
Karen Renaud
Karen Vera Renaud
Person information
- affiliation: University of Glasgow, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j64]Paul van Schaik
, Karen Renaud
, Christopher Wilson
, Jurjen Jansen, Joseph A. Onibokun:
Risk as affect: The affect heuristic in cybersecurity. Comput. Secur. 90: 101651 (2020) - [j63]Noura Aleisa, Karen Renaud
, Ivano Bongiovanni
:
The privacy paradox applies to IoT devices too: A Saudi Arabian study. Comput. Secur. 96: 101897 (2020) - [j62]Suzanne Prior, Karen Renaud
:
Age-appropriate password "best practice" ontologies for early educators and parents. Int. J. Child Comput. Interact. 23-24: 100169 (2020) - [j61]Karen Renaud:
Strong passwords can't keep children safe. Netw. Secur. 2020(3): 20 (2020) - [j60]Karen Renaud, Zinaida Benenson, Daniela Oliveira:
Balancing resistance and resilience. Netw. Secur. 2020(7): 20 (2020) - [j59]Karen Renaud, Verena Zimmermann:
How to nudge in cyber security. Netw. Secur. 2020(11): 20 (2020) - [c93]Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. Financial Cryptography Workshops 2020: 291-309 - [c92]Esra Alkhamis, Helen Petrie
, Karen Renaud:
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children. HAISA 2020: 123-132 - [c91]Karen Renaud, Graham Johnson
, Jacques Ophoff
:
Dyslexia and Password Usage: Accessibility in Authentication Design. HAISA 2020: 259-268 - [c90]Amel Attatfa, Karen Renaud, Stefano De Paoli:
Cyber Diplomacy: A Systematic Literature Review. KES 2020: 60-69 - [c89]Marc J. Dupuis, Karen Renaud:
Conducting. SIGITE 2020: 320-323 - [i9]Karen Renaud, Paul van Schaik, Alastair Irons, Sara Wilford:
2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying. CoRR abs/2006.06340 (2020) - [i8]James Conacher, Karen Renaud, Jacques Ophoff:
Caveat Venditor, Used USB Drive Owner. CoRR abs/2006.11354 (2020)
2010 – 2019
- 2019
- [j58]Karen Renaud
, Robert F. Otondo
, Merrill Warkentin
:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Comput. Secur. 82: 241-260 (2019) - [j57]Yee-Yin Choong
, Mary Frances Theofanos, Karen Renaud, Suzanne Prior:
"Passwords protect my stuff" - a study of children's password practices. J. Cybersecur. 5(1): tyz015 (2019) - [j56]Arijus Pleska, Andrew Hoskins, Karen Renaud:
A Framework for Interrogating Social Media Images to Reveal an Emergent Archive of War. Int. J. Humanit. Arts Comput. 13(1-2): 196-222 (2019) - [j55]Verena Zimmermann, Karen Renaud
:
Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset. Int. J. Hum. Comput. Stud. 131: 169-187 (2019) - [j54]Jacqueline M. Archibald, Karen Renaud:
Refining the PoinTER "human firewall" pentesting framework. Inf. Comput. Secur. 27(4) (2019) - [j53]Ganna Pogrebna, Karen Renaud, Boris Taratine:
The many faces of active cyber. Netw. Secur. 2019(2): 20 (2019) - [j52]Karen Renaud, Verena Zimmermann:
Encouraging password manager use. Netw. Secur. 2019(6): 20 (2019) - [j51]Karen Renaud, Marc J. Dupuis:
Should we scare people into behaving securely? Netw. Secur. 2019(11): 20 (2019) - [c88]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. EMCIS 2019: 376-390 - [c87]Nora Alkaldi, Karen Renaud:
Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs. HICSS 2019: 1-10 - [c86]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c85]Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. ICETE (2) 2019: 125-136 - [c84]Judy van Biljon
, Karen Renaud
:
Human-Computer Interaction for Development (HCI4D): The Southern African Landscape. ICT4D (2) 2019: 253-266 - [c83]Oksana Kulyk, Jan Henzel, Karen Renaud, Melanie Volkamer:
