Professor Lizzie Coles-Kemp

  1. 2020
  2. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Digital welfare: designing for more nuanced forms of access

    Coles-Kemp, L., Ashenden, D., Morris, A. & Yuille, J., 7 May 2020, In : Policy Design and Practice. p. 1-12 12 p.

    Research output: Contribution to journalBook/Film/Article review

  5. Published

    Civic Empowerment through Digitalisation: The Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2019
  10. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  11. Published
  12. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In : Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  16. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In : Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticle

  17. 2018
  18. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L., 19 Jun 2018.

    Research output: Contribution to conferencePaper

  19. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In : Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticle

  20. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., Apr 2018, CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Holding on to dissensus: Participatory interactions in security design

    Heath, C., Hall, P. & Coles-Kemp, L., 2018, In : Strategic Design Research Journal. 11, 2, p. 65-78 14 p.

    Research output: Contribution to journalSpecial issue

  22. 2017
  23. Published
  24. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D., 5 Oct 2017, Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2016
  27. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In : Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticle

  28. 2015
  29. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In : Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticle

  30. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. 2014
  32. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Logical LEGO: Co-constructed perspectives on service design.

    Heath, C. P., Coles-Kemp, L. & Hall, P. A., 2014, In : NordDesign 2014, Proceedings.

    Research output: Contribution to journalArticle

  34. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. 2013
  40. Published
  41. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Not So Liminal Now: The Importance of Designing Privacy Features Across a Spectrum of Use

    Coles-Kemp, L. & Reddington, J., 2013, Digital Enlightenment Yearbook 2013. Hildebrandt, M., O'Hara, K. & Waidnder, M. (eds.). IOS Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. 2012
  45. Published

    Community-centric engagement: lessons learned from privacy awareness intervention design

    Coles-Kemp, L. & Ashenden, D., 1 Sep 2012, Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. p. 4:1-4:4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L., 2012, Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376. p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. 2011
  48. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In : Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticle

  51. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. 2010
  55. Published

    Insider Threat and Information Security Management

    Coles-Kemp, L. & Theoharidou, M., 2010, Insider Threats in Cyber Security: Advances in Information Security. Springer, Vol. 49. p. 45-71 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. 2006
  57. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter