Æȷοì
Karen Renaud
Karen Renaud
Department of Computer and Information Sciences, University of Strathclyde
strath.ac.ukÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Predicting technology acceptance and adoption by the elderly: a qualitative study
K Renaud, J Van Biljon
Proceedings of the 2008 annual research conference of the South African ¡¦, 2008
6042008
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
A De Angeli, L Coventry, G Johnson, K Renaud
International journal of human-computer studies 63 (1-2), 128-152, 2005
3922005
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective
K Renaud, J Ramsay, M Hair
International Journal of Human-Computer Interaction 21 (3), 313-332, 2006
1942006
Lecture Notes in Electrical Engineering: Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011
X Liu, X He
Springer Netherlands, 2012
184*2012
Higher education students¡¯ perceptions of online learning during COVID-19—A comparative study
DJ Cranfield, A Tick, IM Venter, RJ Blignaut, K Renaud
Education Sciences 11 (8), 403, 2021
1772021
The influence of self-esteem and locus of control on perceived email-related stress
M Hair, KV Renaud, J Ramsay
Computers in Human Behavior 23 (6), 2791-2803, 2007
1762007
Moving from a ¡®human-as-problem¡± to a ¡®human-as-solution¡± cybersecurity mindset
V Zimmermann, K Renaud
International Journal of Human-Computer Studies 131, 169-187, 2019
1682019
Why doesn¡¯t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 ¡¦, 2014
1562014
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
1322013
Evaluating authentication mechanisms
K Renaud
Security and usability, 103-128, 2005
1232005
A qualitative study of the applicability of technology acceptance models to senior mobile phone users
J van Biljon, K Renaud
Advances in Conceptual Modeling–Challenges and Opportunities: ER 2008 ¡¦, 2008
1122008
Privacy of the internet of things: a systematic literature review (extended discussion)
N Aleisa, K Renaud
arXiv preprint arXiv:1611.03340, 2016
1052016
Ethical guidelines for nudging in information security & privacy
K Renaud, V Zimmermann
International Journal of Human-Computer Studies 120, 22-35, 2018
932018
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
902017
On user involvement in production of images used in visual authentication
K Renaud
Journal of Visual Languages & Computing 20 (1), 1-15, 2009
882009
My password is here! An investigation into visuo-spatial authentication mechanisms
K Renaud, A De Angeli
Interacting with computers 16 (6), 1017-1041, 2004
872004
Quantifying the quality of web authentication mechanisms: a usability perspective
K Renaud
Journal of Web Engineering 3 (2), 95-123, 2004
872004
Why do people adopt, or reject, smartphone password managers?
N Alkaldi, K Renaud
1st European Workshop on Usable Security-EuroUSEC 2016, 2016
832016
Understanding user perceptions of transparent authentication on a mobile device
H Crawford, K Renaud
Journal of Trust Management 1, 1-28, 2014
802014
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number theory and cryptography: Papers in honor of johannes buchmann on the ¡¦, 2013
752013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20