Karen Renaud

Professor in Cyber Security

  • 28 Citations
  • 2 h-Index
20152019
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Security of data Engineering & Materials Science
Smartphones Engineering & Materials Science
Electronic mail Engineering & Materials Science
Application programs Engineering & Materials Science
Authentication Engineering & Materials Science
visualization Social Sciences
Websites Engineering & Materials Science
Epidemiology Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

4 Downloads (Pure)

Case study: exploring children’s password knowledge and practices

Choong, Y-Y., Theofanos, M., Renaud, K. & Prior, S., 24 Feb 2019, Proceedings 2019 Workshop on Usable Security (USEC). Internet Society, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
target group
cognitive ability
schoolchild
literacy
literature
6 Downloads (Pure)

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks

Camp, L. J., Grobler, M., Jang-Jaccard, J., Probst, C., Renaud, K. & Watters, P., 8 Jan 2019, Proceedings of the 52nd Hawaii International Conference on System Sciences . University of Hawaii at Manoa, p. 4763-4772 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Epidemiology
Security of data
Public health
Logistics
4 Downloads (Pure)

Encouraging password manager adoption by meeting adopter self-determination needs

Alkaldi, N., Renaud, K. & Mackenzie, L., 8 Jan 2019, Proceedings of the 52nd Hawaii International Conference on System Sciences. University of Hawaii at Manoa, p. 4824-4833 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Self-determination
Managers
Factors
Autonomy
Self-determination theory
1 Downloads (Pure)

How to design browser security and privacy alerts

Shepherd, L. & Renaud, K., 22 Feb 2019, In : Dagstuhl Reports . 8, 8, p. 10 1 p.

Research output: Contribution to journalMeeting Abstract

Open Access
File

“This is the way ‘I’ create my passwords ...": does the endowment effect deter people from changing the way they create their passwords?

Renaud, K., Otondo, R. & Warkentin, M., 3 Jan 2019, In : Computers and Security. 82, p. 241-260 20 p.

Research output: Contribution to journalArticle

Chemical activation
activation
artifact
evidence
Values