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations. INTERACT (1) 2019: 519-538 - [c82]Karen Renaud, Marc J. Dupuis:
Cyber security fear appeals: unexpectedly complicated. NSPW 2019: 42-56 - [c81]Karen Renaud, Judy van Biljon:
A Framework to Maximise the Communicative Power of Knowledge Visualisations. SAICSIT 2019: 2:1-2:10 - 2018
- [j50]Karen Renaud
, Stephen Flowerday
, Merrill Warkentin
, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [j49]Karen Renaud
, Verena Zimmermann:
Ethical guidelines for nudging in information security & privacy. Int. J. Hum. Comput. Stud. 120: 22-35 (2018) - [j48]Jurlind Budurushi, Stephan Neumann, Karen Renaud, Melanie Volkamer:
Introduction to special issue on e-voting. J. Inf. Secur. Appl. 38: 122-123 (2018) - [j47]Karen Renaud, Lynsay A. Shepherd
:
GDPR: its time has come. Netw. Secur. 2018(2): 20 (2018) - [j46]Karen Renaud:
Cooking up security awareness & training. Netw. Secur. 2018(5): 20 (2018) - [j45]Karen Renaud, Verena Zimmermann:
A user by any other name. Netw. Secur. 2018(9): 20 (2018) - [c80]Judy van Biljon
, Karen Renaud, Bester Chimbo:
Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation. AfriCHI 2018: 48:1-48:2 - [c79]Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer:
What Did I Really Vote For? CHI 2018: 176 - [c78]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CyberSA 2018: 1-8 - [c77]Merrill Warkentin, Sanjay Goel, Kevin J. Williams, Karen Renaud:
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS 2018: 25 - [c76]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Systematic Review of Information Security Knowledge-Sharing Research. HAISA 2018: 101-110 - [c75]Jacqueline Archibald, Karen Renaud:
POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs). HAISA 2018: 147-157 - [c74]Abdulwhab Alkharashi, Karen Renaud:
Privacy in Crowdsourcing: A Systematic Review. ISC 2018: 387-400 - [c73]Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Security Symposium 2018: 1-11 - [c72]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - [i7]Lynsay A. Shepherd, Karen Renaud:
How to design browser security and privacy alerts. CoRR abs/1806.05426 (2018) - [i6]Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. CoRR abs/1806.06670 (2018) - 2017
- [j44]Karen Renaud, Judy van Biljon
:
The role of knowledge visualisation in supporting postgraduate dissertation assessment. Br. J. Educ. Technol. 48(6): 1475-1490 (2017) - [j43]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Alexandra Kunz:
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Comput. Secur. 71: 100-113 (2017) - [j42]Karen Renaud, Stephen Flowerday:
Human-centred cyber security. J. Inf. Secur. Appl. 34: 1 (2017) - [j41]Paul Gerber, Melanie Volkamer, Karen Renaud:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. J. Inf. Secur. Appl. 34: 8-26 (2017) - [j40]Karen Renaud, Stephen Flowerday:
Contemplating human-centred security & privacy research: Suggesting future directions. J. Inf. Secur. Appl. 34: 76-81 (2017) - [j39]Karen Renaud:
Webcam covering phenomenon. Netw. Secur. 2017(1): 20 (2017) - [j38]Karen Renaud:
Facts do not change minds. Netw. Secur. 2017(4): 20 (2017) - [j37]Karen Renaud:
It makes you Wanna Cry. Netw. Secur. 2017(7): 20 (2017) - [j36]Karen Renaud, Gareth Renaud:
To phish, or not to phish... Netw. Secur. 2017(10): 20 (2017) - [j35]Karen Vera Renaud, Judy van Biljon:
Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection. South Afr. Comput. J. 29(3) (2017) - [c71]Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. HCI (22) 2017: 656-674 - [c70]Noura Aleisa, Karen Renaud:
