Picture of small jelly fish in ocean

Open Access research that better understands changing marine ecologies...

Strathprints makes available scholarly Open Access content by researchers in the Department of Mathematics & Statistics.

Mathematics & Statistics hosts the Marine Population Modelling group which is engaged in research into topics surrounding marine resource modelling and ecology. Recent work has included important developments in the population modelling of marine species.

Explore the Open Access research of Mathematics & Statistics. Or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2005
Number of items: 146.

2024

Renaud, Karen and Warkentin, Merrill and Pogrebna, Ganna and van der Schyff, Karl (2024) VISTA : an inclusive insider threat taxonomy, with mitigation strategies. Information & Management, 61 (1). 103877. ISSN 0378-7206

Schaik, Paul van and Renaud, Karen (2024) Gauging the unemployed's perceptions of online consent forms. In: Hawaii International Conference on System Sciences (HICSS), 2024-01-03 - 2024-01-06, Hilton Hawaiian Village Waikiki Beach Resort.

Schaik, Paul van and Irons, Alastair and Renaud, Karen (2024) Privacy in UK police digital forensics investigations. In: Hawaii International Conference on System Sciences (HICSS), 2024-01-03 - 2024-01-06, Hilton Hawaiian Village Waikiki Beach Resort.

2023

Prior, Suzanne and Renaud, Karen (2023) Are UK parents empowered to act on their cybersecurity education responsibilities? In: HCI International 2024, 2024-06-29 - 2024-07-04. (In Press)

Maguire, Mike and Renaud, Karen (2023) Harm, injustice & technology : reflections on the UK's subpostmasters' case. The Howard Journal of Crime and Justice, 62 (4). pp. 441-461. ISSN 0265-5527

Alanazi, Fahad and Renaud, Karen and Tal, Irina (2023) Understanding the impact of dyslexia on online privacy and security. In: IEEE Cyber Research Conference Ireland, 2023-11-24 - 2023-11-24.

Douha, N’guessan Yves-Roland and Renaud, Karen and Taenaka, Yuzo and Kadobayashi, Youki (2023) Smart home cybersecurity awareness and behavioral incentives. Information and Computer Security, 31 (5). pp. 545-575. ISSN 2056-4961

Ballreich, Fabian Lucas and Volkamer, Melanie and Müllmann, Dirk and Berens, Benjamin and Häußler, Elena Marie and Renaud, Karen; (2023) Encouraging organisational information security incident reporting. In: EuroUSEC '23. ACM International Conference Proceeding Series . ACM, DNK, 224–236. ISBN 9798400708145

Renaud, Karen and Dupuis, Marc (2023) Cybersecurity insights gleaned from world religions. Computers and Security, 132. 103326. ISSN 0167-4048

Das Chowdhury, Partha and Renaud, Karen V. (2023) 'Ought' should not assume 'can' ... : basic capabilities in cybersecurity to ground sen's capability approach. In: New Security Paradigms Workshop, 2023-09-18 - 2023-09-21, Segovia.

Renaud, Karen and van der Schyff, Karl and MacDonald, Stuart (2023) Would US citizens accept cybersecurity deresponsibilization? Perhaps not. Computers and Security, 131. 103301. ISSN 0167-4048

Ahmad, Rufai and Terzis, Sotirios and Renaud, Karen; Moallem, Abbas, ed. (2023) Investigating mobile instant messaging phishing : a study into user awareness and preventive measures. In: HCI for Cybersecurity, Privacy and Trust. Springer, DNK, pp. 381-398. ISBN 9783031358227

Kulyk, Oksana and Renaud, Karen and Costica, Stefan (2023) People  want reassurance when making privacy-related decisions - not technicalities. The Journal of Systems & Software, 200. 111620. ISSN 1873-1228

Prior, Suzanne and Renaud, Karen (2023) Who is best placed to support cyber responsibilized UK parents? Children, 10 (7). 1130. ISSN 2227-9067

Renaud, Karen and van Schaik, Paul (2023) What values should online consent forms satisfy? A scoping review. In: Dewald Roode Workshop 2023, 2023-06-22 - 2023-06-23.

van der Schyff, Karl and Foster, Greg and Renaud, Karen and Flowerday, Stephen (2023) Online privacy fatigue : a scoping review and research agenda. Future Internet, 15 (5). 164. ISSN 1999-5903

Renaud, Karen (2023) The "Nessa'" system : can images from age-related 'reminiscence bumps' help us separate grown-ups from kids? In: Dewald Roode Workshop 2023, 2023-06-22 - 2023-06-23. (In Press)

Sikra, Juraj and Renaud, Karen V. and Thomas, Daniel R. (2023) UK cybercrime, victims and reporting : a systematic review. Commonwealth Cybercrime Journal, 1 (1). pp. 28-59.

2022

van der Schyff, Karl and Renaud, Karen and Puchert- Townes, Juliet and Tshiqi, Naledi (2022) Investigating the mediating effects of phubbing on self-presentation and FoMO within the context of excessive Instagram use. Cogent Psychology, 9 (1). ISSN 2331-1908

Renaud, Karen (2022) Human-centred cyber secure software engineering. Zeitschrift für Arbeitswissenschaft, 77 (1). pp. 45-55. ISSN 2366-4681

Mudzamba, Ronald and van der Schyff, Karl and Renaud, Karen (2022) The challenges of cloud adoption among South African small to medium enterprises : a thematic analysis. The Electronic Journal of Information Systems in Developing Countries, 88 (6). e12235. ISSN 1681-4835

Nevin, Patricia and Renaud, Karen and Finney, George (2022) Slow down and frown to improve phishing detection. Computer Fraud & Security, 2022 (10). 1. ISSN 1361-3723

Alahmari, Saad and Renaud, Karen and Omoronyia, Inah (2022) Moving beyond cyber security awareness and training to engendering security knowledge sharing. Information Systems and e-Business Management. ISSN 1617-9846

Lamond, Maria and Renaud, Karen and Wood, Lara and Prior, Suzanne; (2022) SOK : young children's cybersecurity knowledge, skills & practice : a systematic literature review. In: Proceedings - EuroUSEC 2022. ACM International Conference Proceeding Series . ACM, New York, pp. 14-27. ISBN 9781450397001

Venter, Isabella M. and Cranfield, Desirée J. and Tick, Andrea and Blignaut, Renette J. and Renaud, Karen V. (2022) ‘Lockdown' : digital and emergency eLearning technologies - a student perspective. MDPI Electronics, 11 (18). p. 2941. 2941.

Renaud, Karen and Coles-Kemp, Lizzie (2022) Accessible and inclusive cyber security : a nuanced and complex challenge. SN Computer Science, 3 (5). p. 346. 346. ISSN 2661-8907

Prior, Suzanne and Renaud, Karen (2022) The impact of financial deprivation on children's cybersecurity knowledge & abilities. Education and Information Technologies, 27 (8). pp. 10563-10583. ISSN 1573-7608

Renaud, Karen (2022) The G-I of cyber security. Computer Fraud & Security, 2022 (8). ISSN 1361-3723

Bella, Giampaolo and Ophoff, Jacques and Renaud, Karen and Sempreboni, Diego and Viganò, Luca (2022) Perceptions of beauty in security ceremonies. Philosophy & Technology, 35 (3). p. 72. 72. ISSN 2210-5433

Lamond, Maria and Renaud, Karen and Prior, Suzanne and Wood, Lara (2022) SOK : young children's cybersecurity knowledge and skills. In: EuroUSEC 2022, 2022-10-21 - 2022-10-21, Karlsruhe. (In Press)

Alkaldi, Nora and Renaud, Karen (2022) MIGRANT : modeling smartphone password manager adoption using migration theory. The Data Base for Advances in Information Systems, 53 (2). pp. 63-95. ISSN 1532-0936

Chhetri, Mohan Baruwal and Liu, Xiao and Grobler, Marthie and Hoang, Thuong and Renaud, Karen and McIntosh, Jennifer (2022) Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021). ACM SIGSOFT Software Engineering Notes, 47 (2). pp. 12-14. ISSN 0163-5948

Renaud, Karen (2022) D-F of cyber security. Network Security, 2022 (3). ISSN 1353-4858

Zimmermann, Verena and Marky, Karola and Renaud, Karen (2022) Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information. Behaviour & Information Technology, 42 (6). pp. 700-743. ISSN 1362-3001

van der Schyff, Karl and Flowerday, Stephen and Renaud, Karen (2022) Socially desirable responding within the context of privacy-related research : a personality perspective. South African Journal of Information Management. ISSN 2078-1865 (In Press)

Bongiovanni, Ivano and Renaud, Karen and Brydon, Humphrey and Blignaut, Renette and Cavallo, Angelo (2022) A quantification mechanism for assessing adherence to information security governance guidelines. Information and Computer Security, 30 (4). pp. 517-548. ISSN 2056-4961

da Veiga, Adele and Loock, Mariaane and Renaud, Karen (2022) Cyber4Dev-Q : calibrating cyber awareness in the developing country context. The Electronic Journal of Information Systems in Developing Countries, 88 (1). e12198. ISSN 1681-4835

2021

Renaud, Karen and Searle, Rosalind and Dupuis, Marc; (2021) Shame in cyber security : effective behavior modification tool or counterproductive foil? In: NSPW '21 : New Security Paradigms Workshop. ACM, New York, NY., 70–87. ISBN 9781450385732

Chiyangwa, Tawanda Blessing and van Biljon, Judy and Renaud, Karen (2021) Natural language processing techniques to reveal human-computer interaction for development research topics. In: 2021 International Conference on Artificial Intelligence and its Applications, 2021-12-09 - 2021-12-10.

Renaud, Karen (2021) Why companies shouldn't shame employees who fall for hacking scams. The Wall Street Journal.

Tick, Andrea and Cranfield, Desireé J. and Venter, Isabella M. and Renaud, Karen V. and Blignaut, Rénette J. (2021) Comparing three countries' Higher Education students' cyber related perceptions and behaviours during COVID-19. Electronics, 10 (22). 2865. ISSN 2079-9292

Renaud, Karen (2021) The A-Z of cyber security : A-C of Cyber Security. Network Security, 2021 (11). p. 20. ISSN 1353-4858

Kulyk, Oksana and Renaud, Karen (2021) "I need to know I'm safe and protected and will check" : users want cues to signal data custodians' trustworthiness. In: 2021 Workshop on Human Centric Software Engineering and Cyber Security, 2021-11-15 - 2021-11-15, Online.

Renaud, Karen and Flowerday, Stephen and Dupuis, Marc (2021) Moving from employee compliance to employee success in the cyber security domain. Computer Fraud & Security, 2021 (4). pp. 16-19.

Renaud, Karen and Johnson, Graham and Ophoff, Jacques (2021) Accessible authentication : dyslexia and password strategies. Information and Computer Security, 29 (4). pp. 604-624. ISSN 2056-4961

Renaud, Karen and House, Deanna and Herath, Teju (2021) It takes a society to protect children's privacy rights. In: 2021 Dewald Roode Workshop, 2021-10-08 - 2021-10-09, USA.

Dupuis, Marc and Jennings, Anna and Renaud, Karen; (2021) Scaring people is not enough : an examination of fear appeals within the context of promoting good password hygiene. In: SIGITE '21: Proceedings of the 22st Annual Conference on Information Technology Education. SIGITE 2021 - Proceedings of the 22nd Annual Conference on Information Technology Education . ACM, USA, pp. 35-40. ISBN 9781450383554

Jarvie, Chelsea and Renaud, Karen (2021) Are you over 18? A snapshot of current age verification mechanisms. In: 2021 Dewald Roode Workshop, 2021-10-08 - 2021-10-09, USA.

Renaud, Karen and Attatfa, Amel and Craig, Anthony (2021) Positioning diplomacy within a strategic response to the cyber conflict threat. In: 11th International Workshop on Socio-Technical Aspects in Security, 2021-10-07 - 2021-10-08, Online.

Renaud, Karen and Bongiovanni, Ivano and Wilford, Sara and Irons, Alastair (2021) PRECEPT-4-Justice : a bias-neutralising framework for internal digital forensics investigations. Science and Justice, 61 (5). pp. 477-492. ISSN 1355-0306

Renaud, Karen (2021) What's wrong with having 'complex' passwords? A lot. The Wall Street Journal.

Renaud, Karen and Volkamer, Melanie and Mayer, Peter and Grimm, Rüdiger (2021) Principles for designing authentication mechanisms for young children : lessons learned from KidzPass. AIS Transactions on Human Computer Interaction. ISSN 1944-3900 (In Press)

Dupuis, Marc and Renaud, Karen and Jennings, Anna (2021) Fear might motivate secure password choices in the short term, but at what cost? In: Hawaii International Conference on System Sciences, 2022-01-04 - 2022-01-07. (In Press)

Renaud, Karen and Prior, Suzanne (2021) The "three M's" counter-measures to children's risky online behaviours : mentor, mitigate and monitor. Information and Computer Security, 29 (3). pp. 526-557. ISSN 2056-4961

Renaud, Karen and Flowerday, Stephen and van der Schyff, Karl (2021) Uncertainty in cyber de-responsibilisation. Computer Fraud and Security, 2021 (8). pp. 13-19. ISSN 1361-3723

Cranfield, Desireé and Tick, Andrea and Venter, Isabella M. and Blignaut, Renette J. and Renaud, Karen (2021) Higher education students' perceptions of online learning during Covid-19—a comparative study. Education Sciences, 11 (8). 403. ISSN 2227-7102

Renaud, Karen (2021) Cyber security is a team effort. Network Security, 2021 (7). p. 20. ISSN 1353-4858

Renaud, Karen and Ophoff, Jacques (2021) An SME-specific cyber situational awareness model to predict the implementation of cyber security controls and precautions. Organizational Cyber Security. ISSN 2635-0289 (In Press)

Al Malwi, Wajdan and Renaud, Karen and Mackenzie, Lewis (2021) Users' information disclosure determinants in social networking sites : a systematic literature review. International Journal of Computer and Information Engineering, 15 (5). pp. 314-321. ISSN 2412-8856

Ophoff, Jacques and Johnson, Graham and Renaud, Karen; (2021) Cognitive function vs accessible authentication : insights from dyslexia research. In: Proceedings of the 18th International Web for All Conference. Proceedings of the 18th International Web for All Conference . Association for Computing Machinery, Inc, SVN. ISBN 9781450382120

Renaud, Karen and Zimmermann, Verena and Shüermann, Tim and Böehm, Carlos (2021) Exploring cybersecurity-related emotions and finding that they are challenging to measure. Humanities and Social Sciences Communications, 8. 75. ISSN 2662-9992

Alahmari, Saad and Renaud, Karen and Omoronyia, Inah; (2021) Implement a model for describing and maximising security knowledge sharing. In: 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, Piscataway, N.J., pp. 177-180. ISBN 9781913572211

Renaud, Karen; Mori, Paolo and Gabriele, Lenzini and Furnell, Steven, eds. (2021) Accessible cyber security : the next frontier? In: Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021). SCITEPRESS, Setúbal, Portugal, pp. 9-18. ISBN 9789897584916

Renaud, Karen (2021) Learning from the past .... Network Security. ISSN 1353-4858 (In Press)

Zimmermann, Verena and Renaud, Karen (2021) The nudge puzzle : matching nudge interventions to cybersecurity decisions. ACM Transactions on Computer-Human Interaction, 28 (1). pp. 1-45. 7. ISSN 1073-0516

Ophoff, Jacques and Renaud, Karen; Bui, Tung X., ed. (2021) Revealing the cyber security non-compliance "attribution gulf". In: Proceedings of the 54th Annual Hawaii International Conference on System Sciences, HICSS 2021. Proceedings of the Annual Hawaii International Conference on System Sciences . University of Hawaii at Manoa, USA, pp. 4557-4566. ISBN 9780998133140

2020

Renaud, Karen (2020) Why companies should stop scaring employees about cybersecurity. The Wall Street Journal.

Dupuis, Marc and Renaud, Karen (2020) Scoping the ethical principles of cybersecurity fear appeals. Ethics and Information Technology. ISSN 1388-1957

Dupuis, Marc J. and Renaud, Karen; (2020) Conducting "in-person" research during a pandemic. In: Proceedings of the 21st Annual Conference on Information Technology Education. Association for Computing Machinery (ACM), New York, pp. 320-323. ISBN 9781450370455

Attatfa, Amel and Renaud, Karen and De Paoli, Stefano (2020) Cyber diplomacy : a systematic literature review. Procedia Computer Science, 176. pp. 60-69. ISSN 1877-0509

Aleisa, Noura and Renaud, Karen and Bongiovanni, Ivano (2020) The privacy paradox applies to IoT devices too : a Saudi Arabian study. Computers and Security, 96. 101897. ISSN 0167-4048

Stewart, Michaela and Campbell, Mhairi and Renaud, Karen and Prior, Suzanne; Vance, Anthony, ed. (2020) KidzPass : authenticating pre-literate children. In: The 2020 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13. IFIP Working Group 8.11/11.13, USA.

