Rodrigo Werlinger

587 total citations
14 papers, 416 citations indexed

About

Rodrigo Werlinger is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Rodrigo Werlinger has authored 14 papers receiving a total of 416 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Information Systems, 8 papers in Computer Networks and Communications and 3 papers in Signal Processing. Recurrent topics in Rodrigo Werlinger's work include Information and Cyber Security (14 papers), Network Security and Intrusion Detection (7 papers) and Cybercrime and Law Enforcement Studies (5 papers). Rodrigo Werlinger is often cited by papers focused on Information and Cyber Security (14 papers), Network Security and Intrusion Detection (7 papers) and Cybercrime and Law Enforcement Studies (5 papers). Rodrigo Werlinger collaborates with scholars based in Canada and United States. Rodrigo Werlinger's co-authors include Konstantin Beznosov, Kirstie Hawkey, Kasia Müldner, Brian Fisher, Sidney Fels and Lee Iverson and has published in prestigious journals such as International Journal of Human-Computer Studies, Figshare and Information Management & Computer Security.

In The Last Decade

Rodrigo Werlinger

13 papers receiving 386 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Rodrigo Werlinger Canada 8 363 162 83 80 46 14 416
Oliver Buckley United Kingdom 9 232 0.6× 189 1.2× 118 1.4× 79 1.0× 21 0.5× 23 379
Ali Abdallah United Kingdom 8 275 0.8× 204 1.3× 134 1.6× 52 0.7× 8 0.2× 25 411
Patrick McCorry United Kingdom 7 309 0.9× 142 0.9× 21 0.3× 46 0.6× 26 0.6× 8 430
Daniel Ragsdale United States 10 206 0.6× 148 0.9× 98 1.2× 38 0.5× 17 0.4× 18 331
Louise Leenen South Africa 8 214 0.6× 93 0.6× 119 1.4× 47 0.6× 10 0.2× 42 307
Inah Omoronyia United Kingdom 11 216 0.6× 82 0.5× 54 0.7× 61 0.8× 22 0.5× 30 353
Eileen Kowalski 5 246 0.7× 152 0.9× 83 1.0× 87 1.1× 11 0.2× 5 345
Zhang Fan China 6 169 0.5× 110 0.7× 48 0.6× 15 0.2× 17 0.4× 18 332
Damiano Torre Canada 12 180 0.5× 74 0.5× 38 0.5× 87 1.1× 29 0.6× 27 342
Thanh Tran Germany 11 206 0.6× 113 0.7× 80 1.0× 58 0.7× 27 0.6× 27 378

Countries citing papers authored by Rodrigo Werlinger

Since Specialization
Citations

This map shows the geographic impact of Rodrigo Werlinger's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Rodrigo Werlinger with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Rodrigo Werlinger more than expected).

Fields of papers citing papers by Rodrigo Werlinger

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Rodrigo Werlinger. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Rodrigo Werlinger. The network helps show where Rodrigo Werlinger may publish in the future.

Co-authorship network of co-authors of Rodrigo Werlinger

This figure shows the co-authorship network connecting the top 25 collaborators of Rodrigo Werlinger. A scholar is included among the top collaborators of Rodrigo Werlinger based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Rodrigo Werlinger. Rodrigo Werlinger is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
Werlinger, Rodrigo, Kasia Müldner, Kirstie Hawkey, & Konstantin Beznosov. (2010). Preparation, detection, and analysis: the diagnostic work of IT security incident response. Information Management & Computer Security. 18(1). 26–42. 68 indexed citations
3.
Werlinger, Rodrigo, et al.. (2009). Security practitioners in context: Their activities and interactions with other stakeholders within organizations. International Journal of Human-Computer Studies. 67(7). 584–606. 47 indexed citations
4.
Werlinger, Rodrigo, Kasia Müldner, Kirstie Hawkey, & Konstantin Beznosov. (2009). Preparation, detection, and analysis: the diagnostic work of IT security incident response. Zenodo (CERN European Organization for Nuclear Research).
5.
Werlinger, Rodrigo, Kirstie Hawkey, & Konstantin Beznosov. (2009). An integrated view of human, organizational, and technological challenges of IT security management. Zenodo (CERN European Organization for Nuclear Research). 1 indexed citations
6.
Werlinger, Rodrigo, Kasia Müldner, Kirstie Hawkey, & Konstantin Beznosov. (2009). Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. Zenodo (CERN European Organization for Nuclear Research). 119–134. 3 indexed citations
7.
Werlinger, Rodrigo, Kirstie Hawkey, & Konstantin Beznosov. (2009). An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security. 17(1). 4–19. 99 indexed citations
8.
Hawkey, Kirstie, et al.. (2008). Human, organizational, and technological factors of IT security. 3639–3644. 23 indexed citations
9.
Werlinger, Rodrigo, Kirstie Hawkey, & Konstantin Beznosov. (2008). Security practitioners in context. 3789–3794. 18 indexed citations
10.
Werlinger, Rodrigo, et al.. (2008). The challenges of using an intrusion detection system. 107–118. 45 indexed citations
11.
Werlinger, Rodrigo, Kirstie Hawkey, & Konstantin Beznosov. (2007). Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. 35–47. 12 indexed citations
12.
Werlinger, Rodrigo, et al.. (2007). Studying IT Security Professionals: Research Design and Lessons Learned. Zenodo (CERN European Organization for Nuclear Research). 3 indexed citations
13.
Werlinger, Rodrigo, et al.. (2007). Detecting, analyzing and responding to security incidents. 149–150. 4 indexed citations
14.
Werlinger, Rodrigo, et al.. (2007). Towards understanding IT security professionals and their tools. Figshare. 100–111. 92 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026