Karen Renaud

Professor in Cyber Security

  • 34 Citations
  • 3 h-Index
20152019
If you made any changes in Pure these will be visible here soon.

Personal profile

Personal profile

I am a Computing Scientist working on all aspects of Human-Centred Security and Privacy. I was educated at the Universities of Pretoria, South Africa and Glasgow. I am particularly interested in deploying behavioural science techniques to improve security behaviours, and in encouraging end-user privacy-preserving behaviours. 

In 2016/17 I was one of five UK Cyber Security Fulbright Awardees and spent 7 months working with Prof Merrill Warkentin at Mississippi State University in Starkville, Mississippi.I joined the Division of Cybersecurity at the University of Abertay in October 2017.

More info here: http://www.karenrenaud.com

Research interests

My research area is Human-Centred Security. Basically I want to improve the boundary where humans and cyber security meet.

For more info my personal web page is at www.karenrenaud.com

Esteem

See www.karenrenaud.com/contrib.html

Fingerprint Dive into the research topics where Karen Renaud is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Security of data Engineering & Materials Science
Smartphones Engineering & Materials Science
Websites Engineering & Materials Science
hacker Social Sciences
Electronic mail Engineering & Materials Science
Application programs Engineering & Materials Science
Authentication Engineering & Materials Science
visualization Social Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

13 Downloads (Pure)

A framework to maximise the communicative power of knowledge visualisations

Renaud, K. & Biljon, J. V., 17 Sep 2019, Proceedings of SAICSIT 2019. New York: Association for Computing Machinery (ACM), 10 p. 2

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Visualization
Production process
Guidance
Design process
Communication

An investigation into the “beautification” of security ceremonies

Bella, G., Renaud, K., Sempreboni, D. & Vigano, L., 6 May 2019, (Accepted/In press) 16th International Joint Conference on e-Business and Telecommunications. Scitepress Digital Library, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
beauty
voting
EU
paradigm
interaction
13 Downloads (Pure)

Case study: exploring children’s password knowledge and practices

Choong, Y-Y., Theofanos, M., Renaud, K. & Prior, S., 24 Feb 2019, Proceedings 2019 Workshop on Usable Security (USEC). Internet Society, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
target group
cognitive ability
schoolchild
literacy
literature
10 Downloads (Pure)

Comparing "challenge-based" and "code-based" internet voting verification implementations

Kulyk, O., Henzel, J., Renaud, K. & Volkamer, M., 23 Aug 2019, Human-Computer Interaction- INTERACT 2019: 17th IFIP TC 13 International Conference Paphos, Cyprus, September 2-6, 2019 Proceedings. Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckle, M. & Zaphiri, P. (eds.). Springer, Vol. Part 1. (Lecture Notes in Computer Science; vol. 11746).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
voting
Internet
voter
acceptance
election
17 Downloads (Pure)

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks

Camp, L. J., Grobler, M., Jang-Jaccard, J., Probst, C., Renaud, K. & Watters, P., 8 Jan 2019, Proceedings of the 52nd Hawaii International Conference on System Sciences . University of Hawaii at Manoa, p. 4763-4772 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Epidemiology
Security of data
Public health
Logistics