• Publications
  • Influence
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
Results demonstrate that pictures can be a solution to some problems relating to traditional knowledge-based authentication but that they are not a simple panacea, since a poor design can eliminate the picture superiority effect in memory.
Predicting technology acceptance and adoption by the elderly: a qualitative study
A set of interlinked acceptance factors and adoption phases that could influence and predict mobile phone adoption by the elderly user are presented as the Senior Technology Acceptance& Adoption model for Mobile technology (STAM).
"You've Got E-Mail!" ... Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective
The conclusion is that the constant monitoring of e-mail actually reduces productivity and that there is a need for increased power, control, and awareness on the part of the e- Mail recipient to ensure that e- mail remains a tool rather than a tyrant.
A framework for continuous, transparent mobile device authentication
An extensible Transparent Authentication Framework is proposed that integrates multiple behavioral biometrics with conventional authentication to implement an effortless and continuous authentication mechanism for transparent authentication on mobile devices.
Why Doesn't Jane Protect Her Privacy?
This investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture that suggest that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users.
The influence of self-esteem and locus of control on perceived email-related stress
A three-fold typology of orientations to email: 'relaxed', 'driven' and 'stressed' is developed and it is suggested that the 'Stressed' orientation may be related to how distractive email is perceived to be, compared with other forms of communication.
On user involvement in production of images used in visual authentication
  • K. Renaud
  • Computer Science
    J. Vis. Lang. Comput.
  • 1 February 2009
The notion of essential and tuning image properties is proposed, which are those that an image must exhibit or possess in order to be used in visual authentication at all and which will improve the efficiency of the mechanism.
My password is here! An investigation into visuo-spatial authentication mechanisms
This paper discusses graphical authentication mechanisms in general and reports on the evaluation of one particular visuo-spatial mechanism, aimed at augmenting the password paradigm by providing a way to record passwords securely.
Understanding user perceptions of transparent authentication on a mobile device
It is found that having a few barriers to device and data access aided the user in building a mental model of the on-device security provided by transparent authentication, showing that a more granular method of smartphone security is justified.
Visual passwords
The biometric -- measurement of either behavioral or physiological characteristics of the end-user, which is obviously superior to the password because it removes the burden on the user's memory, is considered.