Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lizzie Coles-Kemp
@article{DBLP:journals/corr/abs-2308-00004, author = {Kopo M. Ramokapane and Lizzie Coles{-}Kemp and Nikhil Patnaik and Rui Huan and Nirav Ajmeri and Genevieve Liveley and Awais Rashid}, title = {Towards Equitable Privacy}, journal = {CoRR}, volume = {abs/2308.00004}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00004}, doi = {10.48550/ARXIV.2308.00004}, eprinttype = {arXiv}, eprint = {2308.00004}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/Coles-KempRH22, author = {Lizzie Coles{-}Kemp and Nick Robinson and Claude P. R. Heath}, title = {Protecting The Vulnerable: Dimensions of Assisted Digital Access}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CSCW2}}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.1145/3555647}, doi = {10.1145/3555647}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/Coles-KempRH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/RenaudC22, author = {Karen Renaud and Lizzie Coles{-}Kemp}, title = {Accessible and Inclusive Cyber Security: {A} Nuanced and Complex Challenge}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {5}, pages = {346}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01239-1}, doi = {10.1007/S42979-022-01239-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/RenaudC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HeathC22, author = {Claude P. R. Heath and Lizzie Coles{-}Kemp}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {Drawing Out the Everyday Hyper-[In]Securities of Digital Identity}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {254:1--254:18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3501961}, doi = {10.1145/3491102.3501961}, timestamp = {Fri, 29 Apr 2022 13:37:13 +0200}, biburl = {https://dblp.org/rec/conf/chi/HeathC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/SlesingerCPH22, author = {Ian Slesinger and Lizzie Coles{-}Kemp and Niki Panteli and Ren{\'{e}} Rydhof Hansen}, title = {Designing Through The Stack: The Case for a Participatory Digital Security By Design}, booktitle = {Proceedings of the 2022 New Security Paradigms Workshop, {NSPW} 2022, North Conway, NH, USA, October 24-27, 2022}, pages = {45--59}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584318.3584322}, doi = {10.1145/3584318.3584322}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/SlesingerCPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftweb/Coles-Kemp20, author = {Lizzie Coles{-}Kemp}, title = {Inclusive Security: Digital Security Meets Web Science}, journal = {Found. Trends Web Sci.}, volume = {7}, number = {2}, pages = {88--241}, year = {2020}, url = {https://doi.org/10.1561/1800000030}, doi = {10.1561/1800000030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftweb/Coles-Kemp20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/TalhoukCJBGGAAM20, author = {Reem Talhouk and Lizzie Coles{-}Kemp and Rikke Bjerg Jensen and Madeline Balaam and Andrew Garbett and Hala Ghattas and Vera Ara{\'{u}}jo{-}Soares and Balsam Ahmad and Kyle Montague}, title = {Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {4}, number = {{CSCW2}}, pages = {134:1--134:25}, year = {2020}, url = {https://doi.org/10.1145/3415205}, doi = {10.1145/3415205}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/TalhoukCJBGGAAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Coles-KempJH20, author = {Lizzie Coles{-}Kemp and Rikke Bjerg Jensen and Claude P. R. Heath}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Too Much Information: Questioning Security in a Post-Digital Society}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--14}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376214}, doi = {10.1145/3313831.3376214}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/chi/Coles-KempJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/JensenCT20, author = {Rikke Bjerg Jensen and Lizzie Coles{-}Kemp and Reem Talhouk}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--14}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376245}, doi = {10.1145/3313831.3376245}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/JensenCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/JensenCWL20, author = {Rikke Bjerg Jensen and Lizzie Coles{-}Kemp and Nicola Wendt and Makayla M. Lewis}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Digital Liminalities: Understanding Isolated Communities on the Edge}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--14}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376137}, doi = {10.1145/3313831.3376137}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/JensenCWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WendtJC20, author = {Nicola Wendt and Rikke Bjerg Jensen and Lizzie Coles{-}Kemp}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Civic Empowerment through Digitalisation: The Case of Greenlandic Women}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376763}, doi = {10.1145/3313831.3376763}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WendtJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/MorrisCJ20, author = {Amelia Morris and Lizzie Coles{-}Kemp and Will Jones}, title = {Digitalised Welfare: Systems For Both Seeing and Working With Mess}, booktitle = {WebSci '20: 12th {ACM} Conference on Web Science, Southampton, UK, July 6-10, 2020, Companion Publication}, pages = {26--31}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3394332.3402825}, doi = {10.1145/3394332.3402825}, timestamp = {Thu, 09 Jul 2020 17:57:02 +0200}, biburl = {https://dblp.org/rec/conf/websci/MorrisCJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurdonC19, author = {Mark Burdon and Lizzie Coles{-}Kemp}, title = {The significance of securing as a critical component of information security: An Australian narrative}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101601}, doi = {10.1016/J.COSE.2019.101601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurdonC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interactions/CrivellaroCDL19, author = {Clara Crivellaro and Lizzie Coles{-}Kemp and Alan J. Dix and Ann Light}, title = {Not-equal: democratizing research in digital innovation for social justice}, journal = {Interactions}, volume = {26}, number = {2}, pages = {70--73}, year = {2019}, url = {https://doi.org/10.1145/3301655}, doi = {10.1145/3301655}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/interactions/CrivellaroCDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tedu/WilliamsC19, author = {Patricia A. H. Williams and Lizzie Coles{-}Kemp}, title = {Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators}, journal = {Trans. Edutainment}, volume = {15}, pages = {108--128}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-59351-6\_10}, doi = {10.1007/978-3-662-59351-6\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tedu/WilliamsC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Coles-KempJ19, author = {Lizzie Coles{-}Kemp and Rikke Bjerg Jensen}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Accessing a New Land: Designing for a Social Conceptualisation of Access}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {181}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300411}, doi = {10.1145/3290605.3300411}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/Coles-KempJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HeathCC19, author = {Claude P. R. Heath and Clara Crivellaro and Lizzie Coles{-}Kemp}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {308}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300538}, doi = {10.1145/3290605.3300538}, timestamp = {Wed, 01 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HeathCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Coles-KempJT18, author = {Lizzie Coles{-}Kemp and Rikke Bjerg Jensen and Reem Talhouk}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {584}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3174158}, doi = {10.1145/3173574.3174158}, timestamp = {Fri, 12 Mar 2021 15:28:42 +0100}, biburl = {https://dblp.org/rec/conf/chi/Coles-KempJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Coles-KempH17, author = {Lizzie Coles{-}Kemp and Ren{\'{e}} Rydhof Hansen}, editor = {Theo Tryfonas}, title = {Walking the Line: The Everyday Security Ties that Bind}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {464--480}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_32}, doi = {10.1007/978-3-319-58460-7\_32}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/Coles-KempH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BurdonSC16, author = {Mark Burdon and Jodie Siganto and Lizzie Coles{-}Kemp}, title = {The regulatory challenges of Australian information security practice}, journal = {Comput. Law Secur. Rev.}, volume = {32}, number = {4}, pages = {623--633}, year = {2016}, url = {https://doi.org/10.1016/j.clsr.2016.05.004}, doi = {10.1016/J.CLSR.2016.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BurdonSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/HallHC15, author = {Peter Hall and Claude Heath and Lizzie Coles{-}Kemp}, title = {Critical visualization: a case for rethinking how we visualize risk and security}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {93--108}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv004}, doi = {10.1093/CYBSEC/TYV004}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/HallHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Kani-ZabihiCH15, author = {Elahe Kani{-}Zabihi and Lizzie Coles{-}Kemp and Martin Helmhout}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Information Presentation: Considering On-line User Confidence for Effective Engagement}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {517--525}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_46}, doi = {10.1007/978-3-319-20376-8\_46}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/Kani-ZabihiCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HallHCT15, author = {Peter Hall and Claude Heath and Lizzie Coles{-}Kemp and Axel Tanner}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Examining the Contribution of Critical Visualisation to Information Security}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {59--72}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841118}, doi = {10.1145/2841113.2841118}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/HallHCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LewisC14, author = {Makayla M. Lewis and Lizzie Coles{-}Kemp}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {Who says personas can't dance?: the use of comic strips to design information security personas}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts}, pages = {2485--2490}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2559206.2581323}, doi = {10.1145/2559206.2581323}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/LewisC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DunphyVCCVWMO14, author = {Paul Dunphy and John Vines and Lizzie Coles{-}Kemp and Rachel Clarke and Vasillis Vlachokyriakos and Peter C. Wright and John C. McCarthy and Patrick Olivier}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Understanding the Experience-Centeredness of Privacy and Security Technologies}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {83--94}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683475}, doi = {10.1145/2683467.2683475}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/DunphyVCCVWMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ukais/Coles-KempK14, author = {Lizzie Coles{-}Kemp and Anna Kotova}, title = {Sticking And Making: Technology As Glue For Families Separated By Prison}, booktitle = {{UKAIS} 2014, {UK} Academy for Information Systems 19th Annual Conference 2014, St Catherines College, Oxford, UK, April 7-9, 2014}, pages = {18}, year = {2014}, url = {http://aisel.aisnet.org/ukais2014/18}, timestamp = {Wed, 23 Nov 2016 15:02:56 +0100}, biburl = {https://dblp.org/rec/conf/ukais/Coles-KempK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Coles-KempAS13, author = {Lizzie Coles{-}Kemp and Alice Angus and Freya Stang}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {Letting go: working with the rhythm of participants}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts}, pages = {373--378}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2468356.2468422}, doi = {10.1145/2468356.2468422}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/Coles-KempAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/FailyCDJAL13, author = {Shamal Faily and Lizzie Coles{-}Kemp and Paul Dunphy and Mike Just and Yoko Akama and Alexander De Luca}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {Designing interactive secure system: chi 2013 special interest group}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts}, pages = {2469--2472}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2468356.2468807}, doi = {10.1145/2468356.2468807}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/FailyCDJAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LightC13, author = {Ann Light and Lizzie Coles{-}Kemp}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {196--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_15}, doi = {10.1007/978-3-642-38908-5\_15}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/LightC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trust/2013, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5}, doi = {10.1007/978-3-642-38908-5}, isbn = {978-3-642-38907-8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellaC12, author = {Giampaolo Bella and Lizzie Coles{-}Kemp}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Layered Analysis of Security Ceremonies}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {273--286}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_23}, doi = {10.1007/978-3-642-30436-1\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/Coles-KempR12, author = {Lizzie Coles{-}Kemp and Peter Y. A. Ryan}, title = {Foreword from the Programme Chairs - {STAST} 2012}, booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2012, Cambridge, MA, USA, June 25, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/STAST.2012.5}, doi = {10.1109/STAST.2012.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/Coles-KempR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Coles-KempGGPP12, author = {Lizzie Coles{-}Kemp and Carrie Gates and Dieter Gollmann and Sean Peisert and Christian W. Probst}, title = {Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501)}, journal = {Dagstuhl Reports}, volume = {2}, number = {12}, pages = {37--48}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.12.37}, doi = {10.4230/DAGREP.2.12.37}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Coles-KempGGPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-KempRW11, author = {Lizzie Coles{-}Kemp and Joseph Reddington and Patricia A. H. Williams}, title = {Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {115--122}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.001}, doi = {10.1016/J.ISTR.2011.09.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-KempRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/BellaCCR11, author = {Giampaolo Bella and Gianpiero Costantino and Lizzie Coles{-}Kemp and Salvatore Riccobene}, editor = {Alexander Verbraeck and Markus Helfert and Jos{\'{e}} Cordeiro and Boris Shishkov}, title = {Remote Management of Face-to-face Written Authenticated Though Anonymous Exams}, booktitle = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on Computer Supported Education, Volume 2, Noordwijkerhout, Netherlands, 6-8 May, 2011}, pages = {431--437}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 30 Sep 2011 08:32:56 +0200}, biburl = {https://dblp.org/rec/conf/csedu/BellaCCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/PietersC11, author = {Wolter Pieters and Lizzie Coles{-}Kemp}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Reducing normative conflicts in information security}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {11--24}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073279}, doi = {10.1145/2073276.2073279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/PietersC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slpat/ReddingtonC11, author = {Joseph Reddington and Lizzie Coles{-}Kemp}, editor = {Norman Alm}, title = {Trap Hunting: Finding Personal Data Management Issues in Next Generation {AAC} Devices}, booktitle = {Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies, {SLPAT} 2011, Edinburgh, Scotland, UK, July 30, 2011}, pages = {32--42}, publisher = {Association for Computational Linguistics}, year = {2011}, url = {https://www.aclweb.org/anthology/W11-2304/}, timestamp = {Wed, 01 Jun 2022 15:59:15 +0200}, biburl = {https://dblp.org/rec/conf/slpat/ReddingtonC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/Coles-KempK11, author = {Lizzie Coles{-}Kemp and Elahe Kani{-}Zabihi}, title = {Practice Makes Perfect: Motivating Confident Privacy Protection Practices}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {866--871}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.51}, doi = {10.1109/PASSAT/SOCIALCOM.2011.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/Coles-KempK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BellaC11, author = {Giampaolo Bella and Lizzie Coles{-}Kemp}, title = {Internet Users' Security and Privacy While They Interact with Amazon}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {878--883}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.118}, doi = {10.1109/TRUSTCOM.2011.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BellaC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/BonniciC10, author = {Christian J. Bonnici and Lizzie Coles{-}Kemp}, editor = {Gareth Howells and Konstantinos Sirlantzis and Adrian Stoica and Terry Huntsberger and Tughrul Arslan}, title = {Principled Electronic Consent Management: {A} Preliminary Research Framework}, booktitle = {2010 International Conference on Emerging Security Technologies, {EST} 2010, Canterbury, UK, September 6-7, 2010}, pages = {119--123}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EST.2010.21}, doi = {10.1109/EST.2010.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/BonniciC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiC10, author = {Elahe Kani{-}Zabihi and Lizzie Coles{-}Kemp}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {121--135}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_9}, doi = {10.1007/978-3-642-27937-9\_9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Coles-KempK10, author = {Lizzie Coles{-}Kemp and Elahe Kani{-}Zabihi}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {On-line privacy and consent: a dialogue, not a monologue}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {95--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900560}, doi = {10.1145/1900546.1900560}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Coles-KempK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Coles-KempT10, author = {Lizzie Coles{-}Kemp and Marianthi Theoharidou}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threat and Information Security Management}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {45--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_3}, doi = {10.1007/978-1-4419-7133-3\_3}, timestamp = {Fri, 02 Nov 2018 09:27:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Coles-KempT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2010P10341, editor = {Matt Bishop and Lizzie Coles{-}Kemp and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, title = {Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10341}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/portals/10341/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2010P10341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BishopCGHP10, author = {Matt Bishop and Lizzie Coles{-}Kemp and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, editor = {Matt Bishop and Lizzie Coles{-}Kemp and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, title = {10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response}, booktitle = {Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10341}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2904/}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BishopCGHP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BishopCGHP10a, author = {Matt Bishop and Lizzie Coles{-}Kemp and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, editor = {Matt Bishop and Lizzie Coles{-}Kemp and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, title = {10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response}, booktitle = {Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10341}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2903/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BishopCGHP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-Kemp09, author = {Lizzie Coles{-}Kemp}, title = {The changing shape of privacy and consent}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {3}, pages = {111--112}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2009.10.008}, doi = {10.1016/J.ISTR.2009.10.008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-Kemp09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BogdanovicCC09, author = {Danijela Bogdanovic and Conn Crawford and Lizzie Coles{-}Kemp}, title = {The need for enhanced privacy and consent dialogues}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {3}, pages = {167--172}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2009.10.011}, doi = {10.1016/J.ISTR.2009.10.011}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BogdanovicCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-Kemp09a, author = {Lizzie Coles{-}Kemp}, title = {Information security management: An entangled research challenge}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {4}, pages = {181--185}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2010.04.005}, doi = {10.1016/J.ISTR.2010.04.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-Kemp09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-Kemp08, author = {Lizzie Coles{-}Kemp}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {193--194}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.015}, doi = {10.1016/J.ISTR.2008.10.015}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-Kemp08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/Coles-KempO07, author = {Lizzie Coles{-}Kemp and Richard E. Overill}, title = {On the role of the Facilitator in information security risk assessment}, journal = {J. Comput. Virol.}, volume = {3}, number = {2}, pages = {143--148}, year = {2007}, url = {https://doi.org/10.1007/s11416-007-0040-6}, doi = {10.1007/S11416-007-0040-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/Coles-KempO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Coles-KempO07, author = {Lizzie Coles{-}Kemp and Richard E. Overill}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {172--178}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Coles-KempO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.