Dr Karen Renaud

  • Senior Lecturer (Computing Science)

telephone: 01413302052
email: Karen.Renaud@glasgow.ac.uk

Research interests

Personal site: http://www.dcs.gla.ac.uk/~karen/

Biography:
Karen Renaud is a graduate of the Universities of Pretoria, South Africa and Glasgow. Her main research interest is Usable Security. She publishes widely in this area and collaborates with academics in the UK, South Africa and Canada. She also has interests in email usage in organisations, electronic voting and technology acceptance, specifically with respect to learning support systems.

Research Interests:
- Usability of Security Systems
- Graphical Authentication Mechanisms
- Security and Email Acceptable Use Policies
- The use of technology in organisations
- Electronic Voting
- Privacy

Selected publications

All publications

List by: Type | Date

Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001
Number of items: 78.

2016

Cockshott, P., and Renaud, K. (2016) Humans, robots and values. Technology in Society, 45, pp. 19-28. (doi:10.1016/j.techsoc.2016.01.002)

Alkaldi, N., and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452 (Accepted for Publication)

Alkaldi, N., and Renaud, K. (2016) Why do People Adopt, or Reject, Smartphone Security Tools? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Alkhamis, E., and Renaud, K. (2016) The Design and Evaluation of an Interactive Social Engineering Training Programme. In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Gutmann, A., Volkamer, M., and Renaud, K. (2016) Memorable And Secure: How Do You Choose Your PIN? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Gutmann, A., Renaud, K., Maguire, J., Mayer, P., Volkamer, M., Matsuura, K., and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi:10.1109/EuroSP.2016.35)

Kulyk, O., Gerber, P., El Hanafi, M., Reinheimer, B., Renaud, K., and Volkamer, M. (2016) Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do. In: USEC Workshop, San Diego, California, 21 Feb 2016, ISBN 1891562428

Renaud, K., and van Biljon, J. (2016) The role of knowledge visualisation in supporting postgraduate dissertation assessment. British Journal of Educational Technology, (Accepted for Publication)

2015

Volkamer, M., Renaud, K., Kulyk, O., and Emeröz, S. (2015) A Socio-Technical Investigation into Smartphone Security. In: 11th International Workshop (STM 2015), Vienna, Austria, 21-22 Sep 2015, pp. 265-273. ISBN 9783319248578 (doi:10.1007/978-3-319-24858-5_17)

Maguire, J., and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi:10.1109/STAST.2015.13)

Gerber, P., Volkamer, M., and Renaud, K. (2015) Usability versus privacy instead of usable privacy. ACM SIGCAS Computers and Society, 45(1), pp. 16-21. (doi:10.1145/2738210.2738214)

Macdonald, C., and Renaud, K. (2015) Experiences Implementing SQL Design Patterns in a First Year Computing Science Degree Database Course. In: TLAD 2015: 13th International Workshop on Teaching, Learning and Assessment of Databases, Birmingham UK, 3 July 2015,

Renaud, K., Hoskins, A., and von Solms, R. (2015) Biometric Identification: Are We Ethically Ready? In: Information Security for South Africa (ISSA 2015), Johannesburg, South Africa, 12-14 Aug 2015, pp. 1-8. ISBN 9781479977543 (doi:10.1109/ISSA.2015.7335051)

Renaud, K., and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi:10.1145/2702123.2702456)

van Biljon, J., and Renaud, K. (2015) Facilitating knowledge visualisation as communication and knowledge transfer mechanism in postgraduate learning. In: Brown, T. H. and van der Merwe, H. J. (eds.) The Mobile Learning Voyage - From Small Ripples to Massive Open Waters. Series: Communications in computer and information science (560). Springer International Publishing: Cham, pp. 156-171. ISBN 9783319256832 (doi:10.1007/978-3-319-25684-9_12)

2014

Renaud, K., English, R., Wynne, T., and Weber, F. (2014) You have three tries to lockout. Why three? In: 8th International Symposium on Human Aspects of Information Security, Plymouth, UK, 8-10 Jul 2014, pp. 101-111.

Marsh, S., Dwyer, N., Basu, A., Storer, T., Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S., and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hersey, PA, pp. 8-23. ISBN 9781466661585

Jenkins, R., McLachlan, J. L., and Renaud, K. (2014) Facelock: familiarity-based graphical authentication. PeerJ, 2, e444. (doi:10.7717/peerj.444)

Renaud, K., Maguire, J., van Niekerk, J., and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

He, Y., Johnson, C., Renaud, K., Lu, Y., and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi:10.1109/CSIT.2014.6805998)

Birch, S., Cockshott, P., and Renaud, K. (2014) Putting electronic voting under the microscope. Political Quarterly, 85(2), pp. 187-194. (doi:10.1111/1467-923X.12071)

Renaud, K., Volkamer, M., and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi:10.1007/978-3-319-07620-1_17)

Renaud, K., Volkamer, M., and Renkema-Padmos, A. (2014) Why Doesn’t Jane Protect Her Privacy? Lecture Notes in Computer Science, 8555, pp. 244-262. (doi:10.1007/978-3-319-08506-7_13)

2013

Crawford, H., Renaud, K., and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi:10.1016/j.cose.2013.05.005)

Renaud, K., Kennes, D., van Niekerk, J., and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi:10.1109/ISSA.2013.6641059)

Renaud, K., and Cutts, Q. (2013) Teaching human-centred security using non-traditional techniques. ACM Transactions on Computing Education, 13(3), Art. 11.

Renaud, K., and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Maguire, J., and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Cockshott, W.P., and Renaud, K. (2013) Information technology: gateway to direct democracy in China and the world. International Critical Thought, 3(1), pp. 76-97. (doi:10.1080/21598282.2013.761448)

Renaud, K., and Mackenzie, L. (2013) SimPass: quantifying the impact of password behaviours and policy directives on an organisation's systems. Journal of Artificial Societies and Social Simulation, 16(3), Art. 3.

Renaud, K., Mayer, P., Volkamer, M., and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

Storer, T., Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K., and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

2012

Storer, T., Renaud, K., and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Ramsay, J., and Renaud, K. (2012) Using insights from email users to inform organisational email management policy. Behaviour and Information Technology, 31(6), pp. 587-603. (doi:10.1080/0144929X.2010.517271)

Muller, H., van Biljon, J., and Renaud, K. (2012) Information visualization in research reporting: guidelines for representing quantitative data. In: Southern African Computer Lecturers Association (SACLA) Conference, Thaba Nchu, SA, 1-3 July 2012,

Murray, D., and Renaud, K. (2012) Privacy and the citizen. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Ordean, M., and Renaud, K. (2012) Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. In: 8th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 30 Aug - 1 Sept 2012,

Renaud, K. (2012) Blaming noncompliance is too convenient: What really causes information breaches? IEEE Security and Privacy Magazine, 10(3), pp. 57-63. (doi:10.1109/MSP.2011.157)

Renaud, K. (2012) User issues in security. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Renaud, K., and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

van Dyk, T., Renaud, K., and van Biljon Moses, J. (2012) Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly. In: SAICSIT 2012, Centurion, Tshwane, SA, 1 – 3 Oct 2012,

2011

Maguire, J., and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

Goucher, W., and Renaud, K. (2011) In a world of their own: working on the move. In: The 25th BCS Conference on Human Computer Interaction, Newcastle Upon Tyne, UK, 4-8 Jul 2011, pp. 461-466.

2010

Renaud, K., and Just, M. (2010) Pictures or questions? Examining user responses to association-based authentication. In: HCI 2010 The 24th BCS Conference on Human Computer Interaction, University of Abertay, Dundee, 6th-10th September 2010, (Unpublished)

Cockshott, P., and Renaud, K. (2010) Extending handivote to handle digital economic decisions. In: ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, Edinburgh, UK, 14-16 April 2010,

Gibson, M., Conrad, M., Maple, C., and Renaud, K. (2010) Accessible and secure? Design constraints on image and sound based passwords. In: The International Conference on Information Society (i-society 2010), London, UK, 28-30 Jun 2010, pp. 423-428.

Renaud, K., and van Biljon, J. (2010) Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9(4), pp. 387-403. (doi:10.1007/s10209-009-0177-9)

2009

Renaud, K. (2009) On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing, 20(1), pp. 1-15. (doi:10.1016/j.jvlc.2008.04.001)

Cockshott, W.P., and Renaud, K. (2009) HandiVote: simple, anonymous, and auditable electronic voting. Journal of Information Technology and Politics, 6(1), pp. 60-80. (doi:10.1080/19331680802668102)

Gibson, M., Renaud, K., Conrad, M., and Maple, C. (2009) Musipass: authenticating me softly with "my" song. In: New Security Paradigms Workshop 2009, Oxford, UK, 8-11 Sep 2009,

Poet, R., and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R., and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi:10.1142/S0218001409007430)

Renaud, K. (2009) Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1), pp. 60-85. (doi:10.1504/IJICS.2009.026621)

Renaud, K. (2009) Web authentication using Mikon images. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, NB, Canada, 25-27 Aug 2009, pp. 79-88.

Renaud, K., Cockshott, T., and Hair, M. (2009) Everyone Abandons - Eventually: Understanding the Online Shopping Experience. In: 11th IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria., 20-23 July 2009,

Renaud, K., and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

Van Biljon, J., and Renaud, K. (2009) Distance education as enabler in crossing the digital divide: will the phoenix fly? In: 3rd International Development Informatics Association Conference, Kruger National Park, South Africa, 28-30 Oct 2009,

2008

Ramsay, J., Renaud, K., Hair, M., and Saddique, S. (2008) Having it all: how students combine traditional and digitally mediated communication. In: IADIS International Conference Web Based Communities 2008, Amsterdam, The Netherlands, 24-26 Jul 2008,

Renaud, K., and Van Biljon, J. (2008) Predicting technology acceptance and adoption by the elderly: a qualitative study. In: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Wilderness, South Africa, 6-8 Oct 2008, pp. 210-219. (doi:10.1145/1456659.1456684)

Renaud, K.V., McBryan, T., and Siebert, J.P. (2008) Password cueing with cue(ink)blots. In: IADIS Computer Graphics and Visualization, Amsterdam, The Netherlands, 24-26 Jul 2008,

Van Biljon, J., and Renaud, K. (2008) A qualitative study of the applicability of technology acceptance models to senior mobile phone users. In: International Workshop on Modeling Mobile Applications and Services, Barcelona, Spain, 20-23 Oct 2008, pp. 228-237. (doi:10.1007/978-3-540-87991-6_28)

2007

Hair, M., Renaud, K., and Ramsay, J. (2007) The influence of self-esteem and locus of control on perceived email-related stress. Computers in Human Behavior, 23, pp. 2791-2803. (doi:10.1016/j.chb.2006.05.005)

Poet, R., and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

Renaud, K. (2007) Don't do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers and Education,

Renaud, K., and Olsen, E. (2007) DynaHand: Observation-resistant recognition-based web authentication. IEEE Technology and Society Magazine, 26, pp. 22-31.

Renaud, K., and Ramsay, J. (2007) Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour and Information Technology, 26, pp. 309-322. (doi:10.1080/01449290601173770)

Renaud, K. (2007) You've got email. Shall I deal with it now? International Journal of Human-Computer Interaction, pp. 313-332.

Renaud, K., and Cockshott, W.P. (2007) Electronic plebiscites. In: MeTTeG07, Camerino, 27-28 September 2007,

2006

Renaud, K. (2006) A Process for Supporting Risk-Aware Web Authentication Mechanism Choice. Reliability Engineering and System Safety,

Renaud, K., Ramsay, J., and Hair, M. (2006) "You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective. International Journal of Human-Computer Interaction, 21, pp. 313-332.

2005

De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, pp. 128-152. (doi:10.1016/j.ijhcs.2005.04.020)

2004

Renaud, K. (2004) Quantifying the quality of web authentication mechanisms. Journal of Web Engineering, 3(2), pp. 95-123.

Renaud, K., and van Biljon, J. (2004) Teaching SQL - Which pedagogical horse for this course? Key Technologies For Data Management, 3112, pp. 244-256.

Renaud, K., and De Angeli, A. (2004) My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with Computers, 16, pp. 1017-1041. (doi:10.1016/j.intcom.2004.06.012)

2003

Renaud, K., Lo, J., Bishop, J., Zyl, P.v., and Worrall, B. (2003) Algon: a framework for supporting comparison of distributed algorithm performance. In: Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, 5-7 Febuary 2003, pp. 425-432. ISBN 9780769518756 (doi:10.1109/EMPDP.2003.1183620)

2002

Renaud, K. (2002) Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proceedings: Software, 149(6), pp. 169-176. (doi:10.1049/ip-sen:20020909)

2001

Renaud, K. (2001) Teaching Programming from a Distance - Problems and a Proposed Solution. Sigcse Bulletin Vol 33,

Renaud, K., and Dyk, T.V. (2001) Tailoring e-commerce sites to ease recovery after disruptions. In: 25th Annual International Computer Software and Applications Conference, 2001, Chicago, Illinois, 8-12 October 2001, pp. 603-608. ISBN 9780769513720 (doi:10.1109/CMPSAC.2001.960674)

This list was generated on Thu Dec 8 16:08:26 2016 GMT.
Number of items: 78.

