Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Karen Renaud

A Socio-Technical Investigation Into Smartphone Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Cyber Security Education Is as Essential as “The Three R's”

Heliyon
Multidisciplinary
2019English

Mental Models – General Introduction and Review of Their Application to Human-Centred Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Foreground Trust as a Security Paradigm

Advances in Information Security, Privacy, and Ethics
2014English

Usability Versus Privacy Instead of Usable Privacy

ACM SIGCAS Computers and Society
2015English

How to Make Privacy Policies Both GDPR-Compliant and Usable

2018English

Voter, What Message Will Motivate You to Verify Your Vote?

2014English

A Mobile Interface for the Older User

2016English

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology

2016English

An Algorithm for Automatically Choosing Distractors for Recognition Based Authentication Using Minimal Image Types

The Ergonomics Open Journal
2009English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy