Lizzie Coles-Kemp
Orcid: 0000-0003-4143-2347Affiliations:
- Royal Holloway, University of London, UK
According to our database1,
Lizzie Coles-Kemp
authored at least 50 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
2022
SN Comput. Sci., 2022
Proc. ACM Hum. Comput. Interact., 2022
Designing Through The Stack: The Case for a Participatory Digital Security By Design.
Proceedings of the 2022 New Security Paradigms Workshop, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2020
Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity.
Proc. ACM Hum. Comput. Interact., 2020
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators.
Trans. Edutainment, 2019
Interactions, 2019
The significance of securing as a critical component of information security: An Australian narrative.
Comput. Secur., 2019
Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Comput. Law Secur. Rev., 2016
2015
J. Cybersecur., 2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Information Presentation: Considering On-line User Confidence for Effective Engagement.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Proceedings of the UKAIS 2014, 2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
Who says personas can't dance?: the use of comic strips to design information security personas.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the Information Security and Privacy Research, 2012
2011
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud.
Inf. Secur. Tech. Rep., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices.
Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams.
Proceedings of the CSEDU 2011, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
2009
Inf. Secur. Tech. Rep., 2009
2008
2007
J. Comput. Virol., 2007
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
Proceedings of the 2007 International Conference on Security & Management, 2007