TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013
Number of items: 32.

2019

Zimmermann, Verena and Renaud, Karen (2019):
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005,
[Article]

2018

Renaud, Karen and Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), pp. 102-118, 109, (2), [Article]

Marky, Karola and Kulyk, Oksana and Renaud, Karen and Volkamer, Melanie (2018):
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
In: Conference on Human Factors in Computing Systems (CHI), ACM, Montreal, QC, Canada, DOI: 10.1145/3173574.3173750,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750],
[Conference or Workshop Item]

Renaud, Karen and Zimmermann, Verena (2018):
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), Elsevier, pp. 22-35, 120, DOI: 10.1016/j.ijhcs.2018.05.011,
[Article]

Renaud, Karen and Zimmermann, Verena (2018):
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP), Cambridge University Press, pp. 1-31, DOI: 10.1017/bpp.2018.3,
[Article]

2017

Renaud, Karen and Maguire, Joseph and Zimmermann, Verena and Draper, Steve (2017):
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, Usenix Associaton, In: Learning from Authoritative Security Experiment Results (LASER), Arlington, VA, USA, 18.-19.10.2017, [Conference or Workshop Item]

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, pp. 100-113, 71, DOI: 10.1016/j.cose.2017.02.004,
[Article]

Renaud, Karen and Zimmermann, Verena (2017):
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, IEEE, In: Information Security for South Africa (ISSA), Johannesburg, South Africa, 16.-17.08.2017, [Conference or Workshop Item]

2016

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, pp. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, pp. 400-415, 24, (4), DOI: 10.1108/ICS-06-2015-0024,
[Article]

Volkamer, Melanie and Renaud, Karen and Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, pp. 372-385, 24, (4), DOI: 10.1108/ICS-07-2015-0032,
[Article]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

2015

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, pp. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, [Conference or Workshop Item]

2014

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance, Lulu Press, Raleigh, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Privacy Enhancing Technologies - 14th International Symposium, PETS, Springer, Amsterdam, The Netherlands, In: Lecture Notes in Computer Science, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: Human Aspects of Information Security, Privacy, and Trust, Springer, Heraklion, Crete, In: 8533, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems, ACM Digital Library, New York, [Conference or Workshop Item]

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

2013

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, pp. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, Krakow, [Conference or Workshop Item]

This list was generated on Tue Jun 18 01:43:41 2019 CEST.