default search action
Karen Renaud
Person information
- affiliation: University of Strathclyde, Department of Computer and Information Sciences, UK
- affiliation: Rhodes University, Grahamstown, South Africa
- affiliation: University of South Africa, Pretoria, South Africa
- affiliation (former): University of Glasgow, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j92]Karl van der Schyff, Suzanne Prior, Karen Renaud:
Privacy policy analysis: A scoping review and research agenda. Comput. Secur. 146: 104065 (2024) - [j91]Karen Renaud, Merrill Warkentin, Ganna Pogrebna, Karl van der Schyff:
VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Inf. Manag. 61(1): 103877 (2024) - [j90]Partha Das Chowdhury, Karen Renaud:
Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies. IEEE Secur. Priv. 22(5): 23-31 (2024) - [j89]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing. Inf. Comput. Secur. 32(4): 420-435 (2024) - [j88]Karen Renaud:
The Q-Z of cyber security. Netw. Secur. 2024(4) (2024) - [j87]Karen Renaud:
The burden of keeping passwords secret. Netw. Secur. 2024(6) (2024) - [c123]Suzanne Prior, Karen Renaud:
Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities? HCI (45) 2024: 77-96 - [c122]Paul van Schaik, Alastair Irons, Karen Renaud:
Privacy in UK Police Digital Forensics Investigations. HICSS 2024: 1901-1910 - [c121]Anthony Vance, Karen Renaud, Allen C. Johnston, Merrill Warkentin:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2024: 4712-4713 - [c120]Paul van Schaik, Karen Renaud:
Gauging the Unemployed's Perceptions of Online Consent Forms. HICSS 2024: 4764-4773 - [c119]Karen Bopp, Andreas Heinemann, Karen Renaud:
"Pass auf!" - Child-Oriented Cyber Safety & Security Educational Content. MuC (Workshopband) 2024 - [i10]Vivek Nallur, Karen Renaud, Aleksei Gudkov:
Nudging Using Autonomous Agents: Risks and Ethical Considerations. CoRR abs/2407.16362 (2024) - 2023
- [j86]Verena Zimmermann, Karola Marky, Karen Renaud:
Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information. Behav. Inf. Technol. 42(6): 700-743 (2023) - [j85]Karen Renaud, Karl van der Schyff, Stuart MacDonald:
Would US citizens accept cybersecurity deresponsibilization? Perhaps not. Comput. Secur. 131: 103301 (2023) - [j84]Karen Renaud, Marc J. Dupuis:
Cybersecurity Insights Gleaned from World Religions. Comput. Secur. 132: 103326 (2023) - [j83]Karl van der Schyff, Greg Foster, Karen Renaud, Stephen Flowerday:
Online Privacy Fatigue: A Scoping Review and Research Agenda. Future Internet 15(5): 164 (2023) - [j82]N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. 31(5): 545-575 (2023) - [j81]Saad Alahmari, Karen Renaud, Inah Omoronyia:
Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf. Syst. E Bus. Manag. 21(1): 123-158 (2023) - [j80]Oksana Kulyk, Karen Renaud, Stefan Costica:
People want reassurance when making privacy-related decisions - Not technicalities. J. Syst. Softw. 200: 111620 (2023) - [j79]Karen Renaud:
The M-P of cyber security. Netw. Secur. 2023(8) (2023) - [c118]Fabian Lucas Ballreich, Melanie Volkamer, Dirk Müllmann, Benjamin Maximilian Berens, Elena Marie Häußler, Karen Vera Renaud:
Encouraging Organisational Information Security Incident Reporting. EuroUSEC 2023: 224-236 - [c117]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. HAISA 2023: 324-336 - [c116]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures. HCI (35) 2023: 381-398 - [c115]Rosalind Searle, Karen Renaud:
Trust and Vulnerability in the Cybersecurity Context. HICSS 2023: 5228-5240 - [c114]Mohan Baruwal Chhetri, Xiao Liu, Marthie Grobler, Thuong N. Hoang, Karen Renaud, Chetan Arora:
Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023). ASEW 2023: 1-2 - [c113]Jacques Ophoff, Karen Vera Renaud:
Universal Design for Website Authentication: Views and Experiences of Senior Citizens. ASEW 2023: 46-53 - [c112]Partha Das Chowdhury, Karen Renaud:
'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach. NSPW 2023: 76-91 - 2022
- [j78]Nora Alkaldi, Karen Renaud:
MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory. ACM SIGMIS Database 53(1): 63-95 (2022) - [j77]Suzanne Prior, Karen Renaud:
The impact of financial deprivation on children's cybersecurity knowledge & abilities. Educ. Inf. Technol. 27(8): 10563-10583 (2022) - [j76]Adéle da Veiga, Marianne Loock, Karen Renaud:
Cyber4Dev-Q: Calibrating cyber awareness in the developing country context. Electron. J. Inf. Syst. Dev. Ctries. 88(1) (2022) - [j75]Ronald Mudzamba, Karl van der Schyff, Karen Renaud:
The challenges of cloud adoption among South African small to medium enterprises: A thematic analysis. Electron. J. Inf. Syst. Dev. Ctries. 88(6) (2022) - [j74]Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo:
A quantification mechanism for assessing adherence to information security governance guidelines. Inf. Comput. Secur. 30(4): 517-548 (2022) - [j73]Karen Renaud:
D-F of cyber security. Netw. Secur. 2022(3) (2022) - [j72]Mohan Baruwal Chhetri, Xiao Liu, Marthie Grobler, Thuong N. Hoang, Karen Renaud, Jennifer McIntosh:
Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021). ACM SIGSOFT Softw. Eng. Notes 47(2): 12-14 (2022) - [j71]Karen Renaud, Lizzie Coles-Kemp:
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN Comput. Sci. 3(5): 346 (2022) - [c111]Maria Lamond, Karen Renaud, Lara Wood, Suzanne Prior:
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review. EuroUSEC 2022: 14-27 - [c110]Marc J. Dupuis, Karen Renaud, Anna Jennings:
Fear might motivate secure password choices in the short term, but at what cost? HICSS 2022: 1-10 - [c109]Karen Renaud, Rosalind Searle, Marc J. Dupuis:
Cybersecurity Regrets: I've had a few.... Je Ne Regrette. NSPW 2022: 1-20 - [c108]Marc J. Dupuis, Karen Renaud, Rosalind Searle:
Crowdsourcing Quality Concerns: An Examination of Amazon's Mechanical Turk. SIGITE 2022: 127-129 - 2021
- [j70]Karen Renaud, Melanie Volkamer, Peter Mayer, Rüdiger Grimm:
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass. AIS Trans. Hum. Comput. Interact. 13(4): 407-430 (2021) - [j69]Marc J. Dupuis, Karen Renaud:
Scoping the ethical principles of cybersecurity fear appeals. Ethics Inf. Technol. 23(3): 265-284 (2021) - [j68]Karen Renaud, Suzanne Prior:
The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor. Inf. Comput. Secur. 29(3): 526-557 (2021) - [j67]Karen Renaud, Graham Johnson, Jacques Ophoff:
Accessible authentication: dyslexia and password strategies. Inf. Comput. Secur. 29(4): 604-624 (2021) - [j66]Karen Renaud:
Learning from the past. Netw. Secur. 2021(3): 20 (2021) - [j65]Karen Renaud:
Cyber security is a team effort. Netw. Secur. 2021(7): 20 (2021) - [j64]Karen Renaud:
The A-Z of cyber security. Netw. Secur. 2021(11): 20 (2021) - [j63]Verena Zimmermann, Karen Renaud:
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. ACM Trans. Comput. Hum. Interact. 28(1): 7:1-7:45 (2021) - [c107]Jacques Ophoff, Karen Renaud:
Revealing the Cyber Security Non-Compliance "Attribution Gulf". HICSS 2021: 1-10 - [c106]Tawanda Blessing Chiyangwa, Judy van Biljon, Karen Renaud:
Natural Language Processing Techniques to Reveal Human-Computer Interaction for Development Research Topics. icARTi 2021: 9:1-9:7 - [c105]Karen Renaud:
Accessible Cyber Security: The Next Frontier? ICISSP 2021: 9-18 - [c104]Oksana Kulyk, Karen Renaud:
"I need to know I'm safe and protected and will check": Users Want Cues to Signal Data Custodians' Trustworthiness. ASE Workshops 2021: 171-178 - [c103]Karen Renaud, Rosalind Searle, Marc J. Dupuis:
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? NSPW 2021: 70-87 - [c102]Marc J. Dupuis, Anna Jennings, Karen Renaud:
Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene. SIGITE 2021: 35-40 - [c101]Karen Renaud, Amel Attatfa, Tony Craig:
Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat. STAST 2021: 131-152 - [c100]Jacques Ophoff, Graham Johnson, Karen Renaud:
Cognitive function vs. accessible authentication: insights from dyslexia research. W4A 2021: 19:1-19:5 - 2020
- [j62]Paul van Schaik, Karen Renaud, Christopher J. Wilson, Jurjen Jansen, Joseph A. Onibokun:
Risk as affect: The affect heuristic in cybersecurity. Comput. Secur. 90: 101651 (2020) - [j61]Noura Aleisa, Karen Renaud, Ivano Bongiovanni:
The privacy paradox applies to IoT devices too: A Saudi Arabian study. Comput. Secur. 96: 101897 (2020) - [j60]Suzanne Prior, Karen Renaud:
Age-appropriate password "best practice" ontologies for early educators and parents. Int. J. Child Comput. Interact. 23-24: 100169 (2020) - [j59]Karen Renaud:
Strong passwords can't keep children safe. Netw. Secur. 2020(3): 20 (2020) - [j58]Karen Renaud, Zinaida Benenson, Daniela Oliveira:
Balancing resistance and resilience. Netw. Secur. 2020(7): 20 (2020) - [j57]Karen Renaud, Verena Zimmermann:
How to nudge in cyber security. Netw. Secur. 2020(11): 20 (2020) - [c99]Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. Financial Cryptography Workshops 2020: 291-309 - [c98]Esra Alkhamis, Helen Petrie, Karen Renaud:
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children. HAISA 2020: 123-132 - [c97]Karen Renaud, Graham Johnson, Jacques Ophoff:
Dyslexia and Password Usage: Accessibility in Authentication Design. HAISA 2020: 259-268 - [c96]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
Implement a Model for Describing and Maximising Security Knowledge Sharing. ICITST 2020: 1-4 - [c95]Alfred Musarurwa, Karen Renaud, Tim Schürmann:
Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response? ASE Workshops 2020: 1-6 - [c94]Amel Attatfa, Karen Renaud, Stefano De Paoli:
Cyber Diplomacy: A Systematic Literature Review. KES 2020: 60-69 - [c93]Marc J. Dupuis, Karen Renaud:
Conducting. SIGITE 2020: 320-323 - [i9]Karen Renaud, Paul van Schaik, Alastair Irons, Sara Wilford:
2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying. CoRR abs/2006.06340 (2020) - [i8]James Conacher, Karen Renaud, Jacques Ophoff:
Caveat Venditor, Used USB Drive Owner. CoRR abs/2006.11354 (2020)
2010 – 2019
- 2019
- [j56]Karen Renaud, Robert F. Otondo, Merrill Warkentin:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Comput. Secur. 82: 241-260 (2019) - [j55]Yee-Yin Choong, Mary Frances Theofanos, Karen Renaud, Suzanne Prior:
"Passwords protect my stuff" - a study of children's password practices. J. Cybersecur. 5(1): tyz015 (2019) - [j54]Arijus Pleska, Andrew Hoskins, Karen Renaud:
A Framework for Interrogating Social Media Images to Reveal an Emergent Archive of War. Int. J. Humanit. Arts Comput. 13(1-2): 196-222 (2019) - [j53]Verena Zimmermann, Karen Renaud:
Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset. Int. J. Hum. Comput. Stud. 131: 169-187 (2019) - [j52]Jacqueline M. Archibald, Karen Renaud:
Refining the PoinTER "human firewall" pentesting framework. Inf. Comput. Secur. 27(4) (2019) - [j51]Ganna Pogrebna, Karen Renaud, Boris Taratine:
The many faces of active cyber. Netw. Secur. 2019(2): 20 (2019) - [j50]Karen Renaud, Verena Zimmermann:
Encouraging password manager use. Netw. Secur. 2019(6): 20 (2019) - [j49]Karen Renaud, Marc J. Dupuis:
Should we scare people into behaving securely? Netw. Secur. 2019(11): 20 (2019) - [c92]Saad Altamimi, Karen Renaud, Timothy Storer:
"I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns. CRiSIS 2019: 227-243 - [c91]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. EMCIS 2019: 376-390 - [c90]Nora Alkaldi, Karen Renaud:
Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs. HICSS 2019: 1-10 - [c89]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c88]Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. ICETE (2) 2019: 125-136 - [c87]Judy van Biljon, Karen Renaud:
Human-Computer Interaction for Development (HCI4D): The Southern African Landscape. ICT4D (2) 2019: 253-266 - [c86]Tapiwa Gundu, Stephen Flowerday, Karen Renaud:
Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}. ICTAS 2019: 1-6 - [c85]Oksana Kulyk, Jan Henzel, Karen Renaud, Melanie Volkamer:
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations. INTERACT (1) 2019: 519-538 - [c84]Karen Renaud, Marc J. Dupuis:
Cyber security fear appeals: unexpectedly complicated. NSPW 2019: 42-56 - [c83]Karen Renaud, Judy van Biljon:
A Framework to Maximise the Communicative Power of Knowledge Visualisations. SAICSIT 2019: 2:1-2:10 - 2018
- [j48]Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [j47]Karen Renaud, Verena Zimmermann:
Ethical guidelines for nudging in information security & privacy. Int. J. Hum. Comput. Stud. 120: 22-35 (2018) - [j46]Jurlind Budurushi, Stephan Neumann, Karen Renaud, Melanie Volkamer:
Introduction to special issue on e-voting. J. Inf. Secur. Appl. 38: 122-123 (2018) - [j45]Karen Renaud, Lynsay A. Shepherd:
GDPR: its time has come. Netw. Secur. 2018(2): 20 (2018) - [j44]Karen Renaud:
Cooking up security awareness & training. Netw. Secur. 2018(5): 20 (2018) - [j43]Karen Renaud, Verena Zimmermann:
A user by any other name. Netw. Secur. 2018(9): 20 (2018) - [c82]Judy van Biljon, Karen Renaud, Bester Chimbo:
Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation. AfriCHI 2018: 48:1-48:2 - [c81]Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer:
What Did I Really Vote For? CHI 2018: 176 - [c80]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CyberSA 2018: 1-8 - [c79]Merrill Warkentin, Sanjay Goel, Kevin J. Williams, Karen Renaud:
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS 2018: 25 - [c78]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Systematic Review of Information Security Knowledge-Sharing Research. HAISA 2018: 101-110 - [c77]Jacqueline Archibald, Karen Renaud:
POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs). HAISA 2018: 147-157 - [c76]Abdulwhab Alkharashi, Karen Renaud:
Privacy in Crowdsourcing: A Systematic Review. ISC 2018: 387-400 - [c75]Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Security Symposium 2018: 1-11 - [c74]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - [i7]Lynsay A. Shepherd, Karen Renaud:
How to design browser security and privacy alerts. CoRR abs/1806.05426 (2018) - [i6]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CoRR abs/1806.06670 (2018) - 2017
- [j42]Karen Renaud, Judy van Biljon:
The role of knowledge visualisation in supporting postgraduate dissertation assessment. Br. J. Educ. Technol. 48(6): 1475-1490 (2017) - [j41]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Alexandra Kunz:
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Comput. Secur. 71: 100-113 (2017) - [j40]Karen Renaud, Stephen Flowerday:
Human-centred cyber security. J. Inf. Secur. Appl. 34: 1 (2017) - [j39]Paul Gerber, Melanie Volkamer, Karen Renaud:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. J. Inf. Secur. Appl. 34: 8-26 (2017) - [j38]Karen Renaud, Stephen Flowerday:
Contemplating human-centred security & privacy research: Suggesting future directions. J. Inf. Secur. Appl. 34: 76-81 (2017) - [j37]Karen Renaud:
Webcam covering phenomenon. Netw. Secur. 2017(1): 20 (2017) - [j36]Karen Renaud:
Facts do not change minds. Netw. Secur. 2017(4): 20 (2017) - [j35]Karen Renaud:
It makes you Wanna Cry. Netw. Secur. 2017(7): 20 (2017) - [j34]Karen Renaud, Gareth Renaud:
To phish, or not to phish... Netw. Secur. 2017(10): 20 (2017) - [j33]Karen Vera Renaud, Judy van Biljon:
Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection. South Afr. Comput. J. 29(3) (2017) - [c73]Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. HCI (22) 2017: 656-674 - [c72]Noura Aleisa, Karen Renaud:
Privacy of the Internet of Things: A Systematic Literature Review. HICSS 2017: 1-10 - [c71]Noura Aleisa, Karen Renaud:
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. IoTBDS 2017: 198-205 - [c70]Karen Renaud, Verena Zimmermann:
Enriched nudges lead to stronger password replacements ... but implement mindfully. ISSA 2017: 1-9 - [c69]Karen Renaud, Merrill Warkentin:
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW 2017: 57-69 - [c68]Karen Renaud, Judy van Biljon:
Charting the path towards effective knowledge visualisations. SAICSIT 2017: 30:1-30:10 - 2016
- [j32]Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide:
An investigation into the usability of electronic voting systems for complex elections. Ann. des Télécommunications 71(7-8): 309-322 (2016) - [j31]Melanie Volkamer, Karen Renaud, Paul Gerber:
Spot the phish by checking the pruned URL. Inf. Comput. Secur. 24(4): 372-385 (2016) - [j30]Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? Inf. Comput. Secur. 24(4): 400-415 (2016) - [j29]Marian Carcary, Karen Renaud, Stephen McLaughlin, Conor O'Brien:
A Framework for Information Security Governance and Management. IT Prof. 18(2): 22-30 (2016) - [j28]Isabella Margarethe Venter, Karen Renaud, Rénette J. Blignaut:
Granny gets smarter but Junior hardly notices. J. Community Informatics 12(3) (2016) - [j27]Karen Renaud:
No, users are not irrational. Netw. Secur. 2016(11): 20 (2016) - [c67]Karen Renaud, George R. S. Weir:
Cybersecurity and the Unbearability of Uncertainty. CCC 2016: 137-143 - [c66]Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir:
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. CCC 2016: 144-150 - [c65]Karen Renaud, Rénette J. Blignaut, Isabella Margarethe Venter:
Smartphone Owners Need Security Advice. How Can We Ensure They Get it? CONF-IRM 2016: 20 - [c64]Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [c63]Esra Alkhamis, Karen Renaud:
The Design and Evaluation of an Interactive Social Engineering Training Programme. HAISA 2016: 125-134 - [c62]Nora Alkaldi, Karen Renaud:
Why do People Adopt or Reject Smartphone Security Tools? HAISA 2016: 135-144 - [c61]Andreas Gutmann, Melanie Volkamer, Karen Renaud:
Memorable and Secure: How Do You Choose Your PIN?. HAISA 2016: 156-166 - [c60]Judy van Biljon, Karen Renaud:
Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country. SAICSIT 2016: 44:1-44:10 - [c59]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. SEC 2016: 161-175 - [i5]Joseph Maguire, Karen Renaud:
Alternative Authentication in the Wild. CoRR abs/1601.05483 (2016) - [i4]Noura Aleisa, Karen Renaud:
Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion). CoRR abs/1611.03340 (2016) - 2015
- [j26]Paul Gerber, Melanie Volkamer, Karen Renaud:
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy. SIGCAS Comput. Soc. 45(1): 16-21 (2015) - [c58]Shana Ponelis, Karen Renaud, Isabella Margarethe Venter, Retha de la Harpe:
Deploying Design Science Research in Graduate Computing Studies in South Africa. AMCIS 2015 - [c57]Karen Renaud, Joseph Maguire:
Regulating Access to Adult Content (with Privacy Preservation). CHI 2015: 4019-4028 - [c56]Karen Renaud, Andrew Hoskins, Rossouw von Solms:
Biometric identification: Are we ethically ready? ISSA 2015: 1-8 - [c55]Judy van Biljon, Karen Renaud:
Facilitating Knowledge Visualisation as Communication and Knowledge Transfer Mechanism in Postgraduate Learning. mLearn 2015: 156-171 - [c54]Isabella Margarethe Venter, Rénette J. Blignaut, Karen Renaud:
Blinkered Views of Out-Group Mobile Phone Usage: Moving Towards Less Stereotyping of "Others". SAICSIT 2015: 37:1-37:9 - [c53]Joseph Maguire, Karen Renaud:
Alternative Authentication in the Wild. STAST 2015: 32-39 - [c52]Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. STM 2015: 265-273 - [c51]Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015: 104-122 - [c50]Karen Renaud, Melanie Volkamer:
Exploring mental models underlying PIN management strategies. WorldCIS 2015: 18-23 - [c49]Andrews Greig, Karen Renaud, Stephen Flowerday:
An ethnographic study to assess the enactment of information security culture in a retail store. WorldCIS 2015: 61-66 - [i3]Joseph Maguire, Karen Renaud:
You Only Live Twice or "The Years We Wasted Caring about Shoulder-Surfing". CoRR abs/1508.05626 (2015) - 2014
- [c48]Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud:
Building castles in quicksand: blueprint for a crowdsourced study. CHI Extended Abstracts 2014: 643-652 - [c47]Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer:
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both? EGOVIS 2014: 246-260 - [c46]Jurlind Budurushi, Melanie Volkamer, Karen Renaud, Marcel Woide:
Implementation and evaluation of the EasyVote tallying component and ballot. EVOTE 2014: 1-8 - [c45]Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud:
Shake Hands to Bedevil: Securing Email with Wearable Technology. HAISA 2014: 90-100 - [c44]Karen Renaud, Rosanne English, Thomas Wynne, Florian Weber:
You Have Three Tries Before Lockout. Why Three?. HAISA 2014: 101-111 - [c43]Karen Renaud, Melanie Volkamer, Joseph Maguire:
ACCESS: Describing and Contrasting - Authentication Mechanisms. HCI (24) 2014: 183-194 - [c42]Karen Renaud, Wendy Goucher:
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture. HCI (24) 2014: 361-372 - [c41]Matthew Davidson, Karen Renaud, Shujun Li:
jCAPTCHA: Accessible Human Validation. ICCHP (1) 2014: 129-136 - [c40]Rayne Reid, Johan Van Niekerk, Karen Renaud:
Information security culture: A general living systems theory perspective. ISSA 2014: 1-8 - [c39]Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos:
Why Doesn't Jane Protect Her Privacy? Privacy Enhancing Technologies 2014: 244-262 - [i2]Tony McBryan, Karen Renaud, J. Paul Siebert:
An Investigation into the use of Images as Password Cues. CoRR abs/1407.8004 (2014) - [i1]Karen Renaud, Judith Ramsay:
How Helpful is Colour-Cueing of PIN Entry? CoRR abs/1407.8007 (2014) - 2013
- [j25]Heather Crawford, Karen Renaud, Tim Storer:
A framework for continuous, transparent mobile device authentication. Comput. Secur. 39: 127-136 (2013) - [j24]Karen Renaud, Wendy Goucher:
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage. Int. J. Cyber Warf. Terror. 3(4): 40-51 (2013) - [j23]Karen Renaud, Lewis Mackenzie:
SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems. J. Artif. Soc. Soc. Simul. 16(3) (2013) - [j22]Judy van Biljon, Karen Renaud, Tobie van Dyk:
Reporting on Accessibility Challenges Experienced by South Africa's Older Mobile Phone Users. J. Community Informatics 9(4) (2013) - [j21]Karen Renaud, Quintin I. Cutts:
Teaching human-centered security using nontraditional techniques. ACM Trans. Comput. Educ. 13(3): 11:1-11:23 (2013) - [c38]Melanie Volkamer, Karen Renaud:
Mental Models - General Introduction and Review of Their Application to Human-Centred Security. Number Theory and Cryptography 2013: 255-280 - [c37]Karen Renaud, Joe Maguire:
Shrinking the Authentication Footprint. EISMC 2013: 2-11 - [c36]Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire:
Are Graphical Authentication Mechanisms As Strong As Passwords? FedCSIS 2013: 837-844 - [c35]Karen Renaud, Rénette J. Blignaut, Isabella Margarethe Venter:
