Yaquina Bay Bridge, Newport, Oregon ©Virginia Sventek

SICSA Cyber Security Theme Leader

Blog on my latest research


  • 24-25 March 2019: CyberUK: You're only Human, and that's OK.
  • 27 March 2019: Rotary Group: Cyber Crime is a Fact of Life ... but that's ok
  • 11 March 2019: Monifeith Chamber of Commerce: What do you do with a problem like Cyber Security?
  • 17 January 2019: Graduate Women Scotland (East) Group
  • Christmas Piece in The Courier
  • 17 October 2018: Fulbright Cyber Security Panel, London
  • Excellent Debate last night with Cameron Colquhoun and Jamie Collier.
  • 20 September 2018: Stirling University. Title: The Ethics of Nudging In Information Privacy & Security
    Workshop on Applied Ethics of Nudging organised
    by Philip Ebert and Conny Wollbrandt
  • 4 July 2018: Birmingham University. Title: A Software Engineer Ventures into Behavioural Economics Invited by Ganna Pogrebna
  • 30 June 2018: Fulbright TedX, Story Telling Centre, Edinburgh
  • 26 June 2018: Keynote, Conference on Public Sector Fraud, Edinburgh
  • 14 June 2018: Debate (Why Does Everything Get Hacked?) with John Moor and Chris Merritt as Moderator CloudFlare Internet Summit, London
  • 12 June 2018: Keynote, CyberSA Conference, Glasgow. Title: Getting REAL ... about the Reasons for Insecure Behaviours
  • 25 May 2018: Talk to group at KIT, Karlsruhe
  • 8 May 2018: Technical University Darmstadt, Darmstadt
  • 24 April 2018: Glasgow Business Club, Ibrox, Glasgow
  • 14 March, 2018: Inaugural Address at Abertay. Title: "Cyber Security: Blame is not the Name of the Game"
  • August 2017: ISSA Conference, Johannesburg. Title: "Users Behave Insecurely.… Why Do they Do That?"
  • 18th December 2017: Amberg University. Title: "Mythbusting Common Beliefs about Security Behaviours"

  Abertay Cyber Security Hall of Fame

Building a Bridge between Humans and Cyber Security

My research focuses on human-centred security, a branch of Human Computer Interaction (HCI). I am interested in the interplay between users and security in the context of societal and industrial use. I want to work towards creating a natural easy yet secure interaction between humans and devices. My work has a strong development, experimental and deployment focus, testing solutions in practical situations. I have come up with a number of novel solutions to improve usability in a wide range of situations. I have also done fundamental work in understanding people's mental models of security in a variety of applications and contexts.

I have a wide range of other interests, including electronic voting, accessible technology, mobile phone design for elderly users, knowledge visualisation and the use of email in organisations.

About Me

  • Professor of Cybersecurity, Division of Cybersecurity, Abertay University
  • Professor Extraordinarius, University of South Africa
  • Fulbright Cyber Security Scholar 2016/17.  Blog about my Fulbright
  • Associate Editor:
    • IJHCS
    • JISA
    • IEEE Transactions on Comp Fraud & Security
    • Information Technology and People
    • Co-Editor with Stephen Flowerday, Special Issue on Human-Centred Security (JISA),
    • Co-Editor of JISA Special Issue on Electronic Voting
    • Co-Editor with Melanie Volkamer of Special Issue on Human and Privacy Aspects of IoT
  • Columnist: Computer Fraud & Security
  • Open Technology Fund Reviewer
  • Commonwealth Alumni Mentor
  • Royal Academy of Engineering Industrial Secondment Awardee   RAE Secondment Report
  • Association of Commonwealth Universities PhD Scholarship Awardee
  • Council for Scientific and Industrial Research (RSA) Undergraduate Scholarship Awardee

Stop Press

BJET Paper: The Role of Knowledge Visualisation in Supporting Postgraduate Dissertation Assessment

Regulating Children's Access to Adult Content

Fulbright Scholars 2016/17
University Press ReleaseFulbright Website

Emailing Birds (BBC Report)

Email Stress

Research Areas

  • Usable Security
  • Electronic Voting (Handivote)
  • Mental Models
  • Access Control for Children
  • Mobile Phone Usage by the Elderly
  • Security Management
  • Knowledge Visualization
  • Visual Authentication
  • Security Awareness

Recent Activities

Why Governments Should Treat Cybersecurity the Way They Do Infectious Diseases
By Karen Renaud and Stephen Flowerday
September 10, 2018
Wonderful memories from Starkville, MS

Little Dooey

McCool Hall, MSU

Starkville Cafe

Visited Karlsruhe Insitute of Technology on a wonderfully warm summer day.
I was a Mercator Fellow in the Department of Psychology at Technical University Darmstadt in May 2018
Amberg University
Keynote at ISSA Johannesburg, August 2017

TIFS Editor Meeting in New Orleans, March 2017

USEC 2017 in San Diego (26 February 2017)

Visited Isabella Venter and Renette Blignaut UWC, September 2014

Visited Judy van Biljon UNISA, February 2014

Visited Rossouw von Solms and Johan van Niekerk NMMU, March 2014

My Collaborators

Melanie Volkamer

T U Darmstadt
Karlstad University

Judy van Biljon

University of South Africa

Merrill Warkentin

Mississippi State University

Andreas Gutmann


Andreas Aßmuth

Amberg and Weiden University

Stephen Flowerday

Fort Hare University

Isabella Venter


Renette Blignaut


Paul Gerber

TU Darmstadt

Paul Cockshott

University of Glasgow

Brandon Valeriano

Marine Corps University

Marcia Gibson

University of Bedfordshire

Oksana Kulyk

TU Darmstadt

Karola Marky

TU Darmstadt

Verena Schochlow

TU Darmstadt

Jackie Archibald

Abertay University

Lynsay Shepherd

Abertay University

Shane Horgan

Edinburgh University

Giampaolo Bella

Università di Catania

Luca Vigano

Kings College London

School Roles

  • Coordinator Human-Centred Security Research Group
  • 2010-2015: School Learning and Teaching Committee Convenor
  • 2010-2015: College Learning and Teaching Committee
  • 2010-2015: Member of Computing Science Management Group
  • 2010-2014: Academic Standards Committee
  • 2008-2010: Research Student Committee
  • 2008; 2015-: College Ethics Committee
  • 2010-: Advisor of Studies
  • 2013-: Senate Appeals Committee
  • 2002-2007: Level 3 Year Head
  • 2003-2004: Level 4 Year Head
  • Level 3 Project Coordinator
  • 2012/13: BCS Accreditation Coordinator
  • 2013/14: Institutional Review Coordinator
  • 2014: Cyber Security Centre of Excellence Application Coordinator
  • 2015: Athena Committee Member

Industrial Experience

  • Iron and Steel Corporation of South Africa - Development of a Truck Allocation System for the Sishen Iron Ore Mine
  • Iron and Steel Corporation of South Africa - Access Control System for Durnacol Coal Mine
  • System Support: Kentron

Programming Languages

  • PL/1
  • Fortran
  • LISP
  • Smalltalk
  • Java
  • C++
  • PHP
  • Cold Fusion
  • Javascript
  • jQuery
  • SQL
  • Dynamic HTML

Fulbright Scholars 2016/17 © Leo Johnson

Contact Me

Division of Cybersecurity
Abertay University
Bell Street

k.renaud at abertay.ac.uk