Renaud, Karen and Prior, Suzanne (2020) Password education should be age-appropriate : here's how. The Conversation.

Bongiovanni, Ivano and Renaud, Karen (2020) Universities are a juicy prize for cyber criminals. Here are 5 ways to improve their defences. The Conversation.

Renaud, Karen and Orgeron, Craig and Warkentin, Merrill and French, P. Edward (2020) Cyber security responsibilization : an evaluation of the intervention approaches adopted by the Five Eyes countries and China. Public Administration Review, 80 (4). pp. 577-589. ISSN 0033-3352

Bongiovanni, Ivano and Renaud, Karen and Aleisa, Noura (2020) The privacy paradox : we claim we care about our data, so why don't our actions match? The Conversation.

Renaud, Karen and Prior, Suzanne (2020) Children's password-related books : efficacious, vexatious and incongruous. Early Childhood Education Journal. ISSN 1082-3301

Prior, Suzanne and Renaud, Karen (2020) Age-appropriate password "best practice" ontologies for early educators and parents. International Journal of Child-Computer Interaction, 23-24. 100169. ISSN 2212-8689

Renaud, Karen (2020) How to teach kids to use passwords. The Wall Street Journal.

Schaik, Paul van and Renaud, Karen and Wilson, Christopher and Jansen, Jurjen and Onibokun, Joseph (2020) Risk as affect : the affect heuristic in cybersecurity. Computers and Security, 90. 101651. ISSN 0167-4048

Bongiovanni, Ivano and Renaud, Karen and Cairns, George (2020) Securing intellectual capital : an exploratory study in Australian universities. Journal of Intellectual Capital, 21 (3). pp. 481-505. ISSN 1469-1930

Ferguson, R.I. and Renaud, Karen and Wilford, Sara and Irons, Alastair (2020) PRECEPT : a framework for ethical digital forensics investigations. Journal of Intellectual Capital, 21 (2). pp. 257-290. ISSN 1469-1930

2019

Choong, Yee-Yin and Theofanos, Mary F. and Renaud, Karen and Prior, Suzanne (2019) "Passwords protect my stuff" - a study of children's password practices. Journal of Cybersecurity, 5 (1). tyz015. ISSN 2057-2093

Venter, Isabella M. and Blignaut, Rénette J. and Renaud, Karen and Venter, M. Anja (2019) Cyber security education is as essential as "the three R's". Heliyon, 5 (12). e02855. ISSN 2405-8440

Renaud, Karen and von Solms, Basie and von Solms, Rossouw (2019) How does intellectual capital align with cyber security? Journal of Intellectual Capital, 20 (5). pp. 621-641. ISSN 1469-1930

Zimmermann, Verena and Renaud, Karen (2019) Moving from a 'human-as-problem' to a 'human-as-solution' cybersecurity mindset. International Journal of Human Computer Studies, 131. pp. 169-187. ISSN 1071-5819

Renaud, Karen and Zimmerman, Vera (2019) Nudging folks towards stronger password choices : providing certainty is the key. Behavioural Public Policy, 3 (2). pp. 228-258. ISSN 2398-063X

Renaud, Karen and Ophoff, Jacques and Vance, Anthony; Vance, Anthony, ed. (2019) Modeling inertia causatives. In: Proceedings of 2019 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. IFIP Working Group 8.11/11.13, USA.

