Karen Renaud

Professor in Cyber Security

  • 28 Citations
  • 2 h-Index
20152019
If you made any changes in Pure these will be visible here soon.

Personal profile

Personal profile

I am a Computing Scientist working on all aspects of Human-Centred Security and Privacy. I was educated at the Universities of Pretoria, South Africa and Glasgow. I am particularly interested in deploying behavioural science techniques to improve security behaviours, and in encouraging end-user privacy-preserving behaviours. 

In 2016/17 I was one of five UK Cyber Security Fulbright Awardees and spent 7 months working with Prof Merrill Warkentin at Mississippi State University in Starkville, Mississippi.I joined the Division of Cybersecurity at the University of Abertay in October 2017.

More info here: http://www.karenrenaud.com

Research interests

My research area is Human-Centred Security. Basically I want to improve the boundary where humans and cyber security meet.

For more info my personal web page is at www.karenrenaud.com

Esteem

See www.karenrenaud.com/contrib.html

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 2 Similar Profiles
Security of data Engineering & Materials Science
Smartphones Engineering & Materials Science
Websites Engineering & Materials Science
Electronic mail Engineering & Materials Science
Application programs Engineering & Materials Science
Authentication Engineering & Materials Science
visualization Social Sciences
Epidemiology Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

10 Downloads (Pure)

Case study: exploring children’s password knowledge and practices

Choong, Y-Y., Theofanos, M., Renaud, K. & Prior, S., 24 Feb 2019, Proceedings 2019 Workshop on Usable Security (USEC). Internet Society, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
target group
cognitive ability
schoolchild
literacy
literature
11 Downloads (Pure)

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks

Camp, L. J., Grobler, M., Jang-Jaccard, J., Probst, C., Renaud, K. & Watters, P., 8 Jan 2019, Proceedings of the 52nd Hawaii International Conference on System Sciences . University of Hawaii at Manoa, p. 4763-4772 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Epidemiology
Security of data
Public health
Logistics
12 Downloads (Pure)

Deliver security awareness training, then repeat: {deliver; measure efficacy}

Gundu, T., Flowerday, S. & Renaud, K., 2 May 2019, 2019 Conference on Information Communications Technology and Society (ICTAS). IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data
14 Downloads (Pure)

Encouraging password manager adoption by meeting adopter self-determination needs

Alkaldi, N., Renaud, K. & Mackenzie, L., 8 Jan 2019, Proceedings of the 52nd Hawaii International Conference on System Sciences. University of Hawaii at Manoa, p. 4824-4833 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Self-determination
Managers
Factors
Autonomy
Self-determination theory

Encouraging password manager use

Renaud, K. & Zimmermann, V., 1 Jun 2019, In : Network Security. 2019, 6, p. 20-20 1 p.

Research output: Contribution to journalArticle