Lizzie Coles-Kemp

Orcid: 0000-0003-4143-2347

Affiliations:
  • Royal Holloway, University of London, UK


According to our database1, Lizzie Coles-Kemp authored at least 50 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards Equitable Privacy.
CoRR, 2023

2022
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge.
SN Comput. Sci., 2022

Protecting The Vulnerable: Dimensions of Assisted Digital Access.
Proc. ACM Hum. Comput. Interact., 2022

Designing Through The Stack: The Case for a Participatory Digital Security By Design.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Drawing Out the Everyday Hyper-[In]Securities of Digital Identity.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2020
Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity.
Proc. ACM Hum. Comput. Interact., 2020

Inclusive Security: Digital Security Meets Web Science.
Found. Trends Web Sci., 2020

Digitalised Welfare: Systems For Both Seeing and Working With Mess.
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

Civic Empowerment through Digitalisation: The Case of Greenlandic Women.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Digital Liminalities: Understanding Isolated Communities on the Edge.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Too Much Information: Questioning Security in a Post-Digital Society.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators.
Trans. Edutainment, 2019

Not-equal: democratizing research in digital innovation for social justice.
Interactions, 2019

The significance of securing as a critical component of information security: An Australian narrative.
Comput. Secur., 2019

Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Accessing a New Land: Designing for a Social Conceptualisation of Access.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Walking the Line: The Everyday Security Ties that Bind.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
The regulatory challenges of Australian information security practice.
Comput. Law Secur. Rev., 2016

2015
Critical visualization: a case for rethinking how we visualize risk and security.
J. Cybersecur., 2015

Examining the Contribution of Critical Visualisation to Information Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Information Presentation: Considering On-line User Confidence for Effective Engagement.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Sticking And Making: Technology As Glue For Families Separated By Prison.
Proceedings of the UKAIS 2014, 2014

Understanding the Experience-Centeredness of Privacy and Security Technologies.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Who says personas can't dance?: the use of comic strips to design information security personas.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Letting go: working with the rhythm of participants.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012

Foreword from the Programme Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

Layered Analysis of Security Ceremonies.
Proceedings of the Information Security and Privacy Research, 2012

2011
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud.
Inf. Secur. Tech. Rep., 2011

Internet Users' Security and Privacy While They Interact with Amazon.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Practice Makes Perfect: Motivating Confident Privacy Protection Practices.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices.
Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies, 2011

Reducing normative conflicts in information security.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Remote Management of Face-to-face Written Authenticated Though Anonymous Exams.
Proceedings of the CSEDU 2011, 2011

2010
Insider Threat and Information Security Management.
Proceedings of the Insider Threats in Cyber Security, 2010

On-line privacy and consent: a dialogue, not a monologue.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices.
Proceedings of the Information Security Technology for Applications, 2010

Principled Electronic Consent Management: A Preliminary Research Framework.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

2009
Information security management: An entangled research challenge.
Inf. Secur. Tech. Rep., 2009

The changing shape of privacy and consent.
Inf. Secur. Tech. Rep., 2009

The need for enhanced privacy and consent dialogues.
Inf. Secur. Tech. Rep., 2009

2008
Introduction.
Inf. Secur. Tech. Rep., 2008

2007
On the role of the Facilitator in information security risk assessment.
J. Comput. Virol., 2007

Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...