Renaud, Karen and van Biljon, Judy; (2019) A framework to maximise the communicative power of knowledge visualisations. In: SAICSIT '19. Association for Computing Machinery (ACM), ZAF. ISBN 9781450372657

Archibald, Jacqueline M. and Renaud, Karen (2019) Refining the PoinTER "human firewall" pentesting framework. Information and Computer Security, 27 (4). pp. 575-600. ISSN 2056-4961

Renaud, Karen and Zimmermann, Verena (2019) Encouraging password manager use. Network Security, 2019 (6). p. 20. ISSN 1353-4858

Renaud, Karen and Otondo, Robert and Warkentin, Merrill (2019) "This is the way 'I' create my passwords ..." : does the endowment effect deter people from changing the way they create their passwords? Computers and Security, 82. pp. 241-260. ISSN 0167-4048

Gundu, Tapiwa and Flowerday, Stephen and Renaud, Karen; (2019) Deliver security awareness training, then repeat. In: 2019 Conference on Information Communications Technology and Society (ICTAS). IEEE, ZAF, pp. 106-111. ISBN 9781538673652

Shepherd, Lynsay and Renaud, Karen (2019) How to design browser security and privacy alerts : Dagstuhl Seminar 18321. Dagstuhl Reports, 8 (8). p. 10. ISSN 2192-5283

Choong, Yee-Yin and Theofanos, Mary and Renaud, Karen and Prior, Suzanne; (2019) Case study – exploring children's password knowledge and practices. In: Proceedings 2019 Workshop on Usable Security (USEC). The Internet Society, USA. ISBN 1891562576

Warkentin, Merrill and Renaud, Karen and Otondo, Robert (2019) A secure relationship with passwords means not being attached to how you pick them. The Conversation.

2018

Renaud, Karen and Zimmermann, Verena (2018) Ethical guidelines for nudging in information security & privacy. International Journal of Human Computer Studies, 120. pp. 22-35. ISSN 1071-5819

Warkentin, Merrill and Goel, Sanjay and Williams, Kevin J. and Renaud, Karen; (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors. In: ECIS 2018 Proceedings. Association for Information Systems, GBR. ISBN 9781861376671

Renaud, Karen and Shepherd, Lynsay; (2018) How to make privacy policies both GDPR-compliant and usable. In: 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, GBR. ISBN 978-1-5386-4565-9

Biljon, Judy Van and Renaud, Karen; Baguma, Rehema and Sören Pettersson, John, eds. (2018) M4D reflections on the maturity of the Mobile Communication Technology for Development (M4D). In: Proceedings of the 6th International Conference on M4D Mobile Communication Technology for Development. Karlstad University Studies, UGA, pp. 7-18. ISBN 9789170639814

Renaud, Karen and Scott-Brown, Kenneth C. and Szymkowiak, Andrea; (2018) Designing authentication with seniors in mind. In: Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018, Barcelona, Spain. Association for Computing Machinery (ACM), New York.

Renaud, Karen and Zimmermann, Verena (2018) A user by any other name. Network Security, 2018 (9). ISSN 1353-4858

Al-Ahmari, S. and Renaud, K. and Omoronyia, I.; Clarke, Nathan L. and Furnell, Steven M., eds. (2018) A systematic review of Information security knowledge-sharing research. In: 12th International Symposium on Human Aspects of Information Security & Assurance. University of Plymouth, Plymouth, pp. 101-110. ISBN 9780244402549

Renaud, Karen and Flowerday, Stephen and Warkentin, Merrill and Cockshott, Paul and Orgeron, Craig (2018) Is the responsibilization of the cyber security risk reasonable and judicious? Computers and Security, 78. pp. 198-211. ISSN 0167-4048

Alkharashi, Abdulwhab and Renaud, Karen; (2018) Privacy in crowdsourcing : a systematic review. In: Information Security. Lecture Notes in Computer Science . Springer-Verlag, Cham, Switzerland, pp. 387-400. ISBN 9783319991351

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Rack, Philipp and Ghiglieri, Marco and Mayer, Peter and Kunz, Alexandra and Gerber, Nina; Furnell, Steven and Mouratidis, Haralambos and Pernul, Günther, eds. (2018) Developing and evaluating a five minute phishing awareness video. In: Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 11033 . Springer, DEU, pp. 119-134. ISBN 9783319983851

Bott, Gregory J. and Renaud, Karen; Vance, Anthony, ed. (2018) Are 21st-century citizens grieving for their loss of privacy? In: 2018 IFIP 8.11/11.13 Dewald Roode Information Security Workshop, 2018-06-14 - 2018-06-15.

Warkentin, Merrill and Goel, Sanjay and Williams, Kevin J. and Renaud, Karen (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviours. In: 26th European Conference on Information Systems, ECIS 2018, 2018-06-23 - 2018-06-28.

Renaud, Karen and Zimmerman, Verena (2018) Guidelines for ethical nudging in password authentication. SAIEE African Research Journal, 109 (2). pp. 102-118. ISSN 1991-1696

Renaud, Karen (2018) Cooking up security awareness & training. Network Security, 2018 (5). p. 20. ISSN 1353-4858

Shepherd, Lynsay A. and Renaud, Karen; (2018) How to design browser security and privacy alerts. In: AISB 2018. Society for the Study of Artificial Intelligence and Simulation for Behaviour (AISB), GBR, pp. 21-28.

Ferguson, R. Ian and Renaud, Karen and Irons, Alastair; Duncan, Bob and Lee, Yong Woo and Olmsted, Aspen, eds. (2018) Dark clouds on the horizon : the challenge of cloud forensics. In: Proceedings the Ninth International Conference on Cloud Computing, GRIDs, and Virtualization. International Academy, Research, and Industry Association (IARIA), ESP. ISBN 9781612086071

Renaud, Karen and Shepherd, Lynsay (2018) GDPR : its time has come. Network Security, 2018 (2). p. 20. ISSN 1353-4858

Budurushi, Jurlind and Neumann, Stephan and Renaud, Karen and Volkamer, Melanie (2018) Introduction to special issue on e-voting. Journal of Information Security and Applications, 38. pp. 122-123. ISSN 2214-2134

2017

Renaud, Karen and Biljon, Judy Van (2017) Demarcating mobile phone interface design guidelines to expedite selection. South African Computer Journal, 29 (3). pp. 127-144. ISSN 2313-7835

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra (2017) User experiences of TORPEDO : TOoltip-poweRed Phishing Email DetectiOn. Computers and Security, 71. pp. 100-113. ISSN 0167-4048

Renaud, Karen and Zimmerman, Vera and Maguire, Joseph and Draper, Steve; (2017) Lessons learned from evaluating eight password nudges in the wild. In: Proceedings of LASER 2017. USENIX Association, USA. ISBN 9781931971416

Biljon, Judy Van and Renaud, Karen (2017) Harnessing both information and knowledge visualisation to represent a community of practice : depicting the ICT4D researcher community in South Africa. In: African Conference On Information Systems & Technology, 2017-07-10 - 2017-07-11.

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2017) The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications, 34 (Part 1). pp. 8-26. ISSN 2214-2134

Renaud, Karen and Warkentin, Merrill (2017) Using intervention mapping to breach the cyber-defense deficit. In: 12th Annual Symposium on Information Security, 2017-06-07 - 2017-06-08.

Aleisa, Noura and Renaud, Karen; (2017) Yes, I know this IoT device might invade my privacy, but I love it anyway. A study of Saudi Arabian perceptions. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS. International Conference on the Internet of Things . SCITEPRESS, PRT, pp. 198-205. ISBN 9789897582455

Aleisa, Noura and Renaud, Karen (2017) Privacy of the internet of things : a systematic literature review. In: 50th Hawaii International Conference on System Sciences HICSS 2017, 2017-01-04 - 2017-01-07.

2016

Blignaut, Renette and Venter, Isabella and Renaud, Karen (2016) Granny gets smarter but Junior hardly notices. The Journal of Community Informatics, 12 (3). pp. 159-172.

Renaud, Karen and Weir, George R S; (2016) Cybersecurity and the unbearability of uncertainty. In: 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, JOR, pp. 137-143. ISBN 9781509026579

Goel, Sanjay and Warkentin, Merrill and Williams, Kevin and Renaud, Karen (2016) Does risk disposition play a role in influencing decisions to behave SECUREly? In: 2016 Dewald Roode Workshop, 2016-10-07 - 2016-10-08.

Alkaldi, Nora and Renaud, Karen; (2016) Why do people adopt, or reject, smartphone password managers? In: 1st European Workshop on Usable Security. Alexander von Humboldt Institute for Internet and Society, DEU. ISBN 1891562452

Alkaldi, N. and Renaud, K.; Clarke, Nathan L. and Furnell, Steven M., eds. (2016) Why do people adopt, or reject, smartphone security tools? In: 10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016, 2016-07-19 - 2016-07-21.