Privacy of the Internet of Things: A Systematic Literature Review. HICSS 2017: 1-10 - [c69]Noura Aleisa, Karen Renaud:
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. IoTBDS 2017: 198-205 - [c68]Karen Renaud, Verena Zimmermann:
Enriched nudges lead to stronger password replacements ... but implement mindfully. ISSA 2017: 1-9 - [c67]Karen Renaud, Merrill Warkentin:
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW 2017: 57-69 - [c66]Karen Renaud, Judy van Biljon
:
Charting the path towards effective knowledge visualisations. SAICSIT 2017: 30:1-30:10 - 2016
- [j34]Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide:
An investigation into the usability of electronic voting systems for complex elections. Ann. des Télécommunications 71(7-8): 309-322 (2016) - [j33]Melanie Volkamer, Karen Renaud, Paul Gerber:
Spot the phish by checking the pruned URL. Inf. Comput. Secur. 24(4): 372-385 (2016) - [j32]Karen Renaud, Stephen Flowerday
, Rosanne English, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? Inf. Comput. Secur. 24(4): 400-415 (2016) - [j31]Marian Carcary, Karen Renaud, Stephen McLaughlin, Conor O'Brien:
A Framework for Information Security Governance and Management. IT Prof. 18(2): 22-30 (2016) - [j30]Isabella Margarethe Venter, Karen Renaud, Rénette J. Blignaut:
Granny gets smarter but Junior hardly notices. J. Community Informatics 12(3) (2016) - [j29]Karen Renaud:
No, users are not irrational. Netw. Secur. 2016(11): 20 (2016) - [c65]Karen Renaud, George R. S. Weir:
Cybersecurity and the Unbearability of Uncertainty. CCC 2016: 137-143 - [c64]Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir:
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. CCC 2016: 144-150 - [c63]Karen Renaud, Rénette J. Blignaut, Isabella Margarethe Venter:
Smartphone Owners Need Security Advice. How Can We Ensure They Get it? CONF-IRM 2016: 20 - [c62]Andreas Gutmann, Karen Renaud, Joseph Maguire
, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [c61]Esra Alkhamis, Karen Renaud:
The Design and Evaluation of an Interactive Social Engineering Training Programme. HAISA 2016: 125-134 - [c60]Nora Alkaldi, Karen Renaud:
Why do People Adopt or Reject Smartphone Security Tools? HAISA 2016: 135-144 - [c59]Andreas Gutmann, Melanie Volkamer, Karen Renaud:
Memorable and Secure: How Do You Choose Your PIN?. HAISA 2016: 156-166 - [c58]Judy van Biljon
, Karen Renaud:
Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country. SAICSIT 2016: 44:1-44:10 - [c57]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. SEC 2016: 161-175 - [i5]Joseph Maguire, Karen Renaud:
Alternative Authentication in the Wild. CoRR abs/1601.05483 (2016) - [i4]Noura Aleisa, Karen Renaud:
Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion). CoRR abs/1611.03340 (2016) - 2015
- [j28]Paul Gerber, Melanie Volkamer, Karen Renaud:
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy. SIGCAS Comput. Soc. 45(1): 16-21 (2015) - [c56]Shana Ponelis, Karen Renaud, Isabella Margarethe Venter, Retha de la Harpe:
Deploying Design Science Research in Graduate Computing Studies in South Africa. AMCIS 2015 - [c55]Karen Renaud, Joseph Maguire
:
Regulating Access to Adult Content (with Privacy Preservation). CHI 2015: 4019-4028 - [c54]Karen Renaud, Andrew Hoskins
, Rossouw von Solms:
Biometric identification: Are we ethically ready? ISSA 2015: 1-8 - [c53]Judy van Biljon
, Karen Renaud:
Facilitating Knowledge Visualisation as Communication and Knowledge Transfer Mechanism in Postgraduate Learning. mLearn 2015: 156-171 - [c52]Isabella Margarethe Venter, Rénette J. Blignaut, Karen Renaud:
Blinkered Views of Out-Group Mobile Phone Usage: Moving Towards Less Stereotyping of "Others". SAICSIT 2015: 37:1-37:9 - [c51]Joseph Maguire
, Karen Renaud:
Alternative Authentication in the Wild. STAST 2015: 32-39 - [c50]Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. STM 2015: 265-273 - [c49]Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015: 104-122 - [c48]Karen Renaud, Melanie Volkamer:
Exploring mental models underlying PIN management strategies. WorldCIS 2015: 18-23 - [c47]Andrews Greig, Karen Renaud, Stephen Flowerday:
An ethnographic study to assess the enactment of information security culture in a retail store. WorldCIS 2015: 61-66 - [i3]Joseph Maguire, Karen Renaud:
You Only Live Twice or "The Years We Wasted Caring about Shoulder-Surfing". CoRR abs/1508.05626 (2015) - 2014
- [c46]Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud:
Building castles in quicksand: blueprint for a crowdsourced study. CHI Extended Abstracts 2014: 643-652 - [c45]Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer:
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both? EGOVIS 2014: 246-260 - [c44]Jurlind Budurushi, Melanie Volkamer, Karen Renaud, Marcel Woide:
Implementation and evaluation of the EasyVote tallying component and ballot. EVOTE 2014: 1-8 - [c43]Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud:
Shake Hands to Bedevil: Securing Email with Wearable Technology. HAISA 2014: 90-100 - [c42]Karen Renaud, Rosanne English, Thomas Wynne, Florian Weber:
You Have Three Tries Before Lockout. Why Three?. HAISA 2014: 101-111 - [c41]Karen Renaud, Melanie Volkamer, Joseph Maguire:
ACCESS: Describing and Contrasting - Authentication Mechanisms. HCI (24) 2014: 183-194 - [c40]Karen Renaud, Wendy Goucher:
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture. HCI (24) 2014: 361-372 - [c39]Matthew Davidson, Karen Renaud, Shujun Li
:
jCAPTCHA: Accessible Human Validation. ICCHP (1) 2014: 129-136 - [c38]Rayne Reid, Johan Van Niekerk, Karen Renaud:
Information security culture: A general living systems theory perspective. ISSA 2014: 1-8 - [c37]Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos:
Why Doesn't Jane Protect Her Privacy? Privacy Enhancing Technologies 2014: 244-262 - [i2]Tony McBryan, Karen Renaud, J. Paul Siebert:
An Investigation into the use of Images as Password Cues. CoRR abs/1407.8004 (2014) - [i1]Karen Renaud, Judith Ramsay:
How Helpful is Colour-Cueing of PIN Entry? CoRR abs/1407.8007 (2014) - 2013
- [j27]Heather Crawford
, Karen Renaud, Tim Storer:
A framework for continuous, transparent mobile device authentication. Comput. Secur. 39: 127-136 (2013) - [j26]Karen Renaud, Wendy Goucher:
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage. Int. J. Cyber Warf. Terror. 3(4): 40-51 (2013) - [j25]Karen Renaud, Lewis Mackenzie:
SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems. J. Artif. Soc. Soc. Simul. 16(3) (2013) - [j24]Judy van Biljon, Karen Renaud, Tobie van Dyk:
Reporting on Accessibility Challenges Experienced by South Africa's Older Mobile Phone Users. J. Community Informatics 9(4) (2013) - [j23]Karen Renaud, Quintin I. Cutts:
Teaching human-centered security using nontraditional techniques. ACM Trans. Comput. Educ. 13(3): 11:1-11:23 (2013) - [c36]Melanie Volkamer, Karen Renaud:
Mental Models - General Introduction and Review of Their Application to Human-Centred Security. Number Theory and Cryptography 2013: 255-280 - [c35]Karen Renaud, Joe Maguire:
Shrinking the Authentication Footprint. EISMC 2013: 2-11 - [c34]Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire:
Are Graphical Authentication Mechanisms As Strong As Passwords? FedCSIS 2013: 837-844 - [c33]Karen Renaud, Rénette J. Blignaut, Isabella Margarethe Venter:
Designing Mobile Phone Interfaces for Age Diversity in South Africa: "One-World" versus Diverse "Islands". INTERACT (3) 2013: 1-17 - [c32]Karen Renaud, Demetris Kennes, Johan Van Niekerk, Joe Maguire
:
SNIPPET: Genuine knowledge-based authentication. ISSA 2013: 1-8 - [c31]Karen Renaud:
Introducing computing students to scientific experimentation. ITiCSE 2013: 76-81 - [c30]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs
, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - 2012
- [j22]Judith Ramsay, Karen Renaud:
Using insights from email users to inform organisational email management policy. Behav. Inf. Technol. 31(6): 587-603 (2012) - [j21]Karen Renaud:
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches? IEEE Secur. Priv. 10(3): 57-63 (2012) - [c29]Joseph Maguire, Karen Renaud:
You only live twice or "the years we wasted caring about shoulder-surfing". BCS HCI 2012: 404-409 - [c28]Tobie van Dyk, Karen Renaud, Judy van Biljon
:
Moses - method for selecting senior mobile phones: supporting design & choice for the elderly. SAICSIT 2012: 277-285 - 2011
- [c27]Wendy Goucher, Karen Renaud:
In a world of their own: working on the move. BCS HCI 2011: 461-466 - 2010
- [j20]Karen Renaud, Judy van Biljon
:
Worth-centred mobile phone design for older users. Univers. Access Inf. Soc. 9(4): 387-403 (2010) - [c26]Karen Renaud, Mike Just:
Pictures or questions?: examining user responses to association-based authentication. BCS HCI 2010: 98-107 - [c25]Mohamed Al Fairuz, Karen Renaud:
Multi-channel, Multi-level Authentication for More Secure eBanking. ISSA 2010 - [c24]Karen Renaud, Dora Galvez-Cruz:
Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach. ISSA 2010 - [c23]Karen Renaud, Heather Crawford
:
Invisible, Passive, Continuous and Multimodal Authentication. MSSP 2010: 34-41
2000 – 2009
- 2009
- [j19]Karen Renaud, Antonella De Angeli:
Visual passwords: cure-all or snake-oil? Commun. ACM 52(12): 135-140 (2009) - [j18]Karen Renaud:
Guidelines for designing graphical authentication mechanism interfaces. Int. J. Inf. Comput. Secur. 3(1): 60-85 (2009) - [j17]Ron Poet, Karen Renaud:
A Mechanism for Filtering Distractors for Doodle Passwords. Int. J. Pattern Recognit. Artif. Intell. 23(5): 1005-1029 (2009) - [j16]Karen Renaud:
On user involvement in production of images used in visual authentication. J. Vis. Lang. Comput. 20(1): 1-15 (2009) - [c22]Karen Renaud, Joseph Maguire:
Armchair authentication. BCS HCI 2009: 388-397 - [c21]Marcia Gibson
, Karen Renaud, Marc Conrad, Carsten Maple:
Musipass: authenticating me softly with "my" song. NSPW 2009: 85-100 - [c20]Karen Renaud, Tunde Cockshott, Mario Hair:
Everyone Abandons - Eventually: Understanding the Online Shopping Experience. CEC 2009: 245-251 - 2008
- [j15]Paula Kotzé, Karen Renaud, Judy van Biljon
:
Don't do this - Pitfalls in using anti-patterns in teaching human-computer interaction principles. Comput. Educ. 50(3): 979-1008 (2008) - [j14]Karen Renaud, Judith Ramsay, Mario Hair:
Feature - Think before you link: controlling ubiquitous availability. Interactions 15(6): 65-68 (2008) - [c19]