Professor Karen Renaud

  • Honorary Research Fellow (School of Computing Science)

email: Karen.Renaud@glasgow.ac.uk

Room S121, Computing Science, 12 Lilybank Gardens, Glasgow G12 8QQ

Import to contacts

Publications

List by: Type | Date

Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001
Number of items: 98.

2024

Dupuis, M., Searle, R. and Renaud, K. V. (2024) Finding grace in responses to adverse cybersecurity incidents. Journal of Intellectual Capital, (doi: 10.1108/JIC-04-2024-0128) (Early Online Publication)

2023

Zimmermann, V., Marky, K. and Renaud, K. (2023) Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information. Behaviour and Information Technology, 42(6), pp. 700-743. (doi: 10.1080/0144929x.2022.2042384)

2022

Dupuis, M., Renaud, K. and Searle, R. (2022) Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk. In: 23rd Annual Conference on Information Technology Education, Chicago, IL, USA, 21-24 Sep 2022, pp. 127-129. ISBN 9781450393911 (doi: 10.1145/3537674.3555783)

2021

Renaud, K., Searle, R. and Dupuis, M. (2021) Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? In: New Security Paradigms Workshop (NSPW '21), 26-28 Oct 2021, pp. 70-87. ISBN 9781450385732 (doi: 10.1145/3498891.3498896)

Al Malwi, W. A. A., Renaud, K. and Mackenzie, L. (2021) Users’ information disclosure determinants in social networking sites: a systematic literature review. International Journal of Computer and Information Engineering, 15(5), pp. 314-321.

2020

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) Implement a Model for Describing and Maximising Security Knowledge Sharing. In: 15th International Conference for Internet Technology and Secured Transactions (ICITST-2020), 8-10 Dec 2020, ISBN 9781913572211 (doi: 10.23919/ICITST51030.2020.9351318)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. In: 16th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2019), Dubai, United Arab Emirates, 09-10 Dec 2019, pp. 376-390. ISBN 9783030443214 (doi: 10.1007/978-3-030-44322-1_28)

Bongiovanni, I. , Renaud, K. and Cairns, G. (2020) Securing intellectual capital: an exploratory study in Australian Universities. Journal of Intellectual Capital, 21(3), p. 505. (doi: 10.1108/JIC-08-2019-0197)

2019

Alkaldi, N., Renaud, K. and Mackenzie, L. (2019) Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs. In: 52nd Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA, 08-11 Jan 2019, pp. 4824-4833. ISBN 9780998133126

2018

Al Ahmari, S., Renaud, K. and Omoronyia, I. (2018) A Systematic Review of Information Security Knowledge-Sharing Research. In: 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland, 29-31 Aug 2018, pp. 101-110. ISBN 9780244402549

Alkharashi, A. and Renaud, K. (2018) Privacy in crowdsourcing: a systematic review. In: Chen, L., Manulis, M. and Schneider, S. (eds.) Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings. Series: Lecture notes in computer science (11060). Springer: Cham, pp. 387-400. ISBN 9783319991351 (doi: 10.1007/978-3-319-99136-8_21)

2017

Renaud, K. and van Biljon, J. (2017) The role of knowledge visualisation in supporting postgraduate dissertation assessment. British Journal of Educational Technology, 48(6), pp. 1475-1490. (doi: 10.1111/bjet.12494)

Volkamer, M., Renaud, K., Reinheimer, B. and Kunz, A. (2017) User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Computers and Security, 71, pp. 100-113. (doi: 10.1016/j.cose.2017.02.004)

Renaud, K., Zimmermann, V., Maguire, J. and Draper, S. (2017) Lessons Learned from Evaluating Eight Password Nudges in the Wild. In: The LASER Workshop: Learning from Authoritative Security Experiment Results, Arlington, VA, USA, 18-19 Oct 2017, pp. 25-37. ISBN 9781931971416

Gerber, P., Volkamer, M. and Renaud, K. (2017) The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications, 34(1), pp. 8-26. (doi: 10.1016/j.jisa.2016.10.003)

Aleisa, N. and Renaud, K. (2017) Privacy of the Internet of Things: A Systematic Literature Review. In: 50th Hawaii International Conference on System Sciences, Hawaii, USA, 4-7 Jan 2017, ISBN 9780998133102 (doi: 10.24251/HICSS.2017.717)

Aleisa, N. and Renaud, K. (2017) Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. In: IoTBDS 2017: 2nd International Conference on Internet of Things: Big Data and Security, Porto, Portugal, 24-26 Apr 2017, pp. 198-205. ISBN 9789897582455 (doi: 10.5220/0006233701980205)

Ghiglieri, M., Volkamer, M. and Renaud, K. (2017) Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks. In: International Conference on Human-Computer Interaction, Vancouver, Canada, 9-14 July 2017, pp. 656-674. (doi: 10.1007/978-3-319-58460-7_45)

