Skip to main content

Showing 1–11 of 11 results for author: Renaud, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.12244  [pdf, other

    cs.HC

    Extended Version of Paper Presented at ICISSP, Porto 20-22 February, 2025 A Value-Driven Approach to the Online Consent Conundrum -- A Study with the Unemployed

    Authors: Paul van Schaik, Karen Renaud

    Abstract: Online services are required to gain informed consent from users to collect, store and analyse their personal data, both intentionally divulged and derived during their use of the service. There are many issues with these forms: they are too long, too complex and demand the user's attention too frequently. Many users consent without reading so do not know what they are agreeing to. As such,granted… ▽ More

    Submitted 18 February, 2025; originally announced June 2025.

    Comments: Extended Version of ICISSP 2025 Paper

    MSC Class: H.4.0 General

  2. arXiv:2407.16362  [pdf, ps, other

    cs.CY

    Nudging Using Autonomous Agents: Risks and Ethical Considerations

    Authors: Vivek Nallur, Karen Renaud, Aleksei Gudkov

    Abstract: This position paper briefly discusses nudging, its use by autonomous agents, potential risks and ethical considerations while creating such systems. Instead of taking a normative approach, which guides all situations, the paper proposes a risk-driven questions-and-answer approach. The paper takes the position that this is a pragmatic method, that is transparent about beneficial intentions, foresee… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: 14 pages (incl. 3p pages of references), accepted for publication in EUMAS 2024

  3. arXiv:2006.11354  [pdf, other

    cs.CY

    Caveat Venditor, Used USB Drive Owner

    Authors: James Conacher, Karen Renaud, Jacques Ophoff

    Abstract: USB drives are a great way of transferring and backing up files. The problem is that they are easily lost, and users do not understand how to secure or properly erase them. When used to store private and sensitive information, this constitutes a risk that users may be unaware of. Consider that people sell used USB drives online -- presumably either their own or drives others have lost. This raises… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  4. arXiv:2006.06340  [pdf, other

    cs.CY

    2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying

    Authors: Karen Renaud, Paul van Schaik, Alastair Irons, Sara Wilford

    Abstract: On the 23rd March 2020, the UK entered a period of lockdown in the face of a deadly pandemic. While some were unable to work from home, many organisations were forced to move their activities online. Here, we discuss the technologies they used, from a privacy and security perspective. We also mention the communication failures that have exacerbated uncertainty and anxiety during the crisis. An org… ▽ More

    Submitted 19 June, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

  5. How to Make Privacy Policies both GDPR-Compliant and Usable

    Authors: Karen Renaud, Lynsay A. Shepherd

    Abstract: It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this. We commenced by synthesising the GDPR… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

    Comments: 8 pages, 3 figures. Accepted in IEEE CyberSA 2018 Proceedings

  6. arXiv:1806.05426  [pdf, other

    cs.HC cs.CR cs.CY

    How to design browser security and privacy alerts

    Authors: Lynsay A. Shepherd, Karen Renaud

    Abstract: It is important to design browser security and privacy alerts so as to maximise their value to the end user, and their efficacy in terms of communicating risk. We derived a list of design guidelines from the research literature by carrying out a systematic review. We analysed the papers both quantitatively and qualitatively to arrive at a comprehensive set of guidelines. Our findings aim to to pro… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: Symposium on Digital Behaviour Intervention for Cyber Security, AISB 2018 Convention

    Journal ref: AISB 2018: Symposium on Digital Behaviour Intervention for Cyber Security (pp. 21-28). Society for the Study of Artificial Intelligence and Simulation for Behaviour (AISB)

  7. arXiv:1611.03340  [pdf

    cs.CY cs.HC

    Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion)

    Authors: Noura Aleisa, Karen Renaud

    Abstract: The Internet of Things' potential for major privacy invasion is a concern. This paper reports on a systematic literature review of privacy-preserving solutions appearing in the research literature and in the media. We analysed proposed solutions in terms of the techniques they deployed and the extent to which they satisfied core privacy principles. We found that very few solutions satisfied all co… ▽ More

    Submitted 13 September, 2016; originally announced November 2016.

    Comments: Extended version of a paper to appear in HICSS 2017

  8. Alternative Authentication in the Wild

    Authors: Joseph Maguire, Karen Renaud

    Abstract: Alphanumeric authentication routinely fails to regulate access to resources with the required stringency, primarily due to usability issues. Initial deployment did not reveal the problems of passwords, deep and profound flaws only emerged once passwords were deployed in the wild. The need for a replacement is widely acknowledged yet despite over a decade of research into knowledge-based alternativ… ▽ More

    Submitted 20 January, 2016; originally announced January 2016.

  9. You Only Live Twice or "The Years We Wasted Caring about Shoulder-Surfing"

    Authors: Joseph Maguire, Karen Renaud

    Abstract: Passwords are a good idea, in theory. They have the potential to act as a fairly strong gateway. In practice though, passwords are plagued with problems. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. While alternatives to passwords have been proposed, none, as yet, have been adopted widely. There seems to be a reluctance to switch from tried and tes… ▽ More

    Submitted 23 August, 2015; originally announced August 2015.

    Comments: Proceedings of the BCS HCI 2012

  10. arXiv:1407.8007  [pdf

    cs.HC cs.CY

    How Helpful is Colour-Cueing of PIN Entry?

    Authors: Karen Renaud, Judith Ramsay

    Abstract: 21st Century citizens are faced with the need to remember numbers of PINs (Personal Identification Numbers) in order to do their daily business, and they often have difficulties due to human memory limitations. One way of helping them could be by providing cues during the PIN entry process. The provision of cues that would only be helpful to the PIN owner is challenging because the cue should only… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    ACM Class: H.1.2

  11. arXiv:1407.8004  [pdf, other

    cs.HC cs.CY

    An Investigation into the use of Images as Password Cues

    Authors: Tony McBryan, Karen Renaud, J. Paul Siebert

    Abstract: Computer users are generally authenticated by means of a password. Unfortunately passwords are often forgotten and replacement is expensive and inconvenient. Some people write their passwords down but these records can easily be lost or stolen. The option we explore is to find a way to cue passwords securely. The specific cueing technique we report on in this paper employs images as cues. The idea… ▽ More

    Submitted 9 August, 2014; v1 submitted 30 July, 2014; originally announced July 2014.

    ACM Class: H.1.2