A systematic review of multimedia tools for cybersecurity awareness and education L Zhang-Kennedy, S Chiasson ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021 | 131 | 2021 |
From nosy little brothers to stranger-danger: Children and parents' perception of mobile threats L Zhang-Kennedy, C Mekhail, Y Abdelaziz, S Chiasson Proceedings of the The 15th International Conference on Interaction Design …, 2016 | 84 | 2016 |
The role of instructional design in persuasion: A comics approach for improving cybersecurity L Zhang-Kennedy, S Chiasson, R Biddle International Journal of Human-Computer Interaction 32 (3), 215-257, 2016 | 77 | 2016 |
Revisiting password rules: facilitating human management of passwords L Zhang-Kennedy, S Chiasson, P van Oorschot 2016 APWG symposium on electronic crime research (eCrime), 1-10, 2016 | 74 | 2016 |
Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy L Zhang-Kennedy, Y Abdelaziz, S Chiasson International Journal of Child-Computer Interaction 13, 10-18, 2017 | 67 | 2017 |
Password advice shouldn't be boring: Visualizing password guessing attacks L Zhang-Kennedy, S Chiasson, R Biddle 2013 APWG eCrime Researchers Summit, 1-11, 2013 | 50 | 2013 |
Stop clicking on “update later”: Persuading users they need up-to-date antivirus protection L Zhang-Kennedy, S Chiasson, R Biddle Persuasive Technology: 9th International Conference, PERSUASIVE 2014, Padua …, 2014 | 42 | 2014 |
The aftermath of a crypto-ransomware attack at a large academic institution L Zhang-Kennedy, H Assal, J Rocheleau, R Mohamed, K Baig, ... 27th USENIX Security Symposium (USENIX Security 18), 1061-1078, 2018 | 40 | 2018 |
Teaching with an interactive e-book to improve children's online privacy knowledge L Zhang-Kennedy, S Chiasson Proceedings of the The 15th International Conference on Interaction Design …, 2016 | 32 | 2016 |
Engaging children about online privacy through storytelling in an interactive comic L Zhang-Kennedy, K Baig, S Chiasson Electronic Visualisation and the Arts (EVA 2017), 2017 | 23 | 2017 |
Password advice shouldn't be boring: Visualizing password guessing attacks. In eCrime Researchers Summit (eCRS), 2013 (pp. 1-11) L Zhang-Kennedy, S Chiasson, R Biddle IEEE, 2013 | 23 | 2013 |
" Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices L Zhang-Kennedy, S Chiasson Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 197-216, 2021 | 19 | 2021 |
Privacytoon: Concept-driven storytelling with creativity support for privacy concepts S Suh, S Lamorea, E Law, L Zhang-Kennedy Proceedings of the 2022 ACM Designing Interactive Systems Conference, 41-57, 2022 | 17 | 2022 |
Comprehending the crypto-curious: How investors and inexperienced potential investors perceive and practice cryptocurrency trading H Hadan, L Zhang-Kennedy, L Nacke, V Mäkelä International Journal of Human–Computer Interaction 40 (19), 5675-5696, 2024 | 12 | 2024 |
Secure comics: an interactive comic series for improving cyber security and privacy L Zhang-Kennedy, R Biddle, S Chiasson Scienceopen, 2017 | 11 | 2017 |
Visualizations to teach about mobile online privacy C Mekhail, L Zhang-Kennedy, S Chiasson Persuasive Technology Conference (poster), 2014 | 10 | 2014 |
Geo-phisher: the design and evaluation of information visualizations about internet phishing trends L Zhang-Kennedy, E Fares, S Chiasson, R Biddle 2016 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2016 | 9 | 2016 |
Using comics to teach users about mobile online privacy L Zhang-Kennedy, S Chiasson Technical Report TR-14-02, School of Computer Science, Carleton University …, 2014 | 9 | 2014 |
Privacy in immersive extended reality: Exploring user perceptions, concerns, and coping strategies H Hadan, DM Wang, LE Nacke, L Zhang-Kennedy Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-24, 2024 | 8 | 2024 |
Understanding individual differences: factors affecting secure computer behaviour M Hull, L Zhang-Kennedy, K Baig, S Chiasson Behaviour & Information Technology 41 (15), 3237-3263, 2022 | 8 | 2022 |