Renaud, K. and van Biljon, J. (2017) Charting the Path Towards Effective Knowledge Visualisations. In: Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17), Thab 'Nchu, South Africa, 26-28 Sep 2017, ISBN 9781450352505 (doi: 10.1145/3129416.3129421)

2016

Alkaldi, N. and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452

Aßmuth, A., , , , and , (2016) Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. In: 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordon, 02-04 Aug 2016, pp. 144-150. ISBN 9781509026579 (doi: 10.1109/CCC.2016.30)

Cockshott, P. and Renaud, K. (2016) Humans, robots and values. Technology in Society, 45, pp. 19-28. (doi: 10.1016/j.techsoc.2016.01.002)

Alkaldi, N. and Renaud, K. (2016) Why do People Adopt, or Reject, Smartphone Security Tools? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 135-144. ISBN 9781841024134

Alkhamis, E. and Renaud, K. (2016) The Design and Evaluation of an Interactive Social Engineering Training Programme. In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 125-134. ISBN 9781841024134

Gutmann, A., Volkamer, M. and Renaud, K. (2016) Memorable And Secure: How Do You Choose Your PIN? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 156-166. ISBN 9781841024134

Gutmann, A., Renaud, K., Maguire, J. , Mayer, P., Volkamer, M., Matsuura, K. and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi: 10.1109/EuroSP.2016.35)

Kulyk, O., Gerber, P., El Hanafi, M., Reinheimer, B., Renaud, K. and Volkamer, M. (2016) Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do. In: USEC Workshop, San Diego, California, 21 Feb 2016, ISBN 1891562428

2015

Volkamer, M., Renaud, K., Kulyk, O. and Emeröz, S. (2015) A Socio-Technical Investigation into Smartphone Security. In: 11th International Workshop (STM 2015), Vienna, Austria, 21-22 Sep 2015, pp. 265-273. ISBN 9783319248578 (doi: 10.1007/978-3-319-24858-5_17)

Maguire, J. and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi: 10.1109/STAST.2015.13)

Gerber, P., Volkamer, M. and Renaud, K. (2015) Usability versus privacy instead of usable privacy. ACM SIGCAS Computers and Society, 45(1), pp. 16-21. (doi: 10.1145/2738210.2738214)

Macdonald, C. and Renaud, K. (2015) Experiences Implementing SQL Design Patterns in a First Year Computing Science Degree Database Course. In: TLAD 2015: 13th International Workshop on Teaching, Learning and Assessment of Databases, Birmingham UK, 3 July 2015,

Renaud, K., Hoskins, A. and von Solms, R. (2015) Biometric Identification: Are We Ethically Ready? In: Information Security for South Africa (ISSA 2015), Johannesburg, South Africa, 12-14 Aug 2015, pp. 1-8. ISBN 9781479977543 (doi: 10.1109/ISSA.2015.7335051)

Renaud, K. and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi: 10.1145/2702123.2702456)

van Biljon, J. and Renaud, K. (2015) Facilitating knowledge visualisation as communication and knowledge transfer mechanism in postgraduate learning. In: Brown, T. H. and van der Merwe, H. J. (eds.) The Mobile Learning Voyage - From Small Ripples to Massive Open Waters. Series: Communications in computer and information science (560). Springer International Publishing: Cham, pp. 156-171. ISBN 9783319256832 (doi: 10.1007/978-3-319-25684-9_12)

2014

Renaud, K., English, R., Wynne, T. and Weber, F. (2014) You have three tries to lockout. Why three? In: 8th International Symposium on Human Aspects of Information Security, Plymouth, UK, 8-10 Jul 2014, pp. 101-111.

Marsh, S., Dwyer, N., Basu, A., Storer, T. , Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

Jenkins, R., McLachlan, J. L. and Renaud, K. (2014) Facelock: familiarity-based graphical authentication. PeerJ, 2, e444. (doi: 10.7717/peerj.444)

Renaud, K., Maguire, J. , van Niekerk, J. and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

He, Y., Johnson, C. , Renaud, K., Lu, Y. and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi: 10.1109/CSIT.2014.6805998)

Birch, S., Cockshott, P. and Renaud, K. (2014) Putting electronic voting under the microscope. Political Quarterly, 85(2), pp. 187-194. (doi: 10.1111/1467-923X.12071)

Renaud, K., Volkamer, M. and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_17)

Renaud, K., Volkamer, M. and Renkema-Padmos, A. (2014) Why Doesn’t Jane Protect Her Privacy? Lecture Notes in Computer Science, 8555, pp. 244-262. (doi: 10.1007/978-3-319-08506-7_13)

2013

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Renaud, K., Kennes, D., van Niekerk, J. and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi: 10.1109/ISSA.2013.6641059)

Renaud, K. and Cutts, Q. (2013) Teaching human-centred security using non-traditional techniques. ACM Transactions on Computing Education, 13(3), Art. 11.

Renaud, K. and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Maguire, J. and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Cockshott, W.P. and Renaud, K. (2013) Information technology: gateway to direct democracy in China and the world. International Critical Thought, 3(1), pp. 76-97. (doi: 10.1080/21598282.2013.761448)

Renaud, K. and Mackenzie, L. (2013) SimPass: quantifying the impact of password behaviours and policy directives on an organisation's systems. Journal of Artificial Societies and Social Simulation, 16(3), Art. 3.

Renaud, K. and Goucher, W. (2013) Monkey see - monkey take photo: the risk of mobile information leakage. International Journal of Cyber Warfare and Terrorism, 3(4), pp. 40-51. (doi: 10.4018/ijcwt.2013100105)

Renaud, K., Mayer, P., Volkamer, M. and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

Storer, T. , Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

2012

Storer, T. , Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Ramsay, J. and Renaud, K. (2012) Using insights from email users to inform organisational email management policy. Behaviour and Information Technology, 31(6), pp. 587-603. (doi: 10.1080/0144929X.2010.517271)

Muller, H., van Biljon, J. and Renaud, K. (2012) Information visualization in research reporting: guidelines for representing quantitative data. In: Southern African Computer Lecturers Association (SACLA) Conference, Thaba Nchu, SA, 1-3 July 2012,

Murray, D. and Renaud, K. (2012) Privacy and the citizen. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Ordean, M. and Renaud, K. (2012) Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. In: 8th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 30 Aug - 1 Sept 2012,

Renaud, K. (2012) Blaming noncompliance is too convenient: What really causes information breaches? IEEE Security and Privacy Magazine, 10(3), pp. 57-63. (doi: 10.1109/MSP.2011.157)

Renaud, K. (2012) User issues in security. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Renaud, K. and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

van Dyk, T., Renaud, K. and van Biljon Moses, J. (2012) Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly. In: SAICSIT 2012, Centurion, Tshwane, SA, 1 – 3 Oct 2012,

2011

Maguire, J. and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

Goucher, W. and Renaud, K. (2011) In a world of their own: working on the move. In: The 25th BCS Conference on Human Computer Interaction, Newcastle Upon Tyne, UK, 4-8 Jul 2011, pp. 461-466.

2010

Renaud, K. and Just, M. (2010) Pictures or questions? Examining user responses to association-based authentication. In: HCI 2010 The 24th BCS Conference on Human Computer Interaction, University of Abertay, Dundee, 6th-10th September 2010, (Unpublished)

Cockshott, P. and Renaud, K. (2010) Extending handivote to handle digital economic decisions. In: ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, Edinburgh, UK, 14-16 April 2010,

Gibson, M., Conrad, M., Maple, C. and Renaud, K. (2010) Accessible and secure? Design constraints on image and sound based passwords. In: The International Conference on Information Society (i-society 2010), London, UK, 28-30 Jun 2010, pp. 423-428.

Renaud, K. and van Biljon, J. (2010) Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9(4), pp. 387-403. (doi: 10.1007/s10209-009-0177-9)

2009

Renaud, K. (2009) On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing, 20(1), pp. 1-15. (doi: 10.1016/j.jvlc.2008.04.001)

Cockshott, W.P. and Renaud, K. (2009) HandiVote: simple, anonymous, and auditable electronic voting. Journal of Information Technology and Politics, 6(1), pp. 60-80. (doi: 10.1080/19331680802668102)

Gibson, M., Renaud, K., Conrad, M. and Maple, C. (2009) Musipass: authenticating me softly with "my" song. In: New Security Paradigms Workshop 2009, Oxford, UK, 8-11 Sep 2009,

Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)

Renaud, K. (2009) Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1), pp. 60-85. (doi: 10.1504/IJICS.2009.026621)

Renaud, K. (2009) Web authentication using Mikon images. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, NB, Canada, 25-27 Aug 2009, pp. 79-88.

