Karen Renaud

Dr, Professor Extraordinaire (UNISA), Visiting Professor (Rhodes University), Visiting Professor (Abertay University), SICSA Cyber Security Theme Lead

  • United Kingdom

Accepting PhD Students

Filter
Conference contribution book

Search results

  • 2025

    A holistic list of privacy-preserving measures for system development life cycles

    Hills, A., Da Veiga, A., Loock, M. & Renaud, K., 13 Mar 2025, Advanced Research in Technologies, Information, Innovation and Sustainability: 4th International Conference, ARTIIS 2024, Santiago de Chile, Chile, October 21–23, 2024, Revised Selected Papers, Part III. Guarda, T., Portela, F. & Gatica, G. (eds.). Cham: Springer, p. 283-300 18 p. (Communications in Computer and Information Science; vol. 2347).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Downloads (Pure)
  • A value-driven approach to the online consent conundrum - a study with the unemployed

    Schaik, P. V. & Renaud, K., 1 Mar 2025, Proceedings of the 11th International Conference on Information Systems Security and Privacy . Di Pietro, R., Renaud, K. & Mori, P. (eds.). Vol. 1. p. 133-140 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
  • Risk assessment & mitigation for core security capabilities

    Dupuis, M. J. & Renaud, K., 25 Feb 2025, Proceedings - 2024 APWG Symposium on Electronic Crime Research, eCrime 2024. IEEE, p. 43-57 15 p. (eCrime Researchers Summit, eCrime).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    File
  • "When data breaches happen, where does the buck stop ... and where should it stop?"

    Das Chowdhury, P., Renaud, K. & Rashid, A., 16 Jan 2025, NSPW '24: Proceedings of the 2024 New Security Paradigms Workshop. New York, NY, p. 106-125 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
  • 2024

    "Pass auf!" - Child-oriented cyber safety & security educational content

    Bopp, K., Heinemann, A. & Renaud, K., 12 Jul 2024, (Accepted/In press) Mensch Und Computer 2024.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Are UK parents empowered to act on their cybersecurity education responsibilities?

    Prior, S. & Renaud, K., 1 Jun 2024, HCI for Cybersecurity, Privacy and Trust: 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 – July 4, 2024, Proceedings, Part I. Moallem, A. (ed.). Cham: Springer, p. 77-96 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    3 Downloads (Pure)
  • A cybersecurity deresponsibilization framework & coefficient

    Orgeron, C., Renaud, K. & Craig, A., 22 Mar 2024, Proceedings for the Academy of Business Research: Spring 2024 Conference. p. 42 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2023

    ‘Ought’ should not assume ‘Can’? Basic capabilities in cybersecurity to ground Sen’s capability approach

    Das Chowdhury, P. & Renaud, K., 22 Dec 2023, NSPW '23: Proceedings of the 2023 New Security Paradigms Workshop. p. 76-91 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023)

    Chhetri, M. B., Liu, X., Grobler, M., Hoang, T., Renaud, K. & Arora, C., 2 Nov 2023, 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW). IEEE, (2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Universal Design for Website Authentication: Views and Experiences of Senior Citizens

    Ophoff, J. & Renaud, K. V., 2 Nov 2023, 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW). IEEE, (2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    1 Citation (Scopus)
  • Encouraging organisational information security incident reporting

    Ballreich, F. L., Volkamer, M., Müllmann, D., Berens, B., Häußler, E. M. & Renaud, K., 16 Oct 2023, EuroUSEC '23: Proceedings of the 2023 European Symposium on Usable Security. New York, p. 224–236 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    28 Downloads (Pure)
  • Content analysis of persuasion principles in mobile instant message phishing

    Ahmad, R., Terzis, S. & Renaud, K., 26 Jul 2023, Human Aspects of Information Security & Assurance: 17th International Symposium on Human Aspects of Information Security & Assurance. Furnell, S. & Clarke, N. (eds.). Cham, Switzerland: Springer, p. 324-336 13 p. (IFIP Advances in Information and Communication Technology; vol. 674).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)
  • Investigating mobile instant messaging phishing: a study into user awareness and preventive measures

    Ahmad, R., Terzis, S. & Renaud, K., 9 Jul 2023, HCI for Cybersecurity, Privacy and Trust: 5th International Conference on HCI for Cybersecurity, Privacy and Trust. Moallem, A. (ed.). Cham, Switzerland: Springer, p. 381-398 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    29 Downloads (Pure)
  • 2022

    SOK : young children's cybersecurity knowledge, skills & practice: a systematic literature review

    Lamond, M., Renaud, K., Wood, L. & Prior, S., 29 Sept 2022, EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable Security: 2022 European Symposium on Usable Security, EuroUSEC 2022. New York, p. 14–27 14 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Citations (Scopus)
    46 Downloads (Pure)
  • Crowdsourcing quality concerns: an examination of Amazon's mechanical turk

    Dupuis, M., Renaud, K. & Searle, R., 21 Sept 2022, SIGITE 2022 - Proceedings of the 23rd Annual Conference on Information Technology Education: Proceedings of the 23rd Annual Conference on Information Technology Education. New York, p. 127-129 3 p. (SIGITE 2022 - Proceedings of the 23rd Annual Conference on Information Technology Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    12 Citations (Scopus)
  • 2021

    Shame in cyber security: effective behavior modification tool or counterproductive foil?

    Renaud, K., Searle, R. & Dupuis, M., 27 Dec 2021, NSPW '21 : New Security Paradigms Workshop. New York, NY., p. 70–87 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    18 Citations (Scopus)
    478 Downloads (Pure)
  • Scaring people is not enough: an examination of fear appeals within the context of promoting good password hygiene

    Dupuis, M., Jennings, A. & Renaud, K., 9 Oct 2021, SIGITE '21: Proceedings of the 22st Annual Conference on Information Technology Education. New York, p. 35-40 6 p. (SIGITE 2021 - Proceedings of the 22nd Annual Conference on Information Technology Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    56 Downloads (Pure)
  • Cognitive function vs accessible authentication: insights from dyslexia research

    Ophoff, J., Johnson, G. & Renaud, K., 19 Apr 2021, Proceedings of the 18th International Web for All Conference: W4A 2021. New York, NY, USA, 5 p. 19. (Proceedings of the 18th International Web for All Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    14 Downloads (Pure)
  • Contemplating blame in cyber security

    Renaud, K., Musarurwa, A. & Zimmermann, V., 23 Feb 2021, Proceedings of the 16th International Conference on Cyber Warfare and Security: ICCWS 2021. Lopez, J., Siraj, A. & Perumalla, K. (eds.). Reading, p. 309-317 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Implement a model for describing and maximising security knowledge sharing

    Alahmari, S., Renaud, K. & Omoronyia, I., 18 Feb 2021, 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). Piscataway, N.J.: IEEE, p. 177-180 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    2 Citations (Scopus)
    15 Downloads (Pure)
  • Accessible cyber security: the next frontier?

    Renaud, K., 13 Feb 2021, Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021). Mori, P., Gabriele, L. & Furnell, S. (eds.). Setúbal, Portugal, p. 9-18 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    9 Citations (Scopus)
    103 Downloads (Pure)
  • Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?

    Musarurwa, A., Renaud, K. & Schürmann, T., 22 Jan 2021, Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops. New York, NY, USA, 6 p. (ASE '20).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Revealing the cyber security non-compliance "attribution gulf"

    Ophoff, J. & Renaud, K., 5 Jan 2021, Proceedings of the 54th Annual Hawaii International Conference on System Sciences, HICSS 2021. Bui, T. X. (ed.). Honolulu, HI, p. 4557-4566 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    6 Citations (Scopus)
    47 Downloads (Pure)
  • 2020

    Conducting "in-person" research during a pandemic

    Dupuis, M. J. & Renaud, K., 7 Oct 2020, Proceedings of the 21st Annual Conference on Information Technology Education. New York: Association for Computing Machinery (ACM), p. 320-323 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    24 Downloads (Pure)
  • KidzPass: authenticating pre-literate children

    Stewart, M., Campbell, M., Renaud, K. & Prior, S., 28 Sept 2020, The 2020 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13. Vance, A. (ed.). [S.I.], 14 p. 17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    34 Downloads (Pure)
  • Smartphone security awareness, perceptions and practices: a Welsh higher education case study

    Cranfield, D. J., Venter, I. M., Blignaut, R. J. & Renaud, K., 2 Mar 2020, INTED2020 Proceedings: 14th International Technology, Education and Development Conference. Valencia, p. 3014-3023 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2019

    A framework to maximise the communicative power of knowledge visualisations

    Renaud, K. & van Biljon, J., 30 Sept 2019, SAICSIT '19: Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019. New York: Association for Computing Machinery (ACM), 10 p. 2

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    5 Citations (Scopus)
    52 Downloads (Pure)
  • Comparing 'challenge-based' and 'code-based' internet voting verification implementations

    Kulyk, O., Henzel, J., Renaud, K., Volkamer, M., Lamas, D. (Editor), Nacke, L. (Editor), Petrie, H. (Editor), Loizides, F. (Editor), Winckler, M. (Editor) & Zaphiris, P. (Editor), 29 Aug 2019, Human-Computer Interaction – INTERACT 2019: 17th IFIP TC 13 International Conference Proceedings, Part I. Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M. & Zaphiris, P. (eds.). Cham: Springer, Vol. 11746. p. 519-538 20 p. ( Lecture Notes in Computer Science; vol. 11746).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    8 Citations (Scopus)
    74 Downloads (Pure)
  • Human-Computer Interaction for Development (HCI4D): The Southern African Landscape

    Biljon, J. V., Renaud, K., Nielsen, P. (Editor) & Kimaro, H. C. (Editor), 20 Jun 2019, Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D. Nielsen, P. & Kimaro, H. C. (eds.). Cham: Springer, Vol. 552. 14 p. (IFIP Advances in Information and Communication Technology book series IFIPAICT; vol. 552).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    8 Citations (Scopus)
    86 Downloads (Pure)
  • Investigating the tension between cloud-related actors and individual privacy rights

    Duncan, B., Renaud, K., Mackenzie, B., Lee, Y. W. (Editor), Westerlund, M. (Editor) & Aßmuth, A., 5 May 2019, CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization. Duncan, B., Lee, Y. W., Westerlund, M. & Aßmuth, A. (eds.). International Academy, Research, and Industry Association (IARIA), p. 19-24 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Deliver security awareness training, then repeat

    Gundu, T., Flowerday, S. & Renaud, K., 2 May 2019, 2019 Conference on Information Communications Technology and Society (ICTAS). Piscataway, New Jersey: IEEE, p. 106-111 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    14 Citations (Scopus)
    34 Downloads (Pure)
  • Case study – exploring children's password knowledge and practices

    Choong, Y.-Y., Theofanos, M., Renaud, K. & Prior, S., 21 Feb 2019, Proceedings 2019 Workshop on Usable Security (USEC). Reston, VA, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    12 Downloads (Pure)
  • 2018

    Visualization of African knowledge to embody the spirit of African storytelling

    Van Biljon, J., Renaud, K. & Chimbo, B., 3 Dec 2018, Proceedings of the 2nd African Conference for Human Computer Interaction: Thriving Communities, AfriCHI 2018. Winschiers-Theophilus, H., van Zyl, I., Goagoses, N., Singh Jat, D., Belay, E. G., Orji, R. & Peters, A. (eds.). New York, United States: Association for Computing Machinery (ACM), p. 271-272 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors

    Warkentin, M., Goel, S., Williams, K. J. & Renaud, K., 29 Nov 2018, ECIS 2018 Proceedings. Atlanta, Georgia, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    15 Downloads (Pure)
  • How to make privacy policies both GDPR-compliant and usable

    Renaud, K. & Shepherd, L., 29 Nov 2018, 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Piscataway, New Jersey: IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    31 Citations (Scopus)
    24 Downloads (Pure)
  • M4D reflections on the maturity of the Mobile Communication Technology for Development (M4D)

    Biljon, J. V. & Renaud, K., 15 Nov 2018, Proceedings of the 6th International Conference on M4D Mobile Communication Technology for Development: M4D 2018, 15-16 November 2018, Kampala, Uganda. Baguma, R. & Sören Pettersson, J. (eds.). Karlstad, Sweden, Vol. 47. p. 7-18 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    27 Downloads (Pure)
  • Designing authentication with seniors in mind

    Renaud, K., Scott-Brown, K. C. & Szymkowiak, A., 30 Sept 2018, Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018, Barcelona, Spain. New York: Association for Computing Machinery (ACM), 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Downloads (Pure)
  • A systematic review of Information security knowledge-sharing research

    Al-Ahmari, S., Renaud, K. & Omoronyia, I., 10 Sept 2018, 12th International Symposium on Human Aspects of Information Security & Assurance. Clarke, N. L. & Furnell, S. M. (eds.). Plymouth, p. 101-110 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    117 Downloads (Pure)
  • POINTER: A GDPR-compliant framework for human pentesting (for SMEs)

    Archibald, J. & Renaud, K., 29 Aug 2018, Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018). Furnell, N. & Clarke, S. (eds.). [S.I.], p. 147-157 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Privacy in crowdsourcing: a systematic review

    Alkharashi, A. & Renaud, K., 15 Aug 2018, Information Security: ISC 2018. Cham, Switzerland: Springer-Verlag, p. 387-400 14 p. (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    133 Downloads (Pure)
  • Developing and evaluating a five minute phishing awareness video

    Volkamer, M., Renaud, K., Reinheimer, B., Rack, P., Ghiglieri, M., Mayer, P., Kunz, A., Gerber, N., Furnell, S. (Editor), Mouratidis, H. (Editor) & Pernul, G. (Editor), 27 Jul 2018, Trust, Privacy and Security in Digital Business : Proceedings 15th International Conference on Trust, Privacy and Security in Digital Business. Cham: Springer, Vol. 11033. p. 119-134 16 p. (Lecture Notes in Computer Science; vol. 11033).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    17 Citations (Scopus)
    14 Downloads (Pure)
  • How to design browser security and privacy alerts

    Shepherd, L. A. & Renaud, K., 6 Apr 2018, AISB 2018: Symposium on Digital Behaviour Interventions for Cyber-Security. Bath, UK, p. 21-28 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    12 Downloads (Pure)
  • Dark clouds on the horizon: the challenge of cloud forensics

    Ferguson, R. I., Renaud, K., Irons, A., Duncan, B. (Editor), Lee, Y. W. (Editor) & Olmsted, A. (Editor), 18 Feb 2018, Proceedings the Ninth International Conference on Cloud Computing, GRIDs, and Virtualization. International Academy, Research, and Industry Association (IARIA), 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    29 Downloads (Pure)
  • 2017

    Lessons learned from evaluating eight password nudges in the wild

    Renaud, K., Zimmerman, V., Maguire, J. & Draper, S., 31 Oct 2017, Proceedings of LASER 2017: Learning from Authoritative Security Experiment Results. Berkeley, CA, 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    13 Citations (Scopus)
    14 Downloads (Pure)
  • Risk homeostasis in information security: New Security Paradigms Workshop

    Renaud, K. & Warkentin, M., 4 Oct 2017, NSPW 2017: Proceedings of the 2017 New Security Paradigms Workshop. New York: Association for Computing Machinery (ACM), p. 57-69 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    13 Citations (Scopus)
  • Yes, I know this IoT device might invade my privacy, but I love it anyway. A study of Saudi Arabian perceptions

    Aleisa, N. & Renaud, K., 24 Apr 2017, Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS. Setúbal, Portugal, p. 198-205 8 p. (International Conference on the Internet of Things).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    13 Citations (Scopus)
    25 Downloads (Pure)
  • 2016

    Cybersecurity and the unbearability of uncertainty

    Renaud, K. & Weir, G. R. S., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway, NJ.: IEEE, p. 137-143 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    32 Citations (Scopus)
    216 Downloads (Pure)
  • Validating mobile phone design guidelines. Focusing on the elderly in a developing country

    Biljon, J. V. & Renaud, K., 26 Sept 2016, SAICSIT '16: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists. Blauw, F. F. & Coetzee, M. (eds.). New York, 10 p. 44

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    12 Citations (Scopus)
  • Why do people adopt, or reject, smartphone password managers?

    Alkaldi, N. & Renaud, K., 18 Jul 2016, 1st European Workshop on Usable Security : EuroUSEC 2016. Darmstadt, 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    148 Downloads (Pure)
  • TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

    Volkamer, M., Renaud, K. & Reinheimer, B., 11 May 2016, ICT Systems Security and Privacy Protection. SEC 2016. IFIP Advances in Information and Communication Technology. Cham: Springer, Vol. 471.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    17 Citations (Scopus)