Publications

    I publish on the following topics: Human-Centred Security, Security Management, Privacy, Resilience, IoT, Electronic Voting, Authentication, Security Behaviour, Knowledge Visualization, Email, Behavioural Security and then a variety of other topics related to HCI and Security/Privacy.

    Cybercrime Summer School 2024 Abstracts

    Wall Street Journal Parents Who Share Info About Their Kids Online Are a Cybersecurity Risk. Here’s Why. Chelsea Jarvie and Karen Renaud. 4 Dec 2022. https://archive.is/UJgcW

    Wall Street Journal. WSJ
    If You Can’t See or Understand Cybersecurity Safeguards, How Do You Stay Secure?
    6 Sept 2022

    Wall Street Journal. The Problem With ‘Complex’ Passwords

    The route to salvation lies in your inbox Financial Times. 18 December, 2017

    2024

    1. Rosalind Searle, Karen V. Renaud, Lisa van der Werff. Shaken to the core: trust trajectories in the aftermaths of adverse cyber events. Journal of Intellectual Capital. Vol. 25 No. 5/6, pp. 1154-1183. https://doi.org/10.1108/JIC-02-2024-0038
    2. Vivek Nallur, Karen Renaud, Aleksei Gudkov. Nudging Using Autonomous Agents: Risks and Ethical Considerations. EUMAS 2024 https://doi.org/10.48550/arXiv.2407.16362
    3. Juraj Sikra, Karen Renaud, Daniel Thomas. Identifying Factors that Promote or Deter Cybercrimes Reporting in Scotland. Journal of Economic Criminology Volume 6, December 2024, 100103 https://doi.org/10.1016/j.jeconc.2024.100103 VIDEO
    4. Paul van Schaik, Karen Renaud. PEDRO: Privacy-Enhancing Decision suppoRt tOol. Computing and Artificial Intelligence. Appl. Sci. 2024, 14(20), 9275; https://doi.org/10.3390/app14209275
    5. Marc Dupuis, Rosalind Searle, Karen Renaud. Finding Grace in Responses to Adverse Cybersecurity Incidents. Journal of Intellectual Capital.https://doi.org/10.1108/JIC-04-2024-0128 VIDEO
    6. 7th Strathclyde International Perspectives on Cybercrime Summer School
    7. Chelsea Jarvie. Online Age Verification: Government Legislation; Supplier Responsibilization; Public Perceptions. Children
    8. Karl van der Schyff, Suzanne Prior, Karen Renaud. Privacy Policy Analysis: A Scoping Review and Research Agenda. Computers and Security. https://doi.org/10.1016/j.cose.2024.104065
    9. Partha Das Chowdhury, Karen Renaud. When Data Breaches Happen, Where Does the Buck Stop … and Where Should it Stop? NSPW 2024. Bradford, USA. 16-19 September 10.1145/3703465.3703474
    10. Marc Dupuis, Karen Renaud. Risk Assessment & Mitigation for Core Security Capabilities. eCrime 2024. SEPTEMBER 24-26. MASSACHUSETTS, USA
    11. Alida Hills, Adele Da Veiga, Marianne Loock and Karen Renaud. A Holistic List of Privacy-Preserving Measures for System Development Life Cycles. International Conference on Advanced Research in Technologies, Information, Innovation, and Sustainability (ARTIIS 2024), Universidad Andrés Bello, Santiago de Chile, Chile, between the 21th and 23th of October 2024
    12. Partha Das Chowdhury and Karen Renaud. Advocating a Policy Push Towards Inclusive and Secure “Digital-First” Societies. IEEE Security and Privacy. 10.1109/MSEC.2024.3431278
    13. Takudzwa Mutyavaviri, Karl van der Schyff and Karen Renaud. Dishonesty, Neutralisation and Nudging. EURO Journal of Decision Making. 2024.https://doi.org/10.1016/j.ejdp.2024.100052
    14. Karen Renaud. The Q-Z of cyber security. Computer Fraud & Security.
    15. Renaud, K., & Warkentin, M. (2024). The insider threat ‘zoo’. Computer Fraud & Security, 2024(5).
    16. Karen Renaud, Cigdem Sengul, Kovila Coopamootoo, Bryan Clift, Jacqui Taylor, Mark Springett, Ben Morrison. ‘We’re not that Gullible!’ Revealing Dark Pattern Mental Models of 11-12 Year Old Scottish Children. TOCHI. Volume 31 Issue 3 Pages 1 – 41 https://doi.org/10.1145/3660342
    17. Ahmad, Rufai; Terzis, Sotirios; Renaud, Karen. Getting Users to Click: A Content Analysis of Phishers’ Tactics and Techniques in Mobile Instant Messaging Phishing. Information and Computer Security. https://doi.org/10.1108/ICS-11-2023-0206
    18. Renaud, K. V., Warkentin, M., Pogrebna, G., Van der Schyff, K. (2023). VISTA: An Inclusive Insider Threat Taxonomy, with Mitigation Strategies, Information & Management, 61, 1, January 2024, https://doi.org/10.1016/j.im.2023.103877 YouTube Video
    19. Paul van Schaik and Karen Renaud. Gauging the Unemployed’s Perceptions of Online Consent Forms. HICSS 2024. Oahu
    20. Paul van Schaik, Alastair Irons and Karen Renaud. Privacy in UK Police Digital Forensics Investigations. HICSS 2024. Oahu

    2023

    1. Suzanne Prior. Karen Renaud. Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities? HCI International. 29 June – 4 July 2024.
    2. Fahad Alanazi, Karen Renaud, Irina Tal. Understanding the Impact of Dyslexia on Online Privacy and Security. IEEE Cyber Research Conference Ireland November 24th, 2023 – Atlantic Technological University, Letterkenny
    3. Partha Das Chowdhury and Karen Renaud. ‘Ought’ should not assume ‘Can’ … Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach. New Security Paradigms Workshop. 2023. Segovia, Spain. 18-21 Sept. https://doi.org/10.1145/3633500.3633506 Video
    4. Fabian Lucas Ballreich, Melanie Volkamer, Dirk Müllmann, Benjamin Berens, Elena Marie Häußler, Karen Renaud. Encouraging Organisational Information Security Incident Reporting. EuroUSEC 2023. Copenhagen, Denmark.
    5. Jacques Ophoff and Karen Renaud. Universal Design for Website Authentication. After age 60, it is more a case of preventing authentic people from using the site than anything else! 2023 Workshop on Human Centric Software Engineering and Cyber Security. co-hosted with the 38th IEEE/ACM International Conference on Automated Software Engineering from Mon 11 – Fri 15 September 2023 in Kirchberg, Luxembourg. https://ieeexplore.ieee.org/xpl/conhome/10298259/proceeding
    6. Suzanne Prior, Karen Renaud. Who is Best Placed to Support Cyber Responsibilized UK Parents? 10th Anniversary of Children: Challenges and Opportunities towards the Future. https://www.mdpi.com/journal/children/special_issues/89XAG2T73S, 10(7), 1130; https://doi.org/10.3390/children10071130
    7. Karen Renaud, Marc Dupuis. Cybersecurity Insights Gleaned from World Religions. Computers & Security. https://doi.org/10.1016/j.cose.2023.103326
    8. Rufai Ahmed, Sotirious Terzis, Karen Renaud. Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. HAISA 2023.
    9. Karen Renaud, Karl van der Schyff, Stuart MacDonald. Would US Citizens Accept Cybersecurity Deresponsibilization? Perhaps not. Computers & Security. Volume 131, August 2023, p103301 https://doi.org/10.1016/j.cose.2023.103301
    10. Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday. Online Privacy Fatigue: A Scoping Review and Research Agenda. future internet. https://www.mdpi.com/1999-5903/15/5/164 15(5), 164; https://doi.org/10.3390/fi15050164
    11. Douha, N’guessan Yves-Roland; Renaud, Karen; Taenaka, Yuzo; Kadobayashi, Youki. Smart Home Cybersecurity Awareness and Behavioral Incentives. Information and Computer Security. https://www.emerald.com/insight/content/doi/10.1108/ICS-03-2023-0032/full/html Volume 31 Issue 5 https://doi.org/10.1108/ICS-03-2023-0032
    12. Karen Renaud, Merrill Warkentin, George Westerman From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI MIT Sloan (Alphabetical Ordering – all authors contributed equally)
    13. Karen Renaud. Paul van Schaik. What Values should Online Consent Forms Satisfy? A Scoping Review. Dewald Roode Workshop 2023. Glasgow, Scotland
    14. Chelsea Jarvie, Karen Renaud. The “Nessa” System: Can Images from Age-Related `Reminiscence Bumps’ Help Us Separate Grown-Ups from Kids? Dewald Roode Workshop 2023. Glasgow, Scotland
    15. Mike Mcguire, Karen Renaud. Harm, Injustice & Technology. Reflections on the UK’s Subpostmasters. The Howard Journal of Crime and Justice. Volume 62, Issue 4. December 2023. Pages 441-461 http://doi.org/10.1111/hojo.12533 Video
    16. Juraj Sikra, Karen Renaud, Daniel Thomas. 2023. UK Cybercrime, Victims and Reporting: A Systematic Review Commonwealth Cybercrime Journal. TVolume 1, issue 1, pages 28-59. https://thecommonwealth.org/publications/commonwealth-cybercrime-journal-volume-1-issue-1/uk-cybercrime-victims-and-reporting-systematic-review
    17. Oksana Kulyk, Karen Renaud. Stefan Costica. People want Reassurance when making Privacy-Related Decisions — not Technicalities. The Journal of Systems & Software. https://doi.org/10.1016/j.jss.2023.111620
    18. Rufai Ahmed, Karen Renaud, Sotirios Terzis Investigating Mobile Instant Messaging Phishing: A study into user awareness and preventive measures. HCII 2023
    19. Rosalind Searle, Karen Renaud. Trust and Vulnerability in the Cybersecurity Context. HICSS 2023.
    20. Karen Renaud. Human-centred cyber secure software engineering. Wissenschaftliche Beiträge. Zeitschrift für Arbeitswissenschaft. Volume 77, Issue 1 pages 45 – 55 https://rdcu.be/c2bKn https://doi.org/10.1007/s41449-022-00346-2

    2022

    1. Patricia Nevin, Karen Renaud, George Finney. Slow down and frown to improve phishing detection. Computer Fraud & Security. Volume 2022, Number 10. Published Online:29 Oct 2022 https://doi.org/10.12968/S1361-3723(22)70593-3
    2. Isabella M. Venter, Desirée Joy Cranfield, Andrea Tick, Renette J. Blignaut, Karen V. Renaud. ‘Lockdown’: digital and emergency eLearning technologies – a student perspective. Electronics. 2022. https://doi.org/10.3390/electronics11182941
    3. Karen Renaud, Rosalind Searle, Marc Dupuis. Cybersecurity Regrets: I’ve had a few …. Je Ne Regrette. NSPW 2022. New Hampshire, USA. October, 2022. https://doi.org/10.1145/3584318.3584319
    4. Marc Dupuis, Karen Renaud, Rosalind Searle. Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk. The 23rd ACM Conference on Information Technology Education (SIGITE 2022). Chicago, Illinois, Pages 127–129, September 21-24, 2022. https://doi.org/10.1145/3537674.3555783
    5. Mudzamba, Ronald; van der Schyff, Karl; Renaud, K. The challenges of cloud adoption among South African small to medium enterprises: A thematic analysis. The Electronic Journal of Information Systems in Developing Countries. https://doi.org/10.1002/isd2.12235
    6. Maria Lamond, Karen Renaud, Lara Wood, Suzanne Prior. SOK: Young Children’s cybersecurity Knowledge and Skills. EuroUSEC 2022. Karlsruhe, Sept. https://dl.acm.org/doi/10.1145/3549015.3554207
    7. G Bella, J Ophoff, K Renaud, D Sempreboni, L Vigano. Perceptions of beauty in security ceremonies, Philosophy & Technology. 35, 72 (2022) 10.1007/s13347-022-00552-0 Open Access
    8. Karen Renaud, Lizzie Coles-Kemp. Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN Computer Science. 3:346 https://doi.org/10.1007/s42979-022-01239-1. Full text here
    9. Karen Renaud. The A-Z of cyber security. Network Security. https://www.sciencedirect.com/science/article/abs/pii/S1353485821001343
    10. Karen Renaud, Marc Dupuis. Should we scare people into behaving securely? Network Security. https://www.sciencedirect.com/science/article/pii/S1353485819301357
    11. Karen Renaud, Zinaida Benenson, Daniela Oliveira. Balancing resistance and resilience. Network Security. July. https://www.sciencedirect.com/science/article/abs/pii/S1353485820300830
    12. Karen Renaud. Learning from the past. Network Security. https://www.sciencedirect.com/science/article/abs/pii/S1353485821000313
    13. Karen Renaud. To phish, or not to phish… Network Security. https://www.sciencedirect.com/science/article/pii/S1353485817301058
    14. Karen Renaud. Strong passwords can’t keep children safe. Network Security. https://www.sciencedirect.com/science/article/abs/pii/S1353485820300337
    15. Karen Renaud. Encouraging password manager use. https://www.sciencedirect.com/science/article/pii/S1353485819300753
    16. Mohan Baruwal Chhetri, Xiao Liu, Marthie Grobler, Thuong Hoang, Karen Renaud, Jennifer McIntosh. Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021). ACM SIGSOFT Software Engineering NotesVolume 47Issue 2 April 2022 pp 12–14. https://doi.org/10.1145/3520273.3520278.
    17. Karl van der Schyff, Karen Renaud, Juliet Pichart. Investigating the mediating effects of phubbing on self-presentation and FoMO within the context of excessive Instagram use. Cogent Psychology. 2022. Volume 9, Issue 1. https://doi.org/10.1080/23311908.2022.2062879 https://cogentoa.tandfonline.com/doi/full/10.1080/23311908.2022.2062879
    18. Karl van der Schyff, Stephen Flowerday, Karen Renaud. Socially desirable responding within the context of privacy-related research: A personality perspective. SA Journal of Information Management. 2022. ISSN: 2078-1865. https://sajim.co.za/index.php/sajim/article/view/1507
    19. Verena Zimmermann, Karola Marky, Karen Renaud. Hybrid Password Meters for More Secure Passwords – A Comprehensive Study of Password Meters including Nudges and Password Information. Behaviour & Information Technology. Volume 42, Issue 6, https://doi.org/10.1080/0144929X.2022.2042384.
    20. Marc Dupuis and Karen Renaud. Risk Assessment & Mitigation for Core Security Capabilities. White Paper. 2022
    21. N Alkaldi, Karen Renaud. MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory. ACM SIGMIS Database: The Database of Advanced Information Systems. 2022. Volume 53 Issue 2 May 2022 pp 63–95 https://doi.org/10.1145/3533692.3533698 Video
    22. Suzannne Prior and Karen Renaud. The Impact of Financial Deprivation on Children’s Cybersecurity Knowledge & Abilities. Education and Information Technologies, 27, pages 10563–10583 2022. https://doi.org/10.1007/s10639-022-10908-w
    23. Marc Dupuis, Karen Renaud, Anna Jennings. Fear might motivate secure password choices in the short term, but at what cost? HICSS 2022. Hawaii.
    24. Bongiovanni, Ivano; Renaud, Karen; Brydon, Humphrey; Blignaut, Renette; Cavallo, Angelo. A Quantification Mechanism for Assessing Adherence to Information Security Governance Guidelines. Information and Computer Security. Volume 30 Issue 4 pp. 517-548 https://doi.org/10.1108/ICS-08-2021-0112. 2022 https://www.emerald.com/insight/content/doi/10.1108/ICS-08-2021-0112/full/html
    25. Renaud, K., Flowerday, S., & van der Schyff, K. (2021). Uncertainty in cyber de-responsibilisation. Computer Fraud & Security, 2021(8), 13-19. https://doi.org/10.1016/S1361-3723(21)00086-5
    26. Karen Renaud, Melanie Volkamer, Peter Mayer, Rüdiger Grimm. Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass. AIS Transactions on Human Computer Interaction. 13(4), 407-430. https://doi.org/10.17705/1thci.00155

    2021

    1. Karen Renaud.The burden of keeping passwords secret. Network Security. Vol 2024, Number 6. https://doi.org/10.12968/S1353-4858(24)70027-0
    2. Andrea Tick, Desiree Cranfield, Isabella Venter, Karen Renaud, Renette Blignaut. Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19. Electronics 2021, 10(22), 2865; https://doi.org/10.3390/electronics10222865
    3. Oksana Kulyk, Karen Renaud. “I need to know I’m safe and protected and will check”: Users Want Cues to Signal Data Custodians’ Trustworthiness. 2021 Workshop on Human Centric Software Engineering and Cyber Security. 15 November 2021. https://research.csiro.au/distributed-systems-security/hcse-cs-2021/
    4. Karen Renaud, Amel Attatfa, Tony Craig. Positioning Diplomacy within a Strategic Response to the Cyber Conflict Threat. October 08, 2021. Volume 13176 of the Lecture Notes in Computer Science. Springer Nature Switzerland AG 2022 S. Parkin and L. Vigan`o (Eds.): STAST 2021, LNCS 13176, pp. 1–22, 2022. https://doi.org/10.1007/978-3-031-10183-0_7 Mentioned in the 1 October 2021 The GCSC Weekly Newsletter
    5. Karen Renaud, Rosalind Searle, Marc Dupuis. Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? NSPW 2021. 25-28 October. https://doi.org/10.1145/3498891.3498896 Online. If you’d like to listen to the paper, I read it onto audio files.
    6. Chelsea Jarvie, Karen Renaud. ARE YOU OVER 18? A SNAPSHOT OF CURRENT AGE VERIFICATION MECHANISMS Dewald Roode Workshop. 2021. San Antonio.
    7. Karen Renaud, Deanna House, Teju Herath. It takes a society to protect children’s privacy rights. Dewald Roode Workshop. 2021. San Antonio.
    8. Desireé Cranfield, Andrea Tick, Isabella M. Venter, Renette J. Blignaut and Karen Renaud. Higher Education Students’ Perceptions of Online Learning during COVID-19—A Comparative Study. Education Sciences. 2021. 11, 403. https://doi.org/10.3390/educsci11080403
    9. Tawanda Blessing Chiyangwa, Judy van Biljon, Karen Renaud. Natural Language Processing Techniques to Reveal Human-Computer Interaction for Development Research Topics. ICARTI 2021. Mauritius 9-10 December. https://dl.acm.org/doi/10.1145/3487923.3487932
    10. Adele Da Veiga, Mariaane Loock, Karen Renaud. Cyber4Dev-Q: Calibrating Cyber Awareness in the Developing Country Context. The Electronic Journal of Information Systems in Developing Countries. 2021. Questionnaire. 88(1), e12198. https://doi.org/10.1002/isd2.12198
    11. Marc Dupuis, Anna Jennings, Karen Renaud. Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene. SIGITE. Brigham Young University and Utah Valley University and will take place at the Snowbird Resort, October 6-9, 2021. https://doi.org/10.1145/3450329.3476862
    12. Karen Renaud. Cyber security is a team sport. Network Security. July 2021. p. 20
    13. Wall Street Journal June 2021

      What Keeps People From Using Password Managers? Karen Renaud and Norah Alkaldi.
    14. Karen Renaud, Jacques Ophoff. A Cyber Situational Awareness Model to Predict the Implementation of Cyber Security Controls and Precautions by SMEs. Organizational Cybersecurity Journal. Volume 1, Issue 1. 2021. Data hereFunding
    15. Karen Renaud, Ivano Bongiovanni, Sara Wilford, Alastair Irons. PRECEPT-4-Justice: A Bias-Neutralising Framework for Internal Digital Forensics Investigations. Science & Justice. 2021.https://doi.org/10.1016/j.scijus.2021.06.003 Volume 61, Issue 5, September 2021, Pages 477-492
    16. Judy van Biljon and Karen Renaud. Reviewing a Decade of Human–Computer Interaction for Development (HCI4D) Research, as One of Best’s “Grand Challenges”. The African Journal of Information and Communication (AJIC), 27, 1-15 https://doi.org/10.23962/10539/31368
    17. Karen Renaud, Stephen Flowerday, Marc Dupuis. Moving from employee compliance to employee success in the cyber security domain. Computer Fraud and Security. April 2021. p16-29
    18. Judy van Biljon and Karen Renaud. How can Human-Computer Interaction designers “at the margins” benefit from Artificial Intelligence & Machine Learning? CHI Workshop: Artificially Intelligent Technology for the Margins: A Multidisciplinary Design Agenda. 2021.
    19. Building better digital public spaces Information Security Chapter
    20. Jacques Ophoff, Graham Johnson, Karen Renaud. Cognitive Function vs. Accessible Authentication: Insights from Dyslexia Research. Web4All. Slovenia. April 2021. https://doi.org/10.1145/3430263.3452427. Nominated for Best Communication Award
    21. Jacques Ophoff, Karen Renaud. Revealing the Cyber Security Non-Compliance “Attribution Gulf”. HICSS-54. January 2021. Nominated for Best Prize Award
    22. Verena Zimmermann, Karen Renaud. The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. ACM Transactions on Computer-Human Interactions. 28(1). 2021 https://chi2021.acm.org. Teaser Video
    23. Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie. Users’ Information Disclosure Determinants in Social Networking Sites – A Systematic Literature Review. 23rd International Conference on Privacy and Information Technology on May, 24-25, 2021 at Montreal, Canada.
    24. Karen Renaud, Suzanne Prior. The “Three M’s” Counter-Measures to Children’s Risky Online Behaviours: Mentor, Mitigate and Monitor Information and Computer Security. 2021. https://doi.org/10.1108/ICS-07-2020-0115
    25. Karen Renaud, Graham Johnson, Jacques Ophoff. Accessible Authentication: Dyslexia and Password Strategies. Information and Computer Security. Volume 29, Issue 4, pp. 604-624. 2021. https://doi.org/10.1108/ICS-11-2020-0192
    26. Karen Renaud. Accessible Cyber Security: The Next Frontier? Keynote. ICISSP 2021
    27. Karen Renaud, Verena Zimmermann, Tim Schurmann, Carlos Bohm. Exploring Cybersecurity-Related Emotions and Finding that they are Challenging to Measure. Humanities and Social Sciences Communications. 8(Article 75). 2021. https://doi.org/10.1057/s41599-021-00746-5

    2020

    1. Wall Street Journal 22 June 2020
    2. Wall Street Journal 7 Dec 2020
    3. Karen Renaud. Your used USB drive might look empty, but it probably isn’t. Public Sector Executive. Nov/Dec 2020
    4. Karen Renaud, Verena Zimmermann. How to Nudge in Cybersecurity. Network Security November 2020. https://doi.org/10.1016/S1353-4858(20)30132-X
    5. Karen Renaud, Alfred Musarurwa, Verena Zimmermann. Contemplating Blame in Cyber Security. 16th International Conference on Cyber Warfare and Security. 25 February- 26 February 2021, at Tennessee Tech University, Cookeville, Tennessee, U.S.A
    6. Karen Renaud. Cyber Security Responsibilization of Citizens A Paradigm Mismatch? Keynote Abstract. ESORICS SPOSE Workshop 17-18 Sept, 2020.
    7. Karen Renaud, Suzanne Prior. Password education should be age-appropriate: here’s how. The Conversation. Picked up by Daily Hunt India, Beijing News and the Venezuela Star
    8. Michaela Stewart, Mhairi Campbell, Karen Renaud, Suzanne Prior. KidzPass: Authenticating Pre-Literate Children. The 2020 Dewald Roode Workshop on Information Systems Security Research October 2, 2020 – October 3, 2020
    9. Ivano Bongiovanni and Karen Renaud. Universities are a juicy prize for cyber criminals. Here are 5 ways to improve their defences. The Conversation. Sept 2020.
    10. Karen Renaud. Password Education: Do it early and often. SIPR Annual Report 2019/2020
    11. Alfred Musarurwa, Karen Renaud, Tim Shürmann. Zimbabwean Non-Uptake of Protective Point-of-Sale Behaviours: Is this a Risk Homeostasis Response? Workshop on Human Centric Software Engineering and Cyber Security at the ASE 2020 Conference. 21st September 2020. Melbourne.
    12. Marc Dupuis, Karen Renaud. Conducting “In-Person” Research During a Pandemic. 21st ACM Annual Conference on Information Technology Education (SIGITE 2020). 2020. Omaha. USA. https://doi.org/10.1145/3368308.3415420
    13. Marc Dupuis, Karen Renaud. Scoping the Ethical Principles of Cybersecurity Fear Appeals. Ethics and Information Technology. https://doi.org/10.1007/s10676-020-09560-0 https://rdcu.be/b8Nxb Video
    14. Ivano Bongiovanni, Karen Renaud, Noura Aleisa. The privacy paradox: we claim we care about our data, so why don’t our actions match? The Conversation. 29 July 2020
    15. Karen Renaud, Paul van Schaik, Alastair Irons, Sara Wilford. 2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying. https://arxiv.org/abs/2006.06340
    16. James Conacher, Karen Renaud, Jacques Ophoff. Caveat Venditor, Used USB Drive Owner. arXiv. https://arxiv.org/abs/2006.11354. (As of 04 December 2021, downloaded 627 times from SSRN)
    17. Karen Renaud. How to Teach Kids to Use Passwords. Wall Street Journal. https://www.wsj.com/articles/how-to-teach-kids-to-use-passwords-11592658901
    18. Karen Renaud, Graham Johnson and Jacques Ophoff. Dyslexia and Password Usage: Accessibility in Authentication Design. HAISA 2020
    19. Esra Alkhamis, Helen Petrie, Karen Renaud. KidsDoodlePass: an Exploratory Study of an Authentication Mechanism for Young Children. HAISA 2020
    20. Karen Renaud. The Endowment Effect. Encyclopedia of Cryptography, Security and Privacy. Eds: S. Jajodia , P. Samarati , M. Yung. Berlin, Springer. ISBN: 9783642277399
    21. Karen Renaud and Suzanne Prior. Children’s Password-Related Books: Efficacious, Vexatious and Incongruous. Early Childhood Education Journal. 49(3), 387-400. https://doi.org/10.1007/s10643-020-01067-z
    22. Noura Aleisa, Karen Renaud, Ivano Bongiovanni. The Privacy Paradox Applies to IoT Devices Too: A Saudi Arabian Study Computers & Security. https://doi.org/10.1016/j.cose.2020.101897
    23. Amel Attatfa, Karen Renaud, Stefao De Paoli. Cyber Diplomacy: A Systematic Literature Review. KES2020 Conference. Verona Italy. 16-18 September 2020. https://doi.org/10.1016/j.procs.2020.08.007
    24. Karen Renaud, Craig Orgeron, Merrill Warkentin, P. Edward French Cyber Security Responsibilization: An Evaluation of the Intervention Approaches Adopted by the Five Eyes Countries and China. Public Administration Review. Volume 89, Issue 4 July/August 2020 (2019 Impact Factor: 4.063). Pages 577-589. https://doi.org/10.1111/puar.13210 Winner of the Louis Brownlow Award 2021
    25. Suzanne Prior and Karen Renaud. Age-Appropriate Password “Best Practice” Ontologies for Early Educators and Parents. International Journal of Child-Computer Interaction. Volumes 23–24, June 2020, https://doi.org/10.1016/j.ijcci.2020.100169. https://www.sciencedirect.com/science/article/abs/pii/S2212868920300040?via%3Dihub Video
    26. Ivano Bongiovanni, Karen Renaud, George Cairns. Securing Intellectual Capital: An Exploratory Study in Australian Universities. Journal of Intellectual Capital. Vol. 21 No. 3, pp. 481-505 2020. https://doi.org/10.1108/JIC-08-2019-0197
    27. Ian Ferguson, Karen Renaud, Sara Wilford, Alastair Irons. PRECEPT: A FRAMEWORK FOR ETHICAL DIGITAL FORENSICS INVESTIGATIONS. Journal of Intellectual Capital. Vol. 21 No. 2, pp. 257-290. https://doi.org/10.1108/JIC-05-2019-0097 2020 https://doi.org/10.1108/JIC-05-2019-0097
    28. Paul van Schaik, Karen Renaud, Christopher Wilson, Jurjen Jansen, Joseph Onibokun. Risk as affect: the affect heuristic in cybersecurity. Computers & Security. Volume 90, March 2020. https://doi.org/10.1016/j.cose.2019.101651
    29. Karen Renaud. Exploring Research at the Intersection of Intellectual Capital and Cyber Security Editorial to Special Issue: Information Security & Privacy, Journal of Intellectual Capital. Vol. 21 No. 2, pp. 141-143. https://doi.org/10.1108/JIC-03-2020-284.
    30. Karen Renaud. A Strong Password Cannot Keep a Child Safe Online. Network Security. p20. January 2020.

    2019

    1. Wall Street Journal 17 September 2019
    2. D.J. Cranfield, I.M. Venter, R.J. Blignaut, K. V. Renaud. SMARTPHONE SECURITY AWARENESS, PERCEPTIONS AND PRACTICES: A WELSH HIGHER EDUCATION CASE STUDY. Proceedings of INTED2020 Conference. 2nd-4th March 2020, Valencia, Spain
    3. Saad Alamahri, Karen Renaud, Iadh Ounis. A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. Springer. 6th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2019), Dubai, United Arab Emirates, 09-10 Dec 2019, pp 376-390. https://link.springer.com/chapter/10.1007%2F978-3-030-44322-1_28
    4. Yee-Yin Choong, Mary F Theofanos, Karen Renaud, Suzanne Prior. “Passwords protect my stuff” — a study of children’s password practicesJournal of Cybersecurity, Volume 5, Issue 1, 2019, tyz015. https://doi.org/10.1093/cybsec/tyz015
    5. Isabella Venter, Renette Blignaut, Karen Renaud, Anja Venter. Cyber security education is as essential as “The Three R’s” Heliyon. Volume 5, Issue 12, December 2019, e02855. https://authors.elsevier.com/sd/article/S2405-8440(19)36514-4 https://doi.org/10.1016/j.heliyon.2019.e02855
    6. Karen Renaud, Marc Dupuis. Cyber Security Fear Appeals: Unexpectedly Complicated. NSPW 2019. Costa Rica. September. Video Blog referring to this paper, written by Tom PendergastPodcast
    7. Karen Renaud. How We Got People to Create a Strong Password. Wall Street Journal. 17 Sept 2019.
    8. Karen Renaud and Jacques Ophoff. Modeling Inertia Causatives Dewald Roode Workshop. Louisiana Tech University in Bossier City, Louisiana. October 4-5, 2019.
    9. Saad Altamimi, Karen Renaud, Tim Storer. “I do it because they do it”: Social-Neutralisation in Information Security Practices of Saudi Medical Interns. CRiSIS 2019 (14th International Conference on Risks and Security of Internet and Systems). Oct 29-31, Hammamet, Tunisia. https://link.springer.com/chapter/10.1007/978-3-030-41568-6_15
    10. Karen Renaud, Basie von Solms, Rossouw von Solms. How does Intellectual Capital Align with Cyber Security? Journal of Intellectual Capital. Vol. 20 No. 5, pp. 621-641. 2019. https://doi.org/10.1108/JIC-04-2019-0079 (Highly Commended Emerald Literati Award)
    11. Karen Renaud and Judy van Biljon. A Framework to Maximise the Communicative Power of Knowledge Visualisations. SAICSIT 2019. Skukuza, South Africa. September 17-18.
    12. Karen Renaud and Verena Zimmermann. Encouraging Password Manager Reuse. Network Security. June 2019. https://doi.org/10.1016/S1353-4858(19)30075-3
    13. Karen Renaud. Why We Keep Coming Up With Such Unsafe Passwords. Wall Street Journal. 6 June 2019. https://www.wsj.com/articles/why-we-keep-coming-up-with-such-unsafe-passwords-11559573420
    14. Oksana Kulyk, Jan Henzel, Karen Renaud and Melanie Volkamer. Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations. INTERACT 2019. 2 – 6 September, 2019 in Paphos, Cyprus.
    15. Verena Zimmermann and Karen Renaud. Moving from a “Human-as-Problem” to a “Human-as-Solution” Cybersecurity Mindset. International Journal of Human Computer Studies. Volume 131, November 2019, Pages 169-187. Special Issue:50 Years of IJHCS. https://doi.org/10.1016/j.ijhcs.2019.05.005 https://authors.elsevier.com/a/1Zc2x3pfaRfSky
      Winner of second prize IANUS award for scientific-technological peace and security researchExecutive Summary Article in Techslang
    16. Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Vigano. An Investigation into the “Beautification” of Security Ceremonies. SECRYPT 2019. 26-18 July, Prague, Czech Republic. http://insticc.org/node/TechnicalProgram/icete/presentationDetails/79215
    17. Bob Duncan, Karen Renaud, Beverley Mackenzie. Investigating the Tension Between Cloud-Related Actors and Individual Privacy RightsCLOUD COMPUTING 2019. May 05, 2019 to May 09, 2019 – Venice, Italy. Best Paper Award.
    18. Jaqueline Archibald and Karen Renaud. Refining the POINTER “Human Firewall” Pentesting Framework Information and Computer Security. Vol. 26 No. 4, pp. 575-600. https://doi.org/10.1108/ICS-01-2019-0019 https://www.emeraldinsight.com/doi/full/10.1108/ICS-01-2019-0019
    19. Karen Renaud. Don’t Touch My Password! Humans of Cyber Security Blog
    20. Ganna Pogrebna, Karen Renaud and Boris Taratine. The many faces of active cyber Network Security. February 2019. https://doi.org/10.1016/S1353-4858(19)30026-1
    21. Merrill Warkentin, Karen Renaud, Bob Otondo. A secure relationship with passwords means not being too attached to how you pick them. The Conversation. February 2019
    22. Karen Renaud, Bob Otondo, Merrill Warkentin. “This is the way ‘I’ create my passwords” … does the endowment effect deter people from changing the way they create their passwords? Computers & Security Volume 82, May 2019, Pages 241-260. https://doi.org/10.1016/j.cose.2018.12.018 https://www.sciencedirect.com/science/article/pii/S016740481830909X​
    23. Yee-Yin Choong, Mary Theofanos, Karen Renaud, Suzanne Prior. Case Study – Exploring Children’s Password Knowledge and Practices. USEC 2019. 24 February. San Diego
    24. Judy van Biljon & Karen Renaud. Human-Computer Interaction for Development (HCI4D): the Southern African Landscape Southern-Driven Human Computer Interaction track. IFIP WG 9.4. 2019. Dar es Salaam, Tanzania May 1 – 3, 2019.
    25. Nora Alkaldi and Renaud, Karen, Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs (Extended Version) (October 2, 2018). Available at SSRN: https://ssrn.com/abstract=3259563
    26. Arijus Pleska, Andrew Hoskins, Karen Renaud. A Framework for Interrogating Social Images to Reveal an Emergent Archive of Modern War. IJHAC: A Journal of the Digital Humanities. Issue 13.1-2, p. 196-222, October 1, 2019. https://www.euppublishing.com/doi/abs/10.3366/ijhac.2019.0236?journalCode=ijhac
    27. Nora Alkaldi, Karen Renaud. Encouraging Password Manager Adoption by Meeting Adopter Needs. HICSS 52 2019. Maui, Hawai’i
    28. L Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian W Probst, Karen Renaud, Paul Watters. Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 52 2019. Maui, Hawai’i
    29. Tapiwa Gundu, Stephen Flowerday and Karen Renaud. Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy} ICTAS 2019 (Durban, South Africa). March 6-8, 2019

    2018

    1. Karen Renaud, Verena Zimmerman. Nudging Folks Towards Stronger Password Choices: Providing Certainty is the Key. Behavioural Public Policy. Volume 3, Issue 2, 12 February 2018, pp. 228-258. DOI: https://doi.org/10.1017/bpp.2018.3 https://doi.org/10.1017/bpp.2018.3
    2. Karen Renaud, Merrill Warkentin, Craig Orgeron. Swamped by cyberthreats, citizens need government protection. The Conversation. 29 November 2018 Albany Times Union Piece GovTech Salon
    3. Judy van Biljon & Karen Renaud. M4D Reflections on the Maturity of the Mobile Communication Technology for Development (M4D) Landscape: 2008-2016 KAMPALA, UGANDA, NOVEMBER 15-16 2018 https://www.kau.se/en/news/m4d-2018-conference-kampala-uganda-november-15-16-2018
    4. Karen Renaud & Stephen Flowerday. Why Governments Should Treat Cybersecurity the Way They Do Infectious Diseases 10 September 2018. http://behavioralscientist.org/why-governments-should-treat-cybersecurity-the-way-they-do-infectious-diseases/
    5. Karen Renaud. It’s time for governments to help their citizens deal with cybersecurityThe Conversation. August 26, 2018.
    6. Jacqueline Archibald, Karen Renaud. POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs). p. 147-157. HAISA 2018. 28-31 August, Dundee, Scotland.
    7. Saad Al Alamahri, Karen Renaud, Inah Omoronyia. A Systematic Review of Information Security Knowledge-Sharing Research. p. 101-110. HAISA 2018. 28-31 August, Dundee, Scotland.
    8. Karen Renaud, Stephen Flowerday, Merrill Warkentin, Craig Orgeron, William Cockshott. Is the Responsibilization of the Cyber Security Risk Reasonable and Judicious? Computers & Security. 78 (2018) 198–211. https://doi.org/10.1016/j.cose.2018.06.006 https://www.sciencedirect.com/science/article/pii/S0167404818303262 Video
    9. Abdulwhab Alkharashi & Karen Renaud. Privacy in Crowdsourcing: A Systematic Review. 21st Information Security Conference (ISC 2018) LNCS 11060, pp. 1–14, 9-12 Sept. London, UK.
    10. Karen Renaud, Kenneth Scott-Brown, Andrea Szymkowiak. Designing Authentication with Seniors in Mind. 20th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobHCI) Workshop on Mobile Privacy and Security for an Ageing Population. 3-6 September 2018.
    11. Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer. A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. Towards Understanding Why People Do, or Do Not, Shield PIN Entry. USENIX Symposium on Usable Privacy and Security (SOUPS). August~12-14. 2018. Baltimore, USA. Video
    12. Karen Renaud and Verena Zimmermann. Ethical Guidelines for Nudging in Information Security & Privacy. International Journal of Human Computer Studies. Volume 120, December, Pages 22-35 2018. https://doi.org/10.1016/j.ijhcs.2018.05.011
    13. Melanie Volkamer, Karen Renaud, Benjamin Maximilian Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video. TrustBus. 15th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS. Regensburg, Germany. 5-6 September 2018
    14. Gregory Bott and Karen Renaud. Are 21st-Century Citizens Grieving for their Loss of Privacy? 2018 Dewald Roode Workshop IFIP WG8.11/WG11.13. Cape Town. June 14-15, 2018. Listed on https://www.germanupa.de/arbeitskreise/arbeitskreis-usable-security-privacy/unsere-literaturempfehlungen
    15. Sanjay Goel, Merrill Warkentin, Kevin Williams, Karen Renaud. ARE WE PREDISPOSED TO BEHAVE SECURELY? INFLUENCE OF RISK DISPOSITION ON INDIVIDUAL SECURITY BEHAVIOURS. ECIS 2018. June 23rd – 28th. Portsmouth, UK http://ecis2018.eu/wp-content/uploads/2018/09/1456-doc.pdf
    16. Karen Renaud and Lynsay Shepherd. How to Make Privacy Policies both GDPR-Compliant and Usable. Cyber SA 2018 General Cybersecurity Conference June 11 – 12. Glasgow, United Kingdom
    17. Lynsay Shepherd & Karen Renaud. How to Design Browser Security and Privacy Alerts. AISB Workshop, Liverpool, April 2018.
    18. Keshav Kapoor, Karen Renaud & Jacqueline Archibald. Preparing for GDPR: Helping EU SMEs to Manage Data Breaches. AISB Workshop, Liverpool, April 2018.
    19. Jurlind Budurushi, Stephan Neumann, Karen Renaud, Melanie Volkamer. Introduction to special issue on e-voting. Journal of Information Security and Applications. Volume 38, February 2018, Pages 122-123 http://www.sciencedirect.com/science/article/pii/S2214212617306683
    20. Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer. What Did I Really Vote For? On the Usability of Verifiable Electronic Voting Schemes. CHI 2018. Montreal, Canada April 21–26, 2018
    21. Karen Renaud and Verena Zimmerman. Guidelines For Ethical Nudging In Password Authentication Derived From An Enriched Nudge Trial. Special Issue of SAIEE African Research Journal. p101-117. 2018. DOI:10.23919/SAIEE.2018.8531951
    22. Ian Ferguson, Karen Renaud, A.D. Irons. Dark Clouds on the Horizon. The Challenge of Cloud ForensicsCLOUD COMPUTING. February 18, 2018 to February 22, 2018 – Barcelona, Spain Best Paper Award
    23. Anthony Craig, Brandon Valeriano, Karen Renaud. Measuring Technological Capability in the International System. ISA Annual Convention, San Francisco, 2018. http://www.isanet.org/Conferences/San-Francisco-2018

    2017

    1. Karen Renaud & Judy van Biljon. Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection. South African Computing Journal. Volume 29, issue 3. December 2017. pp.127-144. https://doi.org/10.18489/sacj.v29i3.438
    2. Karen Renaud & Gareth Renaud. To Phish or not to Phish. Network Security. October 2017. https://doi.org/10.1016/S1353-4858(17)30105-8
    3. Karen Renaud, Verena Zimmerman, Joseph Maguire, Steve Draper. Lessons learned from evaluating eight password nudges in the WildLASER Workshop. Arlington. 18-19 October. 2017
    4. Karen Renaud & Merrill Warkentin. Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW, Oct 2017, San Francisco, USA
    5. Karen Renaud & Judy van Biljon. Charting the Path towards Effective Knowledge Visualisations. SAICSIT 2017. Bloemfontein, South Africa. 26-28 September.
    6. Karen Renaud & Verena Zimmerman. Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully. ISSA 2017. Johannesburg, South Africa. 9-10 August.
    7. Karen Renaud & Stephen Flowerday. Contemplating human-centred security & privacy research: Suggesting future directions. Journal of Information Security and Applications. Volumes 34, Part 1, June 2017 Pages 76-81. https://doi.org/10.1016/j.jisa.2017.05.007 http://www.sciencedirect.com/science/journal/22142126/34/part/P1?sdc=1
    8. Judy van Biljon & Karen Renaud. Harnessing both Information and Knowledge Visualisation to Represent a Community of Practice: Depicting the ICT4D Researcher Community in South Africa. African Conference on Information Systems and Technology (ACIST). July, Cape Town
    9. Karen Renaud. It Makes you Wanna Cry. Network Security. July 2017. p20. https://doi.org/10.1016/S1353-4858(17)30073-9
    10. Karen Renaud. Facts do not change minds. Network Security, April (p 20). https://doi.org/10.1016/S1353-4858(17)30041-7
    11. Karen Renaud, Merrill Warkentin. Using Intervention Mapping to Breach the Cyber-Defense Deficit. 12th Annual Symposium on Information Assurance (ASIA ’17) June 7-8, 2017 at Empire State Plaza in Albany, NY
    12. Noura Aleisa, Karen Renaud. Yes, I know this IoT device might invade my Privacy, but I love it anyway. A Study of Saudi Arabian Perceptions. 2nd Intl Conference on Internet of Things. Porto, Portugal. 24-26 April
    13. Karen Renaud. Webcam covering phenomenon. Network Security, January. (p.20) 2017. https://doi.org/10.1016/S1353-4858(17)30009-0
    14. M Volkamer, K Renaud, B Reinheimer, A Kunz. User Experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Computers & Security, Volume 71, November 2017, Pages 100-113. https://doi.org/10.1016/j.cose.2017.02.004
    15. Marco Ghiglieri, Melanie Volkamer, Karen Renaud. Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks. HCII Vancouver. 2017. LNCS p656-674
    16. Paul Gerber, Melanie Volkamer, Karen Renaud. The Simpler, the Better? Presenting the COPING Android Permission-Granting Interface for Better Privacy-related Decisions. Journal of Information Security and Applications 34 (2017): 8-26. https://doi.org/10.1016/j.jisa.2016.10.003
    17. Noura Aleisa & Karen Renaud. Privacy of the Internet of Things: A Systematic Literature Review. Hawaii International Conference on System Sciences HICSS-50: January 4-7, 2017 | Hilton Waikoloa Village

    2016

    1. C Kyfonidis, K Renaud. A Mobile Interface for the Older User. BCS Health Informatics Conference 2016. October. Glasgow, UK.
    2. Karen Renaud. No, users are not irrational. Network Security. The Firewall Column. Elsevier. November 2016 (p. 20). https://doi.org/10.1016/S1353-4858(16)30108-8
    3. Huda Al Shuaily, Karen Renaud. A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors. 18th International Conference on Higher Education Teaching and Learning Dubai, UAE September 21 – 22, 2016. Best Paper Award. https://www.waset.org/abstracts/53944
    4. Judy van Biljon & Karen Renaud. Validating Mobile Phone Design Guidelines. Focusing on the Elderly in a Developing Country. 2016 Annual Conference of the South African Institute of Computer Scientists and Information Technologists. 26-28 September. Johannesburg
    5. Sanjay Goel, Merrill Warkentin, Kevin Williams, Karen Renaud. Does Risk Disposition Play a Role in Influencing Decisions to Behave SECUREly? Dewald Roode Workshop. University of New Mexico, Albuquerque. October 7-8. http://ifip.byu.edu/ifip2016.html
    6. Karen Renaud. SME Cyber Security. 2016. (RAE Funded Report) (Click to Access)
    7. Karen Renaud. How smaller businesses struggle with security advice. Computer Fraud and Security. August 2016
    8. Karen Renaud. SME Survey 2015-16. Information Security Perceptions & Resilience. 2016.(RAE Funded Report) (Click to Access)
    9. A Aßmuth, P Cockshott J Kipke, K Renaud, L Mackenzie, W Vanderbauwhede, M Söllner, T Fischer, G Weir. Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. Cybersecurity and Cyberforensics Conference, Jordan August 2-4
    10. Karen Renaud & George Weir. Cybersecurity and the Unbearability of Uncertainty. Cybersecurity and Cyberforensics Conference, Jordan August 2-4 2016
    11. Karen Renaud & Judy van Biljon. The Role of Knowledge Visualisation in Supporting Postgraduate Dissertation Assessment. BJET. online : 26 JUL 2016, DOI: 10.1111/bjet.12494 YouTube: https://www.youtube.com/watch?v=Y7mcF2ZBNT8
    12. Nora Alkaldi, Karen Renaud. Why Do People Adopt, or Reject, Smartphone Password Managers? EuroUSEC July 2016
    13. A Gutmann, K Renaud, M Volkamer. Memorable And Secure: How Do You Choose Your PIN? HAISA. Frankfurt 19-21 July.
    14. N Alkaldi & K Renaud. Why do People Adopt or Reject Smartphone Security Tools? HAISA. Frankfurt 19-21 July.
    15. E Alkhamis & Karen Renaud. The Design and Evaluation of an Interactive Social Engineering Training Programme. HAISA. Frankfurt 19-21 July.
    16. Blignaut, R.J., Venter, I.M. & Renaud, K. Granny gets smarter but Junior hardly notices. The Journal of Community Informatics, accepted for publication May 2016. Article ID: 1161.
    17. J Budurushi, K Renaud, M Volkamer, M Woide. An Investigation into the Usability of Electronic Voting Systems for Complex Elections. In Paul J. Gibson, Robert Krimmer, Vanessa Teague and Julia Pomares, editors, Annals of Telecommunications. Vol. 71, number 7-8 PDF https://doi.org/10.1007/s12243-016-0510-2
    18. M Volkamer, K Renaud, B Reinheimer. TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. IFIPSec 2016. May 30th till June 1st, 2016, Ghent, Belgium
    19. K Renaud, I Venter, R Blignaut. ‘Smartphone Owners Need Security Advice. How Can We Ensure They Get It? Conf-IRM 2016. Cape Town May
    20. Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud and Melanie Volkamer. Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do. USEC 2016
    21. Paul Cockshott, Karen Renaud. Humans Robots and Values. Technology in Society. Volume 45, May 2016, Pages 19-28. https://doi.org/10.1016/j.techsoc.2016.01.002
    22. Andreas Gutmann, Karen Renaud, Joseph Maguire, Melanie Volkamer, Kanta Matsuura, Jorn Muller-Quade. ZeTA — Zero-Trust Authentication: Relying on Innate Human Ability, not Technology. Euro S&P. March 21-24, Saarbrücken, GERMANY. 2016
    23. K Renaud, S Flowerday, R English, M Volkamer. Why don’t UK citizens protest against Privacy-Invading Dragnet Surveillance? Information and Computer Security. Vol. 24 Issue: 4, pp.400-415, https://doi.org/10.1108/ICS-06-2015-0024
    24. M Volkamer, K Renaud, P Gerber. Spot the Phish by Checking the Pruned URL. Information and Computer Security. Volume: 24 Issue: 4, 2016. DOI: 10.1108/ICS-07-2015-0032/full/html
    25. Marian Carcary, Karen Renaud, Stephen McLaughlin, Connor O’Brien. A Capability Maturity Framework for Information Security Governance and Management IT Professional. 18.2 (2016): 22-30.
    26. Tsvetelina Valcheva, Karen Renaud, Paul Cockshott. A Medium-Scale Trial of Handivote. International Journal of Electronic Governance. Vol. 8, No.2 pp. 102 – 118. 2016

    2015

    1. A Gutmann, K Renaud, M Volkamer. Nudging Bank Account Holders Towards More Secure PIN Management. Journal of Internet Technology and Secured Transaction. Volume 4. http://infonomics-society.ie/jitst/published-papers/
    2. J van Biljon & K Renaud. Postgraduate Dissertation Assessment: Exploring Extant Use and Potential Efficacy of Visualisations African Journal of Information and Communication. number 15, p25-37. https://journals.co.za/content/afjic/2015/15/EJC18
    3. T K Ckiew & K Renaud. Estimating Web Page Response Time Based on Server Access Log. MySec 2015. 9th Malaysian Software Engineering Conference. http://mysec2015.upm.edu.my/
    4. K Renaud, S Flowerday, L ben Othmane, M Volkamer. ‘I am because we are’: Developing and Nurturning an African Digital Security Culture. ACCC 2015. Port Elizabeth. South Africa
    5. IM Venter, RJ Blignaut, KV Renaud Blinkered Views of Out-Group Mobile Phone Usage: Moving Towards Less Stereotyping of “Others”. SAICSIT 2015. Stellenbosch, South Africa
    6. Andrew Greig, Karen Renaud & Stephen Flowerday. An Ethnographic Study to Assess the Enactment of Information Security Culture in a Retail Store. WorldCIS 2015. Dublin, Ireland. 19-21 October
    7. Karen Renaud & Melanie Volkamer. Exploring Mental Models Underlying PIN Management Strategies. WorldCIS 2015. Dublin, Ireland. 19-21 October
    8. Okuku, A., Renaud, K., & Valeriano, B. Cybersecurity Strategy’s Role In Raising Kenyan Awareness of Mobile Security Threats. Information & Security: An International Journal. 2015
    9. I Venter, R de la Harpe, S R Ponelis. K Renaud. Deploying Design Science Research in Graduate Computing Studies in South Africa. 21st Americas Conference on Information Systems (AMCIS 2015) Aug 13-15. Puerto Rico.
    10. Craig Macdonald and Karen Renaud. Experiences Implementing SQL Design Patterns in a First Year Computing Science Degree Database Course. TLAD 2015 Birmingham City University on the 9th July 2015
    11. Gerber, Paul, Melanie Volkamer, and Karen Renaud. “Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy.” ACM SIGCAS Computers and Society 45.1 (2015): 16-21.
    12. Judy van Biljon and Karen Renaud. Do Visualizations Ease Dissertation Assessment? SACLA 2015. Johannesburg. 1-3 July.
    13. Judy Van Biljon and Karen Renaud. Knowledge visualisation as communication and knowledge transfer mechanism: guidelines for mobile learning. mLearn 2015. 17 – 25 October 2015.
    14. Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple. Play that funky password! Recent advances in authentication with musicHandbook of Research on Emerging Developments in Data Privacy. 2015 . DOI: 10.4018/978-1-4666-7381-6.ch006
    15. Melanie Volkamer, Karen Renaud, Oksana Kulyk. A Socio-Technical Investigation into Smartphone Security 11th International Workshop on Security and Trust Management (STM 2015) Workshop at ESORICS 2015 20th European Symposium on Research in Computer Security. Vienna, Austria. 21-25 September. LNCS
    16. Karen Renaud, Andrew Hoskins, Rossouw von Solms. Biometric Identification Are We Ethically Ready? ISSA 2015. Johannesburg, South Africa. 12-13 August. IEEE.
    17. Joseph Maguire & Karen Renaud. Alternative Authentication in the Wild. STAST (5th Workshop on Socio-Technical Aspects in Security and Trust). Co-Located with 28th IEEE Computer Security Foundations Symposium (CSF) Verona, Italy. July 2015.
    18. Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova and Benjamin Reinheimer. Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015. 24-26 August. Heraklion, Greece. LNCS.
    19. Karen Renaud & Joseph Maguire. Regulating Access to Adult Content (with Privacy Preservation). CHI 2015. Seoul. April 2015. ACM. http://dl.acm.org/citation.cfm?id=2702456

    2014

    1. Renaud, K., Maguire, J., van Niekerk, J., & Kennes, D. (2014). Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), 48-60.
    2. McBryan, T., Renaud, K., & Siebert, J. P. (2014). An Investigation into the use of Images as Password Cues. arXiv preprint arXiv:1407.8004.
    3. M. Venter, I., J. Blignaut, R., & Renaud, K. (2014). Uniformity in the midst of diversity. Journal of Engineering, Design and Technology, 12(4), 550-562.
    4. Marsh, S., Dwyer, N., Basu, A., Storer, T., Renaud, K., El-Khatib, K., Bicakci, M. V. (2014). Foreground Trust as a Security Paradigm: Turning Users into Strong Links. Information Security in Diverse Computing Environments, 8.
    5. Renkema-Padmos, A., Volkamer, M., & Renaud, K. (2014, April). Building castles in quicksand: blueprint for a crowdsourced study. In CHI’14 Extended Abstracts on Human Factors in Computing Systems (pp. 643-652). ACM.
    6. Ying He, Chris Johnson, Karen Renaud. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 6th International Conference of Computer Science and Information Technology. 26-27 March. 2014. Amman, Jordan.
    7. Stephan Neumann, M. Maina Olembo, Karen Renaud, and Melanie Volkamer Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both? 3rd International Conference on Electronic Government and the Information Systems Perspective EGOVIS 2014. Munich, Germany September 1 – 5, 2014
    8. Judy van Biljon, Karen Renaud, Tobie van Dyk. Accessibility Challenges Experienced by South Africa’s Older Mobile Phone Users. Journal of Community Informatics. Southern African Special Issue. vol 9, number 4. 2014.
    9. M. Olembo, K. Renaud, S. Bartsch, M. Volkamer. Voter, What Message Will Motivate You To Verify Your Vote? USEC 2014 Workshop on Usable Security 23rd February 2014 http://www.usecap.org/usec14.html
    10. Sarah Birch, William Cockshott, Karen Renaud. Putting Electronic Voting under the Microscope. Political Quarterly. 85 (2) April-June 2014, Pages: 187.194. https://doi.org/10.1111/1467-923X.12071
    11. Jurlind Budurushi, Karen Renaud, Melanie Volkamer and Marcel Woide. Implementation and Evaluation of the EasyVote Tallying Component and Ballot. EVote 2014. Lochau/Bregenz, Austria. 28 to 31 October
    12. Karen Renaud, Wendy Goucher. The Curious Incidence of Security Breaches by Knowledgeable Employees & the Pivotal Role of Security Culture HCI International. 2014. 22 – 27 June 2014, Creta Maris, Heraklion, Crete, Greece
    13. Karen Renaud, Rosanne English, Thomas Wynne, Florian Weber. You have Three Tries to Lockout. Why Three? HAISA 2014. Plymouth. July.
    14. Heather Crawford & Karen Renaud. Understanding User Perceptions of Transparent Authentication on a Mobile Device. Journal of Trust Management. 1.1 (2014): 7
    15. Melanie Volkamer, Karen Renaud. Mental Models – General Introduction and Review of Their Application to Human-Centred Security. Number Theory and Cryptography. Ed (M Fischlin and S Katzenbeisser) Lecture Notes in Computer Science number 8260. p255-280. Papers in Honor of Johannes Buchmann on the Occasion of his 60th Birthday. 2014
    16. Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos. Why Doesn’t Jane Protect Her Privacy? PETS 2014. The 14th Privacy Enhancing Technologies Symposium July 16–18, 2014 Amsterdam, Netherlands (Listed on https://www.germanupa.de/arbeitskreise/arbeitskreis-usable-security-privacy/unsere-literaturempfehlungen)
    17. Arne Renkema-Padmos, Jerome Baum, Karen Renaud, Melanie Volkamer. Shake Hands to Bedevil: Securing Email with Wearable Technology. HAISA 2014. Plymouth. July. 8-10 July
    18. Melanie Volkamer, Karen Renaud, Joe Maguire. ACCESS: Describing and Contrasting Authentication Mechanisms HCI International. 2014. 22 – 27 June 2014, Creta Maris, Heraklion, Crete, Greece
    19. Matt Davidson, Karen Renaud, Shujun Li. jCaptcha: Accessible Human Validation. ICCHP. http://registration.icchp.org/Programme/ShowAbstract?submission=353 14th International Conference on Computers Helping People with Special Needs July 09-11, 2014; Pre-Conference July 07-08, 2014 University Paris 8 Vincennes-Saint-Denis; 2, Rue de la Liberte 93200 Saint-Denis; France
    20. Rob Jenkins, Jane McLachlan, Karen Renaud. Facelock: Familiarity-based graphical authentication. PeerJ. 2:e444 https://peerj.com/articles/444/
    21. Karen Renaud. Clinical and Information Governance Proposes. Human Fallibility Disposes. International Journal of Clinical Governance. Vol. 19 Iss: 2, pp.94 – 109. Emerald. DOI: 10.1108/CGIJ-01-2014-0001.
      Winner of Outstanding Paper of 2014 Award

    2013

    1. A Killick, C Brown, K Renaud. To Reduce E-mail, Start at the Top. Harvard Business Review. September 2013
    2. Gareth Renaud and Karen Renaud. Computing Science in the Classroom: Experiences of a STEM Ambassador. Italics, Magazine of the Higher Education Academy. 12(1), 3-13. DOI: 10.11120/ital.2013.00001
    3. I Venter, R Blignaut, K Renaud. Bridge over the computer science gap. 10th IFIP World Conference on Computers in Education WCCE 2013 Torun, 2-5 July 2013
    4. I Venter, R Blignaut, K Renaud. Reaching out to Mobile Phone Rookies in Two Countries. 10th IFIP World Conference on Computers in Education WCCE 2013 Torun, 2-5 July 2013
    5. Karen Renaud. Introducing Computing Students to Scientific Experimentation. ITiCSE 2013, the 18th Annual Conference on Innovation and Technology in Computer Science Education. The University of Kent at Canterbury, 1-3 July 2013
    6. Karen Renaud and Quintin Cutts. Teaching Human-Centred Security Using Non-Traditional Techniques. Transactions on Computing Education. Volume 13 Issue 3, August 2013 Article No. 11. https://doi.org/10.1145/2492687
    7. T. Storer, S. Marsh, S. Noel, B. Esfandiari, K. El-Khatib, P. Briggs, K. Renaud and M. Vefa-Bicakci. Encouraging Second Thoughts: Obstructive User Interfaces for Raising Security Awareness 11th Annual Conference in Privacy Security and Trust. PST 2013. Tarragona, Catalonia.
    8. Karen Renaud, Judy van Biljon, Tobie van Dyk. Knowledge Visualisation in Postgraduate Assessment: Is a picture worth a thousand words? College of Science, Engineering & Technology, UNISA. 5-6 September 2013: CSET ODL Conference
    9. Karen Renaud, Renette Blignaut, Isabella Venter. Designing Mobile Phone Interfaces for Age Diversity in South Africa: “One-World” versus Diverse “Islands” INTERACT 2013. Cape Town, South Africa, September 2013.
    10. Tobie van Dyk, Helene Gelderblom, Karen Renaud, Judy van Biljon. Mobile Phones for the Elderly. A Design Framework. IDIA 2013. Bangkok, Thailand 1-3 November 2013.
    11. Paul Cockshott, Karen Renaud and Tsvetelina Valcheva. Democratising Budgetary Decisions with HANDIVOTE. 63rd Political Studies Association Annual International Conference. The Party’s Over? 25 – 27 March 2013. City Hall Cardiff
    12. William Cockshott and Karen Renaud. Information Technology: Gateway to Direct Democracy in China and the World. International Critical Thought. Vol 3, Number 1, March 2013. p76-97. doi:10.1080/21598282.2013.761448)
    13. Paul Cockshott, Karen Renaud, Tsvetelina Valcheva. Putting citizens in charge of the democratic process. CEll phone voting as the technological key to participatory democracy. 4th International Vanguard Science Congress. Mexico City. May 28-31, 2013.
    14. Karen Renaud and Lewis Mackenzie. SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation’s Systems. Journal of Artificial Societies and Social Simulation. 16 (3) 3. 2013. DOI: 10.18564/jasss.2181
    15. Wendy Goucher & Karen Renaud. Leaks by a Thousand Clicks: Examining the Growing Risk of Mobile Working. 12th European Conference on Information Warfare and Security (ECIW) 11-12 July 2013
    16. Karen Renaud and Wendy Goucher. Monkey See – Monkey Take Photo: The Risk of Mobile Information Leakage. International Journal of Cyber Warfare and Terrorism (IJCWT). Volume 3, Issue 4. 2013. http://www.igi-global.com/article/monkey-see—monkey-take-photo/105191
    17. Melanie Volkamer, Michaela Kauer, Sinem Emeroz, Karen Renaud. Folk Models of Smartphone Users. Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) August 27, 2013 Munich, Germany
    18. Karen Renaud and Joe Maguire. Shrinking the Authentication Footprint. HAISA 2013 Lisbon, Portugal, May 2013
    19. Heather Crawford, Karen Renaud, Tim Storer. A Framework for Continuous, Transparent Mobile Device Authentication Computers & Security. 39 (2013): 127-136. https://doi.org/10.1016/j.cose.2013.05.005
    20. Karen Renaud, Dimitris Kennes, Johan van Niekerk, Joe Maguire. SNIPPET: GENUINE KNOWLEDGE – BASED AUTHENTICATION. ISSA 2013 Information Security South Africa 13th Annual Conference. Johannesburg 14-16 August, 2013.
    21. Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire. Are Graphical Authentication Mechanisms As Strong As Passwords? Strong Authentication Methods and Systems (SAMAS’13) Associated with the FedCSIS 2013 conference. Krakow, Poland, September 8-11, 2013

    2012

    1. Marcia Gibson, Karen Renaud, Marc Conrad and Carsten Maple. Music is the Key: Using our Enduring Memory for Songs to Help Users Log On. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions. DOI: 10.4018/978-1-4666-0197-0.ch008. 2012
    2. Renaud, K., & Goucher, W. (2012). Email passwords: pushing on a latched door. Computer Fraud & Security, 2012(9), 16-19.
    3. J Ramsay & K V Renaud. Using insights from email users to inform organisational email management policy. Behavior and Information Technology. Volume 31 Issue 6, June 2012 Pages 587-603. https://doi.org/10.1080/0144929X.2010.517271
    4. Helene Muller, Judy van Biljon, Karen Renaud. Information Visualization in Research Reporting: Guidelines for Representing Quantitative Data. SACLA Conference (Southern African Computer Lecturers Association). Thaba Nchu, South Africa. 1-3 July, 2012.
    5. Tobie van Dyk, Karen Renaud, Judy van Biljon Moses: A Method for Selecting Senior Mobile Phones: Supporting Design & Choice for the Elderly SAICSIT 2012. 1-3 October 2012. Centurion, Tshwane
    6. Karen Renaud. User Issues in Security. In: Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann; 1 edition (June 8, 2012) (Eds. Elizabeth Buie Dianne Murray) p.217-229
    7. Dianne Murray and Karen Renaud. Privacy and the Citizen. In: Usability in Government Systems: User Experience Design for Citizens and Public Servants. Morgan Kaufmann; 1 edition (June 8, 2012) (Eds. Elizabeth Buie Dianne Murray) p.71-84 Chapter 4.
    8. Karen Renaud. Blaming Noncompliance Is Too Convenient. What Really Causes Information Breaches? IEEE Security & Privacy. May 2012. DOI: 10.1109/MSP.2011.157
    9. Karen Renaud, Wendy Goucher Health Service Employees & Information Security: An Uneasy Partnership? Information Management and Computer Security. 20.4 (2012): 296-311. https://doi.org/10.1108/09685221211267666
    10. Tim Storer, William Bradley Glisson, Karen Renaud. Patterns of Information Security Postures in Large Scale Socio-Technical Systems. The First International Workshop on Cyberpatterns Unifying Design Patterns with Security, Attack and Forensic Patterns 9-10 July 2012, Abingdon, Oxfordshire , UK
    11. Mihai Ordean & Karen Renaud. Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords. 2012 IEEE International Conference on Intelligent Computer Communication and Processing. August 30 – September 1, 2012 in Cluj-Napoca, Romania.
    12. Karen Renaud & Joe Maguire. You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing. Alt-HCI. HCI 2012. Birmingham, UK. 12th -14th September

    2011

    1. Wendy Goucher & Karen Renaud. In A world of their own: Working on the Move. HCI 2011. Newcastle, UK. July, 2011
    2. K Renaud & R Simpson. WHO is the Enemy? Interfaces. Quarterly Magazine of the BCS Interaction Group. Spring 2011

    2010

    1. Al-Shuaily, H., & Renaud, K. (2010). SQL Patterns: A New Approach for Teaching SQL. In 8th HEA Workshop on Teaching, Learning and Assessment of Databases, Abertay-Dundee (pp. 29-40).
    2. Renaud, K., & van Biljon, J. (2010). Worth-centred mobile phone design for older users. Universal Access in the Information Society, 9(4), 387-403. doi:10.1007/s10209-009-0177-9
    3. Karen Renaud and Paul Cockshott. Extending Handivote to Handle Digital Economic Decisions. BCS 2010 Visions conference . 13-16 April 2010, Edinburgh University
    4. Karen Renaud & Paul Cockshott. Handivote: Checks, Balances and Voiding Options. International Journal of Electronic Governance (IJEG). 3(3):273-295, 2010
    5. Karen Renaud and Dora Galvez-Cruz. Privacy: Aspects, Definitions and a Multi-Faceted Privacy Approach. ISSA 2010. Johannesburg, South Africa. 2-4 August, 2010.
    6. Marcia Gibson, Marc Conrad, Carsten Maple, Karen Renaud. Accessible and Secure? Design Constraints on Image and Sound Based Passwords. Conference on Information Society (i-Society 2010) June 28-30, 2010. London, UK
    7. Karen Renaud and Mike Just. Examining User Responses to Association-Based Authentication. HCI 2010. University of Abertay, Dundee. 6-10 Sept, 2010
    8. Mohamed Al Fairuz and Karen Renaud. Multi-Channel, Multi-level Authentication for More Secure eBanking. ISSA 2010. Johannesburg, South Africa. 2-4 August, 2010.
    9. Karen Renaud & T McBryan. How Viable are Stubblefield and Simon’s Inkblots as Password Cues?. PUMP 2010. University of Abertay, Dundee. 6 Sept, 2010
    10. K Renaud & H Crawford. Invisible, Passive, Continuous and Multimodal Authentication. Workshop on Mobile Social Signal Processing. 7 Sept 2010. Lisbon. Published by LNCS

    Before 2010

    1. T K Chiew and K Renaud. A Component-Based Reverse Engineering Approach: Decomposing Web Pages to Facilitate Maintenance and Reusability. IASK International Conference “E-Activity and Leading Technologies 2009
    2. Judy van Biljon, Karen Renaud, 2009. Distance Education as enabler in crossing the digital divide: Will the Phoenix Fly? IDIA2009 Development Informatics Conference, 28-30 October 2009, Kruger National Park, South Africa
    3. Judy van Biljon and Karen Renaud. A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users. Handbook of Research on Multimodal Human Computer Interaction and Pervasive Services. 2009
    4. Karen Renaud. Guidelines for Designing Graphical Authentication Interfaces. International Journal of Computer Security (IJICS). vol 3. number 1, 2009. DOI: 10.1504/IJICS.2009.026621
    5. Karen Renaud and Paul Cockshott. HandiVote: Simple, Anonymous, and Auditable Electronic Voting. Journal of Information Technology & Politics. 2009 Volume 6, Issue 1 January, pages 60 – 80
    6. Karen Renaud and Antonella De Angeli. Visual Passwords: Cure-All or Snake-Oil? CACM. Dec 2009. DOI: 10.1145/1610252.1610287
    7. K Renaud and J Maguire. Armchair Authentication. HCI 2009. Cambridge, UK.
    8. Ron Poet and Karen Renaud. A mechanism for Filtering Distractors for Doodle Passwords. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI). 23(5) 2009 p1005-1029.
    9. M Gibson, K Renaud, M Conrad. Authenticating me softly with “my” song. NSPW 2009. September 8-11, 2009. Pages: 85-100 The Queen’s College University of Oxford, UK
    10. K Renaud. On User Involvement in Production of Images used in Visual Authentication. Journal of Visual Languages and Computing. 10 (2009) p1-15. https://doi.org/10.1016/j.jvlc.2008.04.001
    11. K Renaud. Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security. 3(1)
    12. K Renaud. Web Authentication using Mikon Images. World Congress on Privacy, Security, Trust and the Management of e-Business. August 25 – 27, 2009 Saint John, New Brunswick, Canada
    13. Ron Poet and Karen Renaud. 2009. An Algorithm for Automatically Choosing Distractors for Recognition Based Authentication using Minimal Image Types. The Ergonomics Open Journal. Special issue: Advances in interfaces
    14. Ramsay, J., Renaud, K., Hair, M., & Saddique, S. (2008). Having it all: how students combine traditional and digitally mediated communication.
    15. Renaud, K., McBryan, T., & Siebert, P. (2008). Password cueing with cue (ink) blots. IADIS Computer Graphics and Visualization, 74-81.
    16. Judith Ramsay, Karen Renaud, Mario Hair and Samina Saddique . Having It All: How Students Combine Traditional and Digitally Mediated Communication. IADIS Web Based Communities 2008 (WBC 2008) Conference. Amsterdam, The Netherlands 24 – 26 July 2008
    17. Judith Ramsay, Karen Renaud and Mario Hair. Think Before You Link: Controlling Ubiquitous Availability. Interactions. Nov/Dec 2008.
    18. P Kotze, K Renaud and J van Biljon. Don’t do this. Pitfalls in using anti-patterns in teaching human computer interaction principles. Computers & Education. 50, 3 (Apr. 2008)
    19. J van Biljon and K Renaud. A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users. International Workshop on Modeling Mobile Applications and Services (M2AS?08) Barcelona, Catalonia, Spain. 20 – 23 October 2008. LNCS Volume 5232/2008 p228-237
    20. Karen Renaud and Judy van Biljon. Predicting Technology Acceptance by the Elderly: A Qualitative study. Annual Conference of the South African Institute of Computer Scientists and Information Technologists. 2008. Wilderness, South Africa. 6 – 8 October 2008
    21. Karen Renaud and Judy van Biljon. Predicting Technology Acceptance by the Elderly: A Qualitative study. Annual Conference of the South African Institute of Computer Scientists and Information Technologists. 2008. Wilderness, South Africa. 6 – 8 October 2008
    22. Paula Kotze, Judy van Biljon and Karen Renaud. Mobile Phone Usage of Young Adults. 2008. Proceedings of the Conference of the Computer-Human Interaction Special Interest Group (CHISIG) of Australia on Computer-Human Interaction Cairns, Australia, 8-12 December, 2008. p57-64
    23. K Renaud, A McBryan and P Siebert. Password Cueing with Cue(ink)Blots. IADIS Computer Graphics and Visualization 2008 (CGV 2008) Conference. 24 – 26 July 2008 Amsterdam. The Netherlands. p74–81
    24. M Hair, J Ramsay and K Renaud. Ubiquitous Connectivity & Work-Related Stress, 2008. Handbook of Research on Virtual Workplaces and the New Nature of Business Practices. Edited by Pavel Zemliansky and Kirk St.Amant. Medical Information Science Reference
    25. Galvez-Cruz, D., & Renaud, K. (2007, July). You Know My’Alter-Ego’–but You Don’t Know Me!. In Databases, 2007. BNCOD’07. 24th British National Conference on (pp. 101-109). IEEE.
    26. Renaud, K., & Ramsay, J. (2007). Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour & Information Technology, 26(4), 309-322. https://doi.org/10.1080/01449290601173770
    27. P Kotze and K Renaud. Do We Practise What We Preach in Formulating Our Design and Development Methods? “Engineering Interactive Systems 2007 (EIS 2007). Published in LNCS 4940 “, March 22-24, 2007, Salamanca, Spain
    28. K Renaud, T Cockshott and M Hair. Everyone Abandons – Eventually: Understanding the Online Shopping Experience. 11th IEEE Conference on Commerce and Enterprise Computing. 20-23 July. Vienna, Austria.
    29. K V Renaud, J Ramsay and M Hair You’ve got email. Shall I deal with it now? IJHCI. 21(3) Jan 1, 2007. https://doi.org/10.1207/s15327590ijhc2103_3
    30. M Hair, K Renaud and J Ramsay. The Influence of Self-Esteem and Locus of Control on Perceived Email-Related Stress. Computers in Human Behavior. 23 (2007) 2791-2803. https://doi.org/10.1016/j.chb.2006.05.005
    31. K Renaud and P Cockshott. Electronic Plebiscites. METTEG 2007 1st International Conference on Methodologies, Technologies and Tools enabling e-Government Camerino (Italy), 27-28 September 2007
    32. M Al Awadi and K Renaud. Success Factors in Information Security Implementation in Organisations IADIS International Conference e-Society 2007. Lisbon, Portugal. 3-6 July 2007
    33. Karen Renaud. A Process for Supporting Risk-Aware Web Authentication Mechanism Choice Reliability Engineering and System Safety. Special Edition. 2007. 92 (9), pp. 1204-1217
    34. Elin Olsen and Karen Renaud. DynaHand: Observation-Resistant Recognition-Based Web Authentication IEEE Technology and Society. Special Issue on Usable Security and Privacy. 26(2):22-31 (2007) 10.1109/MTAS.2007.371279
    35. K Renaud, R Cooper and M Al Fairuz Support Architecture for Multi-Channel, Multi-Factor Authentication e-commerce 2007 IADIS International Conference e-commerce 2007 Algarve, Portugal, 7-9 December 2007
    36. Brinkman, W. P., Gray, P., & Renaud, K. (2006). Computer-Assisted Recording, Pre-Processing and Analysis of User Interaction Data. In Proc. HCI (Vol. 2006, pp. 273-275).
    37. Galvez-Cruz, D., & Renaud, K. (2006). Privacy by agreement. IADIS E-commerce, 338-341.
    38. Nosseir, A., Connor, R., & Renaud, K. (2006, November). Question-based group authentication. In Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments (pp. 277-283). ACM.
    39. Galvez-Cruz, D., & Renaud, K. V. (2006, October). What e-grocery customers really want: Personalised personalisation. In Web Congress, 2006. LA-Web’06. Fourth Latin American (pp. 109-112). IEEE.
    40. Renaud, K. (2006). A visuo-biometric authentication mechanism for older users. In People and Computers XIX—The Bigger Picture (pp. 167-182). Springer London.
    41. Kotze, P, Renaud K, Koukouletsos k, Khazaei B and Dearden A. 2006. Patterns, Anti-Patterns and Guidelines – Effective Aids to Teaching HCI Principles?in: Inventivity: Teaching theory, design and innovation in HCI – Proceedings of HCIEd2006-1 (First Joint BCS / IFIP WG 13.1 / ICS / EU CONVIVIO HCI Educators’ Workshop, edited by E T Hvannberg, J C Read, L Bannon, P Kotze, W Wong, University of Limerick, ISBN: 1874653917, pages 115 – 120.
    42. Karen Renaud. Authentication – the Final Frontier. IST-Africa 2006 Conference. 03 – 05 May 2006, CSIR International Convention Centre, Pretoria, South Africa.
    43. Chiew, T. K., & Renaud, K. (2005). Disassembling Web Site Response Time. Proc. Twelfth ECITE, Turku, Finland, 137-146.
    44. De Angeli, A., Coventry, L., Johnson, G., Renaud, K. 2005 . Is a picture really worth a thousand words? On the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, special issue: HCI research on Privacy and Security. Volume 63, Issue 1-2 (July 2005). Pages: 128 – 152
    45. Karen Renaud. Evaluating Authentication Mechanisms. in Security and Usability. Designing Secure Systems that People Can Use Editors: Lorrie Cranor, Simson Garfinkel First Edition August 2005 (est.) ISBN: 0-596-00827-9
    46. Karen Renaud, Judith Bishop, Johnny Lo and Basil Worrall. Algon: from interchangeable distributed algorithms to interchangeable middleware. . SC 2004 Software Composition Saturday, April 3, 2004
    47. Karen Renaud and Phil Gray. Making Sense of Low-Level Usage Data to Understand User Activities. Stellenbosch, South Africa. 4-6 October.
    48. Judy van Biljon, Paula Kotze, Karen Renaud, Marilyn McGee and Ahmad Seffah. The Use of Anti-Patterns in Human-Computer Interaction – Wise or Ill-Advised? SAICS 2004. Stellenbosch, South Africa. 4-6 October.
    49. Karen Renaud and Judy van Biljon. Teaching SQL – Which Pedagogical Horse for this Course? TLAD Workshop, July 2004. In Proceedings 21st British National Conference on Databases, BNCOD. Lecture Notes in Computer Science. Vol 3112. pp244-256.
    50. Karen Renaud. My password is here! An investigation into Visuo-Spatial Authentication Mechanisms. Interacting with Computers. 16(6):1017-1041. 2004
    51. Karen Renaud. Visuo-Biometric Authentication Mechanism for Older Users. Proc British HCI. September 2005. Edinburgh, Scotland. p167-182.
    52. Karen Renaud. Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective. Journal of Web Engineering. 3(2) 2004 p95-123
    53. Karen Renaud, Johnny Lo, Judith Bishop, Pieter van Zyl& Basil Worrall. Algon: A Framework for Supporting Comparison of Distributed Algorithm Performance. 11th Euromicro Conference on Parallel, Distributed and Network-Based Processing, Genova, Italy, 5-7 February 2003, pp. 425-432. ISBN 9780769518756 (doi:10.1109/EMPDP.2003.1183620) February,
    54. Judy van Biljon and Karen Renaud. Zazu – Investigating the Differences between Interaction Approaches in Advisory Support Systems for Curriculum Planning. Short Paper. INTERACT 2003. Zurich, Switzerland. Sept 2003.
    55. Judy van Biljon & Karen Renaud. Bringing the User Into the Design Process – Incorporating User Context into HCI Pattern. Poster. HCI 2003. 17th Annual Human Computer Interaction Conference. Designing for Society. Bath, England. 8-12 Sept, 2003.
    56. Jim Liddell, Karen Renaud and Antonella De Angeli. Using a Combination of Sound and Images to Authenticate Web Users. Short Paper. HCI 2003. 17th Annual Human Computer Interaction Conference. Designing for Society. Bath, England. 8-12 Sept, 2003.
    57. Van Dyk, T., & Renaud, K. (2002). Task Analysis for E-Commerce and the Web. The Handbook of Task Analysis for Human-Computer Interaction.
    58. Bishop, J., Renaud, K., & Worrall, B. (2002). Composition of distributed software with Algon—concepts and possibilities. Electronic Notes in Theoretical Computer Science, 65(4), 56-67.
    59. Judy van Biljon, Karen Renaud & Estelle de Kock. Zazu – Investigating the Differences between Experts and Novices in Using an Advisory Support Tool. Annual Conference of the South African Institute of Computer Scientists and Information Technologists. Pretoria, South Africa. 16-18 September 2002
    60. Karen Renaud. Experience with statically-generated proxies for facilitating Java runtime specialisation. IEE Proc Software. Vol 149. No 6, Dec 2002
    61. Karen Renaud. Huw Evans, Renaud, Karen, and Huw Evans. JavaCloak—Considering the Limitations of Proxies for Facilitating Java Reflection. SAICSIT 2001. Pretoria. Sept
    62. Renaud, K. (2000). HERCULE: monitoring component-based application activity and enabling post-implementation tailoring of feedback. In Software Engineering for Parallel and Distributed Systems, 2000. Proceedings. International Symposium on (pp. 180-187). IEEE.
    63. Renaud, K., Barrow, J., & le Roux, P. (2001). A strategy for Teaching Programming from a Distance.
    64. Renaud, K., & Evans, H. (2001). JavaCloak: Reflecting on Java typing for class reuse using proxies. In Metalevel Architectures and Separation of Crosscutting Concerns (pp. 278-279). Springer Berlin Heidelberg.
    65. Renaud, K., & Van Dyk, T. (2001). Tailoring e-commerce sites to ease recovery after disruptions. In Computer Software and Applications Conference, 2001. COMPSAC 2001. 25th Annual International (pp. 603-608). IEEE.
    66. Karen Renaud. HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback. PDSE 2000. Limerick, Dublin, June
    67. Karen Renaud, Richard Cooper. Feedback in Human-Computer Interaction — Characteristics and Recommendations. SAICSIT 2000. Cape Town, South Africa
    68. Renaud, K. (2000). HERCULE: Non-invasively Tracking Java™ Component-Based Application Activity. In ECOOP 2000—Object-Oriented Programming (pp. 447-471). Springer Berlin Heidelberg.
    69. Renaud, K., & Evans, H. (2000). Engineering Java™ Proxy Objects using Reflection. In Proceedings of the NET. OBJECTDAYS.
    70. Renaud, K. (2000). Expediting rapid recovery from interruptions by providing a visualization of application activity. In Proceedings of OZCHI (pp. 348-355).
    71. Karen Renaud and Richard Cooper. HERCULE: A Framework for Enhancing Error Reporting in Component-Based Systems. EDOC 1999. Mannheim, Germany
    72. Karen Renaud, Richard Cooper. An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems. UIDIS 1999.
    73. Karen Renaud, Paula Kotze. The Recovery Problem in Multidatabase Systems – Characteristics and Solutions. South African Computing Journal
    74. Karen Renaud and Paula Kotze. An Integrated Classification of Multiple Database Systems. South African Computing Journal. p32-39