PhD Students

Completed Students (See http://theses.gla.ac.uk/)

  • Maryam Al Awadi
  • A Study of Employees' Attitudes Towards Organisational Information Security Policies in the UK and Oman
  • Mohamed Al Fairuz
  • An Investigation into the Usability and Acceptability of Multi-channel Authentication to Online Banking Users in Oman

  • Huda Al Shuaily
  • SQL pattern design, development & evaluation of its efficacy

  • Thiam Kian Chiew
  • Web Page Performance Analysis

  • Heather Crawford
  • A framework for continuous, transparent authentication on mobile devices

  • Iain Darroch
  • Drag and Drop Graphical Interface for Constructing Chains to support Biological Research

  • Rosanne English (2nd Supervisor)
  • Modelling the security of recognition-based graphical password schemes

  • Dora Galvez-Cruz
  • An Environment for Protecting the Privacy of E-Shoppers

  • Salem Jebriel (2nd Supervisor)
  • Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security.

  • Ying He (2nd Supervisor)
  • Generic security templates for information system security arguments: mapping security arguments within healthcare systems

  • Joseph Maguire
  • An ecologically valid evaluation of an observation-resilient graphical authentication mechanism
  • Tim Troup
  • A Framework to Enable User Directed Component Binding at Runtime

Current Students

  • Stevie Docherty (2nd Supervisor) - Investigating the Use of Social Media in Disturbances
  • Gianfranco Elena (2nd Supervisor) - Risk and the Cloud
  • Nora Alkaldi - Adoption of Security Tools
  • Noura Aleisa - Privacy and IoT
  • Maria Evangelopoulou
  • Saad Alahmari Organizational Security
  • Abdulwhab Abdullah A Alkharashi
  • Saad Nasser Altamimi (2nd Supervisor)

Masters Students

  • (2017) Keshav Kapoor: A qualitative study on how organisations respond to data breaches
  • (2017) Miftahul Ulum: Cyber Culture and Cyber Security Policy of Indonesia
  • (2014/15) Andrew Lowson: iPhone Podcasting App for the Blind
  • (2014/15) Chuan Chen: iPhone Podcasting App for the Blind
  • (2013/14) Aga Kielbinska: An online age verification scheme
  • (2013/14) Grant Moffatt: Digital Profiling and Threat Analysis
  • (2013/14) Greig, Andrew James: The Chasm of Perplexity
  • (2013/14) Kyfonidis, Charalampos: Mobile Phone Interface for the Elderly
  • (2012/13) Kuete Takam, Junior, Pattern-based Software Architecture Design Framework
  • (2011/12) Matthew Davidson: CAPTCHAs for the Blind
  • (2011/12) Alkhamis, Esra: Training program for securing against social engineers
  • (2011/12) Lang, Junqing: Simulation Visualisation
  • (2010/11) DEMETRIS KENNES: Tailorable Graphical Authentication
  • (2010/11) Harsh Surana: Moodle Authentication
  • (2010/11) SARAH ABU GHAZALAH: Game to train people to spot phishing messages
  • (2010/11) UMNIAH HAMEED JAID AL-DULAIMY: Lectures in the Lab
  • (2010/11) PANIOZOGLOU, KONSTANTINOS: Structured Store of Information Security Policies
  • (2007/08) Joseph Maguire: Alternative Authentication
  • (2007/08) Nicholas Allen: Rockvale Rebound Website
  • (2006/07) Anthony McBryan: Textual Associations from images applied to authentication
  • (2004/05) Elin Olsen: Authentication by Handwriting Recognition

Bachelors Students

  • (2014/15) Yanai Gonen: (supervised by Prof. Dr. Melanie Volkamer and Karen Renaud): Security Awareness (Darmstadt)
  • (2014/15) Rafal Ciesielczuk: Help Me Remember My PIN
  • (2014/15) Lukas Greblikas: Password Generation
  • (2014/15) Irina-Laura Preda: What's your Privacy Quotient?
  • (2014/15) Alastair Weir: Media Database Project
  • (2013/14) Capavanni, Marc: The Daily Record
  • (2013/14) Jamosin, Mark: TRACKER: Trauma ReCord KEeping
  • (2013/14) Alan Reid: MailGorilla: No-Cost Promotional Emailing
  • (2013/14) Kristoffer Braun and Philipp Rack (supervised by Karen Renaud and Prof. Dr. Melanie Volkamer): Shoulder Surfing resistance (Darmstadt)
  • (2012/13) Tsvetelina Valcheva: HandiVote mobile application for referendums on economic decisions
  • (2011/12) Matt Davidson: Musical Cues
  • (2011/12) Training Programme for Securing Against Social Engineers
  • (2011/12) Website for a Translator (Level 3 Project)
  • (2010/11) Robbie Simpson: CuePic
  • (2008/09) James Kelly - Accessible CAPTCHAs
  • (2008/09) Chris Kiernan - Password Protection
  • (2008/09) Security Games (Level 3 Project)
  • (2007/08) Cheryl Bonnacorsi: Exploring the ENRON Email Corpus
  • (2007/08) David Hannah: Alternative Authentication
  • (2007/08) Usman Kahn: Take Your Medicine
  • (2007/08) Alex Walker: Email Client
  • (2006/07) David Hannah: PDA Authentication
  • (2006/07) Online Homework System (Level 3 Project)
  • (2005/06) Jay Connelly: Email Software
  • (2005/06) Gareth McCrorie: Alternative Authentication
  • (2005/06) Hector Garcia-Urena: Questionnaire Software
  • (2005/06) A Personalised Virtual Grocery Store (Level 3 Project)
  • (2003/04) Elin Olsen: Colour and Memorability in Web Pages
  • (2003/04) Scott Porter: Alternative Authentication
  • (2003/04) Leor Vartikovski: A GUI for the Unix Stream Editor (sed)
  • (2002/03) Jim Liddell: Associative Authentication

Teaching

  • Human-Centred Security
  • IT Architectures
  • Human-Centred Security (UWC-2013)
  • Human-Centred Security Experimentation (2014) (Darmstadt)
  • Communication and Awareness Aspects in Companies (2015) (Darmstadt)

Previous Teaching

  • Enterprise Computing
  • Databases & SQL
  • Programming (Java, LISP, C++, PHP)
  • Information Management 2
  • Internet Technology

Contact Me

Division of Cybersecurity
Abertay University
Bell Street
Dundee
DD1 1HG
UNITED KINGDOM



k.renaud at abertay.ac.uk