• Publications
  • Influence
Security and privacy in electronic health records: A systematic literature review
A systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Expand
A systematic review of gamification in e-Health
Gamification is a relatively new trend that focuses on applying game mechanics to non-game contexts in order to engage audiences and to inject a little fun into mundane activities besides generating motivational and cognitive benefits. Expand
Empirical Studies on Usability of mHealth Apps: A Systematic Literature Review
We investigate the empirical evaluation methods employed as regards usability of mHealth applications by means of a Systematic Literature Review. Expand
Effects of competitive computer-assisted learning versus conventional teaching methods on the acquisition and retention of knowledge in medical surgical nursing students
Summary Purpose This paper presents a novel approach of computer-assisted learning for nursing education in university undergraduate courses. Background The most innovative aspect of the proposal isExpand
Automated Assessment in a Programming Tools Course
  • J. Alemán
  • Computer Science
  • IEEE Trans. Educ.
  • 1 November 2011
Automated assessment systems can be useful for both students and instructors in a programming tools course. Expand
Emerging OCL tools
The Object Constraint Language (OCL) is a notational language for analysis and design of software systems, which is used in conjunction with the Unified Modelling Language (UML) to specify the semantics of the building blocks. Expand
Reusing Requirements in Global Software Engineering
We present a lightweight, reuse-based, global RE method called PANGEA (Process for globAl requiremeNts enGinEering and quAlity), based on natural language requirements and software engineering standards. Expand
Analysis of health professional security behaviors in a real clinical setting: An empirical study
We evaluate the security behavior of healthcare professionals in a real clinical setting and suggest that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Expand
Validating Second-Order Mutation at System Level
This paper describes an empirical study of different combination strategies to compose second-order mutants at system level as well as a cost-risk analysis of n-order mutation at systemlevel. Expand
Requirements engineering education: a systematic mapping study
This paper aims to identify and to present the current research on REE that is available at present and to select useful approaches and needs for future research. Expand