Picture of a satellite in orbit.

Open Access research that solves space system engineering problems...

Strathprints makes available scholarly Open Access content by scholars in the Departments of Mechanical & Aerospace Engineering, Electronic & Electrical Engineering, and Design, Manufacturing & Engineering Management -- all active in the areas of space systems engineering, space mechatronics, aerospace and astronautical engineering. This spans a wide variety of topics such as nano-satellites, self-assembling spacecraft, robotics, flightpath mechanics, orbital dynamics, trajectory design and optimization, autonomous navigation and planning -- and with almost all research outputs openly available through Strathprints.

Explore the Open Access research of the Mechanical & Aerospace Engineering, Electronic & Electrical Engineering, and Design, Manufacturing & Engineering Management. Or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Number of items: 53.

Renaud, Karen and Zimmermann, Verena and Shüermann, Tim and Böehm, Carlos (2021) Exploring cybersecurity-related emotions and finding that they are challenging to measure. Humanities and Social Sciences Communications, 8. 75. ISSN 2662-9992

Renaud, Karen (2021) Learning from the past .... Network Security. ISSN 1353-4858 (In Press)

Zimmermann, Verena and Renaud, Karen (2021) The nudge puzzle : matching nudge interventions to cybersecurity decisions. ACM Transactions on Computer-Human Interaction, 28 (1). 7. ISSN 1073-0516

Renaud, Karen and Prior, Suzanne (2021) The "three M's" counter-measures to children's risky online behaviours : mentor, mitigate and monitor. Information and Computer Security. ISSN 2056-4961 (In Press)

Renaud, Karen and Johnson, Graham and Ophoff, Jacques (2020) Accessible authentication : dyslexia and password strategies. Information and Computer Security. ISSN 2056-4961 (In Press)

Dupuis, Marc and Renaud, Karen (2020) Scoping the ethical principles of cybersecurity fear appeals. Ethics and Information Technology. ISSN 1388-1957

Dupuis, Marc J. and Renaud, Karen; (2020) Conducting "in-person" research during a pandemic. In: Proceedings of the 21st Annual Conference on Information Technology Education. Association for Computing Machinery (ACM), New York, pp. 320-323. ISBN 9781450370455

Attatfa, Amel and Renaud, Karen and De Paoli, Stefano (2020) Cyber diplomacy : a systematic literature review. Procedia Computer Science, 176. pp. 60-69. ISSN 1877-0509

Aleisa, Noura and Renaud, Karen and Bongiovanni, Ivano (2020) The privacy paradox applies to IoT devices too : a Saudi Arabian study. Computers and Security, 96. 101897. ISSN 0167-4048

Stewart, Michaela and Campbell, Mhairi and Renaud, Karen and Prior, Suzanne; Vance, Anthony, ed. (2020) KidzPass : authenticating pre-literate children. In: The 2020 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13. IFIP Working Group 8.11/11.13, USA.

Renaud, Karen and Orgeron, Craig and Warkentin, Merrill and French, P. Edward (2020) Cyber security responsibilization : an evaluation of the intervention approaches adopted by the Five Eyes countries and China. Public Administration Review, 80 (4). pp. 577-589. ISSN 0033-3352

Renaud, Karen and Prior, Suzanne (2020) Children's password-related books : efficacious, vexatious and incongruous. Early Childhood Education Journal. ISSN 1082-3301

Prior, Suzanne and Renaud, Karen (2020) Age-appropriate password "best practice" ontologies for early educators and parents. International Journal of Child-Computer Interaction, 23-24. 100169. ISSN 2212-8689

Schaik, Paul van and Renaud, Karen and Wilson, Christopher and Jansen, Jurjen and Onibokun, Joseph (2020) Risk as affect : the affect heuristic in cybersecurity. Computers and Security, 90. 101651. ISSN 0167-4048

Bongiovanni, Ivano and Renaud, Karen and Cairns, George (2020) Securing intellectual capital : an exploratory study in Australian universities. Journal of Intellectual Capital, 21 (3). pp. 481-505. ISSN 1469-1930

Ferguson, R.I. and Renaud, Karen and Wilford, Sara and Irons, Alastair (2020) PRECEPT : a framework for ethical digital forensics investigations. Journal of Intellectual Capital, 21 (2). pp. 257-290. ISSN 1469-1930

Choong, Yee-Yin and Theofanos, Mary F. and Renaud, Karen and Prior, Suzanne (2019) "Passwords protect my stuff" - a study of children's password practices. Journal of Cybersecurity, 5 (1). tyz015. ISSN 2057-2093

Venter, Isabella M. and Blignaut, Rénette J. and Renaud, Karen and Venter, M. Anja (2019) Cyber security education is as essential as "the three R's". Heliyon, 5 (12). e02855. ISSN 2405-8440

Renaud, Karen and von Solms, Basie and von Solms, Rossouw (2019) How does intellectual capital align with cyber security? Journal of Intellectual Capital, 20 (5). pp. 621-641. ISSN 1469-1930

Zimmermann, Verena and Renaud, Karen (2019) Moving from a 'human-as-problem' to a 'human-as-solution' cybersecurity mindset. International Journal of Human Computer Studies, 131. pp. 169-187. ISSN 1071-5819

Renaud, Karen and Zimmerman, Vera (2019) Nudging folks towards stronger password choices : providing certainty is the key. Behavioural Public Policy, 3 (2). pp. 228-258. ISSN 2398-063X

Renaud, Karen and Ophoff, Jacques and Vance, Anthony; Vance, Anthony, ed. (2019) Modeling inertia causatives. In: Proceedings of 2019 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. IFIP Working Group 8.11/11.13, USA.

Renaud, Karen and van Biljon, Judy; (2019) A framework to maximise the communicative power of knowledge visualisations. In: SAICSIT '19. Association for Computing Machinery (ACM), ZAF. ISBN 9781450372657

Archibald, Jacqueline M. and Renaud, Karen (2019) Refining the PoinTER "human firewall" pentesting framework. Information and Computer Security, 27 (4). pp. 575-600. ISSN 2056-4961

Renaud, Karen and Zimmermann, Verena (2019) Encouraging password manager use. Network Security, 2019 (6). p. 20. ISSN 1353-4858

Renaud, Karen and Otondo, Robert and Warkentin, Merrill (2019) "This is the way 'I' create my passwords ..." : does the endowment effect deter people from changing the way they create their passwords? Computers and Security, 82. pp. 241-260. ISSN 0167-4048

Gundu, Tapiwa and Flowerday, Stephen and Renaud, Karen; (2019) Deliver security awareness training, then repeat. In: 2019 Conference on Information Communications Technology and Society (ICTAS). IEEE, ZAF, pp. 106-111. ISBN 9781538673652

Shepherd, Lynsay and Renaud, Karen (2019) How to design browser security and privacy alerts : Dagstuhl Seminar 18321. Dagstuhl Reports, 8 (8). p. 10. ISSN 2192-5283

Renaud, Karen and Zimmermann, Verena (2018) Ethical guidelines for nudging in information security & privacy. International Journal of Human Computer Studies, 120. pp. 22-35. ISSN 1071-5819

Warkentin, Merrill and Goel, Sanjay and Williams, Kevin J. and Renaud, Karen; (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors. In: ECIS 2018 Proceedings. Association for Information Systems, GBR. ISBN 9781861376671

Renaud, Karen and Shepherd, Lynsay; (2018) How to make privacy policies both GDPR-compliant and usable. In: 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, GBR. ISBN 978-1-5386-4565-9

Renaud, Karen and Scott-Brown, Kenneth C. and Szymkowiak, Andrea; (2018) Designing authentication with seniors in mind. In: Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018, Barcelona, Spain. Association for Computing Machinery (ACM), New York.

Renaud, Karen and Zimmermann, Verena (2018) A user by any other name. Network Security, 2018 (9). ISSN 1353-4858

Al-Ahmari, S. and Renaud, K. and Omoronyia, I.; Clarke, Nathan L. and Furnell, Steven M., eds. (2018) A systematic review of Information security knowledge-sharing research. In: 12th International Symposium on Human Aspects of Information Security & Assurance. University of Plymouth, Plymouth, pp. 101-110. ISBN 9780244402549

Renaud, Karen and Flowerday, Stephen and Warkentin, Merrill and Cockshott, Paul and Orgeron, Craig (2018) Is the responsibilization of the cyber security risk reasonable and judicious? Computers and Security, 78. pp. 198-211. ISSN 0167-4048

Alkharashi, Abdulwhab and Renaud, Karen; (2018) Privacy in crowdsourcing : a systematic review. In: Information Security. Lecture Notes in Computer Science . Springer-Verlag, Cham, Switzerland, pp. 387-400. ISBN 9783319991351

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Rack, Philipp and Ghiglieri, Marco and Mayer, Peter and Kunz, Alexandra and Gerber, Nina; Furnell, Steven and Mouratidis, Haralambos and Pernul, Günther, eds. (2018) Developing and evaluating a five minute phishing awareness video. In: Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 11033 . Springer, DEU, pp. 119-134. ISBN 9783319983851

Bott, Gregory J. and Renaud, Karen; Vance, Anthony, ed. (2018) Are 21st-century citizens grieving for their loss of privacy? In: 2018 IFIP 8.11/11.13 Dewald Roode Information Security Workshop, 2018-06-14 - 2018-06-15.

Warkentin, Merrill and Goel, Sanjay and Williams, Kevin J. and Renaud, Karen (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviours. In: 26th European Conference on Information Systems, ECIS 2018, 2018-06-23 - 2018-06-28.

Renaud, Karen and Zimmerman, Verena (2018) Guidelines for ethical nudging in password authentication. SAIEE African Research Journal, 109 (2). pp. 102-118. ISSN 1991-1696

Renaud, Karen (2018) Cooking up security awareness & training. Network Security, 2018 (5). p. 20. ISSN 1353-4858

Ferguson, R. Ian and Renaud, Karen and Irons, Alastair; Duncan, Bob and Lee, Yong Woo and Olmsted, Aspen, eds. (2018) Dark clouds on the horizon : the challenge of cloud forensics. In: Proceedings the Ninth International Conference on Cloud Computing, GRIDs, and Virtualization. International Academy, Research, and Industry Association (IARIA), ESP. ISBN 9781612086071

Renaud, Karen and Shepherd, Lynsay (2018) GDPR : its time has come. Network Security, 2018 (2). p. 20. ISSN 1353-4858

Budurushi, Jurlind and Neumann, Stephan and Renaud, Karen and Volkamer, Melanie (2018) Introduction to special issue on e-voting. Journal of Information Security and Applications, 38. pp. 122-123. ISSN 2214-2134

Renaud, Karen and Biljon, Judy Van (2017) Demarcating mobile phone interface design guidelines to expedite selection. South African Computer Journal, 29 (3). pp. 127-144. ISSN 1015-7999

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra (2017) User experiences of TORPEDO : TOoltip-poweRed Phishing Email DetectiOn. Computers and Security, 71. pp. 100-113. ISSN 0167-4048

Renaud, Karen and Zimmerman, Vera and Maguire, Joseph and Draper, Steve; (2017) Lessons learned from evaluating eight password nudges in the wild. In: Proceedings of LASER 2017. USENIX Association, USA. ISBN 9781931971416

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2017) The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications, 34 (Part 1). pp. 8-26. ISSN 2214-2134

Aleisa, Noura and Renaud, Karen (2017) Privacy of the internet of things : a systematic literature review. In: 50th Hawaii International Conference on System Sciences HICSS 2017, 2017-01-04 - 2017-01-07.

Alkaldi, Nora and Renaud, Karen; (2016) Why do people adopt, or reject, smartphone password managers? In: 1st European Workshop on Usable Security. Alexander von Humboldt Institute for Internet and Society, DEU. ISBN 1891562452

Alkaldi, N. and Renaud, K.; Clarke, Nathan L. and Furnell, Steven M., eds. (2016) Why do people adopt, or reject, smartphone security tools? In: 10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016, 2016-07-19 - 2016-07-21.

Renaud, Karen and Volkamer, Melanie and Renkema-Padmos, Arne; De Cristofaro, Emiliano and Murdoch, Steven J., eds. (2014) Why doesn't Jane protect her privacy? In: International Symposium on Privacy Enhancing Technologies Symposium. Lecture Notes in Computer Science, 8555 . Springer, NLD, pp. 244-262. ISBN 9783319085050

De Angeli, A and Coventry, L and Johnson, Graham and Renaud, K (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human Computer Studies, 63 (1-2). pp. 128-152. ISSN 1071-5819

This list was generated on Fri Apr 16 23:32:58 2021 BST.