Home
  • E-mailAndreas.Opdahl@uib.no
  • Phone+47 55 58 41 40+47 976 75 264
  • Visitor Address
    Fosswinckelsgate 6
    Lauritz Melzer's building
    NO-5009 Bergen
    Room 
    609 (6th Floor)
  • Postal Address
    Postboks 7802
    5020 Bergen

My general research interest is modelling and analysis of information systems (IS) in an enterprise context. I study how models can be used to facilitate broad involvement in IS development and enterprise change projects, by including other stakeholder groups in addition to ICT experts and managers. A particular interest is how models can be used for identifying and analysing safety and security threats as part of requirements work. I have also investigated how organisations actually use IS models in practice.

Recently, I have moved more and more into semantic technologies and big data sources, in particular the ones generated by social media. Current and recent projects in this area include:

  • NewsAngler - discovering unexpected connections in the news
  • BDEM - big data for emergency management
  • UbiMob - ubiquitous data for mobility in smart cities

A related research interest is the semantics of IS and enterprise modelling notations. I am studying how clearer definitions of notation semantics can contribute to making better models and to facilitate consistency checking and perhaps even automatic translation across different notations. My work on a Unified Enterprise Modelling Ontology (UEMO) is part of this activity.

I mostly give courses in semantic technologies, information systems, systems development, research methods and basic information technology. In these areas, I have supervised 6 Ph.D. candidates and around 50 Master students through to completion since 1990.

Academic article
  • Show author(s) 2021. Crisscross ontology: Mapping concept dynamics, competing argument and multiperspectival knowledge in philosophy. Quaderni di «filosofia». 59-73.
  • Show author(s) 2020. Ontologies for finding journalistic angles. Software and Systems Modeling (SoSyM).
  • Show author(s) 2020. Data Privacy in Journalistic Knowledge Platforms. CEUR Workshop Proceedings.
  • Show author(s) 2020. Challenges and Opportunities for Journalistic Knowledge Platforms. CEUR Workshop Proceedings.
  • Show author(s) 2020. Analysis and Design of Computational News Angles. IEEE Access. 120613-120626.
  • Show author(s) 2020. A knowledge-graph platform for newsrooms. Computers in industry (Print).
  • Show author(s) 2019. Towards a Big Data Platform for News Angles. CEUR Workshop Proceedings. 17-29.
  • Show author(s) 2019. Towards Ontological Support for Journalistic Angles. Lecture Notes in Business Information Processing. 279-294.
  • Show author(s) 2018. News Hunter: Building and Mining Knowledge Graphs for Newsroom Systems. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
  • Show author(s) 2018. Harnessing Mobility Data in Cities: A Case Study from the Bergen Region. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
  • Show author(s) 2018. From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling. Business & Information Systems Engineering (BISE). 69-80.
  • Show author(s) 2018. Combined assessment of software safety and security requirements: An industrial evaluation of the CHASSIS method. Journal of Cases on Information Technology (JCIT). 46-69.
  • Show author(s) 2017. Load-Time Reduction Techniques for Device-Agnostic Web Sites. Journal of Web Engineering. 312-347.
  • Show author(s) 2016. Enterprise modelling for the masses – From elitist discipline to common practice. Lecture Notes in Business Information Processing. 225-240.
  • Show author(s) 2015. Investigating security threats in architectural context: Experimental evaluations of misuse case maps. Journal of Systems and Software. 90-111.
  • Show author(s) 2015. Extending the UML Statecharts Notation to Model Security Aspects. IEEE Transactions on Software Engineering. 661-690.
  • Show author(s) 2014. Comparing attack trees and misuse cases in an industrial setting. Information and Software Technology. 294-308.
  • Show author(s) 2013. Identifying and visualising dependability concerns - applications to business process management. Lecture Notes in Business Information Processing. 623-629.
  • Show author(s) 2013. HARM: Hacker Attack Representation Method. Communications in Computer and Information Science. 156-175.
  • Show author(s) 2013. Comparing risk identification techniques for safety and security requirements. Journal of Systems and Software. 1124-1151.
  • Show author(s) 2012. Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams. Lecture Notes in Computer Science (LNCS). 117-131.
  • Show author(s) 2012. New perspectives in ontological analysis: Guidelines and rules for incorporating modelling languages into UEML. Information Systems. 484-507.
  • Show author(s) 2012. Improving security and safety modelling with failure sequence diagrams. International Journal of Secure Software Engineering (IJSSE). 17 pages.
  • Show author(s) 2012. Benefits of different types of enterprise modeling initiatives in ICT-enabled process change. International Journal of Information System Modeling and Design. 1-23.
  • Show author(s) 2012. An ontology for enterprise and information systems modelling. Applied Ontology. 49-92.
  • Show author(s) 2011. Understanding the determinants of business process modelling in organisations. Business Process Management Journal. 639-662.
  • Show author(s) 2011. Anatomy of the Unified Enterprise Modelling Ontology. Lecture Notes in Business Information Processing. 163-176.
  • Show author(s) 2010. Visualizing Cyber Attacks with Misuse Case Maps. Lecture Notes in Computer Science (LNCS). 262-275.
  • Show author(s) 2010. The Unified Enterprise Modelling Language – Overview and Further Work. Computers in industry (Print). 99-111.
  • Show author(s) 2010. Incorporating UML class and activity constructs into UEML. Lecture Notes in Computer Science (LNCS). 244-254.
  • Show author(s) 2010. Determinants to the use of business process modeling. Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS). 1-10.
  • Show author(s) 2010. Comparing two techniques for intrusion visualization. Lecture Notes in Business Information Processing. 1-15.
  • Show author(s) 2009. Experimental Comparison of Attack Trees and Misuse Cases for Security Threat Identification. Information and Software Technology. 916-932.
  • Show author(s) 2008. Validating the Process-Modelling Practice Model. Enterprise Modelling and Information Systems Architectures - An International Journal. 3-17.
  • Show author(s) 2008. Validating the Process-Modelling Practice Model. Enterprise Modelling and Information Systems Architectures - An International Journal. 3-17.
  • Show author(s) 2008. Misuse Cases for Identifying System Dependability Threats. Journal of Information Privacy and Security. 3-22.
  • Show author(s) 2008. Exploring Process-Modelling Practice: Towards a Conceptual Model. Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS).
  • Show author(s) 2005. Eliciting Security Requirements with Misuse Cases. Requirements Engineering. 34-44.
  • Show author(s) 2005. A Unified Modeling Language without referential redundancy. Data & Knowledge Engineering. 277-300.
  • Show author(s) 2004. Mobile information systems - Research challenges on the conceptual and logical level. Lecture Notes in Computer Science (LNCS). 124-135.
  • Show author(s) 2004. A template for defining enterprise modelling constructs. Journal of Database Management. 39-73.
  • Show author(s) 2003. Research Areas and Challenges for Mobile Information Systems. International Journal of Mobile Communications.
  • Show author(s) 2002. Ontological Evaluation of the UML Using the Bunge-Wand-Weber Model. Journal of Software and Systems Modeling (SoSyM). 43-67.
  • Show author(s) 2001. Ontological analysis of whole-part relationships in OO-models. Information and Software Technology. 387-399.
  • Show author(s) 2001. Grounding the OML metamodel in ontology. Journal of Systems and Software. 119-143.
  • Show author(s) 2000. Programming and Software Development Environment Research in the Nordic Countries, Special Issue on Programming Environments. Nordic Journal of Computing. 65-66.
  • Show author(s) 1999. Workshop Summary (Guest Editor's Introduction). Nordic Journal of Computing. 1-3.
  • Show author(s) 1998. Workshop Summary - REFSQ'98. Software engineering notes. 44-50.
  • Show author(s) 1997. Facet Modelling: An Approach to Flexible and Integrated Conceptual Modelling. Information Systems. 291-323.
Lecture
  • Show author(s) 2019. Towards a Big Data Platform for News Angles.
  • Show author(s) 2019. News Angler – Discovering Unexpected Connections in the News.
Popular scientific lecture
  • Show author(s) 1998. The RAISA Method Description.
  • Show author(s) 1997. Tilpasning av IS-arkitekturer.
Academic lecture
  • Show author(s) 2019. Towards Ontological Support for Journalistic Angles.
  • Show author(s) 2019. Supporting Journalistic News Angles with Models and Analogies.
  • Show author(s) 2019. Detecting newsworthy events in a journalistic platform.
  • Show author(s) 2018. Towards a Big Data Platform for News Angles.
  • Show author(s) 2016. Semantics for Agility in the Time of Big Data.
  • Show author(s) 2014. Teaching Semantic Technologies as Part of a Software Development Program.
  • Show author(s) 2014. Methods and tools for security requirements engineering - A review of the ReqSec project.
  • Show author(s) 2012. Keynote: Identifying and Visualising Dependability Concerns - Applications to Business Process Management.
  • Show author(s) 2011. Ontology Extraction from Social Semantic Tags.
  • Show author(s) 2010. Unified Enterprise Modelling Language – Overview and Ongoing Work.
  • Show author(s) 2010. Interoperabilitet: Nye muligheter og utfordringer.
  • Show author(s) 2010. Experimental evaluation of misuse case maps for eliciting security requirements.
  • Show author(s) 2009. Virksomhetsprosesser og fremvoksende (semantikk) standarder.
  • Show author(s) 2009. Unified Enterprise Modelling Language (UEML) and ISO 15926.
  • Show author(s) 2009. Semantiske teknologier for interoperabilitet.
  • Show author(s) 2008. Towards a Model of Process-Modelling Practice: Quantitative Validation and Results.
  • Show author(s) 2008. The Unified Enterprise Modelling Language – Overview and Further Work.
  • Show author(s) 2007. What Makes Process Modelling Effective - Modelling or Project Factors?
  • Show author(s) 2007. Ontology-Supported Language Interoperability - The UEML Approach.
  • Show author(s) 2007. Incorporating IDEF3 into the Unified Enterprise Modelling Language (UEML).
  • Show author(s) 2006. Progress report February 2006, WP5 UEML - subtask UEML Approaches.
  • Show author(s) 2006. Process Modelling Practice: Theory Formulation and Preliminary Results.
  • Show author(s) 2006. Proces Change Projects: A Study of Norwegian Practice.
  • Show author(s) 2006. Misuse Cases – Use Cases that Capture Security Threats.
  • Show author(s) 2006. Misuse Cases - Use Cases that Capture Security Threats.
  • Show author(s) 2005. UEML Approach Tutorial.
  • Show author(s) 2005. Progress report October 2005, DEM - subtask UEML Approaches.
  • Show author(s) 2005. Progress report May 2005, WP5 UEML - subtask UEML Approaches.
  • Show author(s) 2004. Ten Years of REFSQ: Outcomes and Outlooks.
  • Show author(s) 2004. Progress report November 2004, WP5 UEML - subtask UEML Approaches.
  • Show author(s) 2003. The Multiple Life Cycle Perspective on Information Systems Architecture.
  • Show author(s) 2003. The Multiple Life Cycle Perspective on Information Systems Architecture.
  • Show author(s) 2003. The Multiple Life Cycle Perspective on Information Systems Architecture.
  • Show author(s) 2003. Position Statement on System Modeling and Its Ontological Evaluation.
  • Show author(s) 2003. Multi-Perspective Multi-Purpose Enterprise Knowledge Modelling.
  • Show author(s) 2003. A Reuse-based Approach to Determining Security Requirements.
  • Show author(s) 2003. A Reuse-Based Approach to Determining Security Requirements.
  • Show author(s) 2002. Requirements for the UEML.
  • Show author(s) 2002. Representation, Assessment and Improvement of Information Systems Architecture.
  • Show author(s) 2002. Mobile Information Systems — Research Challenges on the Conceptual and Logical Level.
  • Show author(s) 2002. Mobile Information Systems - Research Challenges on the Conceptual and Logical level.
  • Show author(s) 2002. Managing Information Systems (IS) Architectures.
  • Show author(s) 2002. Informasjonsarkitektur for datavarehus.
  • Show author(s) 2002. Generalization/Specialization as a Structuring Mechanism for Misuse Cases.
  • Show author(s) 2002. Generalization/Specialization as a Structuring Mechanism for Misuse Cases.
  • Show author(s) 2001. Templates for misuse case description.
  • Show author(s) 2001. Early Design of Enhanced ETV Services.
  • Show author(s) 2001. Capturing security requirements through misuse cases.
  • Show author(s) 2000. Workshop Summary REFSQ'00.
  • Show author(s) 2000. Eliciting Security Requirements by Misuse Cases.
  • Show author(s) 2000. Eliciting Security Requirements by Misuse Cases.
  • Show author(s) 1998. Multi-Perspective Modelling of Requirements: A Case Study Using Facet Models.
  • Show author(s) 1997. A Model for Comparing Approaches to IS-Architecture Alignment.
  • Show author(s) 1997. A Comparison of Four Families of Multi-Perspective Problem Analysis Methods.
  • Show author(s) 1993. Concepts for Real-World Modelling.
Editorial
  • Show author(s) 2017. Special issue on conceptual modeling – 34th International Conference on Conceptual Modeling (ER 2015). Data & Knowledge Engineering. 1-2.
  • Show author(s) 2016. REFSQ 2016: Joint proceedings of workshops, doctoral symposium, research method track, and poster track. CEUR Workshop Proceedings.
  • Show author(s) 2016. Preface to "Joint Proceedings of the REFSQ 2016 Co-Located Events". CEUR Workshop Proceedings. 2 pages.
  • Show author(s) 2008. Editorial IBIS Vol. 3 (1). 2008. The International Journal of Interoperability in Business Information Systems.
  • Show author(s) 2002. editorial: Seventh International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'01). Requirements Engineering Journal. 1-2.
  • Show author(s) 2001. Guest Editorial: Sixth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'00). Requirements Engineering. 1-2.
  • Show author(s) 2000. Guest Editor's Foreword: Programming and Software Development Environment Research in the Nordic Countries. Nordic Journal of Computing. 65-66.
Academic anthology/Conference proceedings
  • Show author(s) 2015. Conceptual Modeling - 34th International Conference, ER 2015, Stockholm, Sweden, October 19-22, 2015, Proceedings. Springer Science+Business Media B.V..
  • Show author(s) 2014. NOKOBIT 2014, Norsk konferanse for organisasjoners bruk av informasjonsteknologi, Høgskolen i Østfold 17 - 19. november 2014. Norsk konferanse for organisasjoners bruk av informasjonsteknologi.
  • Show author(s) 2013. Requirements Engineering: Foundation for Software Quality, 19th International Working Conference, REFSQ 2013, Essen, Germany, April 2013, Proceedings. Springer.
  • Show author(s) 2013. NOKOBIT 2013 : Universitetet i Stavanger 18. - 20. november 2013 : Norsk konferanse for organisasjoners bruk av informasjonsteknologi. Akademika forlag.
  • Show author(s) 2011. The Practice of Enterprise Modeling. Springer.
  • Show author(s) 2007. Conceptual Modelling in Information Systems Engineering. Springer.
  • Show author(s) 2007. Conceptual Modelling in Information Systems Engineering. Springer.
  • Show author(s) 2007. Advanced Information Systems Engineering. 19th International Conference, CAiSE 2007. Springer.
  • Show author(s) 2007. Advanced Information Systems Engineering, Proceedings of CAiSE'07. Springer.
  • Show author(s) 2002. Requirements Engineering Journal, Special Issue with Selected Papers from the Seventh International Workshop on Requirements Engineering: Foundation of Software Quality, REFSQ'2001. Springer Verlag.
  • Show author(s) 2001. Requirements Engineering Journal, Special Issue with Selected Papers from the Sixth International Workshop on Requirements Engineering: Foundation of Software Quality - REFSQ'2000. Springer Verlag.
  • Show author(s) 2001. Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001. University of Essen.
  • Show author(s) 2001. Proceedings of the Seventh International Workshop on Requirements Engineering: Foundation for Software Quality - REFSQ'2001. University of Essen.
  • Show author(s) 2001. Proceedings of the Seventh International Workshop on Requirements Engineering: Foundation for Software Quality - REFSQ'01. University of Essen.
  • Show author(s) 2001. Proceedings of the 24th Information Systems Research Seminar in Scandinavia. Universitetet i Bergen.
  • Show author(s) 2000. Proceedings of the Sixth International Workshop on Requirements Engineering: Foundation of Software Quality - REFSQ'00. Essener Informatik Beitrage.
  • Show author(s) 2000. Proceedings of NWPER'2000 - Nordic Workshop on Programming Environment Research. Department of Information Science, University of Bergen.
  • Show author(s) 2000. Nordic Journal of Computing, Special Issue on Programming and Software Development Environment Research in the Nordic Countries. Helsinki University Printing House.
Non-fiction book
  • Show author(s) 1999. Proceedings of "The Fifth International Workshop on Requirements Engineering: Foundation of Software Quality - REFSQ'99". Presses universitaires de Namur.
  • Show author(s) 1997. Proceedings of the Third International Workshop on Requirements Engineering: Foundations of Software Quality - REFSQ'97. Presses Universitaires de Namur.
  • Show author(s) 1997. Proceedings of the Third International Workshop on Requirem ents Engineering: Foundations of Software Quality - REFSQ'9 7. Presses Universitaires de Namur.
  • Show author(s) 1997. Proceedings of the Third International Workshop on Requirem ents Engineering: Foundations of Software Quality - REFSQ'9 7. Presses Universitaires de Namur.
Compendium
  • Show author(s) 2013. 19th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013) - Proceedings of the REFSQ 2013 Workshops CreaRE, IWSPM, and RePriCo, the REFSQ 2013 Empirical Track (Empirical Live Experiment and Empirical Research Fair), the REFSQ 2013 Doctoral Symposium, and the REFSQ 2013 Poster Session. 56.
  • Show author(s) 1993. Long-Term Planning in Computer Chess. To appear in Advances in Computer Chess. 7.
Feature article
  • Show author(s) 2005. Vårt sårbare samfunn. Bergens Tidende.
Doctoral dissertation
  • Show author(s) 2007. Combinational Clinical Decision-making.
Academic chapter/article/Conference paper
  • Show author(s) 2021. Combined Assessment of Software Safety and Security Requirements: An Industrial Evaluation of the CHASSIS Method. 28 pages.
  • Show author(s) 2020. Knowledge Graphs and Natural-Language Processing. 17 pages.
  • Show author(s) 2020. Big Data. 15 pages.
  • Show author(s) 2019. Supporting Journalistic News Angles with Models and Analogies. 7 pages.
  • Show author(s) 2013. SynsetTagger: a tool for generating ontologies from semantic tags.
  • Show author(s) 2013. Enhancing CHASSIS: A Method for Combining Safety and Security. 8 pages.
  • Show author(s) 2012. Enterprise modeling practice in a turnaround project. 14 pages.
  • Show author(s) 2011. Semantic annotations for modelling language interoperability. 9 pages.
  • Show author(s) 2011. Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. 8 pages.
  • Show author(s) 2011. Characterising and Analysing Security Requirements Modelling Initiatives. 6 pages.
  • Show author(s) 2010. Towards a hacker attack representation method. 10 pages.
  • Show author(s) 2010. Determinants to the use of business process modeling. 1 pages.
  • Show author(s) 2010. Browsing and visualizing semantically enriched information resources. 7 pages.
  • Show author(s) 2010. Aligning the UEML Ontology with SUMO. 10 pages.
  • Show author(s) 2010. A platform for interoperable domain-specific enterprise modelling based on ISO 15926. 10 pages.
  • Show author(s) 2008. Exploring Process-Modelling Practice: Towards a Conceptual Model. 8 pages.
  • Show author(s) 2007. What Makes Process Modelling Effective? Modelling or Project Factors? 1 pages.
  • Show author(s) 2007. Ontological Analysis of KAOS using Separation of References. 18 pages.
  • Show author(s) 2007. Interoperable Management of Conceptual Models. 16 pages.
  • Show author(s) 2007. Interoperable Management of Conceptual Models. 16 pages.
  • Show author(s) 2007. Comparing GRL and KAOS using the UEML Approach. 12 pages.
  • Show author(s) 2007. Capturing dependability threats in conceptual modelling. 14 pages.
  • Show author(s) 2007. Capturing Dependability Threats in Conceptual Modelling. 14 pages.
  • Show author(s) 2006. The UEML Approach to Modelling Construct Description.
  • Show author(s) 2006. Process Modelling Practice: Theory Formulation and Preliminary Results.
  • Show author(s) 2006. Process Change Projects: A Study of Norwegian Practice.
  • Show author(s) 2006. Ontological Analysis of KAOS Using Separation of Reference.
  • Show author(s) 2006. Interoperable language and model management using the UEML approach. 8 pages.
  • Show author(s) 2006. Comparison of Goal-oriented Languages using the UEML Approach.
  • Show author(s) 2006. A Roadmap for UEML.
  • Show author(s) 2005. Prosessforbedring – en vurdering av nasjonal praksis.
  • Show author(s) 2005. Prosessforbedring - en vurdering av nasjonal praksis. 18 pages.
  • Show author(s) 2005. Enhancing Security Patterns with Misuse Cases. 7 pages.
  • Show author(s) 2003. Usable M-Commerce Systems: The Need for Model-Based Approaches.
  • Show author(s) 2003. Model-Supported Alignment of Information Systems Architecture.
  • Show author(s) 2001. Workshop Summary REFSQ'01. 8 pages.
  • Show author(s) 2001. The Whole-Part Relationship in the Unified Modeling language: A New Approach.
  • Show author(s) 2001. Templates for Misuse Case Description. 12 pages.
  • Show author(s) 2001. Preface.
  • Show author(s) 2001. Capturing Security Requirements through Misuse Cases. 12 pages.
  • Show author(s) 2000. An Ontological Evaluation of the OML Metamodel. 16 pages.
  • Show author(s) 1997. Towards a Facet-Modelling Language. 14 pages.
  • Show author(s) 1997. Real-World Modelling. 15 pages.
  • Show author(s) 1997. REFSQ'97 Workshop Summary. 12 pages.
  • Show author(s) 1997. Applying Semantic Quality Criteria to Multi-Perspective Problem Analysis Methods. 18 pages.
  • Show author(s) 1994. Long-Term Planning in Computer Chess.
Other
  • Show author(s) 2008. Towards a model of process-modelling practice: quantitative validation and results.
  • Show author(s) 2008. The Unified Enterprise Modelling Language – Overview and Further Work.
  • Show author(s) 2007. Preface.
  • Show author(s) 2006. Process Change Projects: A Study of Norwegian Practice.
  • Show author(s) 2005. Enhancing Security Patterns with Misuse Cases. 525-530.
Abstract
  • Show author(s) 2007. Preface. Lecture Notes in Computer Science (LNCS).
Errata
  • Show author(s) 2001. Erratum to "Ontological analysis of whole-part relationships in OO-models" [Information and Software Technology 43 (2001) 387-389]. Information and Software Technology. 577.
Academic literature review
  • Show author(s) 2020. Named entity extraction for knowledge graphs: A literature overview. IEEE Access. 32862-32881.
  • Show author(s) 2020. Big Data and Emergency Management: Concepts, Methodologies, and Applications. IEEE Transactions on Big Data.
Foreword
  • Show author(s) 2015. Preface. vi-vi.
  • Show author(s) 2013. Preface. V-VI.
  • Show author(s) 2013. Foreword to the Research Poster Abstracts. 243-243.
Introduction
  • Show author(s) 2011. Message from the VORTE 2011 Workshop Chairs. 383-384.

