Predicting technology acceptance and adoption by the elderly: a qualitative study K Renaud, J Van Biljon Proceedings of the 2008 annual research conference of the South African …, 2008 | 637 | 2008 |
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems A De Angeli, L Coventry, G Johnson, K Renaud International journal of human-computer studies 63 (1-2), 128-152, 2005 | 395 | 2005 |
Approximations, vol. 842 of Lecture Notes in Computer Science T Kloks, C Treewidth Springer, 1994 | 226* | 1994 |
Higher education students’ perceptions of online learning during COVID-19—A comparative study DJ Cranfield, A Tick, IM Venter, RJ Blignaut, K Renaud Education Sciences 11 (8), 403, 2021 | 214 | 2021 |
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective K Renaud, J Ramsay, M Hair International Journal of Human-Computer Interaction 21 (3), 313-332, 2006 | 201 | 2006 |
Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset V Zimmermann, K Renaud International Journal of Human-Computer Studies 131, 169-187, 2019 | 200 | 2019 |
The influence of self-esteem and locus of control on perceived email-related stress M Hair, KV Renaud, J Ramsay Computers in Human Behavior 23 (6), 2791-2803, 2007 | 178 | 2007 |
Why doesn’t Jane protect her privacy? K Renaud, M Volkamer, A Renkema-Padmos Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 167 | 2014 |
A framework for continuous, transparent mobile device authentication H Crawford, K Renaud, T Storer Computers & Security 39, 127-136, 2013 | 136 | 2013 |
Evaluating authentication mechanisms K Renaud Security and usability, 103-128, 2005 | 125 | 2005 |
Privacy of the internet of things: a systematic literature review (extended discussion) N Aleisa, K Renaud arXiv preprint arXiv:1611.03340, 2016 | 114 | 2016 |
A qualitative study of the applicability of technology acceptance models to senior mobile phone users J van Biljon, K Renaud Advances in Conceptual Modeling–Challenges and Opportunities: ER 2008 …, 2008 | 113 | 2008 |
User experiences of torpedo: Tooltip-powered phishing email detection M Volkamer, K Renaud, B Reinheimer, A Kunz Computers & Security 71, 100-113, 2017 | 107 | 2017 |
Ethical guidelines for nudging in information security & privacy K Renaud, V Zimmermann International Journal of Human-Computer Studies 120, 22-35, 2018 | 104 | 2018 |
Why do people adopt, or reject, smartphone password managers? N Alkaldi, K Renaud 1st European Workshop on Usable Security-EuroUSEC 2016, 2016 | 95 | 2016 |
The nudge puzzle: matching nudge interventions to cybersecurity decisions V Zimmermann, K Renaud ACM Transactions on Computer-Human Interaction (TOCHI) 28 (1), 1-45, 2021 | 90 | 2021 |
My password is here! An investigation into visuo-spatial authentication mechanisms K Renaud, A De Angeli Interacting with computers 16 (6), 1017-1041, 2004 | 90 | 2004 |
On user involvement in production of images used in visual authentication K Renaud Journal of Visual Languages & Computing 20 (1), 1-15, 2009 | 88 | 2009 |
Quantifying the quality of web authentication mechanisms a usability perspective K Renaud Journal of Web Engineering, 095-123, 2004 | 87 | 2004 |
Understanding user perceptions of transparent authentication on a mobile device H Crawford, K Renaud Journal of Trust Management 1, 1-28, 2014 | 82 | 2014 |