Follow
Kat Krol
Title
Cited by
Cited by
Year
Control versus Effort in Privacy Warnings for Webforms
K Krol, S Preibusch
ACM on Workshop on Privacy in the Electronic Society (WPES), 13-23, 2016
3052016
They brought in the horrible key ring thing! Analysing the Usability of Two-Factor Authentication in UK Online Banking
K Krol, E Philippou, E De Cristofaro, MA Sasse
NDSS Workshop on Usable Security (USEC), 2015
1242015
Don't work. Can't work? Why it's time to rethink security warnings
K Krol, M Moroz, MA Sasse
2012 7th international conference on risks and security of internet and …, 2012
1202012
Productive security: A scalable methodology for analysing employee security behaviours
A Beautement, I Becker, S Parkin, K Krol, A Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016
792016
Towards robust experimental design for user studies in security and privacy
K Krol, JM Spring, S Parkin, MA Sasse
The LASER Workshop: Learning from Authoritative Security Experiment Results, 2016
722016
The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram
R Abu-Salma, K Krol, S Parkin, V Koh, K Kwan, J Mahboob, Z Traboulsi, ...
European Workshop on Usable Security (EuroUSEC), 2017
592017
The privacy economics of voluntary over-disclosure in web forms
S Preibusch, K Krol, AR Beresford
The Economics of Information Security and Privacy, 183-209, 2013
572013
The great authentication fatigue–and how to overcome it
MA Sasse, M Steves, K Krol, D Chisnell
Cross-Cultural Design: 6th International Conference, CCD 2014, Held as Part …, 2014
562014
Report: Authentication diary study
M Steves, D Chisnell, A Sasse, K Krol, M Theofanos, H Wald
National Institute of Standards and Technology, 2014
402014
Better the devil you know: A user study of two CAPTCHAs and a possible replacement technology
K Krol, S Parkin, MA Sasse
NDSS Workshop on Usable Security (USEC), 2016
292016
Applying cognitive control modes to identify security fatigue hotspots
S Parkin, K Krol, I Becker, MA Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
212016
Assessing the user experience of password reset policies in a university
S Parkin, S Driss, K Krol, MA Sasse
Technology and Practice of Passwords: 9th International Conference …, 2016
192016
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement
MA Sasse, K Krol, S Parkin
IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2016
162016
Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools
JRP Mauriés, K Krol, S Parkin, R Abu-Salma, MA Sasse
The LASER Workshop: Learning from Authoritative Security Experiment Results, 49, 2017
132017
Poster: Mental models–User understanding of messaging and encryption
A Naiakshina, A Danilova, S Dechand, K Krol, MA Sasse, M Smith
Proc. of the 1st IEEE European Symposium on Security and Privacy, 2016
132016
VR and empathy: the bad, the good, and the paradoxical
M Moroz, K Krol
2018 IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good), 1-4, 2018
122018
An Exploratory Study of User Perceptions of Payment Methods in the UK and the US
K Krol, MS Rahman, S Parkin, E De Cristofaro, EY Vasserman
NDSS Workshop on Usable Security (USEC), 2016
112016
Usable biometrics for an ageing population
MA Sasse, K Krol
IET, 2013
112013
Pico in the Wild: Replacing Passwords, One Site at a Time
S Aebischer, C Dettoni, GC Jenkinson, KK Krol, D Llewellyn-Jones, ...
European Workshop on Usable Security (EuroUSEC), 2017
102017
Effortless privacy negotiations
K Krol, S Preibusch
IEEE Security & Privacy 13 (3), 88-91, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20