Author: Rodrigo Werlinger
Publication Overview
Publication period start: 2009
Number of co-authors: 9
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Botta,
David,
Beznosov,
Konstantin
(2009):
Security practitioners in context: Their activities and interactions with other stakeholde.
In
International Journal of Human-Computer Studies,
67
(7)
pp. 584-606.
https://dx.doi.org/10.1016/j.ijhcs.2009.03.002
Hawkey,
Kirstie,
Botta,
David,
Werlinger,
Rodrigo,
Muldner,
Kasia,
Gagné,
André,
Beznosov,
Konstantin
(2008):
Human, organizational, and technological factors of IT security.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3639-3644.
https://doi.acm.org/10.1145/1358628.1358905
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Beznosov,
Konstantin
(2008):
Security practitioners in context: their activities and interactions.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 3789-3794.
https://doi.acm.org/10.1145/1358628.1358931
Botta,
David,
Werlinger,
Rodrigo,
Gagné,
André,
Beznosov,
Konstantin,
Iverson,
Lee,
Fels,
Sidney,
Fisher,
Brian D.
(2007):
Towards understanding IT security professionals and their tools.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 100-111.
https://konstantin.beznosov.net/professional/works/doi/view.php?116
Werlinger,
Rodrigo,
Botta,
David,
Beznosov,
Konstantin
(2007):
Detecting, analyzing and responding to security incidents: a qualitative analysis.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 149-150.
https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf
Werlinger,
Rodrigo,
Hawkey,
Kirstie,
Muldner,
Kasia,
Jaferian,
Pooya,
Beznosov,
Konstantin
(2008):
The challenges of using an intrusion detection system: is it worth the effort?.
In:
Proceedings of the 2008 Symposium on Usable Privacy and Security
,
2008,
.
pp. 107-118.
https://doi.acm.org/10.1145/1408664.1408679