Designing Mobile Phone Interfaces for Age Diversity in South Africa: "One-World" versus Diverse "Islands". INTERACT (3) 2013: 1-17 - [c34]Karen Renaud, Demetris Kennes, Johan Van Niekerk, Joe Maguire:
SNIPPET: Genuine knowledge-based authentication. ISSA 2013: 1-8 - [c33]Karen Renaud:
Introducing computing students to scientific experimentation. ITiCSE 2013: 76-81 - [c32]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - 2012
- [j20]Judith Ramsay, Karen Renaud:
Using insights from email users to inform organisational email management policy. Behav. Inf. Technol. 31(6): 587-603 (2012) - [j19]Karen Renaud:
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches? IEEE Secur. Priv. 10(3): 57-63 (2012) - [c31]Joseph Maguire, Karen Renaud:
You only live twice or "the years we wasted caring about shoulder-surfing". BCS HCI 2012: 404-409 - [c30]Tobie van Dyk, Karen Renaud, Judy van Biljon:
Moses - method for selecting senior mobile phones: supporting design & choice for the elderly. SAICSIT 2012: 277-285 - 2011
- [c29]Wendy Goucher, Karen Renaud:
In a world of their own: working on the move. BCS HCI 2011: 461-466 - 2010
- [j18]Karen Renaud, Judy van Biljon:
Worth-centred mobile phone design for older users. Univers. Access Inf. Soc. 9(4): 387-403 (2010) - [c28]Karen Renaud, Mike Just:
Pictures or questions?: examining user responses to association-based authentication. BCS HCI 2010: 98-107 - [c27]Mohamed Al Fairuz, Karen Renaud:
Multi-channel, Multi-level Authentication for More Secure eBanking. ISSA 2010 - [c26]Karen Renaud, Dora Galvez-Cruz:
Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach. ISSA 2010 - [c25]Karen Renaud, Heather Crawford:
Invisible, Passive, Continuous and Multimodal Authentication. MSSP 2010: 34-41
2000 – 2009
- 2009
- [j17]Karen Renaud, Antonella De Angeli:
Visual passwords: cure-all or snake-oil? Commun. ACM 52(12): 135-140 (2009) - [j16]Karen Renaud:
Guidelines for designing graphical authentication mechanism interfaces. Int. J. Inf. Comput. Secur. 3(1): 60-85 (2009) - [j15]Ron Poet, Karen Renaud:
A Mechanism for Filtering Distractors for Doodle Passwords. Int. J. Pattern Recognit. Artif. Intell. 23(5): 1005-1029 (2009) - [j14]Karen Renaud:
On user involvement in production of images used in visual authentication. J. Vis. Lang. Comput. 20(1): 1-15 (2009) - [c24]Karen Renaud, Joseph Maguire:
Armchair authentication. BCS HCI 2009: 388-397 - [c23]Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple:
Musipass: authenticating me softly with "my" song. NSPW 2009: 85-100 - [c22]Karen Renaud, Malcolm Tunde Cockshott, Mario Hair:
Everyone Abandons - Eventually: Understanding the Online Shopping Experience. CEC 2009: 245-251 - 2008
- [j13]Paula Kotzé, Karen Renaud, Judy van Biljon:
Don't do this - Pitfalls in using anti-patterns in teaching human-computer interaction principles. Comput. Educ. 50(3): 979-1008 (2008) - [j12]Karen Renaud, Judith Ramsay, Mario Hair:
Feature - Think before you link: controlling ubiquitous availability. Interactions 15(6): 65-68 (2008) - [c21]Judy van Biljon, Karen Renaud:
A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users. ER Workshops 2008: 228-237 - [c20]Judy van Biljon, Paula Kotzé, Karen Renaud:
Mobile phone usage of young adults: the impact of motivational factors. OZCHI 2008: 57-64 - [c19]Karen Renaud, Judy van Biljon:
Predicting technology acceptance and adoption by the elderly: a qualitative study. SAICSIT 2008: 210-219 - 2007
- [j11]Karen Renaud, Judith Ramsay:
Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behav. Inf. Technol. 26(4): 309-322 (2007) - [j10]Mario Hair, Karen Renaud, Judith Ramsay:
The influence of self-esteem and locus of control on perceived email-related stress. Comput. Hum. Behav. 23(6): 2791-2803 (2007) - [j9]Karen Renaud:
A process for supporting risk-aware web authentication mechanism choice. Reliab. Eng. Syst. Saf. 92(9): 1204-1217 (2007) - [j8]Karen Renaud, Elin Skjegstad Olsen:
