BibTeX records: Lizzie Coles-Kemp

download as .bib file

@article{DBLP:journals/corr/abs-2308-00004,
  author       = {Kopo M. Ramokapane and
                  Lizzie Coles{-}Kemp and
                  Nikhil Patnaik and
                  Rui Huan and
                  Nirav Ajmeri and
                  Genevieve Liveley and
                  Awais Rashid},
  title        = {Towards Equitable Privacy},
  journal      = {CoRR},
  volume       = {abs/2308.00004},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.00004},
  doi          = {10.48550/ARXIV.2308.00004},
  eprinttype    = {arXiv},
  eprint       = {2308.00004},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-00004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/Coles-KempRH22,
  author       = {Lizzie Coles{-}Kemp and
                  Nick Robinson and
                  Claude P. R. Heath},
  title        = {Protecting The Vulnerable: Dimensions of Assisted Digital Access},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {6},
  number       = {{CSCW2}},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555647},
  doi          = {10.1145/3555647},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/Coles-KempRH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/RenaudC22,
  author       = {Karen Renaud and
                  Lizzie Coles{-}Kemp},
  title        = {Accessible and Inclusive Cyber Security: {A} Nuanced and Complex Challenge},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {5},
  pages        = {346},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01239-1},
  doi          = {10.1007/S42979-022-01239-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/RenaudC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HeathC22,
  author       = {Claude P. R. Heath and
                  Lizzie Coles{-}Kemp},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {Drawing Out the Everyday Hyper-[In]Securities of Digital Identity},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {254:1--254:18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3501961},
  doi          = {10.1145/3491102.3501961},
  timestamp    = {Fri, 29 Apr 2022 13:37:13 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HeathC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlesingerCPH22,
  author       = {Ian Slesinger and
                  Lizzie Coles{-}Kemp and
                  Niki Panteli and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Designing Through The Stack: The Case for a Participatory Digital
                  Security By Design},
  booktitle    = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022,
                  North Conway, NH, USA, October 24-27, 2022},
  pages        = {45--59},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584318.3584322},
  doi          = {10.1145/3584318.3584322},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftweb/Coles-Kemp20,
  author       = {Lizzie Coles{-}Kemp},
  title        = {Inclusive Security: Digital Security Meets Web Science},
  journal      = {Found. Trends Web Sci.},
  volume       = {7},
  number       = {2},
  pages        = {88--241},
  year         = {2020},
  url          = {https://doi.org/10.1561/1800000030},
  doi          = {10.1561/1800000030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftweb/Coles-Kemp20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/TalhoukCJBGGAAM20,
  author       = {Reem Talhouk and
                  Lizzie Coles{-}Kemp and
                  Rikke Bjerg Jensen and
                  Madeline Balaam and
                  Andrew Garbett and
                  Hala Ghattas and
                  Vera Ara{\'{u}}jo{-}Soares and
                  Balsam Ahmad and
                  Kyle Montague},
  title        = {Food Aid Technology: The Experience of a Syrian Refugee Community
                  in Coping with Food Insecurity},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {4},
  number       = {{CSCW2}},
  pages        = {134:1--134:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3415205},
  doi          = {10.1145/3415205},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/TalhoukCJBGGAAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Coles-KempJH20,
  author       = {Lizzie Coles{-}Kemp and
                  Rikke Bjerg Jensen and
                  Claude P. R. Heath},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Too Much Information: Questioning Security in a Post-Digital Society},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376214},
  doi          = {10.1145/3313831.3376214},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/Coles-KempJH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/JensenCT20,
  author       = {Rikke Bjerg Jensen and
                  Lizzie Coles{-}Kemp and
                  Reem Talhouk},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {When the Civic Turn turns Digital: Designing Safe and Secure Refugee
                  Resettlement},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376245},
  doi          = {10.1145/3313831.3376245},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/JensenCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/JensenCWL20,
  author       = {Rikke Bjerg Jensen and
                  Lizzie Coles{-}Kemp and
                  Nicola Wendt and
                  Makayla M. Lewis},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Digital Liminalities: Understanding Isolated Communities on the Edge},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376137},
  doi          = {10.1145/3313831.3376137},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/JensenCWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WendtJC20,
  author       = {Nicola Wendt and
                  Rikke Bjerg Jensen and
                  Lizzie Coles{-}Kemp},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Civic Empowerment through Digitalisation: The Case of Greenlandic
                  Women},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376763},
  doi          = {10.1145/3313831.3376763},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WendtJC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/MorrisCJ20,
  author       = {Amelia Morris and
                  Lizzie Coles{-}Kemp and
                  Will Jones},
  title        = {Digitalised Welfare: Systems For Both Seeing and Working With Mess},
  booktitle    = {WebSci '20: 12th {ACM} Conference on Web Science, Southampton, UK,
                  July 6-10, 2020, Companion Publication},
  pages        = {26--31},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3394332.3402825},
  doi          = {10.1145/3394332.3402825},
  timestamp    = {Thu, 09 Jul 2020 17:57:02 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/MorrisCJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurdonC19,
  author       = {Mark Burdon and
                  Lizzie Coles{-}Kemp},
  title        = {The significance of securing as a critical component of information
                  security: An Australian narrative},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101601},
  doi          = {10.1016/J.COSE.2019.101601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurdonC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interactions/CrivellaroCDL19,
  author       = {Clara Crivellaro and
                  Lizzie Coles{-}Kemp and
                  Alan J. Dix and
                  Ann Light},
  title        = {Not-equal: democratizing research in digital innovation for social
                  justice},
  journal      = {Interactions},
  volume       = {26},
  number       = {2},
  pages        = {70--73},
  year         = {2019},
  url          = {https://doi.org/10.1145/3301655},
  doi          = {10.1145/3301655},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/interactions/CrivellaroCDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tedu/WilliamsC19,
  author       = {Patricia A. H. Williams and
                  Lizzie Coles{-}Kemp},
  title        = {Teaching as a Collaborative Practice: Reframing Security Practitioners
                  as Navigators},
  journal      = {Trans. Edutainment},
  volume       = {15},
  pages        = {108--128},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-662-59351-6\_10},
  doi          = {10.1007/978-3-662-59351-6\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tedu/WilliamsC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Coles-KempJ19,
  author       = {Lizzie Coles{-}Kemp and
                  Rikke Bjerg Jensen},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Accessing a New Land: Designing for a Social Conceptualisation of
                  Access},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {181},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300411},
  doi          = {10.1145/3290605.3300411},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/Coles-KempJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HeathCC19,
  author       = {Claude P. R. Heath and
                  Clara Crivellaro and
                  Lizzie Coles{-}Kemp},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Relations are more than Bytes: Re-thinking the Benefits of Smart Services
                  through People and Things},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {308},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300538},
  doi          = {10.1145/3290605.3300538},
  timestamp    = {Wed, 01 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HeathCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Coles-KempJT18,
  author       = {Lizzie Coles{-}Kemp and
                  Rikke Bjerg Jensen and
                  Reem Talhouk},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities},
  booktitle    = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018},
  pages        = {584},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173574.3174158},
  doi          = {10.1145/3173574.3174158},
  timestamp    = {Fri, 12 Mar 2021 15:28:42 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/Coles-KempJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Coles-KempH17,
  author       = {Lizzie Coles{-}Kemp and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Theo Tryfonas},
  title        = {Walking the Line: The Everyday Security Ties that Bind},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {464--480},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_32},
  doi          = {10.1007/978-3-319-58460-7\_32},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Coles-KempH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BurdonSC16,
  author       = {Mark Burdon and
                  Jodie Siganto and
                  Lizzie Coles{-}Kemp},
  title        = {The regulatory challenges of Australian information security practice},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {623--633},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.clsr.2016.05.004},
  doi          = {10.1016/J.CLSR.2016.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BurdonSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/HallHC15,
  author       = {Peter Hall and
                  Claude Heath and
                  Lizzie Coles{-}Kemp},
  title        = {Critical visualization: a case for rethinking how we visualize risk
                  and security},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {93--108},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv004},
  doi          = {10.1093/CYBSEC/TYV004},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/HallHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Kani-ZabihiCH15,
  author       = {Elahe Kani{-}Zabihi and
                  Lizzie Coles{-}Kemp and
                  Martin Helmhout},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Information Presentation: Considering On-line User Confidence for
                  Effective Engagement},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {517--525},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_46},
  doi          = {10.1007/978-3-319-20376-8\_46},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Kani-ZabihiCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HallHCT15,
  author       = {Peter Hall and
                  Claude Heath and
                  Lizzie Coles{-}Kemp and
                  Axel Tanner},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Examining the Contribution of Critical Visualisation to Information
                  Security},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {59--72},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841118},
  doi          = {10.1145/2841113.2841118},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/HallHCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/LewisC14,
  author       = {Makayla M. Lewis and
                  Lizzie Coles{-}Kemp},
  editor       = {Matt Jones and
                  Philippe A. Palanque and
                  Albrecht Schmidt and
                  Tovi Grossman},
  title        = {Who says personas can't dance?: the use of comic strips to design
                  information security personas},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto,
                  ON, Canada - April 26 - May 01, 2014, Extended Abstracts},
  pages        = {2485--2490},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2559206.2581323},
  doi          = {10.1145/2559206.2581323},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/LewisC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DunphyVCCVWMO14,
  author       = {Paul Dunphy and
                  John Vines and
                  Lizzie Coles{-}Kemp and
                  Rachel Clarke and
                  Vasillis Vlachokyriakos and
                  Peter C. Wright and
                  John C. McCarthy and
                  Patrick Olivier},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Understanding the Experience-Centeredness of Privacy and Security
                  Technologies},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683475},
  doi          = {10.1145/2683467.2683475},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/DunphyVCCVWMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ukais/Coles-KempK14,
  author       = {Lizzie Coles{-}Kemp and
                  Anna Kotova},
  title        = {Sticking And Making: Technology As Glue For Families Separated By
                  Prison},
  booktitle    = {{UKAIS} 2014, {UK} Academy for Information Systems 19th Annual Conference
                  2014, St Catherines College, Oxford, UK, April 7-9, 2014},
  pages        = {18},
  year         = {2014},
  url          = {http://aisel.aisnet.org/ukais2014/18},
  timestamp    = {Wed, 23 Nov 2016 15:02:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ukais/Coles-KempK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Coles-KempAS13,
  author       = {Lizzie Coles{-}Kemp and
                  Alice Angus and
                  Freya Stang},
  editor       = {Wendy E. Mackay and
                  Stephen A. Brewster and
                  Susanne B{\o}dker},
  title        = {Letting go: working with the rhythm of participants},
  booktitle    = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems,
                  {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts},
  pages        = {373--378},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2468356.2468422},
  doi          = {10.1145/2468356.2468422},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/Coles-KempAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/FailyCDJAL13,
  author       = {Shamal Faily and
                  Lizzie Coles{-}Kemp and
                  Paul Dunphy and
                  Mike Just and
                  Yoko Akama and
                  Alexander De Luca},
  editor       = {Wendy E. Mackay and
                  Stephen A. Brewster and
                  Susanne B{\o}dker},
  title        = {Designing interactive secure system: chi 2013 special interest group},
  booktitle    = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems,
                  {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts},
  pages        = {2469--2472},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2468356.2468807},
  doi          = {10.1145/2468356.2468807},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/FailyCDJAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LightC13,
  author       = {Ann Light and
                  Lizzie Coles{-}Kemp},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Granddaughter Beware! An Intergenerational Case Study of Managing
                  Trust Issues in the Use of Facebook},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {196--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_15},
  doi          = {10.1007/978-3-642-38908-5\_15},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LightC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2013,
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5},
  doi          = {10.1007/978-3-642-38908-5},
  isbn         = {978-3-642-38907-8},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaC12,
  author       = {Giampaolo Bella and
                  Lizzie Coles{-}Kemp},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Layered Analysis of Security Ceremonies},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {273--286},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_23},
  doi          = {10.1007/978-3-642-30436-1\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/Coles-KempR12,
  author       = {Lizzie Coles{-}Kemp and
                  Peter Y. A. Ryan},
  title        = {Foreword from the Programme Chairs - {STAST} 2012},
  booktitle    = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2012, Cambridge, MA, USA, June 25, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/STAST.2012.5},
  doi          = {10.1109/STAST.2012.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/Coles-KempR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Coles-KempGGPP12,
  author       = {Lizzie Coles{-}Kemp and
                  Carrie Gates and
                  Dieter Gollmann and
                  Sean Peisert and
                  Christian W. Probst},
  title        = {Organizational Processes for Supporting Sustainable Security (Dagstuhl
                  Seminar 12501)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {12},
  pages        = {37--48},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.12.37},
  doi          = {10.4230/DAGREP.2.12.37},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Coles-KempGGPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-KempRW11,
  author       = {Lizzie Coles{-}Kemp and
                  Joseph Reddington and
                  Patricia A. H. Williams},
  title        = {Looking at clouds from both sides: The advantages and disadvantages
                  of placing personal narratives in the cloud},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {115--122},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.001},
  doi          = {10.1016/J.ISTR.2011.09.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-KempRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/BellaCCR11,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Lizzie Coles{-}Kemp and
                  Salvatore Riccobene},
  editor       = {Alexander Verbraeck and
                  Markus Helfert and
                  Jos{\'{e}} Cordeiro and
                  Boris Shishkov},
  title        = {Remote Management of Face-to-face Written Authenticated Though Anonymous
                  Exams},
  booktitle    = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on
                  Computer Supported Education, Volume 2, Noordwijkerhout, Netherlands,
                  6-8 May, 2011},
  pages        = {431--437},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 30 Sep 2011 08:32:56 +0200},
  biburl       = {https://dblp.org/rec/conf/csedu/BellaCCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/PietersC11,
  author       = {Wolter Pieters and
                  Lizzie Coles{-}Kemp},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Reducing normative conflicts in information security},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {11--24},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073279},
  doi          = {10.1145/2073276.2073279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/PietersC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slpat/ReddingtonC11,
  author       = {Joseph Reddington and
                  Lizzie Coles{-}Kemp},
  editor       = {Norman Alm},
  title        = {Trap Hunting: Finding Personal Data Management Issues in Next Generation
                  {AAC} Devices},
  booktitle    = {Proceedings of the Second Workshop on Speech and Language Processing
                  for Assistive Technologies, {SLPAT} 2011, Edinburgh, Scotland, UK,
                  July 30, 2011},
  pages        = {32--42},
  publisher    = {Association for Computational Linguistics},
  year         = {2011},
  url          = {https://www.aclweb.org/anthology/W11-2304/},
  timestamp    = {Wed, 01 Jun 2022 15:59:15 +0200},
  biburl       = {https://dblp.org/rec/conf/slpat/ReddingtonC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/Coles-KempK11,
  author       = {Lizzie Coles{-}Kemp and
                  Elahe Kani{-}Zabihi},
  title        = {Practice Makes Perfect: Motivating Confident Privacy Protection Practices},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {866--871},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.51},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/Coles-KempK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BellaC11,
  author       = {Giampaolo Bella and
                  Lizzie Coles{-}Kemp},
  title        = {Internet Users' Security and Privacy While They Interact with Amazon},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {878--883},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.118},
  doi          = {10.1109/TRUSTCOM.2011.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BellaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/BonniciC10,
  author       = {Christian J. Bonnici and
                  Lizzie Coles{-}Kemp},
  editor       = {Gareth Howells and
                  Konstantinos Sirlantzis and
                  Adrian Stoica and
                  Terry Huntsberger and
                  Tughrul Arslan},
  title        = {Principled Electronic Consent Management: {A} Preliminary Research
                  Framework},
  booktitle    = {2010 International Conference on Emerging Security Technologies, {EST}
                  2010, Canterbury, UK, September 6-7, 2010},
  pages        = {119--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/EST.2010.21},
  doi          = {10.1109/EST.2010.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/BonniciC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiC10,
  author       = {Elahe Kani{-}Zabihi and
                  Lizzie Coles{-}Kemp},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Service Users' Requirements for Tools to Support Effective On-line
                  Privacy and Consent Practices},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_9},
  doi          = {10.1007/978-3-642-27937-9\_9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Coles-KempK10,
  author       = {Lizzie Coles{-}Kemp and
                  Elahe Kani{-}Zabihi},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {On-line privacy and consent: a dialogue, not a monologue},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900560},
  doi          = {10.1145/1900546.1900560},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Coles-KempK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Coles-KempT10,
  author       = {Lizzie Coles{-}Kemp and
                  Marianthi Theoharidou},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threat and Information Security Management},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {45--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_3},
  doi          = {10.1007/978-1-4419-7133-3\_3},
  timestamp    = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Coles-KempT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2010P10341,
  editor       = {Matt Bishop and
                  Lizzie Coles{-}Kemp and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  title        = {Insider Threats: Strategies for Prevention, Mitigation, and Response,
                  22.08. - 26.08.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10341},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/portals/10341/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2010P10341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BishopCGHP10,
  author       = {Matt Bishop and
                  Lizzie Coles{-}Kemp and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  editor       = {Matt Bishop and
                  Lizzie Coles{-}Kemp and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  title        = {10341 Abstracts Collection - Insider Threats: Strategies for Prevention,
                  Mitigation, and Response},
  booktitle    = {Insider Threats: Strategies for Prevention, Mitigation, and Response,
                  22.08. - 26.08.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10341},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2904/},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BishopCGHP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BishopCGHP10a,
  author       = {Matt Bishop and
                  Lizzie Coles{-}Kemp and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  editor       = {Matt Bishop and
                  Lizzie Coles{-}Kemp and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  title        = {10341 Report - Insider Threats: Strategies for Prevention, Mitigation,
                  and Response},
  booktitle    = {Insider Threats: Strategies for Prevention, Mitigation, and Response,
                  22.08. - 26.08.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10341},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2903/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BishopCGHP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-Kemp09,
  author       = {Lizzie Coles{-}Kemp},
  title        = {The changing shape of privacy and consent},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {3},
  pages        = {111--112},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2009.10.008},
  doi          = {10.1016/J.ISTR.2009.10.008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-Kemp09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BogdanovicCC09,
  author       = {Danijela Bogdanovic and
                  Conn Crawford and
                  Lizzie Coles{-}Kemp},
  title        = {The need for enhanced privacy and consent dialogues},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {3},
  pages        = {167--172},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2009.10.011},
  doi          = {10.1016/J.ISTR.2009.10.011},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BogdanovicCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-Kemp09a,
  author       = {Lizzie Coles{-}Kemp},
  title        = {Information security management: An entangled research challenge},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {4},
  pages        = {181--185},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2010.04.005},
  doi          = {10.1016/J.ISTR.2010.04.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-Kemp09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-Kemp08,
  author       = {Lizzie Coles{-}Kemp},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {193--194},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.015},
  doi          = {10.1016/J.ISTR.2008.10.015},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-Kemp08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Coles-KempO07,
  author       = {Lizzie Coles{-}Kemp and
                  Richard E. Overill},
  title        = {On the role of the Facilitator in information security risk assessment},
  journal      = {J. Comput. Virol.},
  volume       = {3},
  number       = {2},
  pages        = {143--148},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-007-0040-6},
  doi          = {10.1007/S11416-007-0040-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/Coles-KempO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Coles-KempO07,
  author       = {Lizzie Coles{-}Kemp and
                  Richard E. Overill},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Triangulating the Views of Human and Non-Human Stakeholders in Information
                  System Security Risk Assessment},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {172--178},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Coles-KempO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics