Home

My current research interests are knowledge graphs, ontologies and related AI techniques such as large language models. Several of my ongoing and recent projects investigate how these and other AI techniques can be used the media sector, often in combination with big open data sources.

My current research builds on a long-standing interest in modelling and analysis of information systems (IS) in an enterprise and usage context. I have studied how various types of conceptual models can be used to facilitate broad organisational involvement in IS development and enterprise change projects, by including other stakeholder groups in addition to ICT experts and managers.

I have investigated how models can be used for identifying and analysing safety and security threats as part of requirements work and how organisations actually use IS models in practice.

I have also investigated the semantics of IS and enterprise modelling notations. I am studying how clearer definitions of notation semantics can contribute to making better models and to facilitate consistency checking and perhaps even automatic translation across different notations. My work on a Unified Enterprise Modelling Ontology (UEMO) is part of this activity.

     

    I give courses in areas such as knowledge graphs, big data, information systems, systems development, research methods, Python programming and basic information technology. In these areas, I have supervised 9 Ph.D. candidates and more than 50 Master students through to completion.

    Academic article
    • Show author(s) (2024). A Blackboard Model for Flexible and Parallel Text Annotation. IEEE Access. 30507-30517.
    • Show author(s) (2023). Visual User-Generated Content Verification in Journalism: An Overview. IEEE Access. 6748-6769.
    • Show author(s) (2023). Trustworthy journalism through AI. Data & Knowledge Engineering.
    • Show author(s) (2023). The Information Disorder Level (IDL) Index: A Human-Based Metric to Assess the Factuality of Machine-Generated Content. Lecture Notes in Computer Science (LNCS). 60-71.
    • Show author(s) (2023). Evaluating the Effectiveness of GPT Large Language Model for News Classification in the IPTC News Ontology. IEEE Access. 145386-145394.
    • Show author(s) (2023). Construction of a relevance knowledge graph with application to the LOCAL news angle. CEUR Workshop Proceedings.
    • Show author(s) (2023). Automated Fact-Checking to Support Professional Practices: Systematic Literature Review and Meta-Analysis. International Journal of Communication. 5170-5190.
    • Show author(s) (2023). A software reference architecture for journalistic knowledge platforms. Knowledge-Based Systems.
    • Show author(s) (2022). Semantic Knowledge Graphs for the News: A Review. ACM Computing Surveys. 1-38.
    • Show author(s) (2022). Knowledge Graph Semantic Annotation and Population with Real-Time Events Data from GDELT. IEEE Conference on Business Informatics (CBI).
    • Show author(s) (2021). Responsible media technology and AI: challenges and research directions. AI and Ethics.
    • Show author(s) (2021). Emerging News task: Detecting emerging events from social media and news feeds. CEUR Workshop Proceedings.
    • Show author(s) (2021). Developing a Software Reference Architecture for Journalistic Knowledge Platforms. CEUR Workshop Proceedings.
    • Show author(s) (2021). Crisscross ontology: Mapping concept dynamics, competing argument and multiperspectival knowledge in philosophy. Quaderni di «filosofia». 59-73.
    • Show author(s) (2020). Ontologies for finding journalistic angles. Software and Systems Modeling (SoSyM).
    • Show author(s) (2020). Data Privacy in Journalistic Knowledge Platforms. CEUR Workshop Proceedings.
    • Show author(s) (2020). Challenges and Opportunities for Journalistic Knowledge Platforms. CEUR Workshop Proceedings.
    • Show author(s) (2020). Analysis and Design of Computational News Angles. IEEE Access. 120613-120626.
    • Show author(s) (2020). A knowledge-graph platform for newsrooms. Computers in industry (Print).
    • Show author(s) (2019). Towards a Big Data Platform for News Angles. CEUR Workshop Proceedings. 17-29.
    • Show author(s) (2019). Towards Ontological Support for Journalistic Angles. Lecture Notes in Business Information Processing. 279-294.
    • Show author(s) (2018). News Hunter: Building and Mining Knowledge Graphs for Newsroom Systems. NOKOBIT: Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
    • Show author(s) (2018). Harnessing Mobility Data in Cities: A Case Study from the Bergen Region. NOKOBIT: Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
    • Show author(s) (2018). From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling. Business & Information Systems Engineering (BISE). 69-80.
    • Show author(s) (2018). Combined assessment of software safety and security requirements: An industrial evaluation of the CHASSIS method. Journal of Cases on Information Technology (JCIT). 46-69.
    • Show author(s) (2017). Load-Time Reduction Techniques for Device-Agnostic Web Sites. Journal of Web Engineering. 312-347.
    • Show author(s) (2016). Enterprise modelling for the masses – From elitist discipline to common practice. Lecture Notes in Business Information Processing. 225-240.
    • Show author(s) (2015). Investigating security threats in architectural context: Experimental evaluations of misuse case maps. Journal of Systems and Software. 90-111.
    • Show author(s) (2015). Extending the UML Statecharts Notation to Model Security Aspects. IEEE Transactions on Software Engineering. 661-690.
    • Show author(s) (2014). Comparing attack trees and misuse cases in an industrial setting. Information and Software Technology. 294-308.
    • Show author(s) (2013). Identifying and visualising dependability concerns - applications to business process management. Lecture Notes in Business Information Processing. 623-629.
    • Show author(s) (2013). HARM: Hacker Attack Representation Method. Communications in Computer and Information Science (CCIS). 156-175.
    • Show author(s) (2013). Comparing risk identification techniques for safety and security requirements. Journal of Systems and Software. 1124-1151.
    • Show author(s) (2012). Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams. Lecture Notes in Computer Science (LNCS). 117-131.
    • Show author(s) (2012). New perspectives in ontological analysis: Guidelines and rules for incorporating modelling languages into UEML. Information Systems. 484-507.
    • Show author(s) (2012). Improving security and safety modelling with failure sequence diagrams. International Journal of Secure Software Engineering (IJSSE). 17 pages.
    • Show author(s) (2012). Benefits of different types of enterprise modeling initiatives in ICT-enabled process change. International Journal of Information System Modeling and Design. 1-23.
    • Show author(s) (2012). An ontology for enterprise and information systems modelling. Applied Ontology. 49-92.
    • Show author(s) (2011). Understanding the determinants of business process modelling in organisations. Business Process Management Journal. 639-662.
    • Show author(s) (2011). Anatomy of the Unified Enterprise Modelling Ontology. Lecture Notes in Business Information Processing. 163-176.
    • Show author(s) (2010). Visualizing Cyber Attacks with Misuse Case Maps. Lecture Notes in Computer Science (LNCS). 262-275.
    • Show author(s) (2010). The Unified Enterprise Modelling Language – Overview and Further Work. Computers in industry (Print). 99-111.
    • Show author(s) (2010). Incorporating UML class and activity constructs into UEML. Lecture Notes in Computer Science (LNCS). 244-254.
    • Show author(s) (2010). Determinants to the use of business process modeling. Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS). 1-10.
    • Show author(s) (2010). Comparing two techniques for intrusion visualization. Lecture Notes in Business Information Processing. 1-15.
    • Show author(s) (2009). Experimental Comparison of Attack Trees and Misuse Cases for Security Threat Identification. Information and Software Technology. 916-932.
    • Show author(s) (2008). Validating the Process-Modelling Practice Model. Enterprise Modelling and Information Systems Architectures - An International Journal. 3-17.
    • Show author(s) (2008). Validating the Process-Modelling Practice Model. Enterprise Modelling and Information Systems Architectures - An International Journal. 3-17.
    • Show author(s) (2008). Misuse Cases for Identifying System Dependability Threats. Journal of Information Privacy and Security. 3-22.
    • Show author(s) (2008). Exploring Process-Modelling Practice: Towards a Conceptual Model. Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS).
    • Show author(s) (2005). Eliciting Security Requirements with Misuse Cases. Requirements Engineering. 34-44.
    • Show author(s) (2005). A Unified Modeling Language without referential redundancy. Data & Knowledge Engineering. 277-300.
    • Show author(s) (2004). Mobile information systems - Research challenges on the conceptual and logical level. Lecture Notes in Computer Science (LNCS). 124-135.
    • Show author(s) (2004). A template for defining enterprise modelling constructs. Journal of Database Management. 39-73.
    • Show author(s) (2003). Research Areas and Challenges for Mobile Information Systems. International Journal of Mobile Communications.
    • Show author(s) (2002). Ontological Evaluation of the UML Using the Bunge-Wand-Weber Model. Journal of Software and Systems Modeling (SoSyM). 43-67.
    • Show author(s) (2001). Ontological analysis of whole-part relationships in OO-models. Information and Software Technology. 387-399.
    • Show author(s) (2001). Grounding the OML metamodel in ontology. Journal of Systems and Software. 119-143.
    • Show author(s) (2000). Programming and Software Development Environment Research in the Nordic Countries, Special Issue on Programming Environments. Nordic Journal of Computing. 65-66.
    • Show author(s) (1999). Workshop Summary (Guest Editor's Introduction). Nordic Journal of Computing. 1-3.
    • Show author(s) (1998). Workshop Summary - REFSQ'98. Software engineering notes. 44-50.
    • Show author(s) (1997). Facet Modelling: An Approach to Flexible and Integrated Conceptual Modelling. Information Systems. 291-323.
    Academic lecture
    • Show author(s) (2023). Trustworthy Journalism Through AI.
    • Show author(s) (2023). The Ethical Dimensions of Data Quality for Automated Fact-Checking.
    • Show author(s) (2023). AI in the newsroom: A data quality assessment framework for employing machine learning in journalistic workflow.
    • Show author(s) (2022). Knowledge Graph Semantic Annotation and Population with Real-Time Events Data from GDELT.
    • Show author(s) (2021). The News Angler Project: Exploring the Next Generation of Journalistic Knowledge Platforms.
    • Show author(s) (2021). News Angler - finding entities for a LOCAL news angle.
    • Show author(s) (2021). News Angler - Towards Discovering Unexpected Connections in the News.
    • Show author(s) (2021). Extracting angles from event KGs.
    • Show author(s) (2021). Emerging News: Detecting emerging events from social media and news feeds.
    • Show author(s) (2020). Semantic knowledge graphs for the news.
    • Show author(s) (2019). Towards Ontological Support for Journalistic Angles.
    • Show author(s) (2019). Supporting Journalistic News Angles with Models and Analogies.
    • Show author(s) (2019). Detecting newsworthy events in a journalistic platform.
    • Show author(s) (2018). Towards a Big Data Platform for News Angles.
    • Show author(s) (2016). Semantics for Agility in the Time of Big Data.
    • Show author(s) (2014). Teaching Semantic Technologies as Part of a Software Development Program.
    • Show author(s) (2014). Methods and tools for security requirements engineering - A review of the ReqSec project.
    • Show author(s) (2012). Keynote: Identifying and Visualising Dependability Concerns - Applications to Business Process Management.
    • Show author(s) (2011). Ontology Extraction from Social Semantic Tags.
    • Show author(s) (2010). Unified Enterprise Modelling Language – Overview and Ongoing Work.
    • Show author(s) (2010). Interoperabilitet: Nye muligheter og utfordringer.
    • Show author(s) (2010). Experimental evaluation of misuse case maps for eliciting security requirements.
    • Show author(s) (2009). Virksomhetsprosesser og fremvoksende (semantikk) standarder.
    • Show author(s) (2009). Unified Enterprise Modelling Language (UEML) and ISO 15926.
    • Show author(s) (2009). Semantiske teknologier for interoperabilitet.
    • Show author(s) (2008). Towards a Model of Process-Modelling Practice: Quantitative Validation and Results.
    • Show author(s) (2008). The Unified Enterprise Modelling Language – Overview and Further Work.
    • Show author(s) (2007). What Makes Process Modelling Effective - Modelling or Project Factors?
    • Show author(s) (2007). Ontology-Supported Language Interoperability - The UEML Approach.
    • Show author(s) (2007). Incorporating IDEF3 into the Unified Enterprise Modelling Language (UEML).
    • Show author(s) (2006). Progress report February 2006, WP5 UEML - subtask UEML Approaches.
    • Show author(s) (2006). Process Modelling Practice: Theory Formulation and Preliminary Results.
    • Show author(s) (2006). Proces Change Projects: A Study of Norwegian Practice.
    • Show author(s) (2006). Misuse Cases – Use Cases that Capture Security Threats.
    • Show author(s) (2006). Misuse Cases - Use Cases that Capture Security Threats.
    • Show author(s) (2005). UEML Approach Tutorial.
    • Show author(s) (2005). Progress report October 2005, DEM - subtask UEML Approaches.
    • Show author(s) (2005). Progress report May 2005, WP5 UEML - subtask UEML Approaches.
    • Show author(s) (2004). Ten Years of REFSQ: Outcomes and Outlooks.
    • Show author(s) (2004). Progress report November 2004, WP5 UEML - subtask UEML Approaches.
    • Show author(s) (2003). The Multiple Life Cycle Perspective on Information Systems Architecture.
    • Show author(s) (2003). The Multiple Life Cycle Perspective on Information Systems Architecture.
    • Show author(s) (2003). The Multiple Life Cycle Perspective on Information Systems Architecture.
    • Show author(s) (2003). Position Statement on System Modeling and Its Ontological Evaluation.
    • Show author(s) (2003). Multi-Perspective Multi-Purpose Enterprise Knowledge Modelling.
    • Show author(s) (2003). A Reuse-based Approach to Determining Security Requirements.
    • Show author(s) (2003). A Reuse-Based Approach to Determining Security Requirements.
    • Show author(s) (2002). Requirements for the UEML.
    • Show author(s) (2002). Representation, Assessment and Improvement of Information Systems Architecture.
    • Show author(s) (2002). Mobile Information Systems — Research Challenges on the Conceptual and Logical Level.
    • Show author(s) (2002). Mobile Information Systems - Research Challenges on the Conceptual and Logical level.
    • Show author(s) (2002). Managing Information Systems (IS) Architectures.
    • Show author(s) (2002). Informasjonsarkitektur for datavarehus.
    • Show author(s) (2002). Generalization/Specialization as a Structuring Mechanism for Misuse Cases.
    • Show author(s) (2002). Generalization/Specialization as a Structuring Mechanism for Misuse Cases.
    • Show author(s) (2001). Templates for misuse case description.
    • Show author(s) (2001). Early Design of Enhanced ETV Services.
    • Show author(s) (2001). Capturing security requirements through misuse cases.
    • Show author(s) (2000). Workshop Summary REFSQ'00.
    • Show author(s) (2000). Eliciting Security Requirements by Misuse Cases.
    • Show author(s) (2000). Eliciting Security Requirements by Misuse Cases.
    • Show author(s) (1998). Multi-Perspective Modelling of Requirements: A Case Study Using Facet Models.
    • Show author(s) (1997). A Model for Comparing Approaches to IS-Architecture Alignment.
    • Show author(s) (1997). A Comparison of Four Families of Multi-Perspective Problem Analysis Methods.
    • Show author(s) (1993). Concepts for Real-World Modelling.
    Academic anthology/Conference proceedings
    • Show author(s) (2023). Research Challenges in Information Science: Information Science and the Connected World. Springer.
    • Show author(s) (2015). Conceptual Modeling - 34th International Conference, ER 2015, Stockholm, Sweden, October 19-22, 2015, Proceedings. Springer Science+Business Media B.V..
    • Show author(s) (2014). NOKOBIT 2014, Norsk konferanse for organisasjoners bruk av informasjonsteknologi, Høgskolen i Østfold 17 - 19. november 2014. Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
    • Show author(s) (2013). Requirements Engineering: Foundation for Software Quality, 19th International Working Conference, REFSQ 2013, Essen, Germany, April 2013, Proceedings. Springer.
    • Show author(s) (2013). NOKOBIT 2013 : Universitetet i Stavanger 18. - 20. november 2013 : Norsk konferanse for organisasjoners bruk av informasjonsteknologi. Akademika forlag.
    • Show author(s) (2011). The Practice of Enterprise Modeling. Springer.
    • Show author(s) (2007). Conceptual Modelling in Information Systems Engineering. Springer.
    • Show author(s) (2007). Conceptual Modelling in Information Systems Engineering. Springer.
    • Show author(s) (2007). Advanced Information Systems Engineering. 19th International Conference, CAiSE 2007. Springer.
    • Show author(s) (2007). Advanced Information Systems Engineering, Proceedings of CAiSE'07. Springer.
    • Show author(s) (2002). Requirements Engineering Journal, Special Issue with Selected Papers from the Seventh International Workshop on Requirements Engineering: Foundation of Software Quality, REFSQ'2001. Springer Verlag.
    • Show author(s) (2001). Requirements Engineering Journal, Special Issue with Selected Papers from the Sixth International Workshop on Requirements Engineering: Foundation of Software Quality - REFSQ'2000. Springer Verlag.
    • Show author(s) (2001). Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001. University of Essen.
    • Show author(s) (2001). Proceedings of the Seventh International Workshop on Requirements Engineering: Foundation for Software Quality - REFSQ'2001. University of Essen.
    • Show author(s) (2001). Proceedings of the Seventh International Workshop on Requirements Engineering: Foundation for Software Quality - REFSQ'01. University of Essen.
    • Show author(s) (2001). Proceedings of the 24th Information Systems Research Seminar in Scandinavia. Universitetet i Bergen.
    • Show author(s) (2000). Proceedings of the Sixth International Workshop on Requirements Engineering: Foundation of Software Quality - REFSQ'00. Essener Informatik Beitrage.
    • Show author(s) (2000). Proceedings of NWPER'2000 - Nordic Workshop on Programming Environment Research. Department of Information Science, University of Bergen.
    • Show author(s) (2000). Nordic Journal of Computing, Special Issue on Programming and Software Development Environment Research in the Nordic Countries. Helsinki University Printing House.
    Compendium
    • Show author(s) (1993). Long-Term Planning in Computer Chess. To appear in Advances in Computer Chess. 7.
    Feature article
    • Show author(s) (2005). Vårt sårbare samfunn. Bergens Tidende.
    Academic chapter/article/Conference paper
    • Show author(s) (2023). Making sense of nonsense : Integrated gradient-based input reduction to improve recall for check-worthy claim detection. 13 pages.
    • Show author(s) (2021). Combined Assessment of Software Safety and Security Requirements: An Industrial Evaluation of the CHASSIS Method. 28 pages.
    • Show author(s) (2020). Knowledge Graphs and Natural-Language Processing. 17 pages.
    • Show author(s) (2020). Big Data. 15 pages.
    • Show author(s) (2019). Supporting Journalistic News Angles with Models and Analogies. 7 pages.
    • Show author(s) (2013). SynsetTagger: a tool for generating ontologies from semantic tags.
    • Show author(s) (2013). Enhancing CHASSIS: A Method for Combining Safety and Security. 8 pages.
    • Show author(s) (2012). Enterprise modeling practice in a turnaround project. 14 pages.
    • Show author(s) (2011). Semantic annotations for modelling language interoperability. 9 pages.
    • Show author(s) (2011). Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. 8 pages.
    • Show author(s) (2011). Characterising and Analysing Security Requirements Modelling Initiatives. 6 pages.
    • Show author(s) (2010). Towards a hacker attack representation method. 10 pages.
    • Show author(s) (2010). Determinants to the use of business process modeling. 1 pages.
    • Show author(s) (2010). Browsing and visualizing semantically enriched information resources. 7 pages.
    • Show author(s) (2010). Aligning the UEML Ontology with SUMO. 10 pages.
    • Show author(s) (2010). A platform for interoperable domain-specific enterprise modelling based on ISO 15926. 10 pages.
    • Show author(s) (2008). Exploring Process-Modelling Practice: Towards a Conceptual Model. 8 pages.
    • Show author(s) (2007). What Makes Process Modelling Effective? Modelling or Project Factors? 1 pages.
    • Show author(s) (2007). Ontological Analysis of KAOS using Separation of References. 18 pages.
    • Show author(s) (2007). Interoperable Management of Conceptual Models. 16 pages.
    • Show author(s) (2007). Interoperable Management of Conceptual Models. 16 pages.
    • Show author(s) (2007). Comparing GRL and KAOS using the UEML Approach. 12 pages.
    • Show author(s) (2007). Capturing dependability threats in conceptual modelling. 14 pages.
    • Show author(s) (2007). Capturing Dependability Threats in Conceptual Modelling. 14 pages.
    • Show author(s) (2006). The UEML Approach to Modelling Construct Description.
    • Show author(s) (2006). Process Modelling Practice: Theory Formulation and Preliminary Results.
    • Show author(s) (2006). Process Change Projects: A Study of Norwegian Practice.
    • Show author(s) (2006). Ontological Analysis of KAOS Using Separation of Reference.
    • Show author(s) (2006). Interoperable language and model management using the UEML approach. 8 pages.
    • Show author(s) (2006). Comparison of Goal-oriented Languages using the UEML Approach.
    • Show author(s) (2006). A Roadmap for UEML.
    • Show author(s) (2005). Prosessforbedring – en vurdering av nasjonal praksis.
    • Show author(s) (2005). Prosessforbedring - en vurdering av nasjonal praksis. 18 pages.
    • Show author(s) (2005). Enhancing Security Patterns with Misuse Cases. 7 pages.
    • Show author(s) (2003). Usable M-Commerce Systems: The Need for Model-Based Approaches.
    • Show author(s) (2003). Model-Supported Alignment of Information Systems Architecture.
    • Show author(s) (2001). Workshop Summary REFSQ'01. 8 pages.
    • Show author(s) (2001). The Whole-Part Relationship in the Unified Modeling language: A New Approach.
    • Show author(s) (2001). Templates for Misuse Case Description. 12 pages.
    • Show author(s) (2001). Preface.
    • Show author(s) (2001). Capturing Security Requirements through Misuse Cases. 12 pages.
    • Show author(s) (2000). An Ontological Evaluation of the OML Metamodel. 16 pages.
    • Show author(s) (1997). Towards a Facet-Modelling Language. 14 pages.
    • Show author(s) (1997). Real-World Modelling. 15 pages.
    • Show author(s) (1997). REFSQ'97 Workshop Summary. 12 pages.
    • Show author(s) (1997). Applying Semantic Quality Criteria to Multi-Perspective Problem Analysis Methods. 18 pages.
    • Show author(s) (1994). Long-Term Planning in Computer Chess.
    Abstract
    • Show author(s) (2021). The News Angler Project: Exploring the Next Generation of Journalistic Knowledge Platforms. NIKT: Norsk IKT-konferanse for forskning og utdanning.
    • Show author(s) (2007). Preface. Lecture Notes in Computer Science (LNCS).
    Academic literature review
    • Show author(s) (2022). Supporting Newsrooms with Journalistic Knowledge Graph Platforms: Current State and Future Directions. Technologies.
    • Show author(s) (2020). Named entity extraction for knowledge graphs: A literature overview. IEEE Access. 32862-32881.
    • Show author(s) (2020). Big Data and Emergency Management: Concepts, Methodologies, and Applications. IEEE Transactions on Big Data. 397-419.

    More information in national current research information system (CRIStin)

    You can find even more of my publications in Google Scholar and at Research Gate (which also has full text available for many of them).

    Current and recent research projects include:

    • Media Futures - responsible media content analysis and production
    • NORDIS - Nordic Observatory for Digital Media and Information Disorder
    • NewsAngler - discovering unexpected connections in the news
    • BDEM - big data for emergency management
    • UbiMob - ubiquitous data for mobility in smart cities
    • TransFeed - Driver Behaviour and Emissions

    Older projects:

    • Safety and security requirements: I participated in the NFR-funded ReqSec project (2008-2011), a collaboration with the Norwegian University of Science and Technology (NTNU).
    • Unified Enterprise Modelling Language (UEML): I was involved in the development of a unified modelling language for enterprises and their information systems. This work started as part of the EU Network of Excellence Interop-NoE (2003-2007).
    • Mobile information systems for knowledge workers: I participated in the NFR-funded Model-Driven Multi-Channel Mobile Work (M3W) project (2006-2010), also a collaboration with the Norwegian University of Science and Technology (NTNU).
    • Process-modelling practice in Norway (PMP): I have been collaborating with the Norwegian School of Economics and Business Administration and Agder University on studies of practical process modelling in Norway.

    Other research interests are:

    • Knowledge graphs and ontologies, in particular their synergies with large language models (recent and ongoing)
    • Ontological analysis and evaluation of enterprise and IS modelling languages (since 1998)
    • Understanding IS and enterprise architecture (since 1994)

    In the past, I have also carried out research on software performance evaluation (on which I did my Ph D) and several other areas.

    M.Eng. from the Norwegian Institute of Techology (1988), Ph.D. from the same place in 1992, both in computer science/computer technology.

    Areas of competence: Information systems (IS), IS research methods, enterprise modelling, process modelling, IS modelling, IS development, semantic technologies, semantic interoperability, web 3.0, ontologies, software development, requirements determination, security requirements, IS architecture, enterprise information architecture, data warehouses, social information systems, social web, web 2.0.

    More information is available on my LinkedIn page.