DynaHand: Observation-resistant recognition-based web authentication. IEEE Technol. Soc. Mag. 26(2): 22-31 (2007) - [c18]Dora Galvez-Cruz, Karen Renaud:
You Know My 'Alter-Ego'--but You Don't Know Me!. BNCOD Workshops 2007: 101-109 - [c17]Paula Kotzé, Karen Renaud:
Do We Practise What We Preach in Formulating Our Design and Development Methods? EHCI/DS-VIS 2007: 567-585 - 2006
- [j7]Karen Renaud, Judith Ramsay, Mario Hair:
"You've Got E-Mail!" ... Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective. Int. J. Hum. Comput. Interact. 21(3): 313-332 (2006) - [c16]Dora Galvez-Cruz, Karen Renaud:
What E-Grocery Customers really want: Personalised Personalisation. LA-WEB 2006: 109-112 - [c15]Ann Nosseir, Richard Connor, Karen Renaud:
Question-based group authentication. OZCHI 2006: 277-283 - 2005
- [j6]Antonella De Angeli, Lynne M. Coventry, Graham Johnson, Karen Renaud:
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1-2): 128-152 (2005) - [c14]Karen Renaud:
A Visuo-Biometric Authentication Mechanism for Older Users. BCS HCI 2005: 167-182 - 2004
- [j5]Karen Renaud, Antonella De Angeli:
My password is here! An investigation into visuo-spatial authentication mechanisms. Interact. Comput. 16(6): 1017-1041 (2004) - [j4]Karen Renaud:
Quantification of Authentication Mechanisms: a Usability Perspective. J. Web Eng. 3(2): 95-123 (2004) - [c13]Karen Renaud, Judy van Biljon:
Teaching SQL - Which Pedagogical Horse for This Course? BNCOD 2004: 244-256 - [c12]Karen Renaud, Judith Bishop, Johnny Li-Chang Lo, Basil Worrall:
Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware. SC 2004: 65-85 - 2003
- [c11]Judy van Biljon, Karen Renaud:
Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Systems for Curriculum. INTERACT 2003 - [c10]Karen Renaud, Johnny Li-Chang Lo, Judith Bishop, Pieter van Zyl, Basil Worrall:
Algon: A Framework for Supporting Comparison of Distributed Algorithm Performance. PDP 2003: 425-432 - 2002
- [j3]Karen Renaud:
Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proc. Softw. 149(6): 169-176 (2002) - [c9]Judith Bishop, Karen Renaud, Basil Worrall:
Composition of Distributed Software with Algon - Concepts and Possibilities. SC@ETAPS 2002: 56-67 - 2001
- [j2]Karen Renaud, John Barrow, Petra le Roux:
Teaching programming from a distance: problems and a proposed solution. ACM SIGCSE Bull. 33(4): 39-42 (2001) - [c8]Karen Renaud, Tobias van Dyk:
Tailoring E-Commerce Sites to Ease Recovery after Disruptions. COMPSAC 2001: 603- - [c7]Karen Renaud, Paula Kotzé, Tobias van Dyk:
A Mechanism for Evalutaing Feedback of e-Commerce Sites. I3E 2001: 389-398 - [c6]Karen Renaud, James Huw Evans:
JavaCloak: Reflecting on Java Typing for Class Reuse Using Proxies. Reflection 2001: 278-279 - [c5]Karen Renaud, Richard L. Cooper:
Considering Possible Outcomes and the User's Environment in Designing User Interfaces for Data Intensive Systems. UIDIS 2001: 80-90 - 2000
- [b1]Karen Vera Renaud:
A generic feedback mechanism for component-based systems. University of Glasgow, UK, 2000 - [j1]Karen Renaud, Richard L. Cooper:
Feedback in human-computer interaction - characteristics and recommendations. South Afr. Comput. J. 26: 105-114 (2000) - [c4]Karen Renaud:
HERCULE : Non-invasively Tracking JavaTM Component-Based Application Activity. ECOOP 2000: 447-471 - [c3]Karen Renaud:
HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback. PDSE 2000: 180-187
1990 – 1999
- 1999
- [c2]Karen Renaud, Richard L. Cooper:
HERCULE: a framework for enhancing error reporting in component-based systems. EDOC 1999: 245-254 - [c1]Karen Renaud, Richard L. Cooper:
An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems. UIDIS 1999: 141-150
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint