Lizzie Coles-Kemp

ORCID: 0000-0003-4143-2347
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Information and Cyber Security
  • Innovative Human-Technology Interaction
  • Cybercrime and Law Enforcement Studies
  • Social Media and Politics
  • Cybersecurity and Cyber Warfare Studies
  • Information Systems Theories and Implementation
  • Persona Design and Applications
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Sexuality, Behavior, and Technology
  • Innovative Approaches in Technology and Social Development
  • Digital and Cyber Forensics
  • ICT in Developing Communities
  • Technology Use by Older Adults
  • Software Engineering Techniques and Practices
  • Smart Cities and Technologies
  • Network Security and Intrusion Detection
  • Traumatic Brain Injury and Neurovascular Disturbances
  • Access Control and Trust
  • Global Security and Public Health
  • Data Visualization and Analytics
  • Electronic Health Records Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Child Development and Digital Technology

Royal Holloway University of London
2014-2025

Universidad de Londres
2024

Edith Cowan University
2012-2014

Newcastle University
2014

University of Luxembourg
2012

University of London
2010

King's College London
2007

Assumptions are made by government and technology providers about the power relationships that shape use of technological security controls norms under which usage occurs. We present a case study carried out in North East England examined how community might work together using digital information sharing platform to respond pressures welfare policy change. describe an inductive consideration this highly local before reviewing it light broader theory. By taking approach we problematise...

10.17645/pag.v6i2.1333 article EN cc-by Politics and Governance 2018-06-11

It has been argued that human-centred security design needs to accommodate the considerations of three dimensions: (1) security, (2) usability and (3) accessibility. The latter not yet received much attention. Now governments health services are increasingly requiring their citizens/patients use online services, need for accessible privacy become far more pressing. reality is that, many, measures often exasperatingly inaccessible. Regardless outcome debate about social acceptability...

10.1007/s42979-022-01239-1 article EN cc-by SN Computer Science 2022-06-22

In this paper, we report on a three-year endeavour that fostered 18 collaborations between academic and non-academic organizations to co-create responses social (in)justice issues in digital societies. The projects range of individuals organisations connected programme offer snapshot the state justice thinking within UK economy research sector. Our analysis shows how programme’s constellations actions enacted different modes resistance attempting reshape people’s relationship power dynamics,...

10.1145/3711840 article EN ACM Transactions on Computer-Human Interaction 2025-01-22

Framed within the theoretical lens of positive and negative security, this paper presents a study newcomers to Sweden roles mobile phones in establishment new life. Using creative engagement methods through series workshops, two researchers engaged 70 adult participants enrolled into further education colleges Sweden. Group narratives about phone use were captured outputs, researcher observations notes analysed using thematic analysis. Key findings show that offers security for individuals...

10.1145/3173574.3174158 article EN 2018-04-20

This paper presents a study of mobile phone use by people settling in new land to access state provided digital services. It shows that literacy and technology are not the only resources capabilities needed successfully services do guarantee straightforward resettlement process. Using creative engagement methods, research involved 132 "newcomers" seeking settle Sweden. Ribot Peluso's theory (2003) was employed examine complex web experienced our participants. We uncover when communities...

10.1145/3290605.3300411 article EN 2019-04-29

The joint study of computer security, privacy and human-computer interaction (HCI) over the last two decades has shaped a research agenda focused upon usable & security. However, in HCI more generally there long been an awareness need to understand design for user experience, recognition complex multi-faceted role that technology now plays our lives. In this paper we add growing discussion by introducing notion experience-centered We argue order engage users around issues related experiences...

10.1145/2683467.2683475 article EN 2014-09-15
Thijs Vande Vyvere Guido Wilms Lene Claes Francisco Martin Leon Daan Nieboer and 95 more Jan Verheyden Luc van den Hauwe Pim Pullens Andrew I.R. Maas Paul M. Parizel Cecilia Ackerlund Hadie Adams Vanni Agnoletti Judith Allanson Krisztina Amrein Norberto Andaluz Nada Anđelić Lasse Andreassen Azasevac Antun Audny Anke Anna Degli Antoni Hilko Ardon Gérard Audibert Kaspars Auslands Philippe Azouvi Maria Luisa Azzolini Camelia Baciu Rafael Badenes Ronald Bartels Pál Barzó Ursula Bauerfeind Romuald Beauvais Ronny Beer F. J. Belda Bo‐Michael Bellander Antonio Belli Rémy Bellier Habib Benali Thierry Bénard Maurizio Berardino Luigi Beretta Christopher Beynon Federico Bilotta Harald Binder Erta Biqiri Morten Blaabjerg Hugo den Boogert Pierre Bouzat Peter Bragge Alexandra Bražinová Vibeke Brinck Joanne Brooker Camilla Brorsson András Büki Monika Bullinger Emiliana Calappi Maria Rosa Calvi Peter Cameron Guillermo Carbayo Lozano Marco Carbonara Elsa Carise Kristin J. Carpenter Ana M. Castaño‐León Francesco Causin Giorgio Chevallard Arturo Chieregato Giuseppe Citerio Maryse C. Cnossen Mark Coburn Jonathan Coles Lizzie Coles-Kemp Johnny Collett D. James Cooper Marta Correia Amra Čović Nicola Curry Endre Czeiter Marek Czosnyka Claire Dahyot‐Fizelier François Damas Pierre Damas Helen Dawes Véronique De Keyser Françesco Della Corte Bart Depreitere Godard C. W. de Ruiter Đula Đilvesi Shenghao Ding Diederik W.J. Dippel Abhishek Dixit Emma Donoghue Jens P. Dreier Guy‐Loup Dulière George A. Eapen Heiko Engemann Ari Ercole Patrick Esser Erzsébet Ezer Martin Fabricius Valery L. Feigin

Observer variability in local radiological reading is a major concern large-scale multi-center traumatic brain injury (TBI) studies. A central review process has been advocated to minimize this variability. The aim of study compare with TBI imaging datasets and investigate the added value review. total 2050 admission computed tomography (CT) scans from subjects enrolled Collaborative European NeuroTrauma Effectiveness Research Traumatic Brain Injury (CENTER-TBI) were analyzed for seven main...

10.1089/neu.2018.6061 article EN Journal of Neurotrauma 2018-09-27

10.1016/j.istr.2010.04.005 article EN Information Security Technical Report 2009-11-01

Across Europe, refugees are required to engage with the "civic turn" -- a process of integrating into social and cultural aspects new land. Over two-year period, we engaged 89 settling in Sweden, explore how accelerated digitalised resettlement processes shape civic turn. Framed within wider literature on transitioning everyday insecurities, show this "digital exacerbates existing barriers experienced by refugees. By critically analysing these barriers, reveal turn rests upon series...

10.1145/3313831.3376245 article EN 2020-04-21

In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus much corporate state-funded research. Data visualization regarded as important tool in detection prediction risk vulnerability cybersecurity, but discussion tends to remain at level usability tools how reduce cognitive load on consumers visualizations. This rooted a desire simplify complexity cybersecurity. article argues that while simplification are goals for designers visualizations, there wider...

10.1093/cybsec/tyv004 article EN cc-by-nc-nd Journal of Cybersecurity 2015-12-01

Over half of Syrian refugee households in Lebanon are food insecure with some reliant on an electronic voucher (e-voucher) system for aid. The interplay between the digitisation aid, within socio-technical context refugees, and community collaborative practices is yet to be investigated. Through design engagements interviews refugees shop owners we explore experiences a using e-voucher system. We provide insights into environment which dispensing information power asymmetries experienced,...

10.1145/3415205 article EN Proceedings of the ACM on Human-Computer Interaction 2020-10-14

Abstract Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing omnipresent threat of next “cyber-attack” or emergence a new vulnerability in highly interconnected supply chains. However, such discursive positioning its resolution typically reinforced, perpetuated, dominant power structures forms violence well...

10.1093/ips/olac013 article EN cc-by International Political Sociology 2022-07-23

This paper presents comic strips as an approach to align personas and narrative scenarios; the resulting visual artifact was tested with information security practitioners, who often struggle wider engagement. It offers ways in which different professional roles can work together share understanding of complex topics such security. also user-centered design practitioners a way reflect on, participate with, user research data.

10.1145/2559206.2581323 article EN 2014-04-26

With the move to deliver services on-line, there is a reduction in opportunities for service user discuss and agree terms of management their personal data.As focus turned on-line technologies, design question becomes one privacy protection not negotiation conflict resolution.However, findings from large survey outputs several follow-up groups reflect need systems also support different types consent dialogues.These dialogues are used resolution dilemmas through selection effective...

10.1145/1900546.1900560 article EN 2010-09-21

Consent is a multifaceted concept that has not received much attention in information systems literature. In this paper we categorise current electronic consent decision making into first generation, ex-post and principled Electronic Management. We argue for the adoption of ECM as way forward to management systems, outline research framework ECM, proposing three key components: theory, norms, norms' manifestation. A real world context then selected illustrate framework's intention.

10.1109/est.2010.21 article EN International Conference on Emerging Security Technologies 2010-09-01

The aim of many forms digitalized welfare is to offer a personalized, holistic service that affordable, sustainable, efficient, encouraging and leaves room for voluntary action. We argue these goals be achieved, consideration has given both the design system delivered by provider ecosystem further shapes experience system. In such an not only should state-provided considered but so too community support, as well alternative methods accounting societal contribution. this paper, we use...

10.1080/25741292.2020.1760414 article EN cc-by Policy Design and Practice 2020-04-02

Purpose As part of the growing necessity for inter-organisational and multi-disciplinary interaction to facilitate complex innovation in digital security, there needs be greater engagement with regulation process. This is particularly true case security technologies that are embedded within wider systems largely invisible most users system. paper aims describe stakeholders’ perspectives on process evaluates implications these anticipatory security. Design/methodology/approach Using a...

10.1108/ics-01-2023-0010 article EN Information and Computer Security 2024-06-17
Coming Soon ...