Elda Paja

883 total citations
29 papers, 395 citations indexed

About

Elda Paja is a scholar working on Information Systems, Artificial Intelligence and Sociology and Political Science. According to data from OpenAlex, Elda Paja has authored 29 papers receiving a total of 395 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Information Systems, 15 papers in Artificial Intelligence and 11 papers in Sociology and Political Science. Recurrent topics in Elda Paja's work include Information and Cyber Security (18 papers), Advanced Software Engineering Methodologies (10 papers) and Access Control and Trust (7 papers). Elda Paja is often cited by papers focused on Information and Cyber Security (18 papers), Advanced Software Engineering Methodologies (10 papers) and Access Control and Trust (7 papers). Elda Paja collaborates with scholars based in Italy, Denmark and United Kingdom. Elda Paja's co-authors include Paolo Giorgini, Fabiano Dalpiaz, John Mylopoulos, Tong Li, Jennifer Horkoff, Mattia Salnitri, Evellin Cardoso, Fatma Başak Aydemir, Alejandro Maté and Luca Piras and has published in prestigious journals such as ACM Transactions on Software Engineering and Methodology, Data & Knowledge Engineering and Proceedings of the ACM on Human-Computer Interaction.

In The Last Decade

Elda Paja

28 papers receiving 369 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Elda Paja Italy 10 261 192 82 63 58 29 395
Saiqa Aleem United Arab Emirates 11 171 0.7× 151 0.8× 83 1.0× 55 0.9× 23 0.4× 24 402
Y. Raghu Reddy India 11 266 1.0× 184 1.0× 46 0.6× 62 1.0× 37 0.6× 69 487
Damiano Torre Canada 12 180 0.7× 184 1.0× 87 1.1× 74 1.2× 29 0.5× 27 342
Camille Salinesi France 12 300 1.1× 187 1.0× 36 0.4× 78 1.2× 103 1.8× 50 441
Maritta Heisel Germany 10 364 1.4× 242 1.3× 83 1.0× 101 1.6× 39 0.7× 87 528
Damiano Distante Italy 15 400 1.5× 167 0.9× 46 0.6× 96 1.5× 55 0.9× 58 635
Branko Milosavljević Serbia 13 277 1.1× 181 0.9× 49 0.6× 57 0.9× 197 3.4× 57 456
Naveed Ikram Pakistan 17 526 2.0× 187 1.0× 58 0.7× 93 1.5× 142 2.4× 58 639
Slimane Hammoudi France 9 158 0.6× 120 0.6× 28 0.3× 84 1.3× 71 1.2× 44 324
Mattia Salnitri Italy 8 220 0.8× 151 0.8× 50 0.6× 48 0.8× 61 1.1× 18 304

Countries citing papers authored by Elda Paja

Since Specialization
Citations

This map shows the geographic impact of Elda Paja's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Elda Paja with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Elda Paja more than expected).

Fields of papers citing papers by Elda Paja

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Elda Paja. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Elda Paja. The network helps show where Elda Paja may publish in the future.

Co-authorship network of co-authors of Elda Paja

This figure shows the co-authorship network connecting the top 25 collaborators of Elda Paja. A scholar is included among the top collaborators of Elda Paja based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Elda Paja. Elda Paja is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Giallorenzo, Saverio, et al.. (2022). A Study on Security and Privacy Practices in Danish Companies. 3 indexed citations
2.
Lê, Lam-Son, et al.. (2021). A data-driven, goal-oriented framework for process-focused enterprise re-engineering. Information Systems and e-Business Management. 19(2). 683–747. 5 indexed citations
3.
Geisler, Sandra, María-Esther Vidal, Cinzia Cappiello, et al.. (2021). Knowledge-Driven Data Ecosystems Toward Data Transparency. Journal of Data and Information Quality. 14(1). 1–12. 39 indexed citations
4.
Breaux, Travis D., et al.. (2019). Consent Verification Under Evolving Privacy Policies. IT University Of Copenhagen (IT University of Copenhagen). 27. 422–427. 4 indexed citations
5.
Horkoff, Jennifer, Fatma Başak Aydemir, Evellin Cardoso, et al.. (2017). Goal-oriented requirements engineering: an extended systematic mapping study. Requirements Engineering. 24(2). 133–160. 117 indexed citations
6.
Piras, Luca, et al.. (2017). Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques. Iris (University of Trento). 255–265. 10 indexed citations
7.
Dalpiaz, Fabiano, Elda Paja, & Paolo Giorgini. (2016). Security Requirements Engineering: Designing Secure Socio-Technical Systems. Institutional Research Information System (Università degli Studi di Trento). 18 indexed citations
8.
Li, Tong, Elda Paja, John Mylopoulos, Jennifer Horkoff, & Kristian Beckers. (2016). Security attack analysis using attack patterns. mediaTUM – the media and publications repository of the Technical University Munich (Technical University Munich). 1–13. 16 indexed citations
9.
Salnitri, Mattia, et al.. (2015). STS-Tool 3.0: Maintaining security in socio-technical systems. Institutional Research Information System (Università degli Studi di Trento). 1367. 205–212. 1 indexed citations
10.
Li, Tong, Jennifer Horkoff, Kristian Beckers, Elda Paja, & John Mylopoulos. (2015). A Holistic Approach to Attack Modeling and Analysis.. 49–54. 2 indexed citations
11.
Paja, Elda, Jennifer Horkoff, & John Mylopoulos. (2015). The importance of teaching goal-oriented analysis techniques: an experience report. 37–42. 2 indexed citations
12.
Paja, Elda, Fabiano Dalpiaz, & Paolo Giorgini. (2015). Modelling and reasoning about security requirements in socio-technical systems. Data & Knowledge Engineering. 98. 123–143. 37 indexed citations
13.
Li, Tong, Elda Paja, John Mylopoulos, Jennifer Horkoff, & Kristian Beckers. (2015). Holistic security requirements analysis: An attacker's perspective. mediaTUM – the media and publications repository of the Technical University Munich (Technical University Munich). 282–283. 4 indexed citations
14.
Paja, Elda, Fabiano Dalpiaz, & Paolo Giorgini. (2013). Designing Secure Socio-Technical Systems with STS-ml. Institutional Research Information System (Università degli Studi di Trento). 79–84. 3 indexed citations
15.
Paja, Elda, et al.. (2013). STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements. Institutional Research Information System (Università degli Studi di Trento). 131–133. 2 indexed citations
16.
Paja, Elda, et al.. (2012). Modelling Security Requirements in Socio-Technical Systems with STS-Tool. Institutional Research Information System (Università degli Studi di Trento). 155–162. 3 indexed citations
17.
Paja, Elda, et al.. (2012). STS-tool: Socio-technical Security Requirements through social commitments. Institutional Research Information System (Università degli Studi di Trento). 331–332. 11 indexed citations
18.
Trösterer, Sandra, Elke Beck, Fabiano Dalpiaz, et al.. (2012). Formative User-Centered Evaluation of Security Modeling. RePEc: Research Papers in Economics. 3(1). 1–19. 9 indexed citations
19.
Paja, Elda, Fabiano Dalpiaz, & Paolo Giorgini. (2012). Identifying Conflicts in Security Requirements with STS-ml. Unitn Eprints Research (Università Degli Studi di Trento). 4 indexed citations
20.
Dalpiaz, Fabiano, Elda Paja, & Paolo Giorgini. (2011). Security Requirements Engineering for Service-Oriented Applications. Institutional Research Information System (Università degli Studi di Trento). 102–107.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026