Dr Karen Renaud

Karen Renaud
  • Senior Lecturer (Computing Science)

telephone: 01413302052
email: Karen.Renaud@glasgow.ac.uk


Personal site: http://www.dcs.gla.ac.uk/~karen/

Biography:
Karen Renaud is a graduate of the Universities of Pretoria, South Africa and Glasgow. Her main research interest is Usable Security. She publishes widely in this area and collaborates with academics in the UK, South Africa and Canada. She also has interests in email usage in organisations, electronic voting and technology acceptance, specifically with respect to learning support systems.

Research Interests:
- Usability of Security Systems
- Graphical Authentication Mechanisms
- Security and Email Acceptable Use Policies
- The use of technology in organisations
- Electronic Voting
- Privacy

Jump to: 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001
Number of items: 47.

2013

Cockshott, W.P., and Renaud, K. (2013) Information technology: gateway to direct democracy in China and the world. International Critical Thought, 3 (1). pp. 76-97. ISSN 2159-8282 (doi:10.1080/21598282.2013.761448)

Renaud, K., and Cutts, Q. (2013) Teaching human-centred security using non-traditional techniques. Transactions on Computer Education . ISSN 1946-6226 (In Press)

Renaud, K., and Mackenzie, L. (2013) SimPass: quantifying the impact of password behaviours and policy directives on an organisation's systems. Journal of Artificial Societies and Social Simulation . ISSN 1460-7425 (In Press)

2012

Storer, T., Renaud, K., and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, 9-10 Jul 2012, Abingdon, Oxfordshire, UK.

Ramsay, J., and Renaud, K. (2012) Using insights from email users to inform organisational email management policy. Behaviour and Information Technology, 31 (6). pp. 587-603. ISSN 0144-929X (doi:10.1080/0144929X.2010.517271)

Muller, H., van Biljon, J., and Renaud, K. (2012) Information visualization in research reporting: guidelines for representing quantitative data. In: Southern African Computer Lecturers Association (SACLA) Conference, 1-3 July 2012, Thaba Nchu, SA.

Murray, D., and Renaud, K. (2012) Privacy and the citizen. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann, Waltham, MA. ISBN 9780123910639

Ordean, M., and Renaud, K. (2012) Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. In: 8th IEEE International Conference on Intelligent Computer Communication and Processing, 30 Aug - 1 Sept 2012, Cluj-Napoca, Romania.

Renaud, K. (2012) Blaming noncompliance is too convenient: What really causes information breaches? IEEE Security and Privacy Magazine, 10 (3). pp. 57-63. ISSN 1540-7993 (doi:10.1109/MSP.2011.157)

Renaud, K. (2012) User issues in security. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann, Waltham, MA. ISBN 9780123910639

Renaud, K., and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, 12-14 Sept 2012, Birmingham, UK.

van Dyk, T., Renaud, K., and van Biljon Moses, J. (2012) Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly. In: SAICSIT 2012, 1 – 3 Oct 2012, Centurion, Tshwane, SA.

2011

Goucher, W., and Renaud, K. (2011) In a world of their own: working on the move. In: The 25th BCS Conference on Human Computer Interaction, 4-8 Jul 2011, Newcastle Upon Tyne, UK.

2010

Renaud, K., and Just, M. (2010) Pictures or questions? Examining user responses to association-based authentication. In: HCI 2010 The 24th BCS Conference on Human Computer Interaction, 6th-10th September 2010, University of Abertay, Dundee. (Unpublished)

Cockshott, P., and Renaud, K. (2010) Extending handivote to handle digital economic decisions. In: ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, 14-16 April 2010, Edinburgh, UK.

Gibson, M., Conrad, M., Maple, C., and Renaud, K. (2010) Accessible and secure? Design constraints on image and sound based passwords. In: The International Conference on Information Society (i-society 2010), 28-30 Jun 2010, London, UK.

Renaud, K., and van Biljon, J. (2010) Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9 (4). pp. 387-403. ISSN 1615-5297 (doi:10.1007/s10209-009-0177-9)

2009

Renaud, K. (2009) On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing, 20 (1). pp. 1-15. ISSN 1045-926X (doi:10.1016/j.jvlc.2008.04.001)

Cockshott, W.P., and Renaud, K. (2009) HandiVote: simple, anonymous, and auditable electronic voting. Journal of Information Technology and Politics, 6 (1). pp. 60-80. ISSN 1933-1681 (doi:10.1080/19331680802668102 )

Gibson, M., Renaud, K., Conrad, M., and Maple, C. (2009) Musipass: authenticating me softly with "my" song. In: New Security Paradigms Workshop 2009, 8-11 Sep 2009, Oxford, UK.

Poet, R., and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Open Ergonomics Journal, 2 . pp. 178-184.

Poet, R., and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23 (5). pp. 1005-1029. (doi:10.1142/S0218001409007430)

Renaud, K. (2009) Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3 (1). pp. 60-85. ISSN 1744-1765 (doi:10.1504/IJICS.2009.026621)

Renaud, K. (2009) Web authentication using Mikon images. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, 25-27 Aug 2009, Saint John, NB, Canada.

Renaud, K., Cockshott, T., and Hair, M. (2009) Everyone Abandons - Eventually: Understanding the Online Shopping Experience. In: 11th IEEE Conference on Commerce and Enterprise Computing, 20-23 July 2009, Vienna, Austria. .

Renaud, K., and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, 1-5 Sep 2009, Cambridge, UK.

Van Biljon, J., and Renaud, K. (2009) Distance education as enabler in crossing the digital divide: will the phoenix fly? In: 3rd International Development Informatics Association Conference, 28-30 Oct 2009, Kruger National Park, South Africa.

2008

Ramsay, J., Renaud, K., Hair, M., and Saddique, S. (2008) Having it all: how students combine traditional and digitally mediated communication. In: IADIS International Conference Web Based Communities 2008, 24-26 Jul 2008, Amsterdam, The Netherlands.

Renaud, K., and Van Biljon, J. (2008) Predicting technology acceptance and adoption by the elderly: a qualitative study. In: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, 6-8 Oct 2008, Wilderness, South Africa.

Van Biljon, J., and Renaud, K. (2008) A qualitative study of the applicability of technology acceptance models to senior mobile phone users. In: International Workshop on Modeling Mobile Applications and Services , 20-23 Oct 2008, Barcelona, Spain.

2007

Hair, M, Renaud, KV, and Ramsay, J (2007) The influence of self-esteem and locus of control on perceived email-related stress. Computers in Human Behavior, 23 . pp. 2791-2803. (doi:10.1016/j.chb.2006.05.005)

Poet, R., and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), 11-14 Nov 2007, Melbourne, Australia.

Renaud, K (2007) Don't do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers and Education .

Renaud, K, and Olsen, ES (2007) DynaHand: Observation-resistant recognition-based web authentication. IEEE Technology and Society Magazine, 26 . pp. 22-31.

Renaud, K, and Ramsay, J (2007) Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour and Information Technology, 26 . pp. 309-322. (doi:10.1080/01449290601173770)

Renaud, K. (2007) You've got email. Shall I deal with it now? International Journal of Human-Computer Interaction . pp. 313-332.

Renaud, K., and Cockshott, W.P. (2007) Electronic plebiscites. In: MeTTeG07, 27-28 September 2007, Camerino.

2006

Renaud, K (2006) A Process for Supporting Risk-Aware Web Authentication Mechanism Choice. Reliability Engineering and System Safety .

Renaud, K., Ramsay, J., and Hair, M. (2006) "You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective. International Journal of Human-Computer Interaction , 21 . pp. 313-332.

2005

De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63 . pp. 128-152. ISSN 1071-5819 (doi:10.1016/j.ijhcs.2005.04.020)

2004

Renaud, K. (2004) Quantifying the quality of web authentication mechanisms. Journal of Web Engineering, 3 (2). pp. 95-123. ISSN 1540-9589

Renaud, K, and van Biljon, J (2004) Teaching SQL - Which pedagogical horse for this course? Key Technologies For Data Management, 3112 . pp. 244-256.

Renaud, K., and De Angeli, A. (2004) My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with Computers, 16 . pp. 1017-1041. ISSN 0953-5438 (doi:10.1016/j.intcom.2004.06.012)

2003

Renaud, K., Lo, J., Bishop, J., Zyl, P.v., and Worrall, B. (2003) Algon: a framework for supporting comparison of distributed algorithm performance. In: Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, 5-7 Febuary 2003, Genova, Italy.

2002

Renaud, K. (2002) Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proceedings: Software, 149 (6). pp. 169-176. ISSN 1462-5970 (doi:10.1049/ip-sen:20020909)

2001

Renaud, K (2001) Teaching Programming from a Distance - Problems and a Proposed Solution. Sigcse Bulletin Vol 33 .

Renaud, K., and Dyk, T.V. (2001) Tailoring e-commerce sites to ease recovery after disruptions. In: 25th Annual International Computer Software and Applications Conference, 2001, 8-12 October 2001, Chicago, Illinois.

This list was generated on Fri May 3 07:28:15 2013 BST.