PhD Students

Completed Students (See http://theses.gla.ac.uk/)

  • Maryam Al Awadi
  • A Study of Employees' Attitudes Towards Organisational Information Security Policies in the UK and Oman
  • Mohamed Al Fairuz
  • An Investigation into the Usability and Acceptability of Multi-channel Authentication to Online Banking Users in Oman

  • Huda Al Shuaily
  • SQL pattern design, development & evaluation of its efficacy

  • Thiam Kian Chiew
  • Web Page Performance Analysis

  • Heather Crawford
  • A framework for continuous, transparent authentication on mobile devices

  • Iain Darroch
  • Drag and Drop Graphical Interface for Constructing Chains to support Biological Research

  • Rosanne English (2nd Supervisor)
  • Modelling the security of recognition-based graphical password schemes

  • Dora Galvez-Cruz
  • An Environment for Protecting the Privacy of E-Shoppers

  • Salem Jebriel (2nd Supervisor)
  • Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security.

  • Ying He (2nd Supervisor)
  • Generic security templates for information system security arguments: mapping security arguments within healthcare systems

  • Joseph Maguire
  • An ecologically valid evaluation of an observation-resilient graphical authentication mechanism
  • Tim Troup
  • A Framework to Enable User Directed Component Binding at Runtime

Current Students

  • Stevie Docherty (2nd Supervisor) - Investigating the Use of Social Media in Disturbances
  • Gianfranco Elena (2nd Supervisor) - Risk and the Cloud
  • Nora Alkaldi - Adoption of Security Tools
  • Noura Aleisa - Privacy and IoT
  • Maria Evangelopoulou
  • Saad Alahmari Organizational Security
  • Abdulwhab Abdullah A Alkharashi
  • Saad Nasser Altamimi (2nd Supervisor)

Masters Students

  • (2017) A qualitative study on how organisations respond to data breaches
  • (2017) Cyber Culture and Cyber Security Policy of Indonesia
  • (2014/15) iPhone Podcasting App for the Blind
  • (2014/15) iPhone Podcasting App for the Blind
  • (2013/14) An online age verification scheme
  • (2013/14) Digital Profiling and Threat Analysis
  • (2013/14) The Chasm of Perplexity
  • (2013/14) Mobile Phone Interface for the Elderly
  • (2012/13) Pattern-based Software Architecture Design Framework
  • (2011/12) CAPTCHAs for the Blind
  • (2011/12) Training program for securing against social engineers
  • (2011/12) Simulation Visualisation
  • (2010/11) Tailorable Graphical Authentication
  • (2010/11) Moodle Authentication
  • (2010/11) Game to train people to spot phishing messages
  • (2010/11) Lectures in the Lab
  • (2010/11) Structured Store of Information Security Policies
  • (2007/08) Alternative Authentication
  • (2007/08) Rockvale Rebound Website
  • (2006/07) Textual Associations from images applied to authentication
  • (2004/05) Authentication by Handwriting Recognition

Bachelors Students

  • (2014/15) Security Awareness (Darmstadt)
  • (2014/15) Help Me Remember My PIN
  • (2014/15) Password Generation
  • (2014/15) What's your Privacy Quotient?
  • (2014/15) Media Database Project
  • (2013/14) The Daily Record
  • (2013/14) TRACKER: Trauma ReCord KEeping
  • (2013/14) MailGorilla: No-Cost Promotional Emailing
  • (2013/14) Shoulder Surfing resistance (Darmstadt)
  • (2012/13) HandiVote mobile application for referendums on economic decisions
  • (2011/12) Musical Cues
  • (2011/12) Training Programme for Securing Against Social Engineers
  • (2011/12) Website for a Translator (Level 3 Project)
  • (2010/11) CuePic
  • (2008/09) Accessible CAPTCHAs
  • (2008/09) Password Protection
  • (2008/09) Security Games (Level 3 Project)
  • (2007/08) Exploring the ENRON Email Corpus
  • (2007/08) Alternative Authentication
  • (2007/08) Take Your Medicine
  • (2007/08) Email Client
  • (2006/07) PDA Authentication
  • (2006/07) Online Homework System (Level 3 Project)
  • (2005/06) Email Software
  • (2005/06) Alternative Authentication
  • (2005/06) Questionnaire Software
  • (2005/06) A Personalised Virtual Grocery Store (Level 3 Project)
  • (2003/04) Colour and Memorability in Web Pages
  • (2003/04) Alternative Authentication
  • (2003/04) A GUI for the Unix Stream Editor (sed)
  • (2002/03) Associative Authentication

Teaching

  • Human-Centred Security
  • IT Architectures
  • Human-Centred Security (UWC-2013)
  • Human-Centred Security Experimentation (2014) (Darmstadt)
  • Communication and Awareness Aspects in Companies (2015) (Darmstadt)

Previous Teaching

  • Enterprise Computing
  • Databases & SQL
  • Programming (Java, LISP, C++, PHP)
  • Information Management 2
  • Internet Technology

Contact Me

Division of Cybersecurity
Abertay University
Bell Street
Dundee
DD1 1HG
UNITED KINGDOM



k.renaud at abertay.ac.uk