Professor Lizzie Coles-Kemp

  1. 2017
  2. Published

    Walking the line: the everyday security ties that bind

    Coles-Kemp, L. & Rydhof Hansen, R. 13 May 2017 Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292, p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2016
  4. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L. 6 Jun 2016 In : Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticle

  5. 2015
  6. Published

    Critical visualization: A case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L. 1 Dec 2015 In : Journal of Cybersecurity. 1, 1, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  7. Published

    Examining the contribution of critical visualisation to information security.

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A. 2015 Proceedings of NSPW 2015. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2014
  9. Published

    Watching You Watching Me: The Art of Playing the Panopticon.

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M. Nov 2014 Digital Enlightenment Yearbook 2014. O'Hara, K. (ed.). 2014: IOS Press, p. 147-162 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L. 2014 Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P. 2014 Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A. 2014 UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Who says personas can't dance?: The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L. 2014 CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2013
  15. Published
  16. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L. 2013 International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F. 2013 CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Not So Liminal Now: The Importance of Designing Privacy Features Across a Spectrum of Use

    Coles-Kemp, L. & Reddington, J. 2013 Digital Enlightenment Yearbook 2013. Hildebrandt, M., O'Hara, K. & Waidnder, M. (eds.). IOS Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. 2012
  20. Published

    Community-centric engagement: lessons learned from privacy awareness intervention design

    Coles-Kemp, L. & Ashenden, D. 1 Sep 2012 Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. p. 4:1-4:4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L. 2012 Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376, p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. 2011
  23. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L. 1 Jul 2011 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L. 2011 Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H. 2011 In : Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticle

  26. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E. 2011 Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L. 2011 NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L. 2011 Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. 2010
  30. Published

    Insider Threat and Information Security Management

    Coles-Kemp, L. & Theoharidou, M. 2010 Insider Threats in Cyber Security: Advances in Information Security. Springer, Vol. 49, p. 45-71 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. 2006
  32. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H. 2006 Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter