Predicting technology acceptance and adoption by the elderly: a qualitative study K Renaud, J Van Biljon Proceedings of the 2008 annual research conference of the South African …, 2008 | 378 | 2008 |
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems A De Angeli, L Coventry, G Johnson, K Renaud International journal of human-computer studies 63 (1-2), 128-152, 2005 | 342 | 2005 |
Following the crowd S Greengard Communications of the ACM 54 (2), 20-22, 2011 | 236* | 2011 |
" You've got e-mail!"... shall I deal with it now? Electronic mail from the recipient's perspective K Renaud, J Ramsay, M Hair International Journal of Human-Computer Interaction 21 (3), 313-332, 2006 | 159 | 2006 |
The influence of self-esteem and locus of control on perceived email-related stress M Hair, KV Renaud, J Ramsay Computers in Human Behavior 23 (6), 2791-2803, 2007 | 142 | 2007 |
A framework for continuous, transparent mobile device authentication H Crawford, K Renaud, T Storer Computers & Security 39, 127-136, 2013 | 112 | 2013 |
Evaluating authentication mechanisms K Renaud Security and usability, 103-128, 2005 | 105 | 2005 |
Why doesn’t Jane protect her privacy? K Renaud, M Volkamer, A Renkema-Padmos International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014 | 104 | 2014 |
A qualitative study of the applicability of technology acceptance models to senior mobile phone users J Van Biljon, K Renaud International Conference on Conceptual Modeling, 228-237, 2008 | 90 | 2008 |
On user involvement in production of images used in visual authentication K Renaud Journal of Visual Languages & Computing 20 (1), 1-15, 2009 | 85 | 2009 |
My password is here! An investigation into visuo-spatial authentication mechanisms K Renaud, A De Angeli Interacting with computers 16 (6), 1017-1041, 2004 | 83 | 2004 |
Quantifying the quality of web authentication mechanisms: a usability perspective K Renaud Journal of Web Engineering 3 (2), 95-123, 2004 | 76 | 2004 |
Understanding user perceptions of transparent authentication on a mobile device H Crawford, K Renaud Journal of Trust Management 1 (1), 1-28, 2014 | 62 | 2014 |
Success factors in information security implementation in organizations M Al-Awadi, K Renaud IADIS International Conference e-Society, 169-176, 2007 | 61 | 2007 |
Visual passwords: cure-all or snake-oil? K Renaud, A De Angeli Communications of the ACM 52 (12), 135-140, 2009 | 57 | 2009 |
Now what was that password again? A more flexible way of identifying and authenticating our seniors K Renaud, J Ramsay Behaviour & Information Technology 26 (4), 309-322, 2007 | 56 | 2007 |
Guidelines for designing graphical authentication mechanism interfaces KV Renaud International Journal of Information and Computer Security 3 (1), 60-85, 2009 | 55 | 2009 |
Don’t do this–Pitfalls in using anti-patterns in teaching human–computer interaction principles P Kotzé, K Renaud, J van Biljon Computers & Education 50 (3), 979-1008, 2008 | 51 | 2008 |
Blaming noncompliance is too convenient: What really causes information breaches? K Renaud IEEE Security & Privacy 10 (3), 57-63, 2011 | 47 | 2011 |
Worth-centred mobile phone design for older users K Renaud, J van Biljon Universal Access in the Information Society 9 (4), 387-403, 2010 | 43 | 2010 |