Follow
Karen Renaud
Karen Renaud
Department of Computer and Information Sciences, University of Strathclyde
Verified email at strath.ac.uk - Homepage
Title
Cited by
Cited by
Year
Predicting technology acceptance and adoption by the elderly: a qualitative study
K Renaud, J Van Biljon
Proceedings of the 2008 annual research conference of the South African …, 2008
4972008
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
A De Angeli, L Coventry, G Johnson, K Renaud
International journal of human-computer studies 63 (1-2), 128-152, 2005
3682005
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective
K Renaud, J Ramsay, M Hair
International Journal of Human-Computer Interaction 21 (3), 313-332, 2006
1822006
The influence of self-esteem and locus of control on perceived email-related stress
M Hair, KV Renaud, J Ramsay
Computers in Human Behavior 23 (6), 2791-2803, 2007
1572007
Approximations, vol. 842 of Lecture Notes in Computer Science
T Kloks, C Treewidth
Springer, 1994
142*1994
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014
1322014
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
1262013
Evaluating authentication mechanisms
K Renaud
Security and usability, 103-128, 2005
1192005
A qualitative study of the applicability of technology acceptance models to senior mobile phone users
J Biljon, K Renaud
International Conference on Conceptual Modeling, 228-237, 2008
1032008
On user involvement in production of images used in visual authentication
K Renaud
Journal of Visual Languages & Computing 20 (1), 1-15, 2009
872009
My password is here! An investigation into visuo-spatial authentication mechanisms
K Renaud, A De Angeli
Interacting with computers 16 (6), 1017-1041, 2004
862004
Privacy of the Internet of Things: a systematic literature review (extended discussion)
N Aleisa, K Renaud
arXiv preprint arXiv:1611.03340, 2016
852016
Quantifying the quality of web authentication mechanisms a usability perspective
K Renaud
Journal of Web Engineering, 095–123-095–123, 2004
822004
Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset
V Zimmermann, K Renaud
International Journal of Human-Computer Studies 131, 169-187, 2019
782019
Understanding user perceptions of transparent authentication on a mobile device
H Crawford, K Renaud
Journal of Trust Management 1 (1), 1-28, 2014
742014
Why do people adopt, or reject, smartphone password managers?
N Alkaldi, K Renaud
662016
Success factors in information security implementation in organizations
M Al-Awadi, K Renaud
IADIS International Conference e-Society, 169-176, 2007
652007
Now what was that password again? A more flexible way of identifying and authenticating our seniors
K Renaud, J Ramsay
Behaviour & Information Technology 26 (4), 309-322, 2007
612007
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
602017
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number Theory and Cryptography, 255-280, 2013
572013
The system can't perform the operation now. Try again later.
Articles 1–20