Karen Renaud
Orcid: 0000-0002-7187-6531Affiliations:
- University of Strathclyde, Department of Computer and Information Sciences, UK
- Rhodes University, Grahamstown, South Africa
- University of South Africa, Pretoria, South Africa
- University of Glasgow, UK (former)
According to our database1,
Karen Renaud
authored at least 223 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on youtube.com
-
on linkedin.com
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Inf. Manag., January, 2024
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing.
Inf. Comput. Secur., 2024
IEEE Secur. Priv., 2024
Proceedings of the Mensch und Computer 2024, 2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
2023
J. Syst. Softw., June, 2023
Future Internet, May, 2023
Hybrid password meters for more secure passwords - a comprehensive study of password meters including nudges and password information.
Behav. Inf. Technol., April, 2023
Moving beyond cyber security awareness and training to engendering security knowledge sharing.
Inf. Syst. E Bus. Manag., March, 2023
Inf. Comput. Secur., 2023
Comput. Secur., 2023
'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach.
Proceedings of the 2023 New Security Paradigms Workshop, 2023
Universal Design for Website Authentication: Views and Experiences of Senior Citizens.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023).
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the 2023 European Symposium on Usable Security, 2023
2022
ACM SIGMIS Database, January, 2022
SN Comput. Sci., 2022
Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021).
ACM SIGSOFT Softw. Eng. Notes, 2022
A quantification mechanism for assessing adherence to information security governance guidelines.
Inf. Comput. Secur., 2022
Electron. J. Inf. Syst. Dev. Ctries., 2022
The challenges of cloud adoption among South African small to medium enterprises: A thematic analysis.
Electron. J. Inf. Syst. Dev. Ctries., 2022
The impact of financial deprivation on children's cybersecurity knowledge & abilities.
Educ. Inf. Technol., 2022
Proceedings of the SIGITE '22: The 23rd Annual Conference on Information Technology Education, Chicago, IL, USA, September 21, 2022
Proceedings of the 2022 New Security Paradigms Workshop, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass.
AIS Trans. Hum. Comput. Interact., December, 2021
ACM Trans. Comput. Hum. Interact., 2021
The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor.
Inf. Comput. Secur., 2021
Inf. Comput. Secur., 2021
Ethics Inf. Technol., 2021
Proceedings of the W4A '21: 18th Web for All Conference, 2021
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021
Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021
"I need to know I'm safe and protected and will check": Users Want Cues to Signal Data Custodians' Trustworthiness.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Natural Language Processing Techniques to Reveal Human-Computer Interaction for Development Research Topics.
Proceedings of the icARTi '21: International Conference on Artificial Intelligence and its Applications, Virtual Event, Mauritius, December 9, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Int. J. Child Comput. Interact., 2020
CoRR, 2020
Comput. Secur., 2020
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Proceedings of the Human Aspects of Information Security and Assurance, 2020
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Inf. Comput. Secur., 2019
Int. J. Hum. Comput. Stud., 2019
A Framework for Interrogating Social Media Images to Reveal an Emergent Archive of War.
Int. J. Humanit. Arts Comput., 2019
J. Cybersecur., 2019
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords?
Comput. Secur., 2019
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019
Proceedings of the Conference on Information Communications Technology and Society, 2019
Proceedings of the Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness.
Proceedings of the Information Systems, 2019
"<i>I do it because they do it</i>": Social-Neutralisation in Information Security Practices of Saudi Medical Interns.
Proceedings of the Risks and Security of Internet and Systems, 2019
2018
Int. J. Hum. Comput. Stud., 2018
Comput. Secur., 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018
2017
South Afr. Comput. J., 2017
Contemplating human-centred security & privacy research: Suggesting future directions.
J. Inf. Secur. Appl., 2017
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
J. Inf. Secur. Appl., 2017
Comput. Secur., 2017
The role of knowledge visualisation in supporting postgraduate dissertation assessment.
Br. J. Educ. Technol., 2017
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2017
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the 2017 Information Security for South Africa, 2017
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions.
Proceedings of the 2nd International Conference on Internet of Things, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Inf. Comput. Secur., 2016
Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion).
CoRR, 2016
An investigation into the usability of electronic voting systems for complex elections.
Ann. des Télécommunications, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the CONF-IRM 2016, 2016
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016
2015
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
SIGCAS Comput. Soc., 2015
Proceedings of the 2015 World Congress on Internet Security, 2015
An ethnographic study to assess the enactment of information security culture in a retail store.
Proceedings of the 2015 World Congress on Internet Security, 2015
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015
Blinkered Views of Out-Group Mobile Phone Usage: Moving Towards Less Stereotyping of "Others".
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015
Facilitating Knowledge Visualisation as Communication and Knowledge Transfer Mechanism in Postgraduate Learning.
Proceedings of the Mobile Learning Voyage - From Small Ripples to Massive Open Waters, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the Computers Helping People with Special Needs, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
ACM Trans. Comput. Educ., 2013
Reporting on Accessibility Challenges Experienced by South Africa's Older Mobile Phone Users.
J. Community Informatics, 2013
SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems.
J. Artif. Soc. Soc. Simul., 2013
Int. J. Cyber Warf. Terror., 2013
Comput. Secur., 2013
Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Designing Mobile Phone Interfaces for Age Diversity in South Africa: "One-World" versus Diverse "Islands".
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
Proceedings of the Number Theory and Cryptography, 2013
2012
IEEE Secur. Priv., 2012
Behav. Inf. Technol., 2012
Moses - method for selecting senior mobile phones: supporting design & choice for the elderly.
Proceedings of the 2012 South African Institute of Computer Scientists and Information Technologists Conference, 2012
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012
2011
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011
2010
Proceedings of the Mobile Social Signal Processing - First International Workshop, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Pictures or questions?: examining user responses to association-based authentication.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010
2009
J. Vis. Lang. Comput., 2009
Int. J. Pattern Recognit. Artif. Intell., 2009
Int. J. Inf. Comput. Secur., 2009
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 2009
2008
Interactions, 2008
Don't do this - Pitfalls in using anti-patterns in teaching human-computer interaction principles.
Comput. Educ., 2008
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
Proceedings of the 20th Australasian Computer-Human Interaction Conference, 2008
A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008
2007
IEEE Technol. Soc. Mag., 2007
Reliab. Eng. Syst. Saf., 2007
Comput. Hum. Behav., 2007
Now what was that password again? A more flexible way of identifying and authenticating our seniors.
Behav. Inf. Technol., 2007
Proceedings of the Engineering Interactive Systems - EIS 2007 Joint Working Conferences, 2007
Proceedings of the Workshop Proceedings of the 24th British National Conference on Databases, 2007
2006
"You've Got E-Mail!" ... Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective.
Int. J. Hum. Comput. Interact., 2006
Proceedings of the 2006 Australasian Computer-Human Interaction Conference, 2006
Proceedings of the Fourth Latin American Web Congress (LA-Web 2006), 2006
2005
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems.
Int. J. Hum. Comput. Stud., 2005
Proceedings of the People and Computers XIX, 2005
2004
J. Web Eng., 2004
Interact. Comput., 2004
Proceedings of the Software Composition Workshop, 2004
Proceedings of the Key Technologies for Data Management, 2004
2003
Proceedings of the 11th Euromicro Workshop on Parallel, 2003
Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Systems for Curriculum.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003
2002
Experience with statically-generated proxies for facilitating Java runtime specialisation.
IEE Proc. Softw., 2002
Proceedings of the Workshop on Software Composition, 2002
2001
ACM SIGCSE Bull., 2001
Considering Possible Outcomes and the User's Environment in Designing User Interfaces for Data Intensive Systems.
Proceedings of the Second International Workshop on User Interfaces to Data Intensive Systems, 2001
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001
Proceedings of the Towards The E-Society: E-Commerce, 2001
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001
2000
South Afr. Comput. J., 2000
HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000
HERCULE : Non-invasively Tracking Java<sup>TM</sup> Component-Based Application Activity.
Proceedings of the ECOOP 2000, 2000
1999
An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems.
Proceedings of the 1999 User Interfaces to Data Intensive Systems, 1999
Proceedings of the Third International Enterprise Distributed Object Computing Conference, 1999