More information in national current research information system (CRIStin)

You can find even more of my publications in Google Scholar and at Research Gate (which also has full text available for many of them).

My ongoing and most recent research projects are:

  • Safety and security requirements: I participated in the NFR-funded ReqSec project (2008-2011), a collaboration with the Norwegian University of Science and Technology (NTNU). For details, see the Misuse Case Wiki.
  • Unified Enterprise Modelling Language (UEML): I am involved in the development of a unified modelling language for enterprises and their information systems. This work started as part of the EU Network of Excellence Interop (2003-2007). For details on UEML, see the uemlwiki.
  • Mobile information systems for knowledge workers: I am involved in the NFR-funded Model-Driven Multi-Channel Mobile Work (M3W) project (2006-2010), also a collaboration with the Norwegian University of Science and Technology (NTNU).
  • Process-modelling practice in Norway (PMP): I have been collaborating with the Norwegian School of Economics and Business Administration and Agder University on studies of practical process modelling in Norway.

Other research interests are:

  • Semantic modelling (recent and ongoing)
  • Ontological analysis and evaluation of enterprise and IS modelling languages (since 1998)
  • Understanding IS and enterprise architecture (since 1994)

In the past, I have also carried out research on software performance evaluation (on which I did my Ph D) and several other areas.

M.Eng. from the Norwegian Institute of Techology (1988), Ph.D. from the same place in 1992, both in computer science/computer technology.

Areas of competence: Information systems (IS), IS research methods, enterprise modelling, process modelling, IS modelling, IS development, semantic technologies, semantic interoperability, web 3.0, ontologies, software development, requirements determination, security requirements, IS architecture, enterprise information architecture, data warehouses, social information systems, social web, web 2.0.

More information is available on my LinkedIn page.