Renaud, K., Cockshott, T. and Hair, M. (2009) Everyone Abandons - Eventually: Understanding the Online Shopping Experience. In: 11th IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria., 20-23 July 2009,

Renaud, K. and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

Van Biljon, J. and Renaud, K. (2009) Distance education as enabler in crossing the digital divide: will the phoenix fly? In: 3rd International Development Informatics Association Conference, Kruger National Park, South Africa, 28-30 Oct 2009,

2008

Ramsay, J., Renaud, K., Hair, M. and Saddique, S. (2008) Having it all: how students combine traditional and digitally mediated communication. In: IADIS International Conference Web Based Communities 2008, Amsterdam, The Netherlands, 24-26 Jul 2008,

Renaud, K. and Van Biljon, J. (2008) Predicting technology acceptance and adoption by the elderly: a qualitative study. In: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Wilderness, South Africa, 6-8 Oct 2008, pp. 210-219. (doi: 10.1145/1456659.1456684)

Renaud, K.V., McBryan, T. and Siebert, J.P. (2008) Password cueing with cue(ink)blots. In: IADIS Computer Graphics and Visualization, Amsterdam, The Netherlands, 24-26 Jul 2008,

Van Biljon, J. and Renaud, K. (2008) A qualitative study of the applicability of technology acceptance models to senior mobile phone users. In: International Workshop on Modeling Mobile Applications and Services, Barcelona, Spain, 20-23 Oct 2008, pp. 228-237. (doi: 10.1007/978-3-540-87991-6_28)

2007

Hair, M., Renaud, K. and Ramsay, J. (2007) The influence of self-esteem and locus of control on perceived email-related stress. Computers in Human Behavior, 23, pp. 2791-2803. (doi: 10.1016/j.chb.2006.05.005)

Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

Renaud, K. (2007) Don't do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers and Education,

Renaud, K. and Olsen, E. (2007) DynaHand: Observation-resistant recognition-based web authentication. IEEE Technology and Society Magazine, 26, pp. 22-31.

Renaud, K. and Ramsay, J. (2007) Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour and Information Technology, 26, pp. 309-322. (doi: 10.1080/01449290601173770)

Renaud, K. (2007) You've got email. Shall I deal with it now? International Journal of Human-Computer Interaction, pp. 313-332.

Renaud, K. and Cockshott, W.P. (2007) Electronic plebiscites. In: MeTTeG07, Camerino, 27-28 September 2007,

2006

Renaud, K. (2006) A Process for Supporting Risk-Aware Web Authentication Mechanism Choice. Reliability Engineering and System Safety,

Renaud, K., Ramsay, J. and Hair, M. (2006) "You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective. International Journal of Human-Computer Interaction, 21, pp. 313-332.

2005

De Angeli, A., Coventry, L., Johnson, G. and Renaud, K. (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, pp. 128-152. (doi: 10.1016/j.ijhcs.2005.04.020)

2004

Renaud, K. (2004) Quantifying the quality of web authentication mechanisms. Journal of Web Engineering, 3(2), pp. 95-123.

Renaud, K. and van Biljon, J. (2004) Teaching SQL - Which pedagogical horse for this course? Key Technologies For Data Management, 3112, pp. 244-256.

Renaud, K. and De Angeli, A. (2004) My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with Computers, 16, pp. 1017-1041. (doi: 10.1016/j.intcom.2004.06.012)

2003

Renaud, K., Lo, J., Bishop, J., Zyl, P.v. and Worrall, B. (2003) Algon: a framework for supporting comparison of distributed algorithm performance. In: Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, 5-7 Febuary 2003, pp. 425-432. ISBN 9780769518756 (doi: 10.1109/EMPDP.2003.1183620)

2002

Renaud, K. (2002) Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proceedings: Software, 149(6), pp. 169-176. (doi: 10.1049/ip-sen:20020909)

2001

Renaud, K. (2001) Teaching Programming from a Distance - Problems and a Proposed Solution. Sigcse Bulletin Vol 33,

Renaud, K. and Dyk, T.V. (2001) Tailoring e-commerce sites to ease recovery after disruptions. In: 25th Annual International Computer Software and Applications Conference, 2001, Chicago, Illinois, 8-12 October 2001, pp. 603-608. ISBN 9780769513720 (doi: 10.1109/CMPSAC.2001.960674)

This list was generated on Sat Dec 21 01:49:34 2024 GMT.
Number of items: 98.

Articles

Dupuis, M., Searle, R. and Renaud, K. V. (2024) Finding grace in responses to adverse cybersecurity incidents. Journal of Intellectual Capital, (doi: 10.1108/JIC-04-2024-0128) (Early Online Publication)

Zimmermann, V., Marky, K. and Renaud, K. (2023) Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information. Behaviour and Information Technology, 42(6), pp. 700-743. (doi: 10.1080/0144929x.2022.2042384)

Al Malwi, W. A. A., Renaud, K. and Mackenzie, L. (2021) Users’ information disclosure determinants in social networking sites: a systematic literature review. International Journal of Computer and Information Engineering, 15(5), pp. 314-321.

Bongiovanni, I. , Renaud, K. and Cairns, G. (2020) Securing intellectual capital: an exploratory study in Australian Universities. Journal of Intellectual Capital, 21(3), p. 505. (doi: 10.1108/JIC-08-2019-0197)

Renaud, K. and van Biljon, J. (2017) The role of knowledge visualisation in supporting postgraduate dissertation assessment. British Journal of Educational Technology, 48(6), pp. 1475-1490. (doi: 10.1111/bjet.12494)

Volkamer, M., Renaud, K., Reinheimer, B. and Kunz, A. (2017) User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Computers and Security, 71, pp. 100-113. (doi: 10.1016/j.cose.2017.02.004)

Gerber, P., Volkamer, M. and Renaud, K. (2017) The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications, 34(1), pp. 8-26. (doi: 10.1016/j.jisa.2016.10.003)

Cockshott, P. and Renaud, K. (2016) Humans, robots and values. Technology in Society, 45, pp. 19-28. (doi: 10.1016/j.techsoc.2016.01.002)

Gerber, P., Volkamer, M. and Renaud, K. (2015) Usability versus privacy instead of usable privacy. ACM SIGCAS Computers and Society, 45(1), pp. 16-21. (doi: 10.1145/2738210.2738214)

Jenkins, R., McLachlan, J. L. and Renaud, K. (2014) Facelock: familiarity-based graphical authentication. PeerJ, 2, e444. (doi: 10.7717/peerj.444)

Renaud, K., Maguire, J. , van Niekerk, J. and Kennes, D. (2014) Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), pp. 48-60.

Birch, S., Cockshott, P. and Renaud, K. (2014) Putting electronic voting under the microscope. Political Quarterly, 85(2), pp. 187-194. (doi: 10.1111/1467-923X.12071)

Renaud, K., Volkamer, M. and Renkema-Padmos, A. (2014) Why Doesn’t Jane Protect Her Privacy? Lecture Notes in Computer Science, 8555, pp. 244-262. (doi: 10.1007/978-3-319-08506-7_13)

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Renaud, K. and Cutts, Q. (2013) Teaching human-centred security using non-traditional techniques. ACM Transactions on Computing Education, 13(3), Art. 11.

Cockshott, W.P. and Renaud, K. (2013) Information technology: gateway to direct democracy in China and the world. International Critical Thought, 3(1), pp. 76-97. (doi: 10.1080/21598282.2013.761448)

Renaud, K. and Mackenzie, L. (2013) SimPass: quantifying the impact of password behaviours and policy directives on an organisation's systems. Journal of Artificial Societies and Social Simulation, 16(3), Art. 3.

Renaud, K. and Goucher, W. (2013) Monkey see - monkey take photo: the risk of mobile information leakage. International Journal of Cyber Warfare and Terrorism, 3(4), pp. 40-51. (doi: 10.4018/ijcwt.2013100105)

Ramsay, J. and Renaud, K. (2012) Using insights from email users to inform organisational email management policy. Behaviour and Information Technology, 31(6), pp. 587-603. (doi: 10.1080/0144929X.2010.517271)

Renaud, K. (2012) Blaming noncompliance is too convenient: What really causes information breaches? IEEE Security and Privacy Magazine, 10(3), pp. 57-63. (doi: 10.1109/MSP.2011.157)

Renaud, K. and van Biljon, J. (2010) Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9(4), pp. 387-403. (doi: 10.1007/s10209-009-0177-9)

Renaud, K. (2009) On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing, 20(1), pp. 1-15. (doi: 10.1016/j.jvlc.2008.04.001)

Cockshott, W.P. and Renaud, K. (2009) HandiVote: simple, anonymous, and auditable electronic voting. Journal of Information Technology and Politics, 6(1), pp. 60-80. (doi: 10.1080/19331680802668102)

Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)

Renaud, K. (2009) Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1), pp. 60-85. (doi: 10.1504/IJICS.2009.026621)

Hair, M., Renaud, K. and Ramsay, J. (2007) The influence of self-esteem and locus of control on perceived email-related stress. Computers in Human Behavior, 23, pp. 2791-2803. (doi: 10.1016/j.chb.2006.05.005)

Renaud, K. (2007) Don't do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers and Education,

Renaud, K. and Olsen, E. (2007) DynaHand: Observation-resistant recognition-based web authentication. IEEE Technology and Society Magazine, 26, pp. 22-31.

Renaud, K. and Ramsay, J. (2007) Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour and Information Technology, 26, pp. 309-322. (doi: 10.1080/01449290601173770)

Renaud, K. (2007) You've got email. Shall I deal with it now? International Journal of Human-Computer Interaction, pp. 313-332.

Renaud, K. (2006) A Process for Supporting Risk-Aware Web Authentication Mechanism Choice. Reliability Engineering and System Safety,

Renaud, K., Ramsay, J. and Hair, M. (2006) "You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective. International Journal of Human-Computer Interaction, 21, pp. 313-332.

De Angeli, A., Coventry, L., Johnson, G. and Renaud, K. (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, pp. 128-152. (doi: 10.1016/j.ijhcs.2005.04.020)

Renaud, K. (2004) Quantifying the quality of web authentication mechanisms. Journal of Web Engineering, 3(2), pp. 95-123.

Renaud, K. and van Biljon, J. (2004) Teaching SQL - Which pedagogical horse for this course? Key Technologies For Data Management, 3112, pp. 244-256.

Renaud, K. and De Angeli, A. (2004) My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with Computers, 16, pp. 1017-1041. (doi: 10.1016/j.intcom.2004.06.012)

Renaud, K. (2002) Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proceedings: Software, 149(6), pp. 169-176. (doi: 10.1049/ip-sen:20020909)

Renaud, K. (2001) Teaching Programming from a Distance - Problems and a Proposed Solution. Sigcse Bulletin Vol 33,

Book Sections

Alkharashi, A. and Renaud, K. (2018) Privacy in crowdsourcing: a systematic review. In: Chen, L., Manulis, M. and Schneider, S. (eds.) Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings. Series: Lecture notes in computer science (11060). Springer: Cham, pp. 387-400. ISBN 9783319991351 (doi: 10.1007/978-3-319-99136-8_21)

van Biljon, J. and Renaud, K. (2015) Facilitating knowledge visualisation as communication and knowledge transfer mechanism in postgraduate learning. In: Brown, T. H. and van der Merwe, H. J. (eds.) The Mobile Learning Voyage - From Small Ripples to Massive Open Waters. Series: Communications in computer and information science (560). Springer International Publishing: Cham, pp. 156-171. ISBN 9783319256832 (doi: 10.1007/978-3-319-25684-9_12)

Marsh, S., Dwyer, N., Basu, A., Storer, T. , Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

Murray, D. and Renaud, K. (2012) Privacy and the citizen. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Renaud, K. (2012) User issues in security. In: Buie, E. and Murray, D. (eds.) Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann: Waltham, MA. ISBN 9780123910639

Conference or Workshop Item

Maguire, J. and Renaud, K. (2013) How Do You Solve A Problem Like Authentication? Human Factors in the Safety and Security of Critical Systems, University of Glasgow, UK, 18 Mar 2013.

Maguire, J. and Renaud, K. (2011) An Alternative Avatar. British HCI 2011 Health, Wealth and Happiness, Newcastle, UK, 4-8 Jul 2011.

Conference Proceedings

Dupuis, M., Renaud, K. and Searle, R. (2022) Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk. In: 23rd Annual Conference on Information Technology Education, Chicago, IL, USA, 21-24 Sep 2022, pp. 127-129. ISBN 9781450393911 (doi: 10.1145/3537674.3555783)

Renaud, K., Searle, R. and Dupuis, M. (2021) Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? In: New Security Paradigms Workshop (NSPW '21), 26-28 Oct 2021, pp. 70-87. ISBN 9781450385732 (doi: 10.1145/3498891.3498896)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) Implement a Model for Describing and Maximising Security Knowledge Sharing. In: 15th International Conference for Internet Technology and Secured Transactions (ICITST-2020), 8-10 Dec 2020, ISBN 9781913572211 (doi: 10.23919/ICITST51030.2020.9351318)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. In: 16th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2019), Dubai, United Arab Emirates, 09-10 Dec 2019, pp. 376-390. ISBN 9783030443214 (doi: 10.1007/978-3-030-44322-1_28)

Alkaldi, N., Renaud, K. and Mackenzie, L. (2019) Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs. In: 52nd Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA, 08-11 Jan 2019, pp. 4824-4833. ISBN 9780998133126

Al Ahmari, S., Renaud, K. and Omoronyia, I. (2018) A Systematic Review of Information Security Knowledge-Sharing Research. In: 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland, 29-31 Aug 2018, pp. 101-110. ISBN 9780244402549

Renaud, K., Zimmermann, V., Maguire, J. and Draper, S. (2017) Lessons Learned from Evaluating Eight Password Nudges in the Wild. In: The LASER Workshop: Learning from Authoritative Security Experiment Results, Arlington, VA, USA, 18-19 Oct 2017, pp. 25-37. ISBN 9781931971416

Aleisa, N. and Renaud, K. (2017) Privacy of the Internet of Things: A Systematic Literature Review. In: 50th Hawaii International Conference on System Sciences, Hawaii, USA, 4-7 Jan 2017, ISBN 9780998133102 (doi: 10.24251/HICSS.2017.717)

Aleisa, N. and Renaud, K. (2017) Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions. In: IoTBDS 2017: 2nd International Conference on Internet of Things: Big Data and Security, Porto, Portugal, 24-26 Apr 2017, pp. 198-205. ISBN 9789897582455 (doi: 10.5220/0006233701980205)

Ghiglieri, M., Volkamer, M. and Renaud, K. (2017) Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks. In: International Conference on Human-Computer Interaction, Vancouver, Canada, 9-14 July 2017, pp. 656-674. (doi: 10.1007/978-3-319-58460-7_45)

Renaud, K. and van Biljon, J. (2017) Charting the Path Towards Effective Knowledge Visualisations. In: Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17), Thab 'Nchu, South Africa, 26-28 Sep 2017, ISBN 9781450352505 (doi: 10.1145/3129416.3129421)

Alkaldi, N. and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452

Aßmuth, A., , , , and , (2016) Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. In: 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordon, 02-04 Aug 2016, pp. 144-150. ISBN 9781509026579 (doi: 10.1109/CCC.2016.30)

Alkaldi, N. and Renaud, K. (2016) Why do People Adopt, or Reject, Smartphone Security Tools? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 135-144. ISBN 9781841024134

Alkhamis, E. and Renaud, K. (2016) The Design and Evaluation of an Interactive Social Engineering Training Programme. In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 125-134. ISBN 9781841024134

Gutmann, A., Volkamer, M. and Renaud, K. (2016) Memorable And Secure: How Do You Choose Your PIN? In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), Frankfurt, Germany, 19 - 21 July 2016, pp. 156-166. ISBN 9781841024134

Gutmann, A., Renaud, K., Maguire, J. , Mayer, P., Volkamer, M., Matsuura, K. and Muller-Quade, J. (2016) ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. In: 1st IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, 21-24 Mar 2016, pp. 357-371. ISBN 9781509017515 (doi: 10.1109/EuroSP.2016.35)

Kulyk, O., Gerber, P., El Hanafi, M., Reinheimer, B., Renaud, K. and Volkamer, M. (2016) Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do. In: USEC Workshop, San Diego, California, 21 Feb 2016, ISBN 1891562428

Volkamer, M., Renaud, K., Kulyk, O. and Emeröz, S. (2015) A Socio-Technical Investigation into Smartphone Security. In: 11th International Workshop (STM 2015), Vienna, Austria, 21-22 Sep 2015, pp. 265-273. ISBN 9783319248578 (doi: 10.1007/978-3-319-24858-5_17)

Maguire, J. and Renaud, K. (2015) Alternative Authentication in the Wild. In: 5th Annual Workshop on Socio-Technical Aspects in Security and Trust, co-located with the 28th IEEE Computer Security Foundations Symposium, Verona, Italy, 13-17 Jul 2015, pp. 32-39. (doi: 10.1109/STAST.2015.13)

Macdonald, C. and Renaud, K. (2015) Experiences Implementing SQL Design Patterns in a First Year Computing Science Degree Database Course. In: TLAD 2015: 13th International Workshop on Teaching, Learning and Assessment of Databases, Birmingham UK, 3 July 2015,

Renaud, K., Hoskins, A. and von Solms, R. (2015) Biometric Identification: Are We Ethically Ready? In: Information Security for South Africa (ISSA 2015), Johannesburg, South Africa, 12-14 Aug 2015, pp. 1-8. ISBN 9781479977543 (doi: 10.1109/ISSA.2015.7335051)

Renaud, K. and Maguire, J. (2015) Regulating Access to Adult Content (with Privacy Preservation). In: CHI 2015, Seoul, Korea, 18-23 Apr 2015, pp. 4019-4028. ISBN 9781450331456 (doi: 10.1145/2702123.2702456)

Renaud, K., English, R., Wynne, T. and Weber, F. (2014) You have three tries to lockout. Why three? In: 8th International Symposium on Human Aspects of Information Security, Plymouth, UK, 8-10 Jul 2014, pp. 101-111.

He, Y., Johnson, C. , Renaud, K., Lu, Y. and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi: 10.1109/CSIT.2014.6805998)

Renaud, K., Volkamer, M. and Maguire, J. (2014) ACCESS: Describing and Contrasting Authentication Mechanisms. In: Human Aspects of Information Security, Privacy, and Trust, Crete, Greece, 22 - 27 Jun 2014, pp. 183-194. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_17)

Renaud, K., Kennes, D., van Niekerk, J. and Maguire, J. (2013) SNIPPET: Genuine Knowledge-Based Authentication. In: 12th Annual Conference on Information Security South Africa, Johannesburg, South Africa, 14-16 Aug 2013, pp. 1-8. (doi: 10.1109/ISSA.2013.6641059)

Renaud, K. and Maguire, J. (2013) Shrinking the Authentication Footprint. In: Seventh International Symposium on Human Aspects of Information Security & Assurance, Lisbon, Portugal, 8-9 May 2013, pp. 2-11. ISBN 9781841023458

Renaud, K., Mayer, P., Volkamer, M. and Maguire, J. (2013) Are Graphical Authentication Mechanisms as Strong as Passwords? In: Federated Conference on Computer Science and Information Systems, Kraków, Poland, 8-11 Sep 2013, pp. 837-844.

Storer, T. , Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

Storer, T. , Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Muller, H., van Biljon, J. and Renaud, K. (2012) Information visualization in research reporting: guidelines for representing quantitative data. In: Southern African Computer Lecturers Association (SACLA) Conference, Thaba Nchu, SA, 1-3 July 2012,

Ordean, M. and Renaud, K. (2012) Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. In: 8th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, 30 Aug - 1 Sept 2012,

Renaud, K. and Maguire, J. (2012) You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. In: HCI 2012 People and Computers XXVI, Birmingham, UK, 12-14 Sept 2012,

van Dyk, T., Renaud, K. and van Biljon Moses, J. (2012) Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly. In: SAICSIT 2012, Centurion, Tshwane, SA, 1 – 3 Oct 2012,

Goucher, W. and Renaud, K. (2011) In a world of their own: working on the move. In: The 25th BCS Conference on Human Computer Interaction, Newcastle Upon Tyne, UK, 4-8 Jul 2011, pp. 461-466.

Renaud, K. and Just, M. (2010) Pictures or questions? Examining user responses to association-based authentication. In: HCI 2010 The 24th BCS Conference on Human Computer Interaction, University of Abertay, Dundee, 6th-10th September 2010, (Unpublished)

Cockshott, P. and Renaud, K. (2010) Extending handivote to handle digital economic decisions. In: ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, Edinburgh, UK, 14-16 April 2010,

Gibson, M., Conrad, M., Maple, C. and Renaud, K. (2010) Accessible and secure? Design constraints on image and sound based passwords. In: The International Conference on Information Society (i-society 2010), London, UK, 28-30 Jun 2010, pp. 423-428.

Gibson, M., Renaud, K., Conrad, M. and Maple, C. (2009) Musipass: authenticating me softly with "my" song. In: New Security Paradigms Workshop 2009, Oxford, UK, 8-11 Sep 2009,

Renaud, K. (2009) Web authentication using Mikon images. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, NB, Canada, 25-27 Aug 2009, pp. 79-88.

Renaud, K., Cockshott, T. and Hair, M. (2009) Everyone Abandons - Eventually: Understanding the Online Shopping Experience. In: 11th IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria., 20-23 July 2009,

Renaud, K. and Maguire, J. (2009) Armchair authentication. In: The 23rd British BCS Human Computer Interaction Group Annual Conference on People and Computers: Celebrating People and Technology, Cambridge, UK, 1-5 Sep 2009, pp. 388-397.

Van Biljon, J. and Renaud, K. (2009) Distance education as enabler in crossing the digital divide: will the phoenix fly? In: 3rd International Development Informatics Association Conference, Kruger National Park, South Africa, 28-30 Oct 2009,

Ramsay, J., Renaud, K., Hair, M. and Saddique, S. (2008) Having it all: how students combine traditional and digitally mediated communication. In: IADIS International Conference Web Based Communities 2008, Amsterdam, The Netherlands, 24-26 Jul 2008,

Renaud, K. and Van Biljon, J. (2008) Predicting technology acceptance and adoption by the elderly: a qualitative study. In: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Wilderness, South Africa, 6-8 Oct 2008, pp. 210-219. (doi: 10.1145/1456659.1456684)

Renaud, K.V., McBryan, T. and Siebert, J.P. (2008) Password cueing with cue(ink)blots. In: IADIS Computer Graphics and Visualization, Amsterdam, The Netherlands, 24-26 Jul 2008,

Van Biljon, J. and Renaud, K. (2008) A qualitative study of the applicability of technology acceptance models to senior mobile phone users. In: International Workshop on Modeling Mobile Applications and Services, Barcelona, Spain, 20-23 Oct 2008, pp. 228-237. (doi: 10.1007/978-3-540-87991-6_28)

Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

Renaud, K. and Cockshott, W.P. (2007) Electronic plebiscites. In: MeTTeG07, Camerino, 27-28 September 2007,

Renaud, K., Lo, J., Bishop, J., Zyl, P.v. and Worrall, B. (2003) Algon: a framework for supporting comparison of distributed algorithm performance. In: Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, 5-7 Febuary 2003, pp. 425-432. ISBN 9780769518756 (doi: 10.1109/EMPDP.2003.1183620)

Renaud, K. and Dyk, T.V. (2001) Tailoring e-commerce sites to ease recovery after disruptions. In: 25th Annual International Computer Software and Applications Conference, 2001, Chicago, Illinois, 8-12 October 2001, pp. 603-608. ISBN 9780769513720 (doi: 10.1109/CMPSAC.2001.960674)

This list was generated on Sat Dec 21 01:49:34 2024 GMT.