Publication | Year | ||||||||
---|---|---|---|---|---|---|---|---|---|
Authors :
Karen Renaud
Journal : Computer Fraud & Security Volume : 2023 |
2023 | ||||||||
Human-centred cyber secure software engineering Authors : Karen RenaudJournal : Zeitschrift für Arbeitswissenschaft Journal Reference count : 108 Volume : 77 Pages : 45-55 |
2022 | ||||||||
Cyber security is a team effort Authors : Karen RenaudJournal : Network Security Volume : 2021 Pages : 20 |
2021 | ||||||||
Authors :
Karen Renaud
Journal : Network Security Volume : 2021 Pages : 20 |
2021 | ||||||||
Strong passwords can't keep children safe Authors : Karen RenaudJournal : Network Security Volume : 2020 Pages : 20-20 |
2020 | ||||||||
Authors :
Karen Renaud
Journal : Journal of Intellectual Capital Journal Reference count : 6 Volume : 21 Pages : 141-143 |
2020 | ||||||||
Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection Authors : Karen Vera Renaud , Judy Van BiljonJournal : South African Computer Journal Volume : 29 |
2017 | ||||||||
Authors :
Karen Renaud
, Gareth Renaud
Journal : Network Security Volume : 2017 Pages : 20 |
2017 | ||||||||
Authors :
Karen Renaud
Journal : Network Security Volume : 2017 Pages : 20 |
2017 | ||||||||
How smaller businesses struggle with security advice Authors : Karen RenaudJournal : Computer Fraud & Security Journal Reference count : 50 Volume : 2016 Pages : 10-18 |
2016 | ||||||||
Authors :
Karen Renaud
Journal : Network Security Volume : 2016 Pages : 20 |
2016 | ||||||||
Clinical and information governance proposes; human fallibility disposes Authors : Karen RenaudJournal : Clinical Governance: An International Journal Journal Reference count : 38 Volume : 19 Pages : 94-109 |
2014 | ||||||||
Computing Science in the Classroom: Experiences of a STEM Ambassador Authors : Gareth Renaud , Karen RenaudJournal : Innovation in Teaching and Learning in Information and Computer Sciences Journal Reference count : 26 Volume : 12 Pages : 3-13 |
2013 | ||||||||
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches? Authors : Karen RenaudJournal : IEEE Security & Privacy Magazine Journal Reference count : 15 Volume : 10 Pages : 57-63 |
2012 | ||||||||
On user involvement in production of images used in visual authentication Authors : Karen RenaudJournal : Journal of Visual Languages & Computing Journal Reference count : 80 Volume : 20 Pages : 1-15 |
2009 |