Professor Karen Renaud

Professor in Cyber Security

School School of Design and Informatics

Department Division of Cyber Security

Contact info

+44 (0)1382 30 8236

Biography

I am a Computing Scientist working on all aspects of Human-Centred Security and Privacy. I was educated at the Universities of Pretoria, South Africa and Glasgow. I am particularly interested in deploying behavioural science techniques to improve security behaviours, and in encouraging end-user privacy-preserving behaviours. 

In 2016/17 I was one of five UK Cyber Security Fulbright Awardees and spent 7 months working with Prof Merrill Warkentin at Mississippi State University in Starkville, Mississippi.I joined the Division of Cybersecurity at the University of Abertay in October 2017.

More info here: http://www.karenrenaud.com

I teach two courses called Engineering Resilient Systems with Adam Sampson and Xavier Bellekens, one at Honours level and one at Masters level. These courses bring together concepts of human-centred security, machine learning and secure software engineering.

 

Interests

My research area is Human-Centred Security. Basically I want to improve the boundary where humans and cyber security meet.

For more info my personal web page is at www.karenrenaud.com

2019

“I do it because they do it”

Altamimi, S., Renaud, K. & Storer, T. (2019) “I do it because they do it”. . . .
View in Research Portal

Modeling inertia causatives

Renaud, K. & Ophoff, J. (2019) Modeling inertia causatives. In: Proceedings of 2019 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. . . IFIP Working Group 8.11/11.13.
View in Research Portal

How does intellectual capital align with cyber security?

Renaud, K., von Solms, B. & von Solms, R. . (2019) How does intellectual capital align with cyber security?. . . .
View in Research Portal

A framework to maximise the communicative power of knowledge visualisations

Renaud, K. & Biljon, J. V. (2019) A framework to maximise the communicative power of knowledge visualisations. In: Proceedings of SAICSIT 2019. . .
View in Research Portal

An investigation into the “beautification” of security ceremonies

Bella, G., Renaud, K., Sempreboni, D. . & Vigano, L. . (2019) An investigation into the “beautification” of security ceremonies. In: 16th International Joint Conference on e-Business and Telecommunications. . . Scitepress Digital Library.
View in Research Portal

Comparing "challenge-based" and "code-based" internet voting verification implementations

Kulyk, O., Henzel, J., Renaud, K. & Volkamer, M. . (2019) Comparing "challenge-based" and "code-based" internet voting verification implementations. In: Human-Computer Interaction- INTERACT 2019: 17th IFIP TC 13 International Conference Paphos, Cyprus, September 2-6, 2019 Proceedings. Lamas, D. (ed.), Loizides, F. (ed.), Nacke, L. (ed.), Petrie, H. (ed.), Winckle, M. (ed.), Zaphiri, P. (ed.). . Springer.
View in Research Portal

Encouraging password manager use

Renaud, K. & Zimmermann, V. (2019) Encouraging password manager use. . . p. 20-20. .
View in Research Portal

Refining the POINTER “Human Firewall” pentesting framework

Archibald, J. & Renaud, K. (2019) Refining the POINTER “Human Firewall” pentesting framework. . . .
View in Research Portal

How to design browser security and privacy alerts

Shepherd, L. & Renaud, K. (2019) How to design browser security and privacy alerts. . . p. 10. .
View in Research Portal

Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset

Zimmermann, V. & Renaud, K. (2019) Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset. . . p. 169-187. .
View in Research Portal

2018

Why governments should treat cybersecurity the way they do infectious diseases

Renaud, K. & Flowerday, S. (2018) Why governments should treat cybersecurity the way they do infectious diseases. . . . Behavior Scientist.
View in Research Portal

It’s time for governments to help their citizens deal with cybersecurity

Renaud, K. (2018) It’s time for governments to help their citizens deal with cybersecurity. . . London: The Conversation.
View in Research Portal

Encouraging password manager adoption by meeting adopter self-determination needs

Alkaldi, N., Renaud, K. & Mackenzie, L. (2018) Encouraging password manager adoption by meeting adopter self-determination needs. In: Proceedings of the 52nd Hawaii International Conference on System Sciences. . p. 4824-4833. . University of Hawaii at Manoa.
View in Research Portal

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks

Camp, L. J., Grobler, M. ., Jang-Jaccard, J., Probst, C. ., Renaud, K. & Watters, P. (2018) Conceptualizing human resilience in the face of the global epidemiology of cyber attacks. In: Proceedings of the 52nd Hawaii International Conference on System Sciences . . p. 4763-4772. . University of Hawaii at Manoa.
View in Research Portal

A user by any other name

Renaud, K. & Zimmermann, V. (2018) A user by any other name. . . p. 20. .
View in Research Portal

POINTER

Archibald, J. & Renaud, K. (2018) POINTER. In: Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018). Clarke, N. (ed.), Furnell, S. (ed.). p. 147-157. Plymouth: Centre for Security, Communications & Network Research, University of Plymouth.
View in Research Portal

Designing authentication with seniors in mind

Renaud, K., Scott-Brown, K. C. & Szymkowiak, A. (2018) Designing authentication with seniors in mind. In: Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018, Barcelona, Spain. . .
View in Research Portal

Privacy in crowdsourcing

Alkharashi, A. & Renaud, K. (2018) Privacy in crowdsourcing. In: Information Security : 21st International Conference, ISC 2018, Guilford, UK, September 9-12, 2018, Proceedings. Chen, L. (ed.), Manulis, M. (ed.), Schneider, S. (ed.). p. 387-400. . Springer-Verlag.
View in Research Portal

Developing and evaluating a five minute phishing awareness video

Volkamer, M., Renaud, K., Reinheimer, B., Rack, P., Ghiglieri, M., Mayer, P., Kunz, A. & Gerber, N. (2018) Developing and evaluating a five minute phishing awareness video. In: Trust, Privacy and Security in Digital Business: 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings. Furnell, S. (ed.), Mouratidis, H. (ed.), Pernul, G. (ed.). p. 119-134. Cham: Springer Nature.
View in Research Portal

Replication study

Volkamer, M., Gutmann, A., Renaud, K., Gerber, P. & Mayer, P. (2018) Replication study. In: Proceedings of the Fourteenth Symposium on Usable Privacy and Security. . p. 1-11. . USENIX Association.
View in Research Portal

Are 21st-century citizens grieving for their loss of privacy?

Bott, G. J. & Renaud, K. (2018) Are 21st-century citizens grieving for their loss of privacy?. In: Proceedings of 2018 IFIP 8.11/11.13 Dewald Roode Information Security Workshop. Vance, A. (ed.). . IFIP Working Group 8.11/11.13.
View in Research Portal

Is the responsibilization of the cyber security risk reasonable and judicious?

Renaud, K., Flowerday, S., Warkentin, M., Cockshott, P. & Orgeron, C. (2018) Is the responsibilization of the cyber security risk reasonable and judicious?. . . p. 198-211. .
View in Research Portal

Cooking up security awareness & training

Renaud, K. (2018) Cooking up security awareness & training. . . p. 20-20. .
View in Research Portal

How to make privacy policies both GDPR-compliant and usable

Renaud, K. & Shepherd, L. (2018) How to make privacy policies both GDPR-compliant and usable. In: 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). . . IEEE .
View in Research Portal

Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors

Warkentin, M., Goel, S., Williams, K. J. & Renaud, K. (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors. In: ECIS 2018 Proceedings. . . Association for Information Systems.
View in Research Portal

Are we predisposed to behave securely? Influence of risk disposition on individual security behaviours

Warkentin, M., Goel, S., Williams, K. J. & Renaud, K. (2018) Are we predisposed to behave securely? Influence of risk disposition on individual security behaviours. . . p. 1. .
View in Research Portal

Preparing for GDPR

Kapoor, K., Renaud, K. & Archibald, J. (2018) Preparing for GDPR. In: AISB 2018: Symposium on Digital Behaviour Interventions for Cyber-Security. . p. 13-20. . Society for the Study of Artificial Intelligence and Simulation for Behaviour (AISB).
View in Research Portal

How to design browser security and privacy alerts

Shepherd, L. A. & Renaud, K. (2018) How to design browser security and privacy alerts. In: AISB 2018: Symposium on Digital Behaviour Interventions for Cyber-Security. . p. 21-28. . Society for the Study of Artificial Intelligence and Simulation for Behaviour (AISB).
View in Research Portal

Dark clouds on the horizon

Ferguson, R. I., Renaud, K. & Irons, A. (2018) Dark clouds on the horizon. In: Cloud Computing 2018: The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization. Duncan, B. (ed.), Lee, Y. (ed.), Olmsted, A. (ed.). p. 51-58. . International Academy, Research, and Industry Association (IARIA).
View in Research Portal

GDPR

Renaud, K. & Shepherd, L. (2018) GDPR. . . p. 20-20. .
View in Research Portal

“This is the way ‘I’ create my passwords ..."

Renaud, K., Otondo, R. & Warkentin, M. (2018) “This is the way ‘I’ create my passwords ...". . . p. 241-260. .
View in Research Portal

Case study

Choong, Y., Theofanos, M., Renaud, K. & Prior, S. (2018) Case study. In: Proceedings 2019 Workshop on Usable Security (USEC). . . Internet Society.
View in Research Portal

Human-computer interaction for development (HCI4D)

Biljon, J. V. & Renaud, K. (2018) Human-computer interaction for development (HCI4D). In: Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part II. Nielsen, P. (ed.), Kimaro, H. (ed.). p. 253-266. . Springer.
View in Research Portal

Swamped by cyberthreats, citizens need government protection

Renaud, K. & Warkentin, M. (2018) Swamped by cyberthreats, citizens need government protection. . . . The Conversation.
View in Research Portal

Deliver security awareness training, then repeat

Gundu, T., Flowerday, S. & Renaud, K. (2018) Deliver security awareness training, then repeat. In: 2019 Conference on Information Communications Technology and Society (ICTAS). . . IEEE .
View in Research Portal

Visualization of African knowledge to embody the spirit of African storytelling

Van Biljon, J., Renaud, K. & Chimbo, B. (2018) Visualization of African knowledge to embody the spirit of African storytelling. In: Proceedings of the 2nd African Conference for Human Computer Interaction: Thriving Communities, AfriCHI 2018. van Zyl, I. (ed.), Singh Jat, D. (ed.), Winschiers-Theophilus, H. (ed.), Goagoses, N. (ed.), Orji, R. (ed.), Belay, E. (ed.), Peters, A. (ed.). p. 271-272. . Association for Computing Machinery (ACM).
View in Research Portal

Ethical guidelines for nudging in information security & privacy

Renaud, K. & Zimmermann, V. (2018) Ethical guidelines for nudging in information security & privacy. . . p. 22-35. .
View in Research Portal

2017

Nudging folks towards stronger password choices

Renaud, K. & Zimmerman, V. (2017) Nudging folks towards stronger password choices. . . .
View in Research Portal

The role of knowledge visualisation in supporting postgraduate dissertation assessment

Renaud, K. & Biljon, J. V. (2017) The role of knowledge visualisation in supporting postgraduate dissertation assessment. . . p. 1475-1490. .
View in Research Portal

Risk homeostasis in information security

Renaud, K. & Warkentin, M. (2017) Risk homeostasis in information security. In: Proceedings of New Security Paradigms Workshop (NSPW’17). . p. 57-69. New York: Association for Computing Machinery (ACM).
View in Research Portal

User experiences of TORPEDO

Volkamer, M., Renaud, K., Reinheimer, B. & Kunz, A. (2017) User experiences of TORPEDO. . . p. 100-113. .
View in Research Portal

Introduction to special issue on e-voting

Budurushi, J., Neumann, S., Renaud, K. & Volkamer, M. (2017) Introduction to special issue on e-voting. . . p. 122-123. .
View in Research Portal

What did I really vote for? On the usability of verifiable e-voting schemes

Marky, K., Kulyk, O., Renaud, K. & Volkamer, M. (2017) What did I really vote for? On the usability of verifiable e-voting schemes. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. . New York: Association for Computing Machinery (ACM).
View in Research Portal

Guidelines for ethical nudging in password authentication

Renaud, K. & Zimmerman, V. (2017) Guidelines for ethical nudging in password authentication. . . p. 102-118. .
View in Research Portal

Lessons learned from evaluating eight password nudges in the wild

Renaud, K., Zimmerman, V., Maguire, J. & Draper, S. (2017) Lessons learned from evaluating eight password nudges in the wild. In: Proceedings of LASER 2017: Learning from Authoritative Security Experiment Results, Arlington, VA, USA, October 18-19, 2017. . p. 25-37. Berkeley, CA: USENIX Association.
View in Research Portal

Privacy of the Internet of Things

Aleisa, N. & Renaud, K. (2017) Privacy of the Internet of Things. In: Proceedings of the 50th Hawaii International Conference on System Sciences. . p. 5947-5956. .
View in Research Portal

Human-centred cyber security

Renaud, K. & Flowerday, S. (2017) Human-centred cyber security. . . .
View in Research Portal

2016

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions

Gerber, P., Volkamer, M. & Renaud, K. (2016) The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. . . p. 8-26. .
View in Research Portal

Why do people adopt, or reject, smartphone security tools?

Alkaldi, N. & Renaud, K. (2016) Why do people adopt, or reject, smartphone security tools?. In: Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016. Clarke, N. (ed.), Furnell, S. (ed.). p. 135-144. Plymouth: Univerisity of Plymouth.
View in Research Portal

Why do people adopt, or reject, smartphone password managers?

Alkaldi, N. & Renaud, K. (2016) Why do people adopt, or reject, smartphone password managers?. In: EuroUSEC '16: the 1st European Workshop on Usable Security. . Darmstadt: Internet Society.
View in Research Portal

ZeTA-Zero-Trust Authentication

Gutmann, A., Renaud, K., Maguire, J., Mayer, P., Volkamer, M., Matsuura, K. & Muller-Quade, J. (2016) ZeTA-Zero-Trust Authentication. In: Proceedings of 2016 IEEE European Symposium on Security and Privacy, EURO S & P 2016. . p. 357-371. Los Alamitos, CA: IEEE Computer Society.
View in Research Portal

Smartphone owners need security advice. How can we ensure they get it?

Renaud, K., Blignaut, R. & Venter, I. (2016) Smartphone owners need security advice. How can we ensure they get it?. . . .
View in Research Portal

Demarcating mobile phone interface design guidelines to expedite selection

Renaud, K. & Biljon, J. V. (2016) Demarcating mobile phone interface design guidelines to expedite selection. . . p. 127-144. .
View in Research Portal

2015

"I am because we are"

Renaud, K., Flowerday, S., Othmane, L. b. & Volkamer, M. (2015) "I am because we are". In: Proceedings of the African Cyber Citizenship Conference 2015. Van Niekerk, J. (ed.). p. 94-104. Port Elizabeth: Nelson Mandela University.
View in Research Portal

Spot the phish by checking the pruned URL

Volkamer, M., Renaud, K. & Gerber, P. (2015) Spot the phish by checking the pruned URL. . . p. 372-385. .
View in Research Portal

Regulating access to adult content (with privacy preservation)

Renaud, K. & Maguire, J. (2015) Regulating access to adult content (with privacy preservation). In: Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems. . p. 4019-4028. New York: Association for Computing Machinery (ACM).
View in Research Portal

An ethnographic study to assess the enactment of information security culture in a retail store

Greig, A., Renaud, K. & Flowerday, S. (2015) An ethnographic study to assess the enactment of information security culture in a retail store. In: 2015 World Congress on Internet Security (WorldCIS). . p. 61-66. . IEEE .
View in Research Portal

More Information

Esteem

Esteem

See www.karenrenaud.com/contrib.html

Meet the rest of the team

Dr Ethan Bayne

Dr Ethan Bayne

Division of Cyber Security | Lecturer

View profile

Dr Suzanne Prior

Dr Suzanne Prior

Division of Cyber Security | Lecturer

View profile