Articles

Cockshott, P., and Renaud, K. (2016) Humans, robots and values. Technology in Society, 45, pp. 19-28. (doi:10.1016/j.techsoc.2016.01.002)

Renaud, K., and van Biljon, J. (2016) The role of knowledge visualisation in supporting postgraduate dissertation assessment. British Journal of Educational Technology, (Accepted for Publication)

Gerber, P., Volkamer, M., and Renaud, K. (2015) Usability versus privacy instead of usable privacy. ACM SIGCAS Computers and Society, 45(1), pp. 16-21. (doi:10.1145/2738210.2738214)

Jenkins, R., McLachlan, J. L., and Renaud, K. (2014) Facelock: familiarity-based graphical authentication. PeerJ, 2, e444. (doi:10.7717/peerj.444)

Renaud, K., Maguire, J., van Niekerk, J., and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

Birch, S., Cockshott, P., and Renaud, K. (2014) Putting electronic voting under the microscope. Political Quarterly, 85(2), pp. 187-194. (doi:10.1111/1467-923X.12071)

Renaud, K., Volkamer, M., and Renkema-Padmos, A. (2014) Why Doesn’t Jane Protect Her Privacy? Lecture Notes in Computer Science, 8555, pp. 244-262. (doi:10.1007/978-3-319-08506-7_13)

Crawford, H., Renaud, K., and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi:10.1016/j.cose.2013.05.005)

Renaud, K., and Cutts, Q. (2013) Teaching human-centred security using non-traditional techniques. ACM Transactions on Computing Education, 13(3), Art. 11.

Cockshott, W.P., and Renaud, K. (2013) Information technology: gateway to direct democracy in China and the world. International Critical Thought, 3(1), pp. 76-97. (doi:10.1080/21598282.2013.761448)

Renaud, K., and Mackenzie, L. (2013) SimPass: quantifying the impact of password behaviours and policy directives on an organisation's systems. Journal of Artificial Societies and Social Simulation, 16(3), Art. 3.

Ramsay, J., and Renaud, K. (2012) Using insights from email users to inform organisational email management policy. Behaviour and Information Technology, 31(6), pp. 587-603. (doi:10.1080/0144929X.2010.517271)

Renaud, K. (2012) Blaming noncompliance is too convenient: What really causes information breaches? IEEE Security and Privacy Magazine, 10(3), pp. 57-63. (doi:10.1109/MSP.2011.157)

Renaud, K., and van Biljon, J. (2010) Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9(4), pp. 387-403. (doi:10.1007/s10209-009-0177-9)

Renaud, K. (2009) On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing, 20(1), pp. 1-15. (doi:10.1016/j.jvlc.2008.04.001)

Cockshott, W.P., and Renaud, K. (2009) HandiVote: simple, anonymous, and auditable electronic voting. Journal of Information Technology and Politics, 6(1), pp. 60-80. (doi:10.1080/19331680802668102)

Poet, R., and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R., and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi:10.1142/S0218001409007430)

Renaud, K. (2009) Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1), pp. 60-85. (doi:10.1504/IJICS.2009.026621)

Hair, M., Renaud, K., and Ramsay, J. (2007) The influence of self-esteem and locus of control on perceived email-related stress. Computers in Human Behavior, 23, pp. 2791-2803. (doi:10.1016/j.chb.2006.05.005)

Renaud, K. (2007) Don't do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers and Education,

Renaud, K., and Olsen, E. (2007) DynaHand: Observation-resistant recognition-based web authentication. IEEE Technology and Society Magazine, 26, pp. 22-31.

Renaud, K., and Ramsay, J. (2007) Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour and Information Technology, 26, pp. 309-322. (doi:10.1080/01449290601173770)

Renaud, K. (2007) You've got email. Shall I deal with it now? International Journal of Human-Computer Interaction, pp. 313-332.

Renaud, K. (2006) A Process for Supporting Risk-Aware Web Authentication Mechanism Choice. Reliability Engineering and System Safety,

Renaud, K., Ramsay, J., and Hair, M. (2006) "You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective. International Journal of Human-Computer Interaction, 21, pp. 313-332.

De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, pp. 128-152. (doi:10.1016/j.ijhcs.2005.04.020)

Renaud, K. (2004) Quantifying the quality of web authentication mechanisms. Journal of Web Engineering, 3(2), pp. 95-123.

Renaud, K., and van Biljon, J. (2004) Teaching SQL - Which pedagogical horse for this course? Key Technologies For Data Management, 3112, pp. 244-256.

Renaud, K., and De Angeli, A. (2004) My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with Computers, 16, pp. 1017-1041. (doi:10.1016/j.intcom.2004.06.012)

Renaud, K. (2002) Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proceedings: Software, 149(6), pp. 169-176. (doi:10.1049/ip-sen:20020909)

Renaud, K. (2001) Teaching Programming from a Distance - Problems and a Proposed Solution. Sigcse Bulletin Vol 33,

Book Sections

van Biljon, J., and Renaud, K. (2015) Facilitating knowledge visualisation as communication and knowledge transfer mechanism in postgraduate learning. In: Brown, T. H. and van der Merwe, H. J. (eds.) The Mobile Learning Voyage - From Small Ripples to Massive Open Waters. Series: Communications in computer and information science (560). Springer International Publishing: Cham, pp. 156-171. ISBN 9783319256832 (doi:10.1007/978-3-319-25684-9_12)

Marsh, S., Dwyer, N., Basu, A., Storer, T., Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S., and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hersey, PA, pp. 8-23. ISBN 9781466661585

Murray, D., and Renaud, K. (2012) Privacy and the citizen. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Renaud, K. (2012) User issues in security. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Conference or Workshop Item

Maguire, J., and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Maguire, J., and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

Conference Proceedings

Alkaldi, N., and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452 (Accepted for Publication)

Alkaldi, N., and Renaud, K. (2016) Why do People Adopt, or Reject, Smartphone Security Tools? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Alkhamis, E., and Renaud, K. (2016) The Design and Evaluation of an Interactive Social Engineering Training Programme. In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Gutmann, A., Volkamer, M., and Renaud, K. (2016) Memorable And Secure: How Do You Choose Your PIN? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, (Accepted for Publication)

Gutmann, A., Renaud, K., Maguire, J., Mayer, P., Volkamer, M., Matsuura, K., and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi:10.1109/EuroSP.2016.35)

Kulyk, O., Gerber, P., El Hanafi, M., Reinheimer, B., Renaud, K., and Volkamer, M. (2016) Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do. In: USEC Workshop, San Diego, California, 21 Feb 2016, ISBN 1891562428

Volkamer, M., Renaud, K., Kulyk, O., and Emeröz, S. (2015) A Socio-Technical Investigation into Smartphone Security. In: 11th International Workshop (STM 2015), Vienna, Austria, 21-22 Sep 2015, pp. 265-273. ISBN 9783319248578 (doi:10.1007/978-3-319-24858-5_17)

Maguire, J., and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi:10.1109/STAST.2015.13)

Macdonald, C., and Renaud, K. (2015) Experiences Implementing SQL Design Patterns in a First Year Computing Science Degree Database Course. In: TLAD 2015: 13th International Workshop on Teaching, Learning and Assessment of Databases, Birmingham UK, 3 July 2015,

Renaud, K., Hoskins, A., and von Solms, R. (2015) Biometric Identification: Are We Ethically Ready? In: Information Security for South Africa (ISSA 2015), Johannesburg, South Africa, 12-14 Aug 2015, pp. 1-8. ISBN 9781479977543 (doi:10.1109/ISSA.2015.7335051)

Renaud, K., and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi:10.1145/2702123.2702456)

Renaud, K., English, R., Wynne, T., and Weber, F. (2014) You have three tries to lockout. Why three? In: 8th International Symposium on Human Aspects of Information Security, Plymouth, UK, 8-10 Jul 2014, pp. 101-111.

He, Y., Johnson, C., Renaud, K., Lu, Y., and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi:10.1109/CSIT.2014.6805998)

Renaud, K., Volkamer, M., and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi:10.1007/978-3-319-07620-1_17)

Renaud, K., Kennes, D., van Niekerk, J., and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi:10.1109/ISSA.2013.6641059)

Renaud, K., and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Renaud, K., Mayer, P., Volkamer, M., and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

Storer, T., Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K., and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

Storer, T., Renaud, K., and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Muller, H., van Biljon, J., and Renaud, K. (2012) Information visualization in research reporting: guidelines for representing quantitative data. In: Southern African Computer Lecturers Association (SACLA) Conference, Thaba Nchu, SA, 1-3 July 2012,

Ordean, M., and Renaud, K. (2012) Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. In: 8th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 30 Aug - 1 Sept 2012,

Renaud, K., and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

van Dyk, T., Renaud, K., and van Biljon Moses, J. (2012) Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly. In: SAICSIT 2012, Centurion, Tshwane, SA, 1 – 3 Oct 2012,

Goucher, W., and Renaud, K. (2011) In a world of their own: working on the move. In: The 25th BCS Conference on Human Computer Interaction, Newcastle Upon Tyne, UK, 4-8 Jul 2011, pp. 461-466.

Renaud, K., and Just, M. (2010) Pictures or questions? Examining user responses to association-based authentication. In: HCI 2010 The 24th BCS Conference on Human Computer Interaction, University of Abertay, Dundee, 6th-10th September 2010, (Unpublished)

Cockshott, P., and Renaud, K. (2010) Extending handivote to handle digital economic decisions. In: ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, Edinburgh, UK, 14-16 April 2010,

Gibson, M., Conrad, M., Maple, C., and Renaud, K. (2010) Accessible and secure? Design constraints on image and sound based passwords. In: The International Conference on Information Society (i-society 2010), London, UK, 28-30 Jun 2010, pp. 423-428.

Gibson, M., Renaud, K., Conrad, M., and Maple, C. (2009) Musipass: authenticating me softly with "my" song. In: New Security Paradigms Workshop 2009, Oxford, UK, 8-11 Sep 2009,

Renaud, K. (2009) Web authentication using Mikon images. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, NB, Canada, 25-27 Aug 2009, pp. 79-88.

Renaud, K., Cockshott, T., and Hair, M. (2009) Everyone Abandons - Eventually: Understanding the Online Shopping Experience. In: 11th IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria., 20-23 July 2009,

Renaud, K., and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

Van Biljon, J., and Renaud, K. (2009) Distance education as enabler in crossing the digital divide: will the phoenix fly? In: 3rd International Development Informatics Association Conference, Kruger National Park, South Africa, 28-30 Oct 2009,

Ramsay, J., Renaud, K., Hair, M., and Saddique, S. (2008) Having it all: how students combine traditional and digitally mediated communication. In: IADIS International Conference Web Based Communities 2008, Amsterdam, The Netherlands, 24-26 Jul 2008,

Renaud, K., and Van Biljon, J. (2008) Predicting technology acceptance and adoption by the elderly: a qualitative study. In: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Wilderness, South Africa, 6-8 Oct 2008, pp. 210-219. (doi:10.1145/1456659.1456684)

Renaud, K.V., McBryan, T., and Siebert, J.P. (2008) Password cueing with cue(ink)blots. In: IADIS Computer Graphics and Visualization, Amsterdam, The Netherlands, 24-26 Jul 2008,

Van Biljon, J., and Renaud, K. (2008) A qualitative study of the applicability of technology acceptance models to senior mobile phone users. In: International Workshop on Modeling Mobile Applications and Services, Barcelona, Spain, 20-23 Oct 2008, pp. 228-237. (doi:10.1007/978-3-540-87991-6_28)

Poet, R., and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

Renaud, K., and Cockshott, W.P. (2007) Electronic plebiscites. In: MeTTeG07, Camerino, 27-28 September 2007,

Renaud, K., Lo, J., Bishop, J., Zyl, P.v., and Worrall, B. (2003) Algon: a framework for supporting comparison of distributed algorithm performance. In: Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, 5-7 Febuary 2003, pp. 425-432. ISBN 9780769518756 (doi:10.1109/EMPDP.2003.1183620)

Renaud, K., and Dyk, T.V. (2001) Tailoring e-commerce sites to ease recovery after disruptions. In: 25th Annual International Computer Software and Applications Conference, 2001, Chicago, Illinois, 8-12 October 2001, pp. 603-608. ISBN 9780769513720 (doi:10.1109/CMPSAC.2001.960674)

This list was generated on Thu Dec 8 16:08:26 2016 GMT.