Items of interest

Transparency versus security: early analysis of antagonistic requirements. In: Proceedings of the 2010 ACM symposium on applied computing, pp 298–305

http://dl.acm.org/citation.cfm?doid=1774088.1774151

Software transparency. Bus Inf Syst Eng 2(3):127–139

https://link.springer.com/article/10.1007/s12599-010-0102-z

Managing Transparency Guided by a Maturity Model

3rd Global Conference on Transparency Research HEC Paris 1 (3), 1 – 17

https://pdfs.semanticscholar.org/6a49/132a4af4baf11b611534602cdc2628c74443.pdf