Author: Rodrigo Werlinger

Publications

Publication period start: 2009
Number of co-authors: 9

Co-authors

Number of publications with favourite co-authors
Kirstie Hawkey
4
David Botta
4
Konstantin Beznosov
6

Productive Colleagues

Most productive colleagues in number of publications
Konstantin Beznosov
23
Sidney Fels
36
Kirstie Hawkey
37

Publications

Werlinger, Rodrigo, Hawkey, Kirstie, Botta, David, Beznosov, Konstantin (2009): Security practitioners in context: Their activities and interactions with other stakeholde. In International Journal of Human-Computer Studies, 67 (7) pp. 584-606. https://dx.doi.org/10.1016/j.ijhcs.2009.03.002

Hawkey, Kirstie, Botta, David, Werlinger, Rodrigo, Muldner, Kasia, Gagné, André, Beznosov, Konstantin (2008): Human, organizational, and technological factors of IT security. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3639-3644. https://doi.acm.org/10.1145/1358628.1358905

Werlinger, Rodrigo, Hawkey, Kirstie, Beznosov, Konstantin (2008): Security practitioners in context: their activities and interactions. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 3789-3794. https://doi.acm.org/10.1145/1358628.1358931

Botta, David, Werlinger, Rodrigo, Gagné, André, Beznosov, Konstantin, Iverson, Lee, Fels, Sidney, Fisher, Brian D. (2007): Towards understanding IT security professionals and their tools. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 100-111. https://konstantin.beznosov.net/professional/works/doi/view.php?116

Werlinger, Rodrigo, Botta, David, Beznosov, Konstantin (2007): Detecting, analyzing and responding to security incidents: a qualitative analysis. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 149-150. https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. https://doi.acm.org/10.1145/1408664.1408679

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,532 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,532 designers enjoy our newsletter—sure you don’t want to receive it?