi)
- E. Kušen, M. Strembeck: Short- and long-term impact of psychological distance on human responses to a terror attack, In: Online Social Networks and Media (OSNEM), Vol. 33, January 2023 (doi)
- K. Kueffner, M. Strembeck: Toward a generalized notion of discrete time for modeling temporal networks, In: Network Science, Vol. 9, No. 4, December 2021 (doi)
- E. Kušen, M. Strembeck: Evacuate everyone south of that line: Analyzing structural communication patterns during natural disasters, In: Journal of Computational Social Science (JCSS), Vol. 4, No. 2, November 2021 (doi, pdf)
- E. Kušen, M. Strembeck: Building blocks of communication networks in times of crises: Emotion-exchange motifs, In: Computers in Human Behavior (CHB), Vol. 123, October 2021 (doi)
- E. Kušen, M. Strembeck: Emotional Communication during Crisis Events: Mining Structural OSN Patterns, In: IEEE Internet Computing, Vol. 25, No. 2, March/April 2021 (doi)
- E. Kušen, M. Strembeck: You talkin' to me? Exploring Human/Bot Communication Patterns during Riot Events, In: Information Processing & Management (IPM), Vol. 57, No. 1, January 2020 (doi)
- E. Kušen, M. Strembeck: Something draws near, I can feel it: An Analysis of Human and Bot Emotion-exchange Motifs on Twitter, In: Online Social Networks and Media (OSNEM), Vol. 10-11, May 2019 (doi, pdf)
- E. Kušen, M. Strembeck: An Analysis of Emotion-exchange Motifs in Multiplex Networks during Emergency Events, In: Applied Network Science, Vol. 4, March 2019 (doi, pdf)
- E. Kušen, M. Strembeck, M. Conti: Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube, In: Influence and Behavior Analysis in Social Networks and Social Media, Lecture Notes in Social Networks (LNSN), Springer, February 2019 (doi, pdf)
- E. Kušen, M. Strembeck: Why so Emotional? An Analysis of Emotional Bot-generated Content on Twitter, In: Proc. of the 3rd International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS), Funchal, Madeira, Portugal, March 2018 (pdf)
- E. Kušen, M. Strembeck: Politics, Sentiments, and Misinformation: An Analysis of the Twitter Discussion on the 2016 Austrian Presidential Elections, In: Online Social Networks and Media (OSNEM), Vol. 5, March 2018 (doi, pdf)
- B. Hoisl, S. Sobernig, M. Strembeck: Reusable and Generic Design Decisions for Developing UML-based Domain-specific Languages, In: Information and Software Technology (IST), Vol. 92, December 2017 (doi, pdf)
- E. Kušen, M. Strembeck, G. Cascavilla, M. Conti: On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks, In: Proc. of the 9th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Sydney, Australia, July/August 2017 (pdf)
- E. Kušen, M. Strembeck: Security-related Research in Ubiquitous Computing - Results of a Systematic Literature Review, In: The Computing Research Repository (CoRR), arXiv:1701.00773, January 2017 (pdf, SLR protocol)
- E. Kušen, M. Strembeck: A Decade of Security Research in Ubiquitous Computing: Results of a Systematic Literature Review, In: International Journal of Pervasive Computing and Communications (IJPCC), Vol. 12, No. 2, July 2016 (doi, SLR protocol)
- S. Sobernig, B. Hoisl, M. Strembeck: Extracting Reusable Design Decisions for UML-based Domain-specific Languages: A Multi-method Study, In: Journal of Systems and Software (JSS), Volume 113, March 2016 (doi, pdf, protocol)
- S. Schefer-Wenzl, M. Strembeck: Model-driven Specification and Enforcement of RBAC Break-Glass Policies for Process-Aware Information Systems, In: Information and Software Technology (IST), Vol. 56, No. 10, October 2014 (doi, pdf)
- S. Schefer-Wenzl, M. Strembeck: Modeling Support for Role-Based Delegation in Process-Aware Information Systems, In: Business & Information Systems Engineering (BISE), Vol. 6, No. 4, August 2014 (doi, pdf)
- B. Hoisl, S. Sobernig, M. Strembeck: Modeling and Enforcing Secure Object Flows in Process-driven SOAs: An Integrated Model-driven Approach, In: Software and Systems Modeling (SoSyM), Vol. 13, No. 2, May 2014 (doi, pdf)
- W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, S. Dustdar: Enforcement of Entailment Constraints in Distributed Service-Based Business Processes, In: Information and Software Technology (IST), Vol. 55, No. 11, November 2013 (doi, pdf)
- S. Schefer-Wenzl, M. Strembeck: Modeling Context-Aware RBAC Models for Mobile Business Processes, In: International Journal of Wireless and Mobile Computing (IJWMC), Vol. 6, No. 5, 2013 (doi, pdf)
- K. Figl, J. Mendling, M. Strembeck: The Influence of Notational Deficiencies on Process Model Comprehension, In: Journal of the Association for Information Systems (JAIS), Vol. 14, No. 6, June 2013 pdf, web)
- A. Baumgrass, M. Strembeck: Bridging the Gap between Role Mining and Role Engineering via Migration Guides, In: Information Security Technical Report (ISTR), Vol. 17, No. 4, May 2013 (doi, pdf)
- J. Mendling, M. Strembeck, J. Recker: Factors of Process Model Comprehension - Findings from a Series of Experiments, In: Decision Support Systems (DSS), Vol. 53, No. 1, April 2012 (doi, pdf)
- A. Baumgrass, M. Strembeck, S. Rinderle-Ma: Deriving Role Engineering Artifacts from Business Processes and Scenario Models, In: Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), Innsbruck, Austria, June 2011 (ps, pdf, extended version)
- M. Strembeck, J. Mendling: Modeling Process-related RBAC Models with Extended UML Activity Models, In: Information and Software Technology (IST), Vol. 53, No. 5, May 2011 (doi, pdf)
- M. Strembeck: Scenario-Driven Role Engineering, In: IEEE Security & Privacy, Vol. 8, No. 1, January/February 2010 (doi, pdf)
- M. Strembeck, U. Zdun: An Approach for the Systematic Development of Domain-Specific Languages, In: Software: Practice and Experience (SP&E), Vol. 39, No. 15, October 2009 (doi, pdf)
- U. Zdun, M. Strembeck: Reusable Architectural Decisions for DSL Design: Foundational Decisions in DSL Development, In: Proc. of the 14th European Conference on Pattern Languages of Programs (EuroPLoP), Irsee Monastery, Germany, July 2009 (ps, pdf)
- M. Strembeck, U. Zdun: Modeling Interdependent Concern Behavior Using Extended Activity Models, In: Journal of Object Technology (JOT), Vol. 7, No. 6, July-August 2008 (doi, pdf)
- U. Zdun, M. Strembeck, G. Neumann: Object-based and class-based composition of transitive mixins, In: Information and Software Technology (IST), Vol. 49, No. 8, August 2007 (doi, pdf)
- M. Strembeck: A Role Engineering Tool for Role-Based Access Control, In: Proc. of the 3rd Symposium on Requirements Engineering for Information Security (SREIS), Paris, France, August 2005 (ps, pdf)
- M. Strembeck: Embedding Policy Rules for Software-Based Systems in a Requirements Context, In: Proc. of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Stockholm, Sweden, June 2005 (ps, pdf)
- M. Strembeck, G. Neumann: An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments, In: ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 3, August 2004 (doi, pdf)
- M. Strembeck: Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences, In: Proc. of the Conference on Software Engineering (SE2004), Innsbruck, Austria, February 2004 (ps, pdf)
- G. Neumann, M. Strembeck: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment, In: Proc. of 8th ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June 2003 (ps, pdf)
- G. Neumann, M. Strembeck: A Scenario-driven Role Engineering Process for Functional RBAC Roles, In: Proc. of 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, CA, USA, June 2002 (ps, pdf)
- G. Neumann, M. Strembeck: Design and Implementation of a Flexible RBAC-Service in an Object-Oriented Scripting Language, In: Proc. of the 8th ACM Conference on Computer and Communications Security (CCS), Philadelphia, PA, USA, November 2001 (ps, pdf, presentation)
Open Source Projects:
- BusinessActivity LRE: the BusinessActivity library and runtime engine provides platform support for different parts of the BusinessActivities Framework.
- xoRBAC: a policy decision point and policy repository for RBAC policies.
- xoRET: a software tool for RBAC role engineering/RBAC policy engineering.