TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 37.

Renaud, Karen ; Zimmermann, Verena ; Schürmann, Tim ; Böhm, Carlos (2021):
Exploring cybersecurity-related emotions and finding that they are challenging to measure.
In: Humanities and Social Sciences Communications, 8, Springer Nature, e-ISSN 2662-9992,
DOI: 10.1057/s41599-021-00746-5,

Renaud, Karen ; Musarurwa, Alfred ; Zimmermann, Verena
Lopez, Juan ; Perumalla, Kalyan ; Siraj, Ambareen (eds.) (2021):
Contemplating Blame in Cyber Security.
In: Proceedings of the 16th International Conference on Cyber Warfare and Security,
Cookeville Tennessee, USA, Academic Conferences Limited, ICCWS 2021 16th International Conference on Cyber Warfare and Security, Cookeville Tennessee, USA, 25.-26.02.2021, [Conference or Workshop Item]

Zimmermann, Verena ; Renaud, Karen (2021):
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
In: ACM Transactions on Computer-Human Interaction, 28 (1), pp. 7:1-7:45. ACM, DOI: 10.1145/3429888,

Renaud, Karen ; Zimmermann, Verena (2020):
How to nudge in cyber security.
In: Network Security, 2020 (11), p. 20. Elsevier, DOI: 10.1016/S1353-4858(20)30132-X,

Renaud, Karen ; Zimmermann, Verena (2019):
Encouraging Password Manager Reuse.
In: Network Security, 2019 (6), Elsevier, DOI: 10.1016/S1353-4858(19)30075-3,

Zimmermann, Verena ; Renaud, Karen (2019):
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005,

Renaud, Karen ; Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2), pp. 102-118. [Article]

Marky, Karola ; Kulyk, Oksana ; Renaud, Karen ; Volkamer, Melanie (2018):
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
In: Conference on Human Factors in Computing Systems (CHI), pp. 176:1-176:13,
ACM, Montreal, QC, Canada, DOI: 10.1145/3173574.3173750,
[Conference or Workshop Item]

Renaud, Karen ; Zimmermann, Verena (2018):
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120, pp. 22-35. Elsevier, DOI: 10.1016/j.ijhcs.2018.05.011,

Renaud, Karen ; Zimmermann, Verena (2018):
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP), pp. 1-31. Cambridge University Press, DOI: 10.1017/bpp.2018.3,

Renaud, Karen ; Maguire, Joseph ; Zimmermann, Verena ; Draper, Steve (2017):
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, pp. 25-38,
Usenix Associaton, Learning from Authoritative Security Experiment Results (LASER), Arlington, VA, USA, 18.-19.10.2017, [Conference or Workshop Item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71, pp. 100-113. DOI: 10.1016/j.cose.2017.02.004,

Renaud, Karen ; Zimmermann, Verena (2017):
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, pp. 1-9,
IEEE, Information Security for South Africa (ISSA), Johannesburg, South Africa, 16.-17.08.2017, [Conference or Workshop Item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4), pp. 400-415. DOI: 10.1108/ICS-06-2015-0024,

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), pp. 372-385. DOI: 10.1108/ICS-07-2015-0032,

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 161-175,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Renaud, Karen ; Flowerday, Stephen ; Othmane, Lotfi Ben ; Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, pp. 265-273,
Springer, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), pp. 104-121,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,

Renaud, Karen ; Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), pp. 18-23,
IEEE, [Conference or Workshop Item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, pp. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance,
Lulu Press, Raleigh, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science, In: Privacy Enhancing Technologies - 14th International Symposium, PETS, pp. 244-262,
Springer, Amsterdam, The Netherlands, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533, In: Human Aspects of Information Security, Privacy, and Trust, pp. 183-194,
Springer, Heraklion, Crete, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems,
ACM Digital Library, New York, [Conference or Workshop Item]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Lecture Notes in Computer Science, 8260, In: Number Theory and Cryptography, pp. 255-280, Springer Berlin Heidelberg, ISBN 978-3-642-42000-9,
DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, pp. 837-844,
Krakow, [Conference or Workshop Item]

This list was generated on Tue Jan 18 01:54:18 2022 CET.