Control versus Effort in Privacy Warnings for Webforms K Krol, S Preibusch ACM on Workshop on Privacy in the Electronic Society (WPES), 13-23, 2016 | 297 | 2016 |
They brought in the horrible key ring thing! Analysing the Usability of Two-Factor Authentication in UK Online Banking K Krol, E Philippou, E De Cristofaro, MA Sasse NDSS Workshop on Usable Security (USEC), 2015 | 119 | 2015 |
Don't work. Can't work? Why it's time to rethink security warnings K Krol, M Moroz, MA Sasse 2012 7th international conference on risks and security of internet and …, 2012 | 115 | 2012 |
Productive security: A scalable methodology for analysing employee security behaviours A Beautement, I Becker, S Parkin, K Krol, A Sasse Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016 | 76 | 2016 |
Towards robust experimental design for user studies in security and privacy K Krol, JM Spring, S Parkin, MA Sasse The LASER Workshop: Learning from Authoritative Security Experiment Results, 2016 | 68 | 2016 |
The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram R Abu-Salma, K Krol, S Parkin, V Koh, K Kwan, J Mahboob, Z Traboulsi, ... European Workshop on Usable Security (EuroUSEC), 2017 | 56 | 2017 |
The privacy economics of voluntary over-disclosure in web forms S Preibusch, K Krol, AR Beresford The Economics of Information Security and Privacy, 183-209, 2013 | 56 | 2013 |
The great authentication fatigue–and how to overcome it MA Sasse, M Steves, K Krol, D Chisnell Cross-Cultural Design: 6th International Conference, CCD 2014, Held as Part …, 2014 | 54 | 2014 |
Report: Authentication diary study M Steves, D Chisnell, A Sasse, K Krol, M Theofanos, H Wald National Institute of Standards and Technology, 2014 | 40 | 2014 |
Better the devil you know: A user study of two CAPTCHAs and a possible replacement technology K Krol, S Parkin, MA Sasse NDSS Workshop on Usable Security (USEC), 2016 | 28 | 2016 |
Applying cognitive control modes to identify security fatigue hotspots S Parkin, K Krol, I Becker, MA Sasse Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 20 | 2016 |
Assessing the user experience of password reset policies in a university S Parkin, S Driss, K Krol, MA Sasse Technology and Practice of Passwords: 9th International Conference …, 2016 | 18 | 2016 |
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement MA Sasse, K Krol, S Parkin IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2016 | 16 | 2016 |
Poster: Mental models–User understanding of messaging and encryption A Naiakshina, A Danilova, S Dechand, K Krol, MA Sasse, M Smith Proc. of the 1st IEEE European Symposium on Security and Privacy, 2016 | 13 | 2016 |
Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools JRP Mauriés, K Krol, S Parkin, R Abu-Salma, MA Sasse The LASER Workshop: Learning from Authoritative Security Experiment Results, 49, 2017 | 12 | 2017 |
VR and empathy: the bad, the good, and the paradoxical M Moroz, K Krol 2018 IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good), 1-4, 2018 | 11 | 2018 |
Usable biometrics for an ageing population MA Sasse, K Krol IET, 2013 | 11 | 2013 |
Pico in the Wild: Replacing Passwords, One Site at a Time S Aebischer, C Dettoni, GC Jenkinson, KK Krol, D Llewellyn-Jones, ... European Workshop on Usable Security (EuroUSEC), 2017 | 10 | 2017 |
An Exploratory Study of User Perceptions of Payment Methods in the UK and the US K Krol, MS Rahman, S Parkin, E De Cristofaro, EY Vasserman NDSS Workshop on Usable Security (USEC), 2016 | 9 | 2016 |
Effortless privacy negotiations K Krol, S Preibusch IEEE Security & Privacy 13 (3), 88-91, 2015 | 9 | 2015 |