default search action
Lizzie Coles-Kemp
Person information
- affiliation: Royal Holloway, University of London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i4]Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid:
Towards Equitable Privacy. CoRR abs/2308.00004 (2023) - 2022
- [j15]Lizzie Coles-Kemp, Nick Robinson, Claude P. R. Heath:
Protecting The Vulnerable: Dimensions of Assisted Digital Access. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-26 (2022) - [j14]Karen Renaud, Lizzie Coles-Kemp:
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN Comput. Sci. 3(5): 346 (2022) - [c30]Claude P. R. Heath, Lizzie Coles-Kemp:
Drawing Out the Everyday Hyper-[In]Securities of Digital Identity. CHI 2022: 254:1-254:18 - [c29]Ian Slesinger, Lizzie Coles-Kemp, Niki Panteli, René Rydhof Hansen:
Designing Through The Stack: The Case for a Participatory Digital Security By Design. NSPW 2022: 45-59 - 2020
- [j13]Lizzie Coles-Kemp:
Inclusive Security: Digital Security Meets Web Science. Found. Trends Web Sci. 7(2): 88-241 (2020) - [j12]Reem Talhouk, Lizzie Coles-Kemp, Rikke Bjerg Jensen, Madeline Balaam, Andrew Garbett, Hala Ghattas, Vera Araújo-Soares, Balsam Ahmad, Kyle Montague:
Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 134:1-134:25 (2020) - [c28]Lizzie Coles-Kemp, Rikke Bjerg Jensen, Claude P. R. Heath:
Too Much Information: Questioning Security in a Post-Digital Society. CHI 2020: 1-14 - [c27]Rikke Bjerg Jensen, Lizzie Coles-Kemp, Reem Talhouk:
When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement. CHI 2020: 1-14 - [c26]Rikke Bjerg Jensen, Lizzie Coles-Kemp, Nicola Wendt, Makayla M. Lewis:
Digital Liminalities: Understanding Isolated Communities on the Edge. CHI 2020: 1-14 - [c25]Nicola Wendt, Rikke Bjerg Jensen, Lizzie Coles-Kemp:
Civic Empowerment through Digitalisation: The Case of Greenlandic Women. CHI 2020: 1-13 - [c24]Amelia Morris, Lizzie Coles-Kemp, Will Jones:
Digitalised Welfare: Systems For Both Seeing and Working With Mess. WebSci (Companion) 2020: 26-31
2010 – 2019
- 2019
- [j11]Mark Burdon, Lizzie Coles-Kemp:
The significance of securing as a critical component of information security: An Australian narrative. Comput. Secur. 87 (2019) - [j10]Clara Crivellaro, Lizzie Coles-Kemp, Alan J. Dix, Ann Light:
Not-equal: democratizing research in digital innovation for social justice. Interactions 26(2): 70-73 (2019) - [j9]Patricia A. H. Williams, Lizzie Coles-Kemp:
Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators. Trans. Edutainment 15: 108-128 (2019) - [c23]Lizzie Coles-Kemp, Rikke Bjerg Jensen:
Accessing a New Land: Designing for a Social Conceptualisation of Access. CHI 2019: 181 - [c22]Claude P. R. Heath, Clara Crivellaro, Lizzie Coles-Kemp:
Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things. CHI 2019: 308 - 2018
- [c21]Lizzie Coles-Kemp, Rikke Bjerg Jensen, Reem Talhouk:
In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. CHI 2018: 584 - 2017
- [c20]Lizzie Coles-Kemp, René Rydhof Hansen:
Walking the Line: The Everyday Security Ties that Bind. HCI (22) 2017: 464-480 - 2016
- [j8]Mark Burdon, Jodie Siganto, Lizzie Coles-Kemp:
The regulatory challenges of Australian information security practice. Comput. Law Secur. Rev. 32(4): 623-633 (2016) - 2015
- [j7]Peter Hall, Claude Heath, Lizzie Coles-Kemp:
Critical visualization: a case for rethinking how we visualize risk and security. J. Cybersecur. 1(1): 93-108 (2015) - [c19]Elahe Kani-Zabihi, Lizzie Coles-Kemp, Martin Helmhout:
Information Presentation: Considering On-line User Confidence for Effective Engagement. HCI (22) 2015: 517-525 - [c18]Peter Hall, Claude Heath, Lizzie Coles-Kemp, Axel Tanner:
Examining the Contribution of Critical Visualisation to Information Security. NSPW 2015: 59-72 - 2014
- [c17]Makayla M. Lewis, Lizzie Coles-Kemp:
Who says personas can't dance?: the use of comic strips to design information security personas. CHI Extended Abstracts 2014: 2485-2490 - [c16]Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasillis Vlachokyriakos, Peter C. Wright, John C. McCarthy, Patrick Olivier:
Understanding the Experience-Centeredness of Privacy and Security Technologies. NSPW 2014: 83-94 - [c15]Lizzie Coles-Kemp, Anna Kotova:
Sticking And Making: Technology As Glue For Families Separated By Prison. UKAIS 2014: 18 - 2013
- [c14]Lizzie Coles-Kemp, Alice Angus, Freya Stang:
Letting go: working with the rhythm of participants. CHI Extended Abstracts 2013: 373-378 - [c13]Shamal Faily, Lizzie Coles-Kemp, Paul Dunphy, Mike Just, Yoko Akama, Alexander De Luca:
Designing interactive secure system: chi 2013 special interest group. CHI Extended Abstracts 2013: 2469-2472 - [c12]Ann Light, Lizzie Coles-Kemp:
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook. TRUST 2013: 196-204 - [e2]Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8 [contents] - 2012
- [c11]Giampaolo Bella, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. SEC 2012: 273-286 - [c10]Lizzie Coles-Kemp, Peter Y. A. Ryan:
Foreword from the Programme Chairs - STAST 2012. STAST 2012 - [i3]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian W. Probst:
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012) - 2011
- [j6]Lizzie Coles-Kemp, Joseph Reddington, Patricia A. H. Williams:
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud. Inf. Secur. Tech. Rep. 16(3-4): 115-122 (2011) - [c9]Giampaolo Bella, Gianpiero Costantino, Lizzie Coles-Kemp, Salvatore Riccobene:
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams. CSEDU (2) 2011: 431-437 - [c8]Wolter Pieters, Lizzie Coles-Kemp:
Reducing normative conflicts in information security. NSPW 2011: 11-24 - [c7]Joseph Reddington, Lizzie Coles-Kemp:
Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices. SLPAT 2011: 32-42 - [c6]Lizzie Coles-Kemp, Elahe Kani-Zabihi:
Practice Makes Perfect: Motivating Confident Privacy Protection Practices. SocialCom/PASSAT 2011: 866-871 - [c5]Giampaolo Bella, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. TrustCom 2011: 878-883 - 2010
- [c4]Christian J. Bonnici, Lizzie Coles-Kemp:
Principled Electronic Consent Management: A Preliminary Research Framework. EST 2010: 119-123 - [c3]Elahe Kani-Zabihi, Lizzie Coles-Kemp:
Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices. NordSec 2010: 121-135 - [c2]Lizzie Coles-Kemp, Elahe Kani-Zabihi:
On-line privacy and consent: a dialogue, not a monologue. NSPW 2010: 95-106 - [p1]Lizzie Coles-Kemp, Marianthi Theoharidou:
Insider Threat and Information Security Management. Insider Threats in Cyber Security 2010: 45-71 - [e1]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i2]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i1]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [j5]Lizzie Coles-Kemp:
The changing shape of privacy and consent. Inf. Secur. Tech. Rep. 14(3): 111-112 (2009) - [j4]Danijela Bogdanovic, Conn Crawford, Lizzie Coles-Kemp:
The need for enhanced privacy and consent dialogues. Inf. Secur. Tech. Rep. 14(3): 167-172 (2009) - [j3]Lizzie Coles-Kemp:
Information security management: An entangled research challenge. Inf. Secur. Tech. Rep. 14(4): 181-185 (2009) - 2008
- [j2]Lizzie Coles-Kemp:
Introduction. Inf. Secur. Tech. Rep. 13(4): 193-194 (2008) - 2007
- [j1]Lizzie Coles-Kemp, Richard E. Overill:
On the role of the Facilitator in information security risk assessment. J. Comput. Virol. 3(2): 143-148 (2007) - [c1]Lizzie Coles-Kemp, Richard E. Overill:
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. Security and Management 2007: 172-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint