Yahoo Web Search

  1. About 77,600 search results
  1. Location: Announced gathering points include, but are not limited to, the following areas in Vienna: Central City Hall (Rathaus) Zwingli Kirche OeVP headquarters Event: On Thursday, October 3, 2019 from approximately 6:00 p.m. to 11:00 p.m., a political march and demonstration by the group “Wieder Donnerstag” is expected to take place and ...

  2. City Hall Records. October 23, 2019 ·. Various Artists - Open The Dance Vault: Hits From The 80s, 90s, & 2000s. CD out now on TSR Records. We've opened the dance vault to bring you 3 decades of dance hits that includes the sounds of High Energy, Techno, House, Euro, R&B, Pop and Alternative dance.

  3. Jun 03, 2021 · This article about UEFA EURO 2020 in the host city Munich, one of 11 host cities of the pan-European European Football Championship, is commissioned by the Department of Education and Sports (RBS).

    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    Karen Renaud, Stephen Flowerday, Marc Dupuis. Computer Fraud and Security. April 2021. p16-29
    Judy van Biljon and Karen Renaud. How can Human-Computer Interaction designers “at the margins” benefit from Artificial Intelligence & Machine Learning? CHI Workshop: Artificially Intelligent Techn...
    N Alkaldi, Karen Renaud. MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory. The Database of Advanced Information Systems. 2021. To Appear
    Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie. Users’ Information Disclosure Determinants in Social Networking Sites – A Systematic Literature Review. 23rd International Conference on Privacy and...
    D.J. Cranfield, I.M. Venter, R.J. Blignaut, K. V. Renaud. SMARTPHONE SECURITY AWARENESS, PERCEPTIONS AND PRACTICES: A WELSH HIGHER EDUCATION CASE STUDY.Proceedings of INTED2020 Conference. 2nd-4th...
    Saad Alamahri, Karen Renaud, Iadh Ounis. A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. Springer. 6th European Mediterranean and Middle Eastern Conf...
    Yee-Yin Choong, Mary F Theofanos, Karen Renaud, Suzanne Prior. “Passwords protect my stuff” — a study of children’s password practices. Journal of Cybersecurity, Volume 5, Issue 1, 2019, tyz015. ht...
    Isabella Venter, Renette Blignaut, Karen Renaud, Anja Venter. Cyber security education is as essential as “The Three R’s”Heliyon. Volume 5, Issue 12, December 2019, e02855. https://authors.elsevier...
    Karen Renaud, Verena Zimmerman. Nudging Folks Towards Stronger Password Choices: Providing Certainty is the Key. Behavioural Public Policy. Volume 3, Issue 2, 12 February 2018, pp. 228-258. DOI: ht...
    Karen Renaud, Merrill Warkentin, Craig Orgeron. Swamped by cyberthreats, citizens need government protection. The Conversation. 29 November 2018 Albany Times Union Piece GovTech Salon
    Judy van Biljon & Karen Renaud. M4D Reflections on the Maturity of the Mobile Communication Technology for Development (M4D) Landscape: 2008-2016 KAMPALA, UGANDA, NOVEMBER 15-16 2018 https://www.ka...
    Karen Renaud & Stephen Flowerday. Why Governments Should Treat Cybersecurity the Way They Do Infectious Diseases10 September 2018.
    Karen Renaud & Judy van Biljon. Demarcating Mobile Phone Interface Design Guidelines to Expedite Selection. South African Computing Journal. Volume 29, issue 3. December 2017. pp.127-144. https://d...
    Karen Renaud & Gareth Renaud. To Phish or not to Phish. Network Security. October 2017.
    Karen Renaud, Verena Zimmerman, Joseph Maguire, Steve Draper. Lessons learned from evaluating eight password nudges in the Wild. LASER Workshop. Arlington. 18-19 October. 2017
    Karen Renaud & Merrill Warkentin. Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW, Oct 2017, San Francisco, USA
    C Kyfonidis, K Renaud. A Mobile Interface for the Older User. BCS Health Informatics Conference 2016. October. Glasgow, UK.
    Karen Renaud. No, users are not irrational. Network Security. The Firewall Column. Elsevier. November 2016 (p. 20).
    Huda Al Shuaily, Karen Renaud. A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors. 18th International Conference on Higher Education Teaching and Lea...
    Judy van Biljon & Karen Renaud. Validating Mobile Phone Design Guidelines. Focusing on the Elderly in a Developing Country. 2016 Annual Conference of the South African Institute of Computer Scienti...
    A Gutmann, K Renaud, M Volkamer. Nudging Bank Account Holders Towards More Secure PIN Management.Journal of Internet Technology and Secured Transaction. Volume 4.
    J van Biljon & K Renaud. Postgraduate Dissertation Assessment: Exploring Extant Use and Potential Efficacy of Visualisations African Journal of Information and Communication. number 15, p25-37. htt...
    T K Ckiew & K Renaud. Estimating Web Page Response Time Based on Server Access Log. MySec 2015. 9th Malaysian Software Engineering Conference.
    K Renaud, S Flowerday, L ben Othmane, M Volkamer. ‘I am because we are’: Developing and Nurturning an African Digital Security Culture. ACCC 2015. Port Elizabeth. South Africa
    Crawford, H. and Renaud, K., 2014. Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management, 1(1), p.7. doi:10.1186/2196-064X-1-7
    Renaud, K., Maguire, J., van Niekerk, J., & Kennes, D. (2014). Contemplating Skill-Based Authentication. Africa Research Journal, 105(2), 48-60.
    McBryan, T., Renaud, K., & Siebert, J. P. (2014). An Investigation into the use of Images as Password Cues. arXiv preprint arXiv:1407.8004.
    M. Venter, I., J. Blignaut, R., & Renaud, K. (2014). Uniformity in the midst of diversity. Journal of Engineering, Design and Technology, 12(4), 550-562.
    A Killick, C Brown, K Renaud. To Reduce E-mail, Start at the Top. Harvard Business Review. September 2013
    Gareth Renaud and Karen Renaud. Computing Science in the Classroom: Experiences of a STEM Ambassador.Italics, Magazine of the Higher Education Academy. 12(1), 3-13. DOI: 10.11120/ital.2013.00001
    I Venter, R Blignaut, K Renaud. Bridge over the computer science gap.10th IFIP World Conference on Computers in Education WCCE 2013 Torun, 2-5 July 2013
    I Venter, R Blignaut, K Renaud. Reaching out to Mobile Phone Rookies in Two Countries.10th IFIP World Conference on Computers in Education WCCE 2013 Torun, 2-5 July 2013
    Marcia Gibson, Karen Renaud, Marc Conrad and Carsten Maple. Music is the Key: Using our Enduring Memory for Songs to Help Users Log On.Strategic and Practical Approaches for Information Security Go...
    Renaud, K., & Goucher, W. (2012). Email passwords: pushing on a latched door.Computer Fraud & Security, 2012(9), 16-19.
    J Ramsay & K V Renaud. Using insights from email users to inform organisational email management policy. Behavior and Information Technology. Volume 31 Issue 6, June 2012 Pages 587-603. https://doi...
    Helene Muller, Judy van Biljon, Karen Renaud.Information Visualization in Research Reporting: Guidelines for Representing Quantitative Data. SACLA Conference (Southern African Computer Lecturers As...
    Wendy Goucher & Karen Renaud. In A world of their own: Working on the Move.HCI 2011. Newcastle, UK. July, 2011
    K Renaud & R Simpson. WHO is the Enemy?Interfaces. Quarterly Magazine of the BCS Interaction Group. Spring 2011
  4. Nov 03, 2020 · People wait in line to vote at Adam Hall near Auburn Corners, Ohio, Nov. 3, 2020. (AP/Tony Dejak) Experts expected total votes to exceed the 139 million cast in 2016.

  5. Akiko Suwanai (Violin / Artistic Director of International Music Festival NIPPON 2022). Praised by The Times for her “noble playing, with its rhythmic life, taut and rigorous,” Japanese violinist Akiko Suwanai was the youngest ever winner of the International Tchaikovsky Competition in 1990.

  6. Nov 03, 2020 · People wait in line to vote at Adam Hall near Auburn Corners, Ohio, Nov. 3, 2020. (AP/Tony Dejak) Experts expected total votes to exceed the 139 million cast in 2016.

  1. People also search for