Al Shauily, Huda and Renaud, Karen (2016) A framework for SQL learning : linking learning taxonomy, cognitive model and cross cutting factors. International Journal of Computer and Systems Engineering, 10 (9). pp. 3105-3111. ISSN 2769-3457

Cockshott, William Paul and Renaud, Karen (2016) Humans robots and values. Technology in Society, 45. pp. 19-28. ISSN 0160-791X

Kulyk, Oksana and Gerber, Paul and El Hanafi, Michael and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie; (2016) Encouraging privacy-aware smartphone app installation : finding out what the technically-adept do. In: Proceedings of the 2016 Workshop on Usable Security (USEC). The Internet Society, USA. ISBN 1891562428

2015

Biljon, Judy Van and Renaud, Karen (2015) Postgraduate dissertation assessment : exploring extant use and potential efficacy of visualisations. The African Journal of Information and Communication, 15. pp. 25-37. ISSN 2077-7213

Venter, Isabella M. and Blignaut, Renette J. and Renaud, Karen V. (2015) Blinkered views of out-group mobile phone usage : moving towards less stereotyping of 'others'. In: Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015-09-28 - 2015-09-30.

Venter, Isabella M. and de la Harpe, Retha and Ponelis, Shana R and Renaud, Karen V. (2015) Deploying design science research in graduate computing studies in South Africa. In: Americas Conference on Information Systems, 2015-08-13 - 2015-08-15.

Biljon, Judy Van and Renaud, Karen (2015) Do visualizations ease dissertation assessment? In: 44th SACLA Conference, 2015-07-02 - 2015-07-03.

2014

Neumann, Stephan and Olembo, M Maina and Renaud, Karen and Volkamer, Melanie (2014) Helios verification : To alleviate, or to nominate : is that the question, or shall we have both? In: International Conference on Electronic Government and the Information Systems Perspective, 2014-09-01 - 2014-09-05.

Davidson, Matthew and Renaud, Karen and Li, Shujun (2014) jCaptcha : Accessible human validation. In: 14th International Conference on Computers Helping People with Special Needs, 2014-07-09 - 2014-07-11.

Volkamer, Melanie and Renaud, Karen and Maguire, Joseph (2014) ACCESS : Describing and contrasting authentication mechanisms. In: 8th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2014, 2014-07-08 - 2014-07-09.

Renaud, Karen and English, Rosanne and Wynne, Thomas and Weber, Florian (2014) You have three tries before lockout – Why three? In: 8th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2014, 2014-07-08 - 2014-07-09.

Jenkins, Rob and McLachlan, Jane L. and Renaud, Karen (2014) Facelock : familiarity-based graphical authentication. PeerJ, 2 (e444). ISSN 2167-8359

Renaud, Karen and Volkamer, Melanie and Renkema-Padmos, Arne; De Cristofaro, Emiliano and Murdoch, Steven J., eds. (2014) Why doesn't Jane protect her privacy? In: International Symposium on Privacy Enhancing Technologies Symposium. Lecture Notes in Computer Science, 8555 . Springer, NLD, pp. 244-262. ISBN 9783319085050

Crawford, Heather and Renaud, Karen (2014) Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management, 1 (1). pp. 1-28. 7.

Renaud, Karen and Maguire, Joseph and Van Niekerk, J. F. and Kennes, Dimitris (2014) Contemplating skill-based authentication. SAIEE African Research Journal, 105 (2). pp. 48-62. ISSN 1991-1696

Olembo, M Maina and Renaud, Karen and Bartsch, Stefan and Volkamer, Melanie (2014) Voter, what message will motivate you to verify your vote? In: Workshop on Usable Security, 2014-02-23 - 2014-02-23.

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen (2014) Building castles in quicksand : blueprint for a crowdsourced study. In: CHI 2014, 2014-04-26 - 2014-05-01, Convention Centre.

2013

Renaud, Karen and Mackenzie, Lewis (2013) SimPass : quantifying the impact of password behaviours and policy directives on an organisation’s systems. Journal of Artificial Societies and Social Simulation, 16 (2). 3. ISSN 1460-7425

2005

De Angeli, A and Coventry, L and Johnson, Graham and Renaud, K (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human Computer Studies, 63 (1-2). pp. 128-152. ISSN 1071-5819

This list was generated on Mon Mar 18 21:48:44 2024 GMT.