Predicting technology acceptance and adoption by the elderly: a qualitative study K Renaud, J Van Biljon Proceedings of the 2008 annual research conference of the South African …, 2008 | 464 | 2008 |
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems A De Angeli, L Coventry, G Johnson, K Renaud International journal of human-computer studies 63 (1-2), 128-152, 2005 | 365 | 2005 |
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective K Renaud, J Ramsay, M Hair International Journal of Human-Computer Interaction 21 (3), 313-332, 2006 | 176 | 2006 |
The influence of self-esteem and locus of control on perceived email-related stress M Hair, KV Renaud, J Ramsay Computers in Human Behavior 23 (6), 2791-2803, 2007 | 154 | 2007 |
Why doesn’t Jane protect her privacy? K Renaud, M Volkamer, A Renkema-Padmos International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014 | 126 | 2014 |
A framework for continuous, transparent mobile device authentication H Crawford, K Renaud, T Storer Computers & Security 39, 127-136, 2013 | 121 | 2013 |
Evaluating authentication mechanisms K Renaud Security and usability, 103-128, 2005 | 116 | 2005 |
A qualitative study of the applicability of technology acceptance models to senior mobile phone users J Biljon, K Renaud International Conference on Conceptual Modeling, 228-237, 2008 | 99 | 2008 |
On user involvement in production of images used in visual authentication K Renaud Journal of Visual Languages & Computing 20 (1), 1-15, 2009 | 89 | 2009 |
My password is here! An investigation into visuo-spatial authentication mechanisms K Renaud, A De Angeli Interacting with computers 16 (6), 1017-1041, 2004 | 86 | 2004 |
Quantifying the quality of web authentication mechanisms a usability perspective K Renaud Journal of Web Engineering, 095–123-095–123, 2004 | 81 | 2004 |
Privacy of the Internet of Things: a systematic literature review (extended discussion) N Aleisa, K Renaud arXiv preprint arXiv:1611.03340, 2016 | 78 | 2016 |
Understanding user perceptions of transparent authentication on a mobile device H Crawford, K Renaud Journal of Trust Management 1 (1), 1-28, 2014 | 72 | 2014 |
Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset V Zimmermann, K Renaud International Journal of Human-Computer Studies 131, 169-187, 2019 | 68 | 2019 |
Success factors in information security implementation in organizations M Al-Awadi, K Renaud IADIS International Conference e-Society, 169-176, 2007 | 63 | 2007 |
Now what was that password again? A more flexible way of identifying and authenticating our seniors K Renaud, J Ramsay Behaviour & Information Technology 26 (4), 309-322, 2007 | 60 | 2007 |
Why do people adopt, or reject, smartphone password managers? N Alkaldi, K Renaud | 57 | 2016 |
Visual passwords: cure-all or snake-oil? K Renaud, A De Angeli Communications of the ACM 52 (12), 135-140, 2009 | 57 | 2009 |
Guidelines for designing graphical authentication mechanism interfaces KV Renaud International Journal of Information and Computer Security 3 (1), 60-85, 2009 | 56 | 2009 |
Blaming noncompliance is too convenient: What really causes information breaches? K Renaud IEEE Security & Privacy 10 (3), 57-63, 2011 | 54 | 2011 |