Karen Renaud
Karen Renaud
Division of Cyber Security, Abertay University
Bestätigte E-Mail-Adresse bei abertay.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A comprehensive survey on fog computing: State-of-the-art and research challenges
C Mouradian, D Naboulsi, S Yangui, RH Glitho, MJ Morrow, PA Polakos
IEEE Communications Surveys & Tutorials 20 (1), 416-464, 2017
3452017
Predicting technology acceptance and adoption by the elderly: a qualitative study
K Renaud, J Van Biljon
Proceedings of the 2008 annual research conference of the South African …, 2008
3022008
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
A De Angeli, L Coventry, G Johnson, K Renaud
International journal of human-computer studies 63 (1-2), 128-152, 2005
2882005
Following the crowd
S Greengard
Communications of the ACM 54 (2), 20-22, 2011
214*2011
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective
K Renaud, J Ramsay, M Hair
International Journal of Human-Computer Interaction 21 (3), 313-332, 2006
1382006
The influence of self-esteem and locus of control on perceived email-related stress
M Hair, KV Renaud, J Ramsay
Computers in Human Behavior 23 (6), 2791-2803, 2007
1232007
Evaluating authentication mechanisms
K Renaud
Security and usability, 103-128, 2005
992005
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
942013
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014
872014
My password is here! An investigation into visuo-spatial authentication mechanisms
K Renaud, A De Angeli
Interacting with computers 16 (6), 1017-1041, 2004
862004
A qualitative study of the applicability of technology acceptance models to senior mobile phone users
J Van Biljon, K Renaud
International Conference on Conceptual Modeling, 228-237, 2008
792008
On user involvement in production of images used in visual authentication
K Renaud
Journal of Visual Languages & Computing 20 (1), 1-15, 2009
772009
Quantifying the quality of web authentication mechanisms: a usability perspective
K Renaud
Journal of Web Engineering 3 (2), 95-123, 2004
712004
Now what was that password again? A more flexible way of identifying and authenticating our seniors
K Renaud, J Ramsay
Behaviour & Information Technology 26 (4), 309-322, 2007
532007
Visual passwords: cure-all or snake-oil?
K Renaud, A De Angeli
Communications of the ACM 52 (12), 135-140, 2009
522009
Success factors in information security implementation in organizations
M Al-Awadi, K Renaud
IADIS International Conference e-Society, 169-176, 2007
512007
Guidelines for designing graphical authentication mechanism interfaces.
K Renaud
IJICS 3 (1), 60-85, 2009
492009
Don’t do this–Pitfalls in using anti-patterns in teaching human–computer interaction principles
P Kotzé, K Renaud, J van Biljon
Computers & Education 50 (3), 979-1008, 2008
492008
Understanding user perceptions of transparent authentication on a mobile device
H Crawford, K Renaud
Journal of Trust Management 1 (1), 7, 2014
482014
Jiminy: helping users to remember their passwords
K Renaud, E Smith
432001
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20