Karen Renaud

Orcid: 0000-0002-7187-6531

Affiliations:
  • University of Strathclyde, Department of Computer and Information Sciences, UK
  • Rhodes University, Grahamstown, South Africa
  • University of South Africa, Pretoria, South Africa
  • University of Glasgow, UK (former)


According to our database1, Karen Renaud authored at least 223 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VISTA: An inclusive insider threat taxonomy, with mitigation strategies.
Inf. Manag., January, 2024

The burden of keeping passwords secret.
Netw. Secur., 2024

The Q-Z of cyber security.
Netw. Secur., 2024

Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing.
Inf. Comput. Secur., 2024

Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies.
IEEE Secur. Priv., 2024

Nudging Using Autonomous Agents: Risks and Ethical Considerations.
CoRR, 2024

Privacy policy analysis: A scoping review and research agenda.
Comput. Secur., 2024

"Pass auf!" - Child-Oriented Cyber Safety & Security Educational Content.
Proceedings of the Mensch und Computer 2024, 2024

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Gauging the Unemployed's Perceptions of Online Consent Forms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Privacy in UK Police Digital Forensics Investigations.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

2023
Cybersecurity Insights Gleaned from World Religions.
Comput. Secur., September, 2023

People want reassurance when making privacy-related decisions - Not technicalities.
J. Syst. Softw., June, 2023

Online Privacy Fatigue: A Scoping Review and Research Agenda.
Future Internet, May, 2023

Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information.
Behav. Inf. Technol., April, 2023

Moving beyond cyber security awareness and training to engendering security knowledge sharing.
Inf. Syst. E Bus. Manag., March, 2023

The M-P of cyber security.
Netw. Secur., 2023

Smart home cybersecurity awareness and behavioral incentives.
Inf. Comput. Secur., 2023

Would US citizens accept cybersecurity deresponsibilization? Perhaps not.
Comput. Secur., 2023

'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

Universal Design for Website Authentication: Views and Experiences of Senior Citizens.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023

Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023).
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023

Trust and Vulnerability in the Cybersecurity Context.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Content Analysis of Persuasion Principles in Mobile Instant Message Phishing.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Encouraging Organisational Information Security Incident Reporting.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory.
ACM SIGMIS Database, January, 2022

Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge.
SN Comput. Sci., 2022

Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021).
ACM SIGSOFT Softw. Eng. Notes, 2022

D-F of cyber security.
Netw. Secur., 2022

A quantification mechanism for assessing adherence to information security governance guidelines.
Inf. Comput. Secur., 2022

Cyber4Dev-Q: Calibrating cyber awareness in the developing country context.
Electron. J. Inf. Syst. Dev. Ctries., 2022

The challenges of cloud adoption among South African small to medium enterprises: A thematic analysis.
Electron. J. Inf. Syst. Dev. Ctries., 2022

The impact of financial deprivation on children's cybersecurity knowledge & abilities.
Educ. Inf. Technol., 2022

Crowdsourcing Quality Concerns: An Examination of Amazon's Mechanical Turk.
Proceedings of the SIGITE '22: The 23rd Annual Conference on Information Technology Education, Chicago, IL, USA, September 21, 2022

Cybersecurity Regrets: I've had a few.... Je Ne Regrette.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Fear might motivate secure password choices in the short term, but at what cost?
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass.
AIS Trans. Hum. Comput. Interact., December, 2021

The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
ACM Trans. Comput. Hum. Interact., 2021

The A-Z of cyber security.
Netw. Secur., 2021

Cyber security is a team effort.
Netw. Secur., 2021

Learning from the past.
Netw. Secur., 2021

The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor.
Inf. Comput. Secur., 2021

Accessible authentication: dyslexia and password strategies.
Inf. Comput. Secur., 2021

Scoping the ethical principles of cybersecurity fear appeals.
Ethics Inf. Technol., 2021

Cognitive function vs. accessible authentication: insights from dyslexia research.
Proceedings of the W4A '21: 18th Web for All Conference, 2021

Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

"I need to know I'm safe and protected and will check": Users Want Cues to Signal Data Custodians' Trustworthiness.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Accessible Cyber Security: The Next Frontier?
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Natural Language Processing Techniques to Reveal Human-Computer Interaction for Development Research Topics.
Proceedings of the icARTi '21: International Conference on Artificial Intelligence and its Applications, Virtual Event, Mauritius, December 9, 2021

Revealing the Cyber Security Non-Compliance "Attribution Gulf".
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
How to nudge in cyber security.
Netw. Secur., 2020

Balancing resistance and resilience.
Netw. Secur., 2020

Strong passwords can't keep children safe.
Netw. Secur., 2020

Age-appropriate password "best practice" ontologies for early educators and parents.
Int. J. Child Comput. Interact., 2020

Caveat Venditor, Used USB Drive Owner.
CoRR, 2020

2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying.
CoRR, 2020

Risk as affect: The affect heuristic in cybersecurity.
Comput. Secur., 2020

The privacy paradox applies to IoT devices too: A Saudi Arabian study.
Comput. Secur., 2020

Conducting.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Cyber Diplomacy: A Systematic Literature Review.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

Implement a Model for Describing and Maximising Security Knowledge Sharing.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Dyslexia and Password Usage: Accessibility in Authentication Design.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Encouraging password manager use.
Netw. Secur., 2019

Should we scare people into behaving securely?
Netw. Secur., 2019

The many faces of active cyber.
Netw. Secur., 2019

Refining the PoinTER "human firewall" pentesting framework.
Inf. Comput. Secur., 2019

Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset.
Int. J. Hum. Comput. Stud., 2019

A Framework for Interrogating Social Media Images to Reveal an Emergent Archive of War.
Int. J. Humanit. Arts Comput., 2019

"Passwords protect my stuff" - a study of children's password practices.
J. Cybersecur., 2019

"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords?
Comput. Secur., 2019

A Framework to Maximise the Communicative Power of Knowledge Visualisations.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019

Cyber security fear appeals: unexpectedly complicated.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}.
Proceedings of the Conference on Information Communications Technology and Society, 2019

Human-Computer Interaction for Development (HCI4D): The Southern African Landscape.
Proceedings of the Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D, 2019

An Investigation into the "Beautification" of Security Ceremonies.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness.
Proceedings of the Information Systems, 2019

"<i>I do it because they do it</i>": Social-Neutralisation in Information Security Practices of Saudi Medical Interns.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
A user by any other name.
Netw. Secur., 2018

GDPR: its time has come.
Netw. Secur., 2018

Cooking up security awareness & training.
Netw. Secur., 2018

Introduction to special issue on e-voting.
J. Inf. Secur. Appl., 2018

Ethical guidelines for nudging in information security & privacy.
Int. J. Hum. Comput. Stud., 2018

How to design browser security and privacy alerts.
CoRR, 2018

Is the responsibilization of the cyber security risk reasonable and judicious?
Comput. Secur., 2018

Developing and Evaluating a Five Minute Phishing Awareness Video.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Privacy in Crowdsourcing: A Systematic Review.
Proceedings of the Information Security - 21st International Conference, 2018

POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs).
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

A Systematic Review of Information Security Knowledge-Sharing Research.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

How to Make Privacy Policies both GDPR-Compliant and Usable.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

What Did I Really Vote For?
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018

2017
Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection.
South Afr. Comput. J., 2017

To phish, or not to phish...
Netw. Secur., 2017

It makes you Wanna Cry.
Netw. Secur., 2017

Facts do not change minds.
Netw. Secur., 2017

Webcam covering phenomenon.
Netw. Secur., 2017

Contemplating human-centred security & privacy research: Suggesting future directions.
J. Inf. Secur. Appl., 2017

Human-centred cyber security.
J. Inf. Secur. Appl., 2017

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
J. Inf. Secur. Appl., 2017

User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Comput. Secur., 2017

The role of knowledge visualisation in supporting postgraduate dissertation assessment.
Br. J. Educ. Technol., 2017

Charting the path towards effective knowledge visualisations.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2017

Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Enriched nudges lead to stronger password replacements ... but implement mindfully.
Proceedings of the 2017 Information Security for South Africa, 2017

Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Privacy of the Internet of Things: A Systematic Literature Review.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
No, users are not irrational.
Netw. Secur., 2016

Granny gets smarter but Junior hardly notices.
J. Community Informatics, 2016

A Framework for Information Security Governance and Management.
IT Prof., 2016

Spot the phish by checking the pruned URL.
Inf. Comput. Secur., 2016

Why don't UK citizens protest against privacy-invading dragnet surveillance?
Inf. Comput. Secur., 2016

Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion).
CoRR, 2016

An investigation into the usability of electronic voting systems for complex elections.
Ann. des Télécommunications, 2016

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016

Memorable and Secure: How Do You Choose Your PIN?.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

The Design and Evaluation of an Interactive Social Engineering Training Programme.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Why do People Adopt or Reject Smartphone Security Tools?
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Smartphone Owners Need Security Advice. How Can We Ensure They Get it?
Proceedings of the CONF-IRM 2016, 2016

Cybersecurity and the Unbearability of Uncertainty.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
SIGCAS Comput. Soc., 2015

Exploring mental models underlying PIN management strategies.
Proceedings of the 2015 World Congress on Internet Security, 2015

An ethnographic study to assess the enactment of information security culture in a retail store.
Proceedings of the 2015 World Congress on Internet Security, 2015

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

A Socio-Technical Investigation into Smartphone Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Alternative Authentication in the Wild.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

Blinkered Views of Out-Group Mobile Phone Usage: Moving Towards Less Stereotyping of "Others".
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015

Facilitating Knowledge Visualisation as Communication and Knowledge Transfer Mechanism in Postgraduate Learning.
Proceedings of the Mobile Learning Voyage - From Small Ripples to Massive Open Waters, 2015

Biometric identification: Are we ethically ready?
Proceedings of the 2015 Information Security for South Africa, 2015

Regulating Access to Adult Content (with Privacy Preservation).
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Deploying Design Science Research in Graduate Computing Studies in South Africa.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
How Helpful is Colour-Cueing of PIN Entry?
CoRR, 2014

An Investigation into the use of Images as Password Cues.
CoRR, 2014

Why Doesn't Jane Protect Her Privacy?
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Information security culture: A general living systems theory perspective.
Proceedings of the 2014 Information Security for South Africa, 2014

jCAPTCHA: Accessible Human Validation.
Proceedings of the Computers Helping People with Special Needs, 2014

ACCESS: Describing and Contrasting - Authentication Mechanisms.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Shake Hands to Bedevil: Securing Email with Wearable Technology.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

You Have Three Tries Before Lockout. Why Three?.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Implementation and evaluation of the EasyVote tallying component and ballot.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

Building castles in quicksand: blueprint for a crowdsourced study.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Teaching human-centered security using nontraditional techniques.
ACM Trans. Comput. Educ., 2013

Reporting on Accessibility Challenges Experienced by South Africa's Older Mobile Phone Users.
J. Community Informatics, 2013

SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems.
J. Artif. Soc. Soc. Simul., 2013

Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage.
Int. J. Cyber Warf. Terror., 2013

A framework for continuous, transparent mobile device authentication.
Comput. Secur., 2013

Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Introducing computing students to scientific experimentation.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

SNIPPET: Genuine knowledge-based authentication.
Proceedings of the 2013 Information Security for South Africa, 2013

Designing Mobile Phone Interfaces for Age Diversity in South Africa: "One-World" versus Diverse "Islands".
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Are Graphical Authentication Mechanisms As Strong As Passwords?
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Shrinking the Authentication Footprint.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
Proceedings of the Number Theory and Cryptography, 2013

2012
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches?
IEEE Secur. Priv., 2012

Using insights from email users to inform organisational email management policy.
Behav. Inf. Technol., 2012

Moses - method for selecting senior mobile phones: supporting design & choice for the elderly.
Proceedings of the 2012 South African Institute of Computer Scientists and Information Technologists Conference, 2012

You only live twice or "the years we wasted caring about shoulder-surfing".
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012

2011
In a world of their own: working on the move.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
Worth-centred mobile phone design for older users.
Univers. Access Inf. Soc., 2010

Invisible, Passive, Continuous and Multimodal Authentication.
Proceedings of the Mobile Social Signal Processing - First International Workshop, 2010

Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach.
Proceedings of the Information Security South Africa Conference 2010, 2010

Multi-channel, Multi-level Authentication for More Secure eBanking.
Proceedings of the Information Security South Africa Conference 2010, 2010

Pictures or questions?: examining user responses to association-based authentication.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

2009
On user involvement in production of images used in visual authentication.
J. Vis. Lang. Comput., 2009

A Mechanism for Filtering Distractors for Doodle Passwords.
Int. J. Pattern Recognit. Artif. Intell., 2009

Guidelines for designing graphical authentication mechanism interfaces.
Int. J. Inf. Comput. Secur., 2009

Visual passwords: cure-all or snake-oil?
Commun. ACM, 2009

Everyone Abandons - Eventually: Understanding the Online Shopping Experience.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Musipass: authenticating me softly with "my" song.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Armchair authentication.
Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 2009

2008
Feature - Think before you link: controlling ubiquitous availability.
Interactions, 2008

Don't do this - Pitfalls in using anti-patterns in teaching human-computer interaction principles.
Comput. Educ., 2008

Predicting technology acceptance and adoption by the elderly: a qualitative study.
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008

Mobile phone usage of young adults: the impact of motivational factors.
Proceedings of the 20th Australasian Computer-Human Interaction Conference, 2008

A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008

2007
DynaHand: Observation-resistant recognition-based web authentication.
IEEE Technol. Soc. Mag., 2007

A process for supporting risk-aware web authentication mechanism choice.
Reliab. Eng. Syst. Saf., 2007

The influence of self-esteem and locus of control on perceived email-related stress.
Comput. Hum. Behav., 2007

Now what was that password again? A more flexible way of identifying and authenticating our seniors.
Behav. Inf. Technol., 2007

Do We Practise What We Preach in Formulating Our Design and Development Methods?
Proceedings of the Engineering Interactive Systems - EIS 2007 Joint Working Conferences, 2007

You Know My 'Alter-Ego'--but You Don't Know Me!.
Proceedings of the Workshop Proceedings of the 24th British National Conference on Databases, 2007

2006
"You've Got E-Mail!" ... Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective.
Int. J. Hum. Comput. Interact., 2006

Question-based group authentication.
Proceedings of the 2006 Australasian Computer-Human Interaction Conference, 2006

What E-Grocery Customers really want: Personalised Personalisation.
Proceedings of the Fourth Latin American Web Congress (LA-Web 2006), 2006

2005
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems.
Int. J. Hum. Comput. Stud., 2005

A Visuo-Biometric Authentication Mechanism for Older Users.
Proceedings of the People and Computers XIX, 2005

2004
Quantification of Authentication Mechanisms: a Usability Perspective.
J. Web Eng., 2004

My password is here! An investigation into visuo-spatial authentication mechanisms.
Interact. Comput., 2004

Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware.
Proceedings of the Software Composition Workshop, 2004

Teaching SQL - Which Pedagogical Horse for This Course?
Proceedings of the Key Technologies for Data Management, 2004

2003
Algon: A Framework for Supporting Comparison of Distributed Algorithm Performance.
Proceedings of the 11th Euromicro Workshop on Parallel, 2003

Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Systems for Curriculum.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003

2002
Experience with statically-generated proxies for facilitating Java runtime specialisation.
IEE Proc. Softw., 2002

Composition of Distributed Software with Algon - Concepts and Possibilities.
Proceedings of the Workshop on Software Composition, 2002

2001
Teaching programming from a distance: problems and a proposed solution.
ACM SIGCSE Bull., 2001

Considering Possible Outcomes and the User's Environment in Designing User Interfaces for Data Intensive Systems.
Proceedings of the Second International Workshop on User Interfaces to Data Intensive Systems, 2001

JavaCloak: Reflecting on Java Typing for Class Reuse Using Proxies.
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001

A Mechanism for Evalutaing Feedback of e-Commerce Sites.
Proceedings of the Towards The E-Society: E-Commerce, 2001

Tailoring E-Commerce Sites to Ease Recovery after Disruptions.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
A generic feedback mechanism for component-based systems.
PhD thesis, 2000

Feedback in human-computer interaction - characteristics and recommendations.
South Afr. Comput. J., 2000

HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000

HERCULE : Non-invasively Tracking Java<sup>TM</sup> Component-Based Application Activity.
Proceedings of the ECOOP 2000, 2000

1999
An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems.
Proceedings of the 1999 User Interfaces to Data Intensive Systems, 1999

HERCULE: a framework for enhancing error reporting in component-based systems.
Proceedings of the Third International Enterprise Distributed Object Computing Conference